SlideShare a Scribd company logo
1 of 33
Learn how to use your computer for everyday work
By Jeewanthi Hettiarachchi
 System software
◦ Operating systems
◦ Device drivers
◦ Utilities
 Application software
◦ Word processor
◦ Spreadsheet
◦ Accounting application
◦ Web browser
◦ Email client
◦ Media player
◦ File viewer
◦ Aeronautical flight simulator
◦ Console game
◦ Photo editor.
◦ Word Processor
◦ Spreadsheet
◦ Database
◦ Presentation
◦ And Many more
Save Button
Always Remember:
• File Name : Internet
• File type : pdf
• File Location : C:UsersDellDesktop
Name and Extension
Type of the file
Location
Size
Time
Copy Cut Paste
(Ctrl+C) (Ctrl+X) (Ctrl+Y)
New Open Undo Redo Print
(Ctrl+N) (Ctrl+O) (Ctrl+Z) (Ctrl+Y) (Ctrl+P)
 Information security is the practice of
defending information from unauthorized
access, use, disclosure, disruption,
modification, perusal, inspection, recording
or destruction.
Wikipedia
 Record keystrokes and steal passwords.
 Send spam and phishing emails.
 Harvest and sell email addresses and passwords.
 Access restricted or personal information on your
computer or other systems that you have access
to.
 Illegally distribute music, movies and software.
 Distribute child pornography.
 Infect other systems.
 Hide programs that launch attacks on other
computers.
 Generate large volumes of traffic, slowing down
the entire system.
 Use good, cryptic passwords that can‟t be easily
guessed. And keep your passwords secret.
 Make sure your computer‟s operating system and
applications are protected with all necessary
security “patches” and updates.
 Make sure your computer is protected with up-
to-date anti-virus and anti-spyware software.
 Don‟t click on unknown or unsolicited links or
attachments, and don‟t download unknown files
or programs onto your computer.
 Remember that information and passwords
sent via standard, unencrypted wireless are
especially easy for hackers to intercept.
 Look for “https” in the URL before you enter
any sensitive information or a password (The
“s” stands for “secure”).
 Also avoid standard, unencrypted email and
unencrypted Instant Messaging (IM) if you‟re
concerned about privacy.
 What is a computer virus?
a piece of code which is capable of copying
itself and typically has a detrimental effect,
such as corrupting the system or destroying
data.
 Common virus types
◦ Boot Sector Virus - This type of virus affects the
boot sector of a floppy or hard disk.
◦ Worms - Worms do not require user actions to
spread, they move from system to system over
networks on their own.
◦ Macro Viruses - Macro viruses infect to the files
that are created using certain applications or
programs that contain macros.
 Antivirus software, or anti-virus software,
also known as anti-malware, is a computer
program used to prevent, detect, and remove
malware. Antivirus software was originally
developed to detect and remove computer
viruses, hence the name.
804 KB (823,301 bytes)
Bit (Binary Digit) = 1 or 0
8 Bits = 1 Byte (Charactor)
0 1 0 0 0 0 0 1
804 KB (823,301 bytes)
1 byte = 8 bit
1Kilo byte = 1024 bytes
1Mega byte = 1024 Kilo bytes
1Giga byte = 1024 Mega bytes
1Tera byte = 1024 Giga bytes
1Peta byte = 1024 Tera bytes
(1024 is Approximately 1000)
3 MB file
= 3x1024 KB = 3,072 KB
= 3x1024x1024 Bytes = 3,145,728 Bytes
= 3x1024x1024 x 8 Bits = 25,165,824 bits
 In mathematics and digital electronics, a
binary number is a number expressed in the
base-2 numeral system or binary numeral
system, which uses only two symbols:
typically "0" (zero) and "1" (one).
 Binary = 0,1 (Base is 2)
 Decimal = 0,1,2,3,4,5,6,7,8,9 (Base is 10)
 0 0 0 1 numerical value 20
 0 0 1 0 numerical value 21
 0 1 0 0 numerical value 22
 1 0 0 0 numerical value 23
1 0 0 0 12
1x 24 + 0x 23 + 0x 22 + 0x 21 + 1x 20
1x 16 + 0x 8 + 0x 4 + 0x 2+ 1x 1
16+ 0+ 0+ 0+ 1
1710
1 0 0 0 12 = 1710
 Convert these Binary Numbers to Decimal
1. 1111112 = ? 10
2. 10101012 = ? 10
3. 111002 = ? 10
1710 = 1 0 0 0 1 2
 Convert these Decimal Numbers to Binary
1. 6310 = ? 2
2. 8510 = ? 2
3. 2810 = ? 2

More Related Content

Similar to Work with Computer

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101Mache Aggie
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 

Similar to Work with Computer (20)

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
kmf.pptx
kmf.pptxkmf.pptx
kmf.pptx
 
Data security
Data securityData security
Data security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 
Communication security
Communication securityCommunication security
Communication security
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Work with Computer

  • 1. Learn how to use your computer for everyday work
  • 3.  System software ◦ Operating systems ◦ Device drivers ◦ Utilities  Application software ◦ Word processor ◦ Spreadsheet ◦ Accounting application ◦ Web browser ◦ Email client ◦ Media player ◦ File viewer ◦ Aeronautical flight simulator ◦ Console game ◦ Photo editor.
  • 4. ◦ Word Processor ◦ Spreadsheet ◦ Database ◦ Presentation ◦ And Many more
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Save Button Always Remember: • File Name : Internet • File type : pdf • File Location : C:UsersDellDesktop
  • 12. Name and Extension Type of the file Location Size Time
  • 13. Copy Cut Paste (Ctrl+C) (Ctrl+X) (Ctrl+Y) New Open Undo Redo Print (Ctrl+N) (Ctrl+O) (Ctrl+Z) (Ctrl+Y) (Ctrl+P)
  • 14.
  • 15.  Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Wikipedia
  • 16.  Record keystrokes and steal passwords.  Send spam and phishing emails.  Harvest and sell email addresses and passwords.  Access restricted or personal information on your computer or other systems that you have access to.  Illegally distribute music, movies and software.  Distribute child pornography.  Infect other systems.  Hide programs that launch attacks on other computers.  Generate large volumes of traffic, slowing down the entire system.
  • 17.  Use good, cryptic passwords that can‟t be easily guessed. And keep your passwords secret.  Make sure your computer‟s operating system and applications are protected with all necessary security “patches” and updates.  Make sure your computer is protected with up- to-date anti-virus and anti-spyware software.  Don‟t click on unknown or unsolicited links or attachments, and don‟t download unknown files or programs onto your computer.
  • 18.  Remember that information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept.  Look for “https” in the URL before you enter any sensitive information or a password (The “s” stands for “secure”).  Also avoid standard, unencrypted email and unencrypted Instant Messaging (IM) if you‟re concerned about privacy.
  • 19.  What is a computer virus? a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • 20.  Common virus types ◦ Boot Sector Virus - This type of virus affects the boot sector of a floppy or hard disk. ◦ Worms - Worms do not require user actions to spread, they move from system to system over networks on their own. ◦ Macro Viruses - Macro viruses infect to the files that are created using certain applications or programs that contain macros.
  • 21.  Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
  • 22.
  • 23. 804 KB (823,301 bytes) Bit (Binary Digit) = 1 or 0 8 Bits = 1 Byte (Charactor) 0 1 0 0 0 0 0 1
  • 24.
  • 25. 804 KB (823,301 bytes) 1 byte = 8 bit 1Kilo byte = 1024 bytes 1Mega byte = 1024 Kilo bytes 1Giga byte = 1024 Mega bytes 1Tera byte = 1024 Giga bytes 1Peta byte = 1024 Tera bytes (1024 is Approximately 1000)
  • 26. 3 MB file = 3x1024 KB = 3,072 KB = 3x1024x1024 Bytes = 3,145,728 Bytes = 3x1024x1024 x 8 Bits = 25,165,824 bits
  • 27.
  • 28.  In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" (zero) and "1" (one).  Binary = 0,1 (Base is 2)  Decimal = 0,1,2,3,4,5,6,7,8,9 (Base is 10)
  • 29.  0 0 0 1 numerical value 20  0 0 1 0 numerical value 21  0 1 0 0 numerical value 22  1 0 0 0 numerical value 23
  • 30. 1 0 0 0 12 1x 24 + 0x 23 + 0x 22 + 0x 21 + 1x 20 1x 16 + 0x 8 + 0x 4 + 0x 2+ 1x 1 16+ 0+ 0+ 0+ 1 1710 1 0 0 0 12 = 1710
  • 31.  Convert these Binary Numbers to Decimal 1. 1111112 = ? 10 2. 10101012 = ? 10 3. 111002 = ? 10
  • 32. 1710 = 1 0 0 0 1 2
  • 33.  Convert these Decimal Numbers to Binary 1. 6310 = ? 2 2. 8510 = ? 2 3. 2810 = ? 2