After having explained page 26 of your book: Make sure you get this concepts right: 1. What is computer science? A computer system collects data, processes it and transmits the information. Computer science is the techniques and knowledge necessary to automatically process information using a computer Key words: input, output and device. Do exercises 1 and 2 on page 26. Copy down the heading in black colour and answer them using blue ink. 1.1 Binary code; Multiples and submultiples of a Byte: After having explained page 27 Answer these questions below: What is the binary code? What is a bit? What is a byte? How many different characters can be represented with a byte? 1
Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class Complete the gaps below which are from part b of exercise 3 on page 27. The ladder below might help you. In 5Mb there are kb In 8Gb there are kb In 10Tb there are kb In 6MB there are Bytes In 6MB there are bits After having explained page 28 of your book: 1.2 The binary numbering system: Computers use a binary system to represent letters (ASCII code) and numbers. They only understand ones (current is passing through the switch) or zeros (if current is not passing through). We are going to learn how to convert a decimal number into a binary number and vice versa: Answer the questions: How do you convert a binary number into a decimal number? Remember: 2 0 = 1; 21 = 2 ; 2 2 = 4; 2 3 = 8... How do you convert a decimal number into a binary number? Convert the number 25 from decimal into binary: 2
Do exercises 5,6,7 and 9 on page 28 of your book. 3
2. Computer components: After having explained pages 29,30, 31, 32, 33 and 34 of your book: Define the following concepts that appear on the scheme above: Hardware: Software: CPU: Memories: it is where we store the data and instructions that form part of the programs: ROM memory: RAM memory: 4
Store devices: They are used to store information used by the computer: Magnetic (definition and examples): Optical (definition and examples): Solid- state (definition and examples): Peripheral devices: They are used to communicate what is inside the computer to the outside world or vice versa: * Peripheral input devices (definition, examples and a little explanation of each of them): *Peripheral output devices (definition, examples and a little explanation of each of them): *Peripheral input/output devices (definition, examples and a little explanation of each of them): 5
Operating systems (definition, different types, examples and characteristics): Do exercises 11,12,13,14,17 and 18 on page 33. 6
Exercise 1: Match each item with its function: Exercise 2: What is a computer? Cloze Exercise Decide which word fits best in each gap: brain CPU data drives electronic extract hardware holds keyboard memory screen performs physical ports printer process results software storage Computers are 1- machines which can accept data in a certain form,2- the data and give the results of the processing in a specified format as information. Three basic steps are involved in the process. First, 3- is fed into the computer's memory. Then, when the program is run, the computer 4- a set of instructions and processes the data. Finally, we can see the 5- on the screen or in printed form. Information in the form of data and programs is known as 6-, and the electronic and mechanical parts that make up a computer system are called 7-. A standard computer system consists of three main sections: the central processing unit (CPU), the main memory, and the peripherals. Perhaps the most influential component is the 8- Its function is to execute program instructions and coordinate the activities of all the other units. In a way, it is the 9- of the computer. The main memory 10- the instructions and data which are currently being processed by the CPU. The peripherals are the 11- units attached to the computer. They include storage devices and input/output devices. Storage devices (floppy disks, hard disks or compact disks) provide a permanent 12- of both data and programs. Input devices enable data to go into the computer's 13-. The most common input devices are the mouse and the 14-. Output devices enable us to 15- the finished product from the system. For example, the computer shows the output on the 16- or prints the results onto paper by means of a 17-. On the rear panel of the computer there are several 18- into which we can plug a wide reange of peripherals - printers, fax machines, scanners, and headsets. 7
Viruses A virus is a simple program designed to cause harm to someone else's computer. A virus spreads by duplicating and attaching itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is insignificant but inconvenient. Some virus damage is disastrous, putting the computer system out of action by erasing files or corrupting data. How do you get a virus? Viruses are written by malicious programmers who wish to cause problems for other computer users. The primary source of infection these days are email attachments followed by illegal software and infected files from the Internet. If you have up to date anti-virus software installed this will immediately warn you of any infection. If not, there is usually no evidence of the virus and the user is not usually aware of it until something goes wrong. How can you reduce the risk of getting a virus? Viruses can be prevented by taking sensible precautions, including: Keeping your operating system up to date. Using up to date anti-virus software. Not opening an email attachment unless you are expecting it and know the source (many email servers scan emails with anti-virus software on the user's behalf). Not allowing other users to use their own memory stick on your system. Only downloading files from reputable web sites. Avoiding software from unreliable sources. Anti-virus software can inspect computer files and email attachments for viruses and remove them. It is good practice to backup your data regularly. If a virus does damage your data, you can restore the damaged files from backup. 8
Viruses activities: Question: Describe one possible method of preventing a virus getting onto your computer system. Viruses Test 1. What is a computer virus? a) program written to cause harm to a computer b) hardware fault which causes data to be damaged c) fault with the CPU which means that data is lost or damaged 2. What is the most common way people's computers get infected by a virus? a) receive a fax b) install new hardware c) download email attachments 3. Which of the following statements is true? a) you can buy programs that tell you if you have a computer virus b) computer viruses always destroy your work c) you must reinstall your operating system to get rid of a virus 4. What type of warning are you most likely to receive if a virus is found on your system? a) the computer will shut itself down b) siren will sound and continue until the virus is removed c) your anti-virus software will display a message and ask you how to proceed 5. What purpose does anti-virus software serve? a) it deletes every file it suspects is infected b) it stops people gaining unauthorised access to your computer via the internet c) it inspects computer files and email attachments for viruses and removes or quarantines any that it finds 6.Which of the following is BAD advice for protecting your computer against infection? a) open email attachments if they look interesting b) use up-to-date anti-virus software and always download the latest definitions c) only download files from reputable internet sites (look this question up on the internet) 7.What law makes it illegal to knowingly spread a computer virus? a) Computer Misuse Act b) Virus and Hacking Act c) Data Protection Act 8.What year was this Act passed in? a) 1990 b) 1995 c) 2000 d) 2005 9
How to sit correctly: Watch the video and answer this exercise: Complete the gaps in the text with the word from the following list that fits best and copy it down in your notebook: screen breaks, cables, mouse mat, brightness, reach, health, height, injury, floor, flat If you spend many hours using a computer, you can avoid 1- by sitting in the right position and arranging your desk correctly. Just like using any piece of equipment, you have to think about your 2- and safety when using computers. This is why it is important to make sure your computer is set-up correctly: Follow these tips: The monitor is at the correct 3-, the top being in line with your line of eyesight. The chair is at the correct height so your feet are on the 4-. Your feet should be 5- on the floor. If they re not, ask if you can have a footrest, which lets you rest your feet at a level that s comfortable. The screen is at the correct 6- to suit the room you are in. The keyboard and mouse are within easy 7-. 8- are tidied away so they don t clutter up the desk, or get in the way of your legs under the desk. Take regular 9- so you are not in the same position for long periods of time. Keep your mouse close, position and use the mouse as close to you as possible. A 10- with a wrist pad may help to keep your wrist straight and avoid awkward bending. If you are not using your keyboard, push it to one side. 10
What is email, and how do I sign up for it? It s a simple medium for getting someone s message from their computer (or phone or other device) to yours, in a form you can keep or delete. How to Get a Free Gmail Account Want a new email address, with a better user name perhaps; more storage for your messages; or a precise spam filter maybe? A Gmail account can offer you all this. Get a Free Gmail Account To set up a new Gmail email account: Type Gmail English in your search engine, then click on sign in and then click on create an account. A window like the one above will appear. Enter your first name and last names under Name and last. Type your desired user name under Choose your username. o Your Gmail email address will be that user name followed by "@gmail.com"; If your Gmail user name is "example", for instance, your Gmail address will be "example@gmail.com". If Gmail lets you know that your desired user name is not available, enter a different desired name under Choose your username or click one of the proposals under Available. Type the desired password for your Gmail account under Create a password and Confirm your password. o Make sure you pick a secure password. A window will appear telling you how secure your password is grading it from good to strong. Select and enter your birthday under Birthday. Choose your gender under Gender. Optionally, enter your mobile phone number under Mobile phone for account verification and authorization. o You do not need to specify a phone number to sign up for Gmail. Optionally, enter an existing email address under Your current email address if you want to be able to recover a lost password with it. o You do not have to specify this secondary email address to create a Gmail account. Now type the characters in the captcha picture under Prove you're not a robot. Select your country or location under Location. Read Google's terms for serving Gmail. Make sure I agree to Google Terms of Service and Privacy Policy is checked. Optionally, check Google may use my account information to personalize +1's on content and ads on on- Google websites. You do not have to check this to use Gmail. Click Next step. Click Next step again. Now click Continue to Gmail. The teacher email address for this subject will be: technologies1sanjo@gmail.com 11
After creating your Gmail account send me an email from your Gmail account: 1º- Sign in to your account 2º- Click on the red button compose. 3º- Type technologies1sanjo@gmail.com under to 4º- Type your name and surnames under subject 5º- In the message window type again your name and surname as well as your email address. Exercise: Copy down in your notebook the following words and make up a sentence using them. 1- Email account, 2- Email address, 3- Type, 4- Sign in, 5- Sign out, 6- Available,7- Password, 8- Pick, 9- Mail boxes, 10- Inbox mail, 11- Draft mail,12- Sent mail, 13- Trash, 14- Junk mail or Spam mail. 12