Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class. After having explained page 26 of your book:

Similar documents
Workshop. Part 1: Creating your account. 1) In the top search bar, type in gmail.com 2) Click on create account

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software

City College Computing

2 User Guide. Contents

Hardware and Operating Systems.

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

Sahalsoftware college. Welcome To understanding Basic Computer Concept

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

Topic :- COMPUTER BASICS Subject :- COMPUTER BASICS Class :- I Semester BCA

Information Communications Technology (CE-ICT) 6 th Class

An Overview of the Computer System. Kafui A. Prebbie 24

Pharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah

Computer Technology Flash Card 2

Which type of computer is used to operate large corporate systems and databases

Copyright 2006 Prentice-Hall. All rights reserved. 1

PUPIL ICT ACCEPTABLE USE POLICY

Which one of the following terms describes the physical components of a computer system?

Zimmer CSCI /24/18. CHAPTER 1 Overview. COMPUTER Programmable devices that can store, retrieve, and process data.

Parts of Computer hardware Software

Using web-based

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

GOZO COLLEGE BOYS SECONDARY

Get comfortable using computers

What is the typical configuration of a computer sold today? 1-1

ICAU1128B: Operate a Personal Computer Student Handbook

But you can also click CC/BCC to send a carbon copy or a blind carbon copy.

CMSC 104 -Lecture 2 John Y. Park, adapted by C Grasso

Which one of the following terms describes the physical components of a computer system?

15/09/15. Introduction to Computers & The Internet. Contents. Computer hardware and software. Input and output devices CPU. Memory.

STUDENT ICT ACCEPTABLE USE POLICY

Children Aged 5-8. For. A Velsoft Computer Manual for Kids. Entertaining Activities Especially for Children...

INTRODUCTION TO COMPUTERS

Basic PC: How do you turn on this darn thing?

Computer & Workstation Self-Assessment Form

Introduction to Computers. Joslyn A. Smith

What is Data Storage?

Using BBC Raw

Electronic mail, or is a quick way of sending messages to people using the internet.

GCSE ICT AQA Specification A (Full Course) Summary

Contents Before you begin vii Topic 1: Start a computer and use system information and features 1 Topic 2: Use the desktop environment 39

File Management. Version: 04_19_04 Developed by: Department of Instructional Technology 2004 Union Institute & University

Three-box Model: These three boxes need interconnecting (usually done by wiring known as a bus. 1. Processor CPU e.g. Pentium 4 2.

D GHz (10 x 1) = [10]

Computer Workstation Self-Assessment Checklist

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

Module 1 Concepts of Information and Communication Technology (ICT)

Document Imaging User Guide

Junk mail, aka Spam. Unsolicited messages that are sent in huge numbers and clog your box.

Peerless Drive System User's Manual

Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall

Start to Finish: Set up a New Account or Use Your Own

ERGONOMIC WORKSTATION SET-UP CHECKLIST

Creating An Account With Outlook

File Maintenance Windows 7 Word What is File Maintenance?

Data protection. 3 April 2018

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

Basic Computer Hardware Notes in PDF

Padasalai.Net s Computer Instructor TRB Exam Study Material Chapter One Introduction to Computer

Machine Architecture and Number Systems CMSC104. Von Neumann Machine. Major Computer Components. Schematic Diagram of a Computer. First Computer?

Communication using

1. A washing machine is controlled by microprocessors. The name given to this type of microprocessor is: A a mainframe computer. B an output device

Machine Architecture and Number Systems

Laptop Health & Safety Policy

Magic Card User Manual

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

Getting Started. Here's how to get started using your Zip 250 drive: 1. Unpack the Zip 250 drive and accessories.

+27 (0) Display screen equipment workstation assessment

U-Storage User s Manual. Version 2.3

General Computing Concepts. Coding and Representation. General Computing Concepts. Computing Concepts: Review

COMPUTERS. IT, short for Information Technology, is the subject related to computers. What does a computer do?

Copyright 2009 BOSMA Enterprises. Chapter 24.

1. Restarting a computer which is already running is referred to as

INFORMATION AND COMMUNICATION TECHNOLOGY

INTERNET SAFETY IS IMPORTANT

Computer Concepts and C Programming. Unit I 06CCP13

Computer Basics. Page 1 of 10. We optimize South Carolina's investment in library and information services.

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known).

DCSZ Student AUP Policy

The personal computer system uses the following hardware device types -

Computer Basics. Hardware. This class is designed to cover the following basics:

SAMPLE RESIT EXAM QUESTIONS

Display Screen Equipment

How to Write Engaging s

National 5 Computing Science Software Design & Development

Introduction to

Main Parts of Personal Computer

ITConnect KEEPING TRACK OF YOUR EXPENSES WITH YNAB

Introduction to computers

Windows XP. A Quick Tour of Windows XP Features

How to Open a Free Yahoo! Account & Basics

Unit 3 Part B. Computer Storage. Computer Technology

HANDOUT: COMPUTER PARTS

So computers can't think in the same way that people do. But what they do, they do excellently well and very, very fast.

GMAIL TIP SHEET. A Note About Space. A Note About Spam. Signing Up for Gmail

What kind of computer is best for you?

Computers Are Your Future Prentice-Hall, Inc.

By: Computer Education. Introduction Level One

Display Screen (DSE) Assessment

Chapter One. Introduction to Computer System

N5 Computing Science - Solutions

Transcription:

After having explained page 26 of your book: Make sure you get this concepts right: 1. What is computer science? A computer system collects data, processes it and transmits the information. Computer science is the techniques and knowledge necessary to automatically process information using a computer Key words: input, output and device. Do exercises 1 and 2 on page 26. Copy down the heading in black colour and answer them using blue ink. 1.1 Binary code; Multiples and submultiples of a Byte: After having explained page 27 Answer these questions below: What is the binary code? What is a bit? What is a byte? How many different characters can be represented with a byte? 1

Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class Complete the gaps below which are from part b of exercise 3 on page 27. The ladder below might help you. In 5Mb there are kb In 8Gb there are kb In 10Tb there are kb In 6MB there are Bytes In 6MB there are bits After having explained page 28 of your book: 1.2 The binary numbering system: Computers use a binary system to represent letters (ASCII code) and numbers. They only understand ones (current is passing through the switch) or zeros (if current is not passing through). We are going to learn how to convert a decimal number into a binary number and vice versa: Answer the questions: How do you convert a binary number into a decimal number? Remember: 2 0 = 1; 21 = 2 ; 2 2 = 4; 2 3 = 8... How do you convert a decimal number into a binary number? Convert the number 25 from decimal into binary: 2

Do exercises 5,6,7 and 9 on page 28 of your book. 3

2. Computer components: After having explained pages 29,30, 31, 32, 33 and 34 of your book: Define the following concepts that appear on the scheme above: Hardware: Software: CPU: Memories: it is where we store the data and instructions that form part of the programs: ROM memory: RAM memory: 4

Store devices: They are used to store information used by the computer: Magnetic (definition and examples): Optical (definition and examples): Solid- state (definition and examples): Peripheral devices: They are used to communicate what is inside the computer to the outside world or vice versa: * Peripheral input devices (definition, examples and a little explanation of each of them): *Peripheral output devices (definition, examples and a little explanation of each of them): *Peripheral input/output devices (definition, examples and a little explanation of each of them): 5

Operating systems (definition, different types, examples and characteristics): Do exercises 11,12,13,14,17 and 18 on page 33. 6

Exercise 1: Match each item with its function: Exercise 2: What is a computer? Cloze Exercise Decide which word fits best in each gap: brain CPU data drives electronic extract hardware holds keyboard memory screen performs physical ports printer process results software storage Computers are 1- machines which can accept data in a certain form,2- the data and give the results of the processing in a specified format as information. Three basic steps are involved in the process. First, 3- is fed into the computer's memory. Then, when the program is run, the computer 4- a set of instructions and processes the data. Finally, we can see the 5- on the screen or in printed form. Information in the form of data and programs is known as 6-, and the electronic and mechanical parts that make up a computer system are called 7-. A standard computer system consists of three main sections: the central processing unit (CPU), the main memory, and the peripherals. Perhaps the most influential component is the 8- Its function is to execute program instructions and coordinate the activities of all the other units. In a way, it is the 9- of the computer. The main memory 10- the instructions and data which are currently being processed by the CPU. The peripherals are the 11- units attached to the computer. They include storage devices and input/output devices. Storage devices (floppy disks, hard disks or compact disks) provide a permanent 12- of both data and programs. Input devices enable data to go into the computer's 13-. The most common input devices are the mouse and the 14-. Output devices enable us to 15- the finished product from the system. For example, the computer shows the output on the 16- or prints the results onto paper by means of a 17-. On the rear panel of the computer there are several 18- into which we can plug a wide reange of peripherals - printers, fax machines, scanners, and headsets. 7

Viruses A virus is a simple program designed to cause harm to someone else's computer. A virus spreads by duplicating and attaching itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is insignificant but inconvenient. Some virus damage is disastrous, putting the computer system out of action by erasing files or corrupting data. How do you get a virus? Viruses are written by malicious programmers who wish to cause problems for other computer users. The primary source of infection these days are email attachments followed by illegal software and infected files from the Internet. If you have up to date anti-virus software installed this will immediately warn you of any infection. If not, there is usually no evidence of the virus and the user is not usually aware of it until something goes wrong. How can you reduce the risk of getting a virus? Viruses can be prevented by taking sensible precautions, including: Keeping your operating system up to date. Using up to date anti-virus software. Not opening an email attachment unless you are expecting it and know the source (many email servers scan emails with anti-virus software on the user's behalf). Not allowing other users to use their own memory stick on your system. Only downloading files from reputable web sites. Avoiding software from unreliable sources. Anti-virus software can inspect computer files and email attachments for viruses and remove them. It is good practice to backup your data regularly. If a virus does damage your data, you can restore the damaged files from backup. 8

Viruses activities: Question: Describe one possible method of preventing a virus getting onto your computer system. Viruses Test 1. What is a computer virus? a) program written to cause harm to a computer b) hardware fault which causes data to be damaged c) fault with the CPU which means that data is lost or damaged 2. What is the most common way people's computers get infected by a virus? a) receive a fax b) install new hardware c) download email attachments 3. Which of the following statements is true? a) you can buy programs that tell you if you have a computer virus b) computer viruses always destroy your work c) you must reinstall your operating system to get rid of a virus 4. What type of warning are you most likely to receive if a virus is found on your system? a) the computer will shut itself down b) siren will sound and continue until the virus is removed c) your anti-virus software will display a message and ask you how to proceed 5. What purpose does anti-virus software serve? a) it deletes every file it suspects is infected b) it stops people gaining unauthorised access to your computer via the internet c) it inspects computer files and email attachments for viruses and removes or quarantines any that it finds 6.Which of the following is BAD advice for protecting your computer against infection? a) open email attachments if they look interesting b) use up-to-date anti-virus software and always download the latest definitions c) only download files from reputable internet sites (look this question up on the internet) 7.What law makes it illegal to knowingly spread a computer virus? a) Computer Misuse Act b) Virus and Hacking Act c) Data Protection Act 8.What year was this Act passed in? a) 1990 b) 1995 c) 2000 d) 2005 9

How to sit correctly: Watch the video and answer this exercise: Complete the gaps in the text with the word from the following list that fits best and copy it down in your notebook: screen breaks, cables, mouse mat, brightness, reach, health, height, injury, floor, flat If you spend many hours using a computer, you can avoid 1- by sitting in the right position and arranging your desk correctly. Just like using any piece of equipment, you have to think about your 2- and safety when using computers. This is why it is important to make sure your computer is set-up correctly: Follow these tips: The monitor is at the correct 3-, the top being in line with your line of eyesight. The chair is at the correct height so your feet are on the 4-. Your feet should be 5- on the floor. If they re not, ask if you can have a footrest, which lets you rest your feet at a level that s comfortable. The screen is at the correct 6- to suit the room you are in. The keyboard and mouse are within easy 7-. 8- are tidied away so they don t clutter up the desk, or get in the way of your legs under the desk. Take regular 9- so you are not in the same position for long periods of time. Keep your mouse close, position and use the mouse as close to you as possible. A 10- with a wrist pad may help to keep your wrist straight and avoid awkward bending. If you are not using your keyboard, push it to one side. 10

What is email, and how do I sign up for it? It s a simple medium for getting someone s message from their computer (or phone or other device) to yours, in a form you can keep or delete. How to Get a Free Gmail Account Want a new email address, with a better user name perhaps; more storage for your messages; or a precise spam filter maybe? A Gmail account can offer you all this. Get a Free Gmail Account To set up a new Gmail email account: Type Gmail English in your search engine, then click on sign in and then click on create an account. A window like the one above will appear. Enter your first name and last names under Name and last. Type your desired user name under Choose your username. o Your Gmail email address will be that user name followed by "@gmail.com"; If your Gmail user name is "example", for instance, your Gmail address will be "example@gmail.com". If Gmail lets you know that your desired user name is not available, enter a different desired name under Choose your username or click one of the proposals under Available. Type the desired password for your Gmail account under Create a password and Confirm your password. o Make sure you pick a secure password. A window will appear telling you how secure your password is grading it from good to strong. Select and enter your birthday under Birthday. Choose your gender under Gender. Optionally, enter your mobile phone number under Mobile phone for account verification and authorization. o You do not need to specify a phone number to sign up for Gmail. Optionally, enter an existing email address under Your current email address if you want to be able to recover a lost password with it. o You do not have to specify this secondary email address to create a Gmail account. Now type the characters in the captcha picture under Prove you're not a robot. Select your country or location under Location. Read Google's terms for serving Gmail. Make sure I agree to Google Terms of Service and Privacy Policy is checked. Optionally, check Google may use my account information to personalize +1's on content and ads on on- Google websites. You do not have to check this to use Gmail. Click Next step. Click Next step again. Now click Continue to Gmail. The teacher email address for this subject will be: technologies1sanjo@gmail.com 11

After creating your Gmail account send me an email from your Gmail account: 1º- Sign in to your account 2º- Click on the red button compose. 3º- Type technologies1sanjo@gmail.com under to 4º- Type your name and surnames under subject 5º- In the message window type again your name and surname as well as your email address. Exercise: Copy down in your notebook the following words and make up a sentence using them. 1- Email account, 2- Email address, 3- Type, 4- Sign in, 5- Sign out, 6- Available,7- Password, 8- Pick, 9- Mail boxes, 10- Inbox mail, 11- Draft mail,12- Sent mail, 13- Trash, 14- Junk mail or Spam mail. 12