Computer Operations

1,051 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,051
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Course Overview Intro:Livebinder,Multiurl
  • First Demo one item then learner hands on, then demo next Also explain Log Out Shut Down Menu Non-routine Start-up Standby Quick quiz of terminology
  • First Demo one item then learner hands on, then demo next: (may be done simultaneously) Also explain: Dialog Box Submenu Icon & Buttons Scrollbar Drag And Drop Zoom, Minimize & Maximize Wizards Shortcuts Help Quick raise-your-hand quiz of features
  • First Demo one item then learner hands on, then demo next: Also explain: Multiple Monitors Accessibility Settings Shortcuts
  • Explain features and requirements: Pros / cons Cost, Speed, Connectivity: always on / connect, Stability, Cable/ wireless
  • Explain IT System Computer (PC Or Laptop) Input Device (Keyboard, Mouse Or Other Pointing Device) Processor Output Device (Screen, Printer) Storage Media (Memory, Disk, CD, DVD, Data/Memory Stick, Hard Drive, Network Drive) Distribute “ Cool PC Lingo” page-2 “PC Just the steps for Dummies” Cheatsheet_Laptop
  • First Demo one item then learner hands on, then demo next: Use the windows explorer and explain: 1. create, name, open, save, save as, print , close 2. move, copy, rename, share, delete, compress, extract files 3. display file lists, sort, search 4. properties, access control, size, file types First Demo one item then learner hands on, then demo next: create and name folders and subfolders: ICT Training - > PC Operations - > Material change default settings Quick recap
  • First Demo one item then learner hands on, then demo next: Insert, remove, name, label, archive, share, permissions
  • Explain features and requirements: (show physical demo if possible) Data storage Data recovery Quick quiz of terms and features randomly
  • Discuss and explain: Extreme temperatures, Voltage problems, Hackers, Physical Theft, Virtual Theft Viruses, Worms, and Trojan Horses, Spyware, Internet Scams, Online Predators Human Error Hardware damage Health and safety issues: fire, voltage, overheating risks from hardware: shock, power leakage, manufacturer guidelines electrical connection risks and guidelines: shock, leakage, voltage fluctuation use and disposal of cleaning materials: what to use, what not, how to use, how not handling equipment: damage, temperatures, manufacturer guidelines Risks to self and others from using hardware: signals, radioactive, overexposure to light, sound risk assessment safe disposal of IT equipment and consumables: manufacturer guidelines
  • Discuss and explain: adjust seating and lighting (give live demo personally) avoid hazards: standby, voltage, ups take breaks: after every 20mins – look 20feet away – 20eyeblinks (20-20-20) arrangement of hardware and cables: untangled, tagged, labeled wrist rests workspace working conditions Quiz: yes / no questions
  • Virus has received fame after 3 Idiots Viru Shahastrabuddhe Discuss and explain: What are the d angers involved and How to minimize risk Explain: Virus-checking software (give examples) Treat files, software and attachments from unknown sources with caution anti-spam software (give examples) Firewall
  • Discuss and explain: avoid inappropriate disclosure of information: logout, shared computers, online forms Tips: Installing computers in secure locations, Controlling operating environment Surge protection and line conditioning, Uninterruptible Power Supply (UPS) Data Storage in Safe Locations, Virus and Spyware Protection
  • Discuss and explain: Plagiarism Inappropriate-use and piracy: Music, Software, Logo Unauthorized access Legal use Using copyrighted material for educational purposes Sharing links instead of downloaded material Using copyrighted material with the copyright owner's permission
  • Discuss and explain: Do's and Don’ts Email and Instant messaging: include a descriptive subject line, Keep it short spelling and grammar mistakes excessive formatting excessive punctuation CAPITAL LETTERS emoticons like: :-) = happy :-( = sad ;-) = wink :-o = shocked
  • Discuss and explain: Protect personal information avoid misuse of images use appropriate language respect confidentiality
  • Discuss and explain: Manufacturer’s guidelines what maintenance can be done safely; what should be left to experts what problems may happen if maintenance is not done what non-routine maintenance may be needed what maintenance should be carried out by specialist technicians First Demo one item then learner hands on, then demo next: disk cleanup wizard, scheduled tasks, temporary files, cache Cleaning – different components to maintain functionality and appearance.
  • First Demo one item then learner hands on, then demo next: replace printer consumables (paper, toner, cartridge) print test page align cartridge Distribute “WindowsGuidePrint”
  • First Demo one item then learner hands on, then demo next: (Inquiry, need-based) Task manager Trouble shooter tool Device manager Discuss and explain: Inquire and identify needs and solve them along with these: Program not responding error dialogue storage full paper jam virus threat lost network connections memory low driver missing Plug-in not installed monitor does not display correct colors mouse does not respond to movement keyboard error
  • Discuss and explain: help menus manufacturer’s guidelines how to follow advice where to get advice to deal with different hardware and software problems
  • Discuss and explain: Demo how to install: (physical connection and software) keyboard, mouse, speaker, printer, pen-drive, camera
  • First Demo one item then learner hands on, then demo next:
  • Computer Operations

    1. 1. Computer Operations
    2. 2. Work with computers
    3. 3. 1.1 Start And Shutdown <ul><li>Log in </li></ul><ul><li>Password </li></ul><ul><li>Restart </li></ul><ul><li>Safe mode </li></ul><ul><li>Power Management </li></ul>
    4. 4. 1.2 Interface <ul><li>Desktop </li></ul><ul><li>Windows </li></ul><ul><li>Menu </li></ul><ul><li>Toolbars </li></ul>
    5. 5. 1.3 System Settings <ul><li>Desktop </li></ul><ul><li>Input And Output Settings </li></ul><ul><li>Date And Time </li></ul><ul><li>Display Settings </li></ul>
    6. 6. 1.4 Access The Internet <ul><li>Broadband </li></ul><ul><li>Dial Up </li></ul><ul><li>Wireless </li></ul><ul><li>Network Connections </li></ul><ul><li>Mobile Device </li></ul><ul><li>ISP </li></ul>
    7. 7. 1.5 Terminology <ul><li>IT System </li></ul><ul><li>Computer </li></ul><ul><li>Input Device </li></ul><ul><li>Processor </li></ul><ul><li>Output Device </li></ul><ul><li>Storage Media </li></ul>
    8. 8. Information storage and retrieval
    9. 9. 2.1 Manage files & folders
    10. 10. 2.2 Organize and store Information
    11. 11. 2.3 Storage Media <ul><li>CD </li></ul><ul><li>DVD </li></ul><ul><li>memory stick </li></ul><ul><li>media card </li></ul><ul><li>hard drive </li></ul><ul><li>network drive </li></ul><ul><li>mobile device </li></ul>
    12. 12. Safety and Security
    13. 13. 3.1 Work safely <ul><li>Health and safety </li></ul><ul><li>risks from hardware </li></ul><ul><li>electrical connection </li></ul><ul><li>cleaning materials </li></ul><ul><li>handling equipment </li></ul><ul><li>Risks from hardware </li></ul><ul><li>risk assessment </li></ul><ul><li>safe disposal </li></ul>
    14. 14. 3.2 Physical stress <ul><li>http://www.bbc.co.uk/webwise/course/welcome/nethealth/nethealth.shtml </li></ul><ul><li>Quiz </li></ul><ul><li>Seating </li></ul><ul><li>Lighting </li></ul><ul><li>Hazards </li></ul><ul><li>Breaks </li></ul><ul><li>Cables </li></ul><ul><li>Wrists </li></ul><ul><li>Workspace </li></ul>
    15. 15. 3.3 Computer Virus <ul><li>Dangers </li></ul><ul><li>How to minimize </li></ul><ul><li>Anti-virus </li></ul><ul><li>Caution </li></ul><ul><li>Anti-spam </li></ul><ul><li>Firewall </li></ul>
    16. 16. 3.4 Information security
    17. 17. Strong Password & Phishing
    18. 18. 3.1 Information security <ul><li>Copies </li></ul><ul><li>Backup </li></ul><ul><li>Password </li></ul><ul><li>Tips </li></ul>
    19. 19. 3.2 Guidelines: Copyright <ul><li>Plagiarism </li></ul><ul><li>Inappropriate-use </li></ul><ul><li>Piracy </li></ul><ul><li>Unauthorized access </li></ul><ul><li>Legal use </li></ul>
    20. 20. 3.3 Guidelines: Netiquette <ul><li>Do’s </li></ul><ul><li>Don'ts </li></ul>
    21. 21. 3.4 Online Communications <ul><li>Protection </li></ul><ul><li>Misuse </li></ul><ul><li>Language </li></ul><ul><li>Confidentiality </li></ul>
    22. 22. 4.1 Maintenance of Computer <ul><li>Guidelines </li></ul><ul><li>Experts </li></ul><ul><li>Problems </li></ul><ul><li>Specialists </li></ul>
    23. 23. 4.2 Maintenance of Printer <ul><li>Paper </li></ul><ul><li>Toner </li></ul><ul><li>Cartridge </li></ul><ul><li>Print </li></ul><ul><li>Align </li></ul>
    24. 24. 4.3 Troubleshooting <ul><li>Task manager </li></ul><ul><li>Trouble shooter tool </li></ul><ul><li>Device manager </li></ul><ul><li>Problems </li></ul>
    25. 25. 4.4 Help <ul><li>F1 </li></ul><ul><li>Guidelines </li></ul><ul><li>Experts </li></ul>
    26. 26. 5.1 Hardware <ul><li>Device manager </li></ul><ul><li>Add/remove hardware </li></ul><ul><li>Device CD </li></ul>
    27. 27. 5.2 Software <ul><li>Add/remove software </li></ul><ul><li>Software CD </li></ul>

    ×