SlideShare a Scribd company logo
Training Manual for
Parole and Probation officers
Khyber Pakhtunkhwa
Basic Computer Understanding and Skills
3
The Computer
System Unit
Monitor
Keyboard Mouse
Screen
Speaker
Computers Have Two Main Parts
1. Computer Hardware
2. Computer Software
What is Computer Hardware?
• Computer Hardware is the physical part of the
computer system, the machinery and equipment.
• Parts of the computer “you can see”
Examples of Computer Hardware
Monitor: T.V. like screen used to show pictures and words
CPU: Central Processing Unit this is where most of the computer’s calculations take place.
Keyboard: This device is used to type information into the computer and contains the
numbers 0-9.
Click Here for more Examples
Mouse: a small device, which you move across the top of the desk to move the
pointer or cursor on the screen.
Printer: used to make a paper copy of the information into the computer.
Scanner: an electronic device that generates a digital representation of an image
for data input to a computer
Go Back to Table of Contents
What is Computer Software?
• Computer Software are programs that tell the computer what to do.
Examples
• Microsoft Word-word processing program
• Microsoft PowerPoint-presentation program
• Microsoft Excel-work book program used to track, calculate, and
analyze numeric data
9
Press the
Start Button
Turning on the Computer
(CD-Rom Drive)
(Floppy Drive)
10
The Desktop
Icons
Start menu
Task Bar
Shortcuts
11
The mouse normally has two buttons.
The basic button is on the left.
The right button lets you see pop-up menus (hidden menus).
Some mice have a center button to move the scroll bars.
Point : Move the mouse until the pointer (arrow) reaches the target
Click : Press once on the left button.
Double-click : Press twice quickly on the left button.
Drag : Press the left button and hold while moving the mouse.
The Mouse
12
Pointer (mouse) The mouse pointer changes when you do an action or when you are over text, button,
image or other. Here are the changes that you will see most:
Common pointer.
Indicates that you are over a hypertext when you
are on the Internet.
This pointer indicates a movement
This one appears when you « drag » an object.
This pointer indicates that the option is not available
at this moment.
This helps to expand or reduce the size of an object or a
window.
This pointer inserts text.
**Also called the cursor.
This pointer indicates that an operation is in progress.
Please wait for this operation to end.
This pointer enables your to get some information
Using a Keyboard
14
Esc Cancels the action in use.
Caps Lock Lets you write in capital letters.
Shift Lets you write in capital letters or use the symbols located on top of numbers.
Backspace Erases the character to the left of the cursor.
Delete Deletes the character to the right of the cursor.
Enter Activates a command.
Num Lock Activates or deactivates the numeric keyboard.
Home Moves the cursor to the beginning of the line.
End Moves the cursor to the end of the line.
Insert Lets you insert characters.
Page Up Moves the cursor to the top of the page.
Page Down Moves the cursor to the bottom of the page.
Print screen Prints the screen content.
Some Important Keys
14
15
First, click on Start.
Second, slowly move your mouse
to reach Programs.
Third, slowly move to the right.
Select the program you need.
Opening Programs
16
Turning off the computer
First, click on Start.
Click on Turn Off Computer Or Shut
down
Click on Turn Off
The computer will Shut Down
Computer Vs Mobile Vs Tablet
Activity
Thank you!

More Related Content

Similar to Computer Skills.pptx

Input output devices
Input output devicesInput output devices
Input output devices
Vijay Kumar
 
Parts of computer
Parts of computerParts of computer
Parts of computerMukul Kumar
 
Computer basics
Computer basicsComputer basics
Computer basicslev12
 
Week 1 lesson 2 for Intro to Tech class
Week 1 lesson 2 for Intro to Tech classWeek 1 lesson 2 for Intro to Tech class
Week 1 lesson 2 for Intro to Tech class
rdubroy
 
Day 1 basic computer
Day 1 basic computerDay 1 basic computer
Day 1 basic computerSaket Rai
 
• Input/output Devices • Input Devices • Types of Input Devices
• Input/output Devices • Input Devices • Types of Input Devices• Input/output Devices • Input Devices • Types of Input Devices
• Input/output Devices • Input Devices • Types of Input Devices
The University of Lahore
 
Computer Basics
Computer BasicsComputer Basics
Itc lec 4 input devices
Itc lec 4 input devicesItc lec 4 input devices
Itc lec 4 input devices
AnzaDar3
 
ITC_lec_4.ppt
ITC_lec_4.pptITC_lec_4.ppt
ITC_lec_4.ppt
FazilatShahid
 
Assignment on Input and output devices
Assignment on Input and output devicesAssignment on Input and output devices
Assignment on Input and output devices
Mahmudur Rahman Shojib
 
Computer basics
Computer basicsComputer basics
Computer basics
Dr. Dinesh C. Sharma
 
dcs-computertraningbasics-170826004702 (1).pptx
dcs-computertraningbasics-170826004702 (1).pptxdcs-computertraningbasics-170826004702 (1).pptx
dcs-computertraningbasics-170826004702 (1).pptx
LeenAbed1
 
Unit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptxUnit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptx
rishankPassi
 
Computer fundamental 2 Some information about computer. its input device and ...
Computer fundamental 2 Some information about computer. its input device and ...Computer fundamental 2 Some information about computer. its input device and ...
Computer fundamental 2 Some information about computer. its input device and ...
HamaQarani
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
Vicente Antofina
 
Computer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanaComputer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanasman 2 mataram
 
Computer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanaComputer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanasman 2 mataram
 
89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
Paul Gonzales
 
89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
Paul Gonzales
 
INPUT DEVICES
INPUT DEVICESINPUT DEVICES
INPUT DEVICES
Fatima552
 

Similar to Computer Skills.pptx (20)

Input output devices
Input output devicesInput output devices
Input output devices
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Week 1 lesson 2 for Intro to Tech class
Week 1 lesson 2 for Intro to Tech classWeek 1 lesson 2 for Intro to Tech class
Week 1 lesson 2 for Intro to Tech class
 
Day 1 basic computer
Day 1 basic computerDay 1 basic computer
Day 1 basic computer
 
• Input/output Devices • Input Devices • Types of Input Devices
• Input/output Devices • Input Devices • Types of Input Devices• Input/output Devices • Input Devices • Types of Input Devices
• Input/output Devices • Input Devices • Types of Input Devices
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Itc lec 4 input devices
Itc lec 4 input devicesItc lec 4 input devices
Itc lec 4 input devices
 
ITC_lec_4.ppt
ITC_lec_4.pptITC_lec_4.ppt
ITC_lec_4.ppt
 
Assignment on Input and output devices
Assignment on Input and output devicesAssignment on Input and output devices
Assignment on Input and output devices
 
Computer basics
Computer basicsComputer basics
Computer basics
 
dcs-computertraningbasics-170826004702 (1).pptx
dcs-computertraningbasics-170826004702 (1).pptxdcs-computertraningbasics-170826004702 (1).pptx
dcs-computertraningbasics-170826004702 (1).pptx
 
Unit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptxUnit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptx
 
Computer fundamental 2 Some information about computer. its input device and ...
Computer fundamental 2 Some information about computer. its input device and ...Computer fundamental 2 Some information about computer. its input device and ...
Computer fundamental 2 Some information about computer. its input device and ...
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Computer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanaComputer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandana
 
Computer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandanaComputer explanation by i gede sugita aryandana
Computer explanation by i gede sugita aryandana
 
89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
 
89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
 
INPUT DEVICES
INPUT DEVICESINPUT DEVICES
INPUT DEVICES
 

More from WMEmraanElahi

1- Separation 2 – Significance of training and Development .pptx
1- Separation  2 – Significance of training and Development  .pptx1- Separation  2 – Significance of training and Development  .pptx
1- Separation 2 – Significance of training and Development .pptx
WMEmraanElahi
 
DEVELOPMENT POLICY .pptx
DEVELOPMENT  POLICY  .pptxDEVELOPMENT  POLICY  .pptx
DEVELOPMENT POLICY .pptx
WMEmraanElahi
 
Name sharaf ud din sameer suleman.pptx
Name sharaf ud din sameer suleman.pptxName sharaf ud din sameer suleman.pptx
Name sharaf ud din sameer suleman.pptx
WMEmraanElahi
 
HRM CHALLANGES .pptx
HRM CHALLANGES .pptxHRM CHALLANGES .pptx
HRM CHALLANGES .pptx
WMEmraanElahi
 
abc.1680449892516.pptx
abc.1680449892516.pptxabc.1680449892516.pptx
abc.1680449892516.pptx
WMEmraanElahi
 
information Skills.pptx
information Skills.pptxinformation Skills.pptx
information Skills.pptx
WMEmraanElahi
 
management .pptx
management .pptxmanagement .pptx
management .pptx
WMEmraanElahi
 
Hrm presentation.pptx
Hrm presentation.pptxHrm presentation.pptx
Hrm presentation.pptx
WMEmraanElahi
 
zHRM.pptx
zHRM.pptxzHRM.pptx
zHRM.pptx
WMEmraanElahi
 

More from WMEmraanElahi (9)

1- Separation 2 – Significance of training and Development .pptx
1- Separation  2 – Significance of training and Development  .pptx1- Separation  2 – Significance of training and Development  .pptx
1- Separation 2 – Significance of training and Development .pptx
 
DEVELOPMENT POLICY .pptx
DEVELOPMENT  POLICY  .pptxDEVELOPMENT  POLICY  .pptx
DEVELOPMENT POLICY .pptx
 
Name sharaf ud din sameer suleman.pptx
Name sharaf ud din sameer suleman.pptxName sharaf ud din sameer suleman.pptx
Name sharaf ud din sameer suleman.pptx
 
HRM CHALLANGES .pptx
HRM CHALLANGES .pptxHRM CHALLANGES .pptx
HRM CHALLANGES .pptx
 
abc.1680449892516.pptx
abc.1680449892516.pptxabc.1680449892516.pptx
abc.1680449892516.pptx
 
information Skills.pptx
information Skills.pptxinformation Skills.pptx
information Skills.pptx
 
management .pptx
management .pptxmanagement .pptx
management .pptx
 
Hrm presentation.pptx
Hrm presentation.pptxHrm presentation.pptx
Hrm presentation.pptx
 
zHRM.pptx
zHRM.pptxzHRM.pptx
zHRM.pptx
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Computer Skills.pptx

  • 1. Training Manual for Parole and Probation officers Khyber Pakhtunkhwa
  • 4. Computers Have Two Main Parts 1. Computer Hardware 2. Computer Software
  • 5. What is Computer Hardware? • Computer Hardware is the physical part of the computer system, the machinery and equipment. • Parts of the computer “you can see”
  • 6. Examples of Computer Hardware Monitor: T.V. like screen used to show pictures and words CPU: Central Processing Unit this is where most of the computer’s calculations take place. Keyboard: This device is used to type information into the computer and contains the numbers 0-9. Click Here for more Examples
  • 7. Mouse: a small device, which you move across the top of the desk to move the pointer or cursor on the screen. Printer: used to make a paper copy of the information into the computer. Scanner: an electronic device that generates a digital representation of an image for data input to a computer Go Back to Table of Contents
  • 8. What is Computer Software? • Computer Software are programs that tell the computer what to do. Examples • Microsoft Word-word processing program • Microsoft PowerPoint-presentation program • Microsoft Excel-work book program used to track, calculate, and analyze numeric data
  • 9. 9 Press the Start Button Turning on the Computer (CD-Rom Drive) (Floppy Drive)
  • 11. 11 The mouse normally has two buttons. The basic button is on the left. The right button lets you see pop-up menus (hidden menus). Some mice have a center button to move the scroll bars. Point : Move the mouse until the pointer (arrow) reaches the target Click : Press once on the left button. Double-click : Press twice quickly on the left button. Drag : Press the left button and hold while moving the mouse. The Mouse
  • 12. 12 Pointer (mouse) The mouse pointer changes when you do an action or when you are over text, button, image or other. Here are the changes that you will see most: Common pointer. Indicates that you are over a hypertext when you are on the Internet. This pointer indicates a movement This one appears when you « drag » an object. This pointer indicates that the option is not available at this moment. This helps to expand or reduce the size of an object or a window. This pointer inserts text. **Also called the cursor. This pointer indicates that an operation is in progress. Please wait for this operation to end. This pointer enables your to get some information
  • 14. 14 Esc Cancels the action in use. Caps Lock Lets you write in capital letters. Shift Lets you write in capital letters or use the symbols located on top of numbers. Backspace Erases the character to the left of the cursor. Delete Deletes the character to the right of the cursor. Enter Activates a command. Num Lock Activates or deactivates the numeric keyboard. Home Moves the cursor to the beginning of the line. End Moves the cursor to the end of the line. Insert Lets you insert characters. Page Up Moves the cursor to the top of the page. Page Down Moves the cursor to the bottom of the page. Print screen Prints the screen content. Some Important Keys 14
  • 15. 15 First, click on Start. Second, slowly move your mouse to reach Programs. Third, slowly move to the right. Select the program you need. Opening Programs
  • 16. 16 Turning off the computer First, click on Start. Click on Turn Off Computer Or Shut down Click on Turn Off The computer will Shut Down
  • 17. Computer Vs Mobile Vs Tablet

Editor's Notes

  1. Alphanumeric Keys: These keys are used for entering letters and numbers. Special Keys: Keys such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK, and TAB are special keys. These special keys perform special functions depending on when and where they are used. Punctuation Keys: Punctuation keys include keys for punctuation marks, such as colon (:), semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation marks (“ ”). Command Keys: Keys such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys. You use these keys to insert and delete text and objects. You can turn the INSERT key either ON or OFF. When turned ON, the INSERT key helps you overwrite characters to the right of the insertion point. When turned OFF, the INSERT key helps you enter text or characters to the right of the insertion point, without overwriting this text or characters. An insertion point is the blinking vertical line that indicates the location at which the inserted text appears. The DELETE key is used to remove typed text, characters, and other objects on the right side of the insertion point. The BACKSPACE key is used to remove typed text, characters, and other objects on the left side of the insertion point.