SlideShare a Scribd company logo
1 of 33
Learn how to use your computer for everyday work
By Jeewanthi Hettiarachchi
 System software
◦ Operating systems
◦ Device drivers
◦ Utilities
 Application software
◦ Word processor
◦ Spreadsheet
◦ Accounting application
◦ Web browser
◦ Email client
◦ Media player
◦ File viewer
◦ Aeronautical flight simulator
◦ Console game
◦ Photo editor.
◦ Word Processor
◦ Spreadsheet
◦ Database
◦ Presentation
◦ And Many more
Save Button
Always Remember:
• File Name : Internet
• File type : pdf
• File Location : C:UsersDellDesktop
Name and Extension
Type of the file
Location
Size
Time
Copy Cut Paste
(Ctrl+C) (Ctrl+X) (Ctrl+Y)
New Open Undo Redo Print
(Ctrl+N) (Ctrl+O) (Ctrl+Z) (Ctrl+Y) (Ctrl+P)
 Information security is the practice of
defending information from unauthorized
access, use, disclosure, disruption,
modification, perusal, inspection, recording
or destruction.
Wikipedia
 Record keystrokes and steal passwords.
 Send spam and phishing emails.
 Harvest and sell email addresses and passwords.
 Access restricted or personal information on your
computer or other systems that you have access
to.
 Illegally distribute music, movies and software.
 Distribute child pornography.
 Infect other systems.
 Hide programs that launch attacks on other
computers.
 Generate large volumes of traffic, slowing down
the entire system.
 Use good, cryptic passwords that can‟t be easily
guessed. And keep your passwords secret.
 Make sure your computer‟s operating system and
applications are protected with all necessary
security “patches” and updates.
 Make sure your computer is protected with up-
to-date anti-virus and anti-spyware software.
 Don‟t click on unknown or unsolicited links or
attachments, and don‟t download unknown files
or programs onto your computer.
 Remember that information and passwords
sent via standard, unencrypted wireless are
especially easy for hackers to intercept.
 Look for “https” in the URL before you enter
any sensitive information or a password (The
“s” stands for “secure”).
 Also avoid standard, unencrypted email and
unencrypted Instant Messaging (IM) if you‟re
concerned about privacy.
 What is a computer virus?
a piece of code which is capable of copying
itself and typically has a detrimental effect,
such as corrupting the system or destroying
data.
 Common virus types
◦ Boot Sector Virus - This type of virus affects the
boot sector of a floppy or hard disk.
◦ Worms - Worms do not require user actions to
spread, they move from system to system over
networks on their own.
◦ Macro Viruses - Macro viruses infect to the files
that are created using certain applications or
programs that contain macros.
 Antivirus software, or anti-virus software,
also known as anti-malware, is a computer
program used to prevent, detect, and remove
malware. Antivirus software was originally
developed to detect and remove computer
viruses, hence the name.
804 KB (823,301 bytes)
Bit (Binary Digit) = 1 or 0
8 Bits = 1 Byte (Charactor)
0 1 0 0 0 0 0 1
804 KB (823,301 bytes)
1 byte = 8 bit
1Kilo byte = 1024 bytes
1Mega byte = 1024 Kilo bytes
1Giga byte = 1024 Mega bytes
1Tera byte = 1024 Giga bytes
1Peta byte = 1024 Tera bytes
(1024 is Approximately 1000)
3 MB file
= 3x1024 KB = 3,072 KB
= 3x1024x1024 Bytes = 3,145,728 Bytes
= 3x1024x1024 x 8 Bits = 25,165,824 bits
 In mathematics and digital electronics, a
binary number is a number expressed in the
base-2 numeral system or binary numeral
system, which uses only two symbols:
typically "0" (zero) and "1" (one).
 Binary = 0,1 (Base is 2)
 Decimal = 0,1,2,3,4,5,6,7,8,9 (Base is 10)
 0 0 0 1 numerical value 20
 0 0 1 0 numerical value 21
 0 1 0 0 numerical value 22
 1 0 0 0 numerical value 23
1 0 0 0 12
1x 24 + 0x 23 + 0x 22 + 0x 21 + 1x 20
1x 16 + 0x 8 + 0x 4 + 0x 2+ 1x 1
16+ 0+ 0+ 0+ 1
1710
1 0 0 0 12 = 1710
 Convert these Binary Numbers to Decimal
1. 1111112 = ? 10
2. 10101012 = ? 10
3. 111002 = ? 10
1710 = 1 0 0 0 1 2
 Convert these Decimal Numbers to Binary
1. 6310 = ? 2
2. 8510 = ? 2
3. 2810 = ? 2

More Related Content

Similar to Use Your Computer for Everyday Tasks

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101Mache Aggie
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 

Similar to Use Your Computer for Everyday Tasks (20)

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
kmf.pptx
kmf.pptxkmf.pptx
kmf.pptx
 
Data security
Data securityData security
Data security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 
Communication security
Communication securityCommunication security
Communication security
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Use Your Computer for Everyday Tasks

  • 1. Learn how to use your computer for everyday work
  • 3.  System software ◦ Operating systems ◦ Device drivers ◦ Utilities  Application software ◦ Word processor ◦ Spreadsheet ◦ Accounting application ◦ Web browser ◦ Email client ◦ Media player ◦ File viewer ◦ Aeronautical flight simulator ◦ Console game ◦ Photo editor.
  • 4. ◦ Word Processor ◦ Spreadsheet ◦ Database ◦ Presentation ◦ And Many more
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Save Button Always Remember: • File Name : Internet • File type : pdf • File Location : C:UsersDellDesktop
  • 12. Name and Extension Type of the file Location Size Time
  • 13. Copy Cut Paste (Ctrl+C) (Ctrl+X) (Ctrl+Y) New Open Undo Redo Print (Ctrl+N) (Ctrl+O) (Ctrl+Z) (Ctrl+Y) (Ctrl+P)
  • 14.
  • 15.  Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. Wikipedia
  • 16.  Record keystrokes and steal passwords.  Send spam and phishing emails.  Harvest and sell email addresses and passwords.  Access restricted or personal information on your computer or other systems that you have access to.  Illegally distribute music, movies and software.  Distribute child pornography.  Infect other systems.  Hide programs that launch attacks on other computers.  Generate large volumes of traffic, slowing down the entire system.
  • 17.  Use good, cryptic passwords that can‟t be easily guessed. And keep your passwords secret.  Make sure your computer‟s operating system and applications are protected with all necessary security “patches” and updates.  Make sure your computer is protected with up- to-date anti-virus and anti-spyware software.  Don‟t click on unknown or unsolicited links or attachments, and don‟t download unknown files or programs onto your computer.
  • 18.  Remember that information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept.  Look for “https” in the URL before you enter any sensitive information or a password (The “s” stands for “secure”).  Also avoid standard, unencrypted email and unencrypted Instant Messaging (IM) if you‟re concerned about privacy.
  • 19.  What is a computer virus? a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • 20.  Common virus types ◦ Boot Sector Virus - This type of virus affects the boot sector of a floppy or hard disk. ◦ Worms - Worms do not require user actions to spread, they move from system to system over networks on their own. ◦ Macro Viruses - Macro viruses infect to the files that are created using certain applications or programs that contain macros.
  • 21.  Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
  • 22.
  • 23. 804 KB (823,301 bytes) Bit (Binary Digit) = 1 or 0 8 Bits = 1 Byte (Charactor) 0 1 0 0 0 0 0 1
  • 24.
  • 25. 804 KB (823,301 bytes) 1 byte = 8 bit 1Kilo byte = 1024 bytes 1Mega byte = 1024 Kilo bytes 1Giga byte = 1024 Mega bytes 1Tera byte = 1024 Giga bytes 1Peta byte = 1024 Tera bytes (1024 is Approximately 1000)
  • 26. 3 MB file = 3x1024 KB = 3,072 KB = 3x1024x1024 Bytes = 3,145,728 Bytes = 3x1024x1024 x 8 Bits = 25,165,824 bits
  • 27.
  • 28.  In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" (zero) and "1" (one).  Binary = 0,1 (Base is 2)  Decimal = 0,1,2,3,4,5,6,7,8,9 (Base is 10)
  • 29.  0 0 0 1 numerical value 20  0 0 1 0 numerical value 21  0 1 0 0 numerical value 22  1 0 0 0 numerical value 23
  • 30. 1 0 0 0 12 1x 24 + 0x 23 + 0x 22 + 0x 21 + 1x 20 1x 16 + 0x 8 + 0x 4 + 0x 2+ 1x 1 16+ 0+ 0+ 0+ 1 1710 1 0 0 0 12 = 1710
  • 31.  Convert these Binary Numbers to Decimal 1. 1111112 = ? 10 2. 10101012 = ? 10 3. 111002 = ? 10
  • 32. 1710 = 1 0 0 0 1 2
  • 33.  Convert these Decimal Numbers to Binary 1. 6310 = ? 2 2. 8510 = ? 2 3. 2810 = ? 2