ECDL Handout 2020-2021 PDF
Document Details
Uploaded by Deleted User
Federica Di Chiara, Sofia Sottili
Tags
Related
- ICDL Computer & Online Essentials Quick Reference PDF
- ICDL Computer & Online Essentials 1.0 QRG.pdf
- Computer Skills & Programming Concepts I Lectures 1-6 PDF
- Lecture 6 I- Computer Essentials Cont'd PDF
- Computer Skills & Programming Concepts I Lectures 1-6 PDF
- ICDL Computer Essentials 1.0 PDF Quick Reference
Summary
This document is an ECDL handout, covering computer science topics. It includes information on computer hardware, such as components, processors, and memory, and software, like operating systems and applications. The document aims to help students prepare for the ECDL exam.
Full Transcript
Handout ECDL Full Standard EDITION A.A. 2020 - 2021 Written by : Federica Di Chiara, Sofia Sottili This handout has been written by students with no intention to substitute the University official materials. Its purpose is to be an instrument useful to the exam preparation,...
Handout ECDL Full Standard EDITION A.A. 2020 - 2021 Written by : Federica Di Chiara, Sofia Sottili This handout has been written by students with no intention to substitute the University official materials. Its purpose is to be an instrument useful to the exam preparation, but it does not give a total knowledge about the program of the course it is related to, as the materials of the university website or professors. MODULE 1: COMPUTER ESSENTIALS ICT= Information and communication Technology It comprises the study of methods to store, elaborate, share information through computer sciences HARDWARE = includes the physical part of the ICT device e.g. keyboard, screen, mouse Computers can be either desktop PC, laptop, tablet, phablet Other mobile devices are smartphone, media players, digital cameras COMPONENTS: - PROCESSOR (CPU = Central processing unit); executes the calculations and the operations required and also controls all the internal processes and the peripheral devices. It is made up by - ALU (Arithmetic and Logic Unit): accomplishes all logical and mathematical operations - CU (Control Unit): coordinates processes - CACHE MEMORY: super-quick temporary memory in which the ALU saves data - PROCESSOR REGISTER: it is the component in which addresses, instructions and values are stored - BUS: it allows communication between the external and internal parts of the computer The power of the device is defined in terms of velocity of the processor Such velocity is calculated on the base of an internal CLOCK in the computer that emits signals regularly The clock’s frequency measured in Hertz (Hz) corresponds to the number of operations that the processor brings about in 1 second. At the moment, devices can run up to 3GHz, that is 3 billion cycles per second - RAM MEMORY (central memory): it is the quick access memory, “random access” and volatile That means, when data are no longer necessary, or when the computer is shut down or when blackouts occur, data are deleted It does not have mechanical parts – all components have the same access velocity. This allows to maximise efficiency Current capacity: 2-4 -8 -16 GB (Pc) 1-2 GB (Smartphone) - MASS STORAGE = type of memory in which data and programs are permanently stored (until the user does not delete them or supports are damaged). Several types exist. These include: HARD DISK, PEN DRIVE/USB, MEMORY CARD, CD, DVD - PERIPHERALS = devices connected to the computer that allow the user to interact with it They allow to insert data (input) obtaining a result (output) Can be both integrated or external. That makes the classification quite shallow, as integrated devices can often be multifunctional. INPUT: keyboard, mouse, touchpad, scanner, webcam, microphone, trackball, touchscreen OUTPUT: screen/monitor (either LCD = liquid-crystal display or CRT = cathode-ray tube), printer, speakers, docking station (used to cool down the PC or increase the number of doors), touchscreen MEMORY = support through which the computer stores data 2 types of memory are present - CENTRAL, which is divided in - ROM (Read Only Memory = the part of the PC in which it is stored the component of the OS that is necessary when starting the computer) - RAM (Random Access Memory = memory of the computer where data that can be useful in a specific moment are used - MASS STORAGE = supports on which files and programs can be saved permanently RAM and Mass storage memory have an impact on the device’s performance: the greater the RAM, the greater the velocity. The access to data in the mass storage memory depends on the type of support. These can come in two forms: HDD = Hard disk drive. It has mechanical components and a low velocity of access SSD = Solid state disk. It is made by a chip of flash memory such as RAM. However it doesn’t automatically deletes when the electricity is cut off. It has a high access velocity PORTS are both of input and output. E.g. ports on desktop PC are parallel, serial (rather slow, substituted by the USB), PS/2 (used for keyboard and mouse), USB, video, network The most common are: - USB (Universal serial bus): it allows for a rapid transfer if data (600 Mb per second). 3 types are available – standard, mini, macro - HDMI (High definition multimedia interface): transfer of audio and video in HD through DVD players/ blue-ray, decoders, tv in HD, computers SOFTWARE = untouchable part of the computer. It is the set of procedures and instructions that allows the device to work and perform specific actions. It is a set of several programs: - OPERATING SYSTEM (OS) = it is vital for the functioning of the device and its hardware components. It is usually installed locally on the device, It controls the basic operations as well as all resources It is loaded on the RAM when the computer starts It is made up by a central part, known as the KERNEL (for basic activities) and several other programs: FILE SYSTEM (interacts with mass storage devices), VIRTUAL MEMORY MANAGER (manages the spaces in the RAM memory), PERIPHERALS MANAGER, SPOOLER (used to direct printing processes), SCHEDULER (multitasking), SHELL (user interface) User interacts with the OS through an interface. In modern computers it is a GUI = Graphical User Interface Main operating systems: ð Computer: WINDOWS, macOS, LINUX, UNIX ð Mobile devices: WINDOWS PHONE, iOS, ANDROID, SYMBIAN, BLACKBERRYOS - APPLICATIONS (Used to pursue the actions the user choices. Can be available both online and locally.) e.g. word processor, spreadsheets, presentations, database browser (internet explorer, Google Chrome, Mozilla Firefox, Apple Safari, Opera) mail, communication (telephony, instant messaging) multimedia (iTunes, Quick Time, Windows Media Player) Social networks, videogames, antivirus, specific applications EULA = end-used license agreement License contract is viewed on the screen when an application is installed. That includes use limitations, warranties, responsibility TYPES OF LICENSE - PROPRIETARY LICENSE: users buy it to use the software. It excludes all rights for the user. Examples are TRIAL VERSION, SHAREWARE LICENSE (Spotify), FREEWARE APPLICATIONS (free) - OPEN SOURCE SOFTWARE: the software can be used and edited as it is completely accessible. Modified/improved versions can be redistributed freely STARTING – desktop: icons, directories, files, windows explorer, network, trash Drag and drop mode is available (left click) If the screen is not integrated it is necessary to turn on the monitor During the computer starting, the OS is loaded in the memory (BOOT PHASE) User account is selected DESKTOP Icons: can choose order, dimensions, order automatically, align functions TASKBAR - Windows button / Start Menu - Active applications - ENG button (to change the keyboard settings) - Bar of messages RESOURCE LINK: right click in any part of the desktop. Select the function. Specify the file’s position. If the link is deleted the resource is not deleted as well Follow the path: right click – delete/CANC button – move into the Trash folder WINDOWS TITLE BAR (in the upper part): application name and file name MENU BAR (in the upper part, below the title): a series of menus available (e.g. file, edit, layout, view) STATE BAR (in the bottom): e.g. in Notes and Words it shows the number of words, lines FLIP BAR (can be both vertical and horizontal) APPLICATIONS BAR (can only be found in Office applications): set of buttons Windows can be downsized as desired Online guide can be accessed anytime: START – Guide CONTROL PANEL - SYSTEM: hardware and software characteristics of the PC (can be accessed from icon COMPUTER, right click, properties) - AUDIO - SCREEN - TIME AND DATE (or click on the desktop’s clock) - KEYBOARDS AND LANGUAGE - PROGRAMS and functions – accessed to de-install an application TASK MANAGER – when an app doesn’t work properly access this – right click on the application bar Connect and disconnect USB - File explorer – computer. See what devices are connected - Notification bar – secure removal SCREENSHOT of the active window - SNIPPING TOOL (Windows application): follow the path Start – program list – accessories - COMBINATION: STAMP (all the background is selected) or ALT+STAMP (active window) It is possible to paste the image or can be saved on the device TXT EXTENSION – opened with NotePad Copy: CTRL+C Paste: CTRL+V Print: Start Menu – Printers and devices. In Windows you already have pre-set printers. Can install the driver. De-install a printer: right click Manage the PRINT SPOOLER: select the printer, view the prints in wait, suspend, resume, cancel FILE MANAGER Windows expolorer application (application bar/start menu/all programs – accessories/computer applications) Can distinguish one disk from another through the capital letter followed by a column STARRED/FAVOURITES: section along with desktop, download, local files, libraries Can show icons viewing all details Right button – Properties (More information on the file) – READ ONLY mode applied: file cannot be modified It is possible to rename files or create a new directory File manager – NAME button – can order the list in ascending fashion (alphabetical, type, dimensions, last edited) Select more contiguous files: select a file, MAIUSC, browse down Select several non-contiguous files: select a file, CTRL, select another file DRAG AND DROP mode (if you move one file on another disk, it is copied) Cancel a file: right click – Delete/CANC Data are developed as sequences of BIT (binary digits 0,1) 8 BIT make up a BYTE Byte is the unit of measurement of the file’s dimension and the memory capacity. A byte can be combined in 256 (from 2 to 8 digits) different symbols and digits. Can have Kilo, mega, giga, tera, petabytes. Support devices (different storage capacity, access velocity, transportability): - HARD DISK/Fixed disk/Rigid internal disk: dimensions of Terabyte order. Non transportable, optimal access velocity (especially if SSD) - INTRANET: terabyte, non-transportable, access velocity linked to connection type. It is the hard disk of the server - EXTERNAL HARD DISK (both mechanical or SSD): terabyte dimensions, transportable, good access velocity (especially if SSD) if connected through an USB 2.0, optimal if connected through a USB 3.0. Big dimension. Doesn’t request a player - PEN DRIVE: 128 Gb, portable, good (USB 2.0) or optimal (USB 3.0) access velocity - DISKS: transportable, can be used through a plateyer o CD (compact disc) / CD-ROM: 650 or 700 Mb, sufficient access velocity. Can be re-written only if it is RW type o DVD (digital versatile disc) o BLU-RAY DISC (BD) - MEMORY CARD: about 128 GB, transportable, can be used through a player, optimal access velocity. Magnetically based technology - ONLINE STORAGE UNIT: storage such as cloud computing (allows to access several resources), decentralised, safe, easy to access Verify the memory capacity of a support device to see how much space is left: Windows explorer – computer – click on the support with the right click – properties COMPRESS/ZIP one or more file: cluck with the right click – send to – compressed archive file (Windows 7 algorithm). If more files are compressed it is then necessary to rename the folder (there are several applications to compress) EXTRACT FILES: Extract all files – OR – right click, extract all – then select the folder from which files are extracted Extract a UNIQUE file from the compressed archive file: drag and drop the file on the desktop. A copy of the file is created COMPUTER NETWORK = communication system between one or more electronic devices with the aim of: - Share hardware/software resources or connectivity - Access common data saved in a single place (avoid duplicates) Risks: data safety, malware Reduce the risks: only authorized users can access (USERNAME, PASSWORD) NETWORK CLASSIFICATION 1) Connectivity type between devices and peripherals o WIRED connection based on cable, copper, optical fibre o WIRELESS connection: based on radio waves (WIFI, Bluetooth) 2) Based on hierarchical structure (i.e. the relationship between devices) o CLIENT-SERVER: powerful computer (server) that makes its resources available to other devices (client) o PEER TO PEER (PtP): network in which each computer can be either server or client, offering and using shared resources 3) Extension based (territorial, geographical) o WIRED connection LAN (Local Area Network): few computers in a limited area (class, office) MAN (Metropolitan Area Network): network connecting computers in one or more cities WAN (Wide Area Network): network extended on a huge geographical distance o WIRELESS connection WPAN (Wireless Personal Area Network): individual network, personal devices - Bluetooth smartphone Wireless LAN: LAN connected through Wi-Fi Wireless WAN: network realized through wireless technologies able to cover huge distances INTERNET = set of public access networks around the world and connected between different countries through phone lines and other technologies - digital data are sent and received Services: o WORLD WIDE WEB = Informational space made up of files and web resources connected through hyperlinks that can be found through the browser o EMAIL - allows to exchange messages attaching several types of files o INSTANT MESSAGING: System that allows to exchange short messages in real time o VoIP (VOICE OVER INTERNET PROTOCOL): video/audio calls INTRANET (firms or public services, offices In the same building) VPN (Virtual private Network): used by firms that are decentralised. Data travel encrypted, as the VPN Is a private communication network that exploits a public infrastructure (internet) Measuring network performance: BITxSEC (measure unit of velocity of data transmission) Asymmetric connection (ADSL) has high DOWNLOAD velocity, slow UPLOAD velocity ISP = Internet Service Provider Provider of internet services. It is a society that sells on the market the access to the internet. A subscription is necessary to access services through a connection to the server Before subscribing a contract, it is necessary to consider the costs (which can be flat = monthly fee to be paid even though the service is not used), maximum upload and download velocity guaranteed, limitations in the quantity of data that can be downloaded, type of connection Connection to the Internet ð FIXED PHONE LINE - ANALOGICAL connection (modem dial up internal or external that transforms the digital signals of the computer in sounds to send them to ISP's phone number. - ISDN connection (Integrated services digital network): faster modems that use digital data phone lines. Can run up to 64 kbit/sec - 128 kbit/sec - ADSL (Asymmetric digital subscriber line): external modems that use a BROADBAND. Can run up to 640 kbit/sec - 20/30 megabit/sec ð MOBILE TELEPHONY: mobile phones of at least second generation, pen drives, pc card - 3G CONNECTION: third generation mobile phones, velocity similar to the ADSL (4-5 Mbit/sec) - 4G CONNECTION: fourth generation mobile phones. Download can reach up to 3 Gbit/sec ð WIFI HOTSPOT: wireless internet access. More and more frequent. Can be found in public places such as hotels, restaurants, bar, parks, malls ð TV CABLE (much used in the USA) - can access the Internet through the TV cable ð WiMax Connection: wireless connection, broadband, higher velocity and coverage of the Wi-Fi, almost non-existing in Italy. It allows to create broadband connections in those areas where it is not convenient for ISP's to use cables ð SATELLITE connection: available on the entire planet, costly, used in those places which are isolated. It uses a special modem It is easy to connect unauthorized devices to wireless connections. Wireless connections can be OPEN (unprotected, accessible by everyone. no fee, no password) or PROTECTED/SAFE (access password required) PROTECTION: Risks can come from unauthorized people accessing data, loss of data because of distraction, malfunctioning, malwares To minimize risks: - Password (Follow suggestions to make them safe) - FIREWALL (Hardware or software device that monitors and controls the Internet traffic in order to avoid unauthorised access or malware intrusions. Personal firewalls are software available in the OS (e.g. Windows Firewall in Control Panel - System and Safety) - Periodical backup: security copies. Firms backup is regulated by the Disaster recovery plans - UPDATE the software: download antivirus, update the virus definitions. On windows, update management is in Control Panel MALWARE (malicious software)= malicious software, created in order to cause damage, get data or gain access to private systems. Viruses are a particular type of malware Malwares can infect a device by: - Executing files such as exe or bat - Opening attachments to a mail - Using Infected mass storage - Downloading files or software from the internet INFECTIOUS KIND OF MALWARES: VIRUS: code parts that spread by being copied into programs or into the hard disk→ they run every time that the infected file gets opened. If you move the file to another device, the virus will spread there too. WORM: programs that modify the operating system so that they run automatically using the internet. They don't need other files to spread. They use social engineering techniques or bugs in programmes. TROJAN (trojan horse): software with licit purposes, but that contain dangerous information, unknown to the user SPYWARE: software downloaded inadvertently, programmed to record and transmit personal data and information on the user's activity online. Doesn't show. ANTIVIRUS SOFTWARE: it is specific; prevents, detects and removes malwares from folders, files and RAM memory. Must always be up to date. The updates follow the evolution of the malwares, otherwise protection cannot be 100% guaranteed. Sometimes antiviruses may detect “fake positives”; it is then necessary to download the updated version. Usually this happens automatically. Other software need to be up to date too. Signals that the computer might be infected - Initial page is different from the one that was set by the user - Internet popups - When the computer starts, browser or other programs are opened automatically - Some windows are opened automatically - Emails are sent to all contacts If the antivirus doesn’t solve the problem, it might be necessary to FORMAT THE DISK - delete the entire content ERGONOMICS It is the science that studies the way human body interacts with technology, machines and workplaces. It is useful to safeguard people's health Ergonomics gives behavioural suggestions to realise USER FRIENDLY, SAFE, RELIABLE devices, so that negative effects are minimised, by examining critical factors. Devices are not dangerous per se but can be if they are used badly: it Is necessary to have pauses (10 minutes per hour), move the eyes away about every 10 mins, do not stay seated during pauses, take care of airing, air-conditioning, light (possibly on the left) of the environment SCREEN Light and contrast (need to be set so that is possible to see the screen without effort for the eyes) Quality (shall be an LCD screen), dimensions ( 15'' at least), resolution (= quality of pixels that are visualized, points need not to be perceivable, but not too small) REFRESH frequency shall be high (60-120 Hz) POSTURE Look at the screen perpendicularly Seat needs to be adjustable and with a lumbar support for the back, as well as armrests Keyboard shall be ergonomic and placed at the same height of elbow Mouse should be ergonomic and at the same height of the keyboard ENVIRONMENT PROTECTION Devices are considered as RAEE (Electrical and electronic machinery trash). These are dangerous contain potentially toxic substances and are not biodegradable In Italy a tax has been put, starting from 2005 To recycle, it is necessary to bring the devices in the shops where they were bought Manage energetic resources of the computer Start - control panel - power management options - power management (reduces PC performances) or balanced (PC decides whether to use high performance setting or power management) or GRADUAL SHUTDOWN (after some time, can set a degree of luminosity based on the power source used, screen dimension, computer suspension) AIDING people with hearing, eyesight, mobility problems Start - control panel - Accessibility centre - Programs such as Vocal assistant, high contrast, magnifying glass, keyboard on screen (physical interface that can be used through voice recognition or other similar devices) MODULE 2: ONLINE ESSENTIALS INTERNET: network of worldwide informatic connections. Allows connection and communications. Many LAN networks connected→ wider networks (WAN) connected to even bigger networks (backbones), which are high speed lines. HYPERLINK (LINK): hypertext link→ reference from a unit to another on a digital support. It is characterised by graphic signals (underlines). The link gets activated by a mouseclick, then gets visualized. WORLD WIDE WEB (WWW): the whole of all the hypertextual and multimedial pages that you can surf through specific applications. Allows sharing. UNIFORM RESOURCE LOCATOR (URL): sequence of characters that univocally identifies the address of a resource on the internet. You find it on a hot server. WEB SITES: hosted on servers, when they have an IP address (internet protocol, a sequence of four numbers between 0 and 225 separated by a dot) you can reach them by the internet. The IP address identifies univocally any device connected to the internet. DOMAIN NAME SYSTEM (DNS): service which associates an URL to any IP WEBSITE ADDRESS: made up by two parts: FIRST LEVEL DOMAIN (the website's kind of domain) + SECOND LEVEL DOMAIN (company, institution or topic of the site). → Examples of first level domains: - it, fr, de, uk, es: state indicators - com, biz: commercial organization - gov: government institutions - org: no profit organization - info: information companies BROWSER: application able to browse the hypertext pages on the web. Examples: internet explorer, mozilla firefox, google chrome, apple safari. The web gives informations and provides services, for example: o e-commerce o home banking o e- government o distance learning ONLINE PROTECTION TOOLS: HTTPS PROTOCOLS: safe version of the http protocol→ before transmitting data to one device to another, it crypts them so that only the receiving website can read them. When purchasing online, you must be sure that the website is safe; you can do that by reading other clients' feedbacks, and if there are none you must do a screening. When you are done with a website you must log off. DIGITAL CERTIFICATE: document that proves that the sender of an e-mail or a website owner really is who he claims to be. It is used together with the https protocol. When speaking of economic transactions, for example, it is compulsory. You can view the digital certificate by clicking on https (website address bar)→security→view certificate. The access to contents online may not be full→ minors cannot see certain websites (parental control: tecniques tha filter webpages contents); inside companies or institutions, if the network traffic is excessive it could make the whole system slower. WEB NAVIGATION To view a web page: access to a browser→ type the wanted webpage's address in the multitask bar. To edit the home page (starting page of the browser): three dots icon in the top right corner→settings menu→start ADVANCED SETTINGS: three dots icon in the top right corner→ settings menu→ show advanced settings→privacy→ content settings: cookie (website settings, managing exceptions): file where nativating preferences are stored pop up (website settings, managing exceptions): windows that show up when opening websites, ads Window on the left, settings: browser informations→ “get assistance” button→ online assistance layout: to choose the settings to show in the multifunction bar privacy: delete browsing history, downloads, cookies, pictures and cache files, permissions, data CACHE: folder which temporarily stores files connected to the navigation. This allows for a faster navigation experience, but saturates the device's memory. BOOKMARKS, FAVOURITES: bookmarks manager. On Google Chrome: multifunction task bar: “add to favourites button” (star) three dot icon on the top right corner: favourites→ favourites settings folders menu→ new folder new folder→manage TO DOWNLOAD FILES AND TEXTS ON THE DEVICE: FILE: save→ download/ right click→ save as PICTURES AND TEXTS: copy and paste/ save (in a folder or on desktop) SEARCH ENGINES (for example Google, Bing or Yahoo): allow you to reach websites without knowing their address. The search engine can receive informations either in a passive way (by simply receiving data from websites developers) or actively (softwares called spiders: search for new pages to add to the database). The algorithm that selects the informations, also organizes the sites. Each search engine has its own algorithm. TOOLS BUTTON: language, date. CANCEL BUTTON: takes every research filter off TO RESEARCH A QUOTE: write it under quotation marks Since on the internet it is possible to write whatever comes to your mind, it is also easy to manipulate informations, so anything must be read with a critical mind. Factors which allow for so many informations to be on the internet: informations (newspapers) entertainment propaganda commerce: companies websites, ad websites TO VERIFY INFORMATIONS: checking the author's authority checking the sources confronting informations on different websites contents must be up to date COPYRIGHT: laws that guarantee an author's rights→ an author has exclusive faculty of spreading what he did produce. COPYLEFT (1984): free software. On the internet, it is easy to download files→ this doesn't mean it always is licit. You always need to know the licence. It is a right protected by the law. In Italy: law 633, 1941: it's about intellectual products such as literature, music, figurative arts, architecture, theatre, cinematography, photogaphy, software, database, technical drawing products. The only way to be sure something is free is for it to be stated in the licence. In order to be subjected to copyright, it is not necessary for a piece to be registered or to show the © symbol. ONLINE/VIRTUAL COMMUNITIES groups of people interacting thanks to services provided by the internet (for example forums, chats, games, social networks). Everyone can use his own identity or fake another. - forum: board, message board, bulletin board, discussion groups→ informatic structure based on webpages that allow for interactions. They need a database and are accessible via browser or specific apps. - online games - chats: to communicate in real time - social networks - videoconferences TO SHARE CONTENTS ONLINE: - blog (web+log: online diary) → text, pictures, videos - microblog: short text messages→ twitter: 140 characters - podcasts (pod+ broadcast: personal on demand broadcast) → thanks to a subscription (RSS feed), and thanks to a program able to receive them (aggregator), authomatically downloads contents available online. - pictures: social networks such as flickr - audio clips - video clips (Youtube) PRIVACY in virtual communities you don't know the other user's real identity. You must: set your privacy settings so that only contacts/friends can see your data using private messaging never share your position or personal data block and report unknown users INSTANT MESSAGING: sharing in real time short sentences, files and audio. Sinchronic exchange. It is different from forums, e-mails and private chats. You need an account and a client program who is able to interact with the server. SMS: short message service→ characteristics: cheap, you can read again messages even after a long time, mobile phone based MMS (multimedia message service)→ characteristics: files, expensive, mobile phone based VOIP: voice over internet protocol→ transmitting the voice through the internet= calling other computers or phones through servers and iternet connection instead of using telephone lines. With the VOIP the phone call is converted in digital data and passes through data networks. Pros: cheaper. NETIQUETTE: series of rules when communicating online: short messages, in order to not waste time accurately filing the object of a message, so it is easier to recognize its content not sharing irrelevant details which could lead to the user's personal data no inappropriate contents checking the body of a message to avoid mistakes check attachments not sending CC messages to more than one person, so to not reveal other users e-mail addresses. E-MAIL Electronic mail. It allows you to comunicate, and comparing to traditional mail it is faster, free, it allows you to attach fine, you can check it by simply connecting to the internet from any browser. E-mail address: username@address (domain name of the organization which provides the e-mail service; a server is connected to the domain). Attached files: they not always get to the receiver because of size limitations→ to bypass this problem there are web spaces such as jumbo and yousendit. Ways to specify the receiver: to (only one receiver) CC (no main receiver, the message is copied) CCN (hidden copied, the receiver gets the message without the others' knowledge) E-MAIL CONNECTED RISKS: spam: unwanted ads; anti spam filters: may think legitimate messages are spam. Spam messages must be immediately deleted, withouth opening or answer. Malwares: can be hidden in attachments PHISHING: attempt to gain sensitive data from a user, faking a message from an institution with the user's credentials→ the user doesn't know it is a stranger. How to recognize phishing: no institution asks for data confirmation via email often the language is not the same as the user's (or the translation is not good) usually it contains a link identhical to that of the institution, the server, however, has a different domain nme. The phisher doesn't know who is sending messages to, so a part of them gets to actual clients of that institution. SENDING/ RECEIVING AN E-MAIL: Settings button: online guide settings menu→ signature settings settings menu→ to personalize labels settings menu→ general settings→ to set an authomatic reply to messages Tick sign on the message→ other: mark as unread/read/important Settings button: settings→language, number of mail visualized on each page, show pictures, phone number. On Gmail you can not order messages for name or date, you can only create labels→ folders, you add e- mails via drag&drop, you can change the colour of the lable or create underlabels) Spam: doesn't open pictures. GOOGLE CALENDAR: create→new event. You can add invitations or be invited; you can choose whether you want to participate or not→ by saying yes the event is shown nowmally, by saying no it disappears. MODULE 3: WORD PROCESSING SAVE AS → extention: - word document - word document with macro activation - word 97-2003 document - word template (to take advantage of markers and formatting and use them in order to create similar documents) - PDF - rich text format (exporting while keeping all the formatting options) - normal text (only save the text, extension is.txt) Right click → makes the top ribbon collapse icon in the top right corner → to hide the top ribbon and the title bar view page: zoom commands file → word options: username of the word application, saving page, help function (lightbulb icon), online guide (opens a webpage) DIFFERENT WAYS OF VIEWING A DOCUMENT: three icons at the bottom left corner: printing layout (central one), reading mode (left one), web layout (right one) - View page: different viewing modes: - printing layout: default view - reading mode: take anything that's not a reading element off, making the pake look similar to an e- book. You can't edit your document, it is only possible to highlight and write comments on it - web layout mode: the text takes over the whole width of the page as if it was a webpage, occupying all the available space. This doesn't mean that everything will correspond exactly to the actual view on the website. - structure view: focuses on the bigger components of the document→paragraphs, chapters, overall structure. To go back to the printing layout viewing mode, click on close - draft TO ADD SYMBOLS: click on the exact spot where you want it to be, insert menu→symbols dropdown menu font: every symbol comes in all characters and formats TO ADD SPECIAL CHARACTERS: insert→symbol menu→other symbols→special characters page TO SHOW NON PRINTABLE CHARACTERS: home→paragraph options→paragraph symbol non-printable characters: symbols added in the text just for technical purposes (s.a.: spacing) but will not be printed. TO SELECT TEXTS: right click→ selects word three clicks→ selects the whole paragraphs to select the whole document: home page→select→select all alternative: click three times on F8 Instead of copying and paste a text, you can select it and move it in drag and drop mode TO FIND TERMS: home page→edit→find command→write the word you want to find TO SWAP WORDS: home page→edit→substitute command→ a window will open, write the term you want the program to fnd and the one you want it to be substituted with The research start from the point your cursor's at FORMATTING: home page→character command: next to the the number which shows the character's dimensions there is an “A” with an arrow pointing either upwards or downwards→ makes the text of a selected part of the document grow bigger or smaller accordig to certain proportions Under the character's dimensions there is an “x” with superscript/underscript→moves the selected character to superscript/underscript “Aa” button→ turns your tect in caps lock TO SEPARATE A SORD INTO DIFFERENT SYLLABLES: (at the end of a row) layout→ page settings→ syllabation (none, authomatic, manual) TO INTERRUPT A LINE (arrow pointing upwards to the left): character that gets added authomatically and makes you start a new line while staying in the same paragraph. Caps lock button+ send TO CREATE INDENTATIONS: home page→ paragraphs→ widen/reduce indentation layout→paragraph→ you can manage the indentation by adding the exact indentation measures triangles un the ruler at the top of the screen: slide in drag and drop mode. The left indentation is either a first row indentation, and protruding indentation layout→paragraph→paragraph settings VERTICAL SPACING: layout→ paragraph layout→ line-spacing HIGHLIGTING: home→ paragraph→ coloured background home→ paragraph→ borders (background and borders window) ALIGNMENT: TAB button four different ways of aligning a text: to the right, to the left, central, according to the position of the comma choose the kind of tab: symbol to the top left next to the vertical/horizontal ruler→click on it Combinations of predefined formats: home page→style command TABS: add→ tab (adapt to the content/ to the page/ to a certain fixed width of the columns) to see the horizontal extention of the columns: ruler select the column→layout→cell dimensions TO ADD NEW ROWS OR COLUMNS: layout→ rows and columns place the cursor on the row/column TO DELETE A CELL: move to the right/left/upwards/downwards BACKGROUND AND BORDERS: projecting → The backspace button deletes the whole tab (if selected), the CANC button only deletes the content of the tab (if selected) GRAPHICAL OBJECTS (pictures/shapes/graphs): add→ illustrations histogram: series= vertical axis; cathegory: horizonal axis TO DELETE THE BLANK SPACE IN THE GRAPH: projecting→ select data RESIZING WHILE KEEPING PROPORTIONS: select the object→ format→dimensions→ block proportions option or right click→ other layout options MERGE PRINTING to match a template to a name list letters→ merge printing, six steps: 1. letters, email, cards, labels, lists 2. choose the preferred document 3. select the list of the recipients 4. write the letter: put the non-printable characters→ click on the inserting point→ click on “other”→ choose the fields to add Or letters→ insert fields→ insert merge field→ select the field a. To make it personal: top right: title, name, surrname, address, zip code, city b. beginning: opening, title, surname c. collecting point 5. letters→ result preview 6. to complete the merge: o printing→ does not create a new file but directly prints the original one o edit the single letters→ new document LAYOUT→ page settings: orientation, borders Top part of the document: HEADER, bottom part of it: FOOTER insert→ header/footer WORD FIELD: to add author, date, document's name Once you add the header, if you go on projecting→add→date and time, it will automathically update to the one at the opening of the file Footer: page number (insert or projecting) Red dots (error): by right clicking on the word, the program will suggest corrections. Language: revision→ language Error correction: revision→ spelling and grammar (grammar mistakes and repetitions) SHORTCUTS: CTRL+ RIGHT/LEFT ARROW: to move one word away to the right/left CTRL+ DOWNWARDS/UPWARDS POINTED ARROW: to move downwards/upwards of a paragraph CTRL+ HOME/END: to get to the beginning/the end of the document PAGE UP/DOWN: to go to the next/previous page CTRL+ PAGE UP/DOWN: togo at the beginning of the previous/following page GO TO COMMAND: home→ edit→find→go to allows you to move into the document HYPERTEXT LINK: insert→ link. To reach the web page or the file you need to push on CTRL and on the word FRAMING PARAGRAPHS: home→ paragraph→ background and borders INDENTANTIONS AND SPACING: home→ paragraph→ ruler SAVING A DOCUMENT: SHIFT+F12