SECTION 1: INTERNET (DESKTOP BOOK - pgs 5 - 17)
The internet is a very large collection of computers which are connected to one another using telephone lines or cables. Even though the computers are in different places across the country, and around the world, they are connected together by a network.
The origins of the internet bean in 1969, when the 'Department of Defence of the United States of America' set up a network of computers called ARPANET (Advanced Research Projects Agency Network) which connected over network, one computer in California with three computers in Utah. This was the first step towards the creation of the Internet.
In 1989, Tim Berners-Lee invented the World Wide Web (www.), the first web browser; and the fundamental protocols and algorithms which enables the Web to perform.
The first ever web browser created was this:
One of the ARPANET computers.
Tim Berners-Lee, inventor of the World Wide Web.
In order to connect to the internet, the following are required:
Modem stands for Modulator Demodulator. This allows your computer to use the telephone line or cable to get connected with another computer. Modem converts the 'digital' signals into 'analog' signals and vice versa. There are two types of Modems, Internal and External:
A Modem (Modulator Demodulator) and Router
A Web browser is a software application that enables the users to access, retrieve and view the information and other resources on the Internet.
Below are some of the most commonly used Web browser operating systems (OS) today, such as Google Chrome, Safari, Opera, Microsoft Edge (formerly Internet Explorer) and Mozilla Firefox.
The first web browser developed was called the 'Mosaic'. It was developed at the National Center for Supercomputing Applications in the early 1990's.
Web Page is a page found on the internet which contains the information in the form of texts, graphics or sound. A web page can be accessed through a web browser. These pages form the building blocks of a website, such as the school website.
KEY TERMINOLOGY:
SECTION 2: E-MAIL (DESKTOP BOOK - pgs 18 - 29)
Electronic mail, or E-mail, is a method of sending and receiving messages from one account to another. It is based on store-and-forward model. E-mail servers can store, accept and forward messages. The messages may also include images, audio or video clips. In simple words, we can define it as a process of sending messages in an electronic form.
Features of E-mail:
An example of a 'Hotmail' email account.
A 'Captcha' is a test used in the process of using the internet to ensure that the response is generated by a person. It consists of letters and digits in a distorted manner. You have to type the same letters and digits in the box, and are commonly used to prevent the misuse of e-mail addresses by another person, or restrict an automated fraudulent scam by another computer.
ReCAPTCHA logo.
Example of a CAPTCHA verification.
KEY TERMINOLOGY:
Section 3: MS WORD (DESKTOP BOOK - pgs 30 - 55)
The bar across the top of the Word application is known as the 'Ribbon'. This includes all the features used for creating a Word document.
'File', 'Home', 'Insert', etc. across the top of the Ribbon are called 'Tabs'.
'Clipboard', 'Font', 'Paragraph', etc. underneath the Ribbon are called 'Groups'.
The bar across the bottom of the Word application is called the 'Status Bar'. This is used for zooming in and out, indicating the page number and word count; and page viewing modes.
The large blank area of the Word document is called the 'Main Body of Text'.
The feature used for inputting the same text at the top of all document pages is called the 'Header'.
The feature used for inputting the same text at the bottom of all document pages is called the 'Footer'.
SECTION 4: MS POWERPOINT (DESKTOP BOOK - pgs 57 - 99)
MS Paint also has a 'Ribbon' bar at the top of the Paint application, which uses various 'Tabs' and 'Groups' of features.
The 'Status Bar' at the bottom of the application indicates the slide number, various slide view modes and also the zoom feature. Furthermore, as an additional feature, 'Notes' can be included for each slide as a reference during PowerPoint Presentations.
To format an image, select it within the slide page and use the various 'Picture Format' tools on the 'Tab' to change the image features.
To make your image(s) and text move/appear during a slide show presentation, select each one and use the features on the 'Animation' tab to make it move.
To make each slide appear in a unique way, use the 'Transitions' tab to select the type of change you would like your slideshow presentation to produce.
SECTION 5: COMPUTER VIRUSES AND THEIR EFFECTS (DESKTOP BOOK - pgs 106 - 119)
A computer virus is a program that is secretly introduced into a system in order to corrupt or destroy data. It infects the computer negatively by altering the way the computer works, without the user's knowledge or permission. It spreads from one computer to another computer. A virus destroys or corrupts the data files on the computer system.
Virus is a Latin word which means 'poison'. Virus stands for 'Vital Information Resource Under Seige'. It does stand alone but needs a host file or program to replicate itself.
You may also define it as an undesirable and unwanted program file or routine that corrupts files, replicates itself, replicate other files or in some other way degrade or even shutdown a computer system.
This diagram demonstrates the different types of Viruses in existence that can affect a Computer.
The first computer virus that was known publicly is 'Elk Cloner'. It was created by Rich Skrenta (a middle school student) in 1982. This virus attached itself to the Apple DOS 3.3 operating system and spread through a floppy disk.
The first PC virus was a 'boot sector' virus called 'Brain'. It was created in 1986 by two brothers to prevent pirated copies of software they had written.
Since the mid-1990's, 'Macro Viruses' have become common. These viruses spread through Excel spreadsheets and other Microsoft Office documents.
Today, one of the most common means of a virus infection is through the Internet. E-mails are also one of the most prominent means to spread a virus.
Elk Cloner, the first publicly known virus in 1982.
Boot Sector viruses reside in the boot sector of hard disk or floppy disk. The boot sector is the area of a hard disk or floppy disk that stores valuable information. They cause damages to the stored information. Some of the boot sector viruses are Polyboot B and AntiExE.
'Brain', the 'Boot Sector Virus created in 1986.
A 'Trojan Horse' is a program that appears to be beneficial at first glance but actually damages the computer once it is run. They can steal the information from the computer. 'Beast' and 'Zeus' are examples of a Trojan Horse. Some examples of damage by Trojans are:
An example of a Trojan Horse virus on a monitor.
E-mail Viruses spread through e-mails and the attached files. Once an infected attachments is opened, the virus infects the computer system. Some of these viruses replicate themselves by automatically e-mailing everyone in your e-mail address book.
Example of an E-mail virus.
Other types of viruses are:
Example of a worm virus.
The various ways a virus can enter the computer system:
Symptoms of a computer virus:
SECTION 6: PRINTABLE REVISION WORKSHEETS
To compliment the learning in your child/ren's Computing lessons, why not download these printable worksheets relating to the Topics taught in class and the Desktop: Computer Science Books.