Presentation is loading. Please wait.

Presentation is loading. Please wait.

BTT 1O/2O Class Notes. File Management File management is the activity we perform to manage our workspace to ensure that we can find the necessary data.

Similar presentations


Presentation on theme: "BTT 1O/2O Class Notes. File Management File management is the activity we perform to manage our workspace to ensure that we can find the necessary data."— Presentation transcript:

1 BTT 1O/2O Class Notes

2 File Management File management is the activity we perform to manage our workspace to ensure that we can find the necessary data or information when we need it. File management is the activity we perform to manage our workspace to ensure that we can find the necessary data or information when we need it. Typical file management tasks include: Typical file management tasks include: Creating and saving files Creating and saving files Creating folders (also called directories) Creating folders (also called directories) Renaming folders and files Renaming folders and files Copying or moving folders and files Copying or moving folders and files Deleting folders and files Deleting folders and files Completing the above tasks between different drives (i.e. creating a back-up on a diskette) Completing the above tasks between different drives (i.e. creating a back-up on a diskette) Creating read only files Creating read only files Keyboard Shortcuts can be used in all Microsoft programs Keyboard Shortcuts can be used in all Microsoft programs Ctrl-C Copy, Ctrl-V Paste, Ctrl-X Cut, Ctrl-Z Undo, Ctrl-A Select all Ctrl-C Copy, Ctrl-V Paste, Ctrl-X Cut, Ctrl-Z Undo, Ctrl-A Select all

3 File Management (cont'd) When you start to organize your workspace you need to determine the type of information you will be creating and saving (i.e. Science notes, history projects, personal letters) and creating your folders or directories accordingly. Type of InformationSuggested Folder Name Eg:Science notes and labsscience History notes and reportshistory Personal letterspersonal

4 Rules for Naming files and folders: Files and folders can have names up to 255 characters including spaces. Files and folders can have names up to 255 characters including spaces. Special characters such as \ / : * ? | are not allowed. Special characters such as \ / : * ? | are not allowed. File Management (cont'd)

5 File Naming Files have 2 parts in their name: Files have 2 parts in their name: Name indicating content (up to 255 characters long) Name indicating content (up to 255 characters long) Extension: characters after the. Extension: characters after the. The extension determines the type of file, and which program will best open the file The extension determines the type of file, and which program will best open the file i.e..docx indicates an MS Word file.mp3 indicates an audio file.html indicates a web page *Most programs automatically add the extension for you when you save the file.

6 COPYING AND MOVING FILES AND FOLDERS (2 METHODS) Using Windows Explorer RIGHT mouse button Using the right mouse button, drag the file/folder to the new destination and release and click MOVE HERE or COPY HERE. Using the right mouse button, drag the file/folder to the new destination and release and click MOVE HERE or COPY HERE. Drag & Drop (Left mouse button) Within The Same Drive: To MOVE: Drag the file/folder to the new destination and release (drop it). Only works when you are moving within the same drive. To COPY: Hold down the Ctrl- key to copy it when dragging to the other folder. Within The Same Drive: To MOVE: Drag the file/folder to the new destination and release (drop it). Only works when you are moving within the same drive. To COPY: Hold down the Ctrl- key to copy it when dragging to the other folder. Across Drives: To COPY: Drag the file/folder to the new destination and release (drop it). Automatically works when you are copying from one drive to the other (g: to removable). To MOVE: Use Ctrl-X and Ctrl-V or right mouse button technique Across Drives: To COPY: Drag the file/folder to the new destination and release (drop it). Automatically works when you are copying from one drive to the other (g: to removable). To MOVE: Use Ctrl-X and Ctrl-V or right mouse button technique File Management (cont'd)

7 Issues in Information Technology Ergonomics/Health & Safety Ergonomics/Health & Safety Security Security Ethics Ethics Legal Issues Legal Issues Environmental Issues Environmental Issues

8 Ergonomics The term ergonomics refers to the relationship between workers and their working environment. To ensure a suitable working environment, consider the following: adequate lighting adequate lighting adequate ventilation adequate ventilation monitors with screens free from flicker, interference and glare monitors with screens free from flicker, interference and glare an adjustable chair an adjustable chair suitably positioned keyboard suitably positioned keyboard provision for frequent breaks away from the computer provision for frequent breaks away from the computer

9 Ergonomics (cont'd) Why worry about ergonomics? Modifying your: technique and technique and your work environment your work environment can be helpful in reducing Repetitive Stress Injuries like carpal tunnel syndrome which is a wrist or hand injury caused by extended periods of keyboardingand Eye Strain.

10 Ergonomics: Proper Keyboarding Technique: Eyes stay focused on copy material not on keyboard or screen. Eyes stay focused on copy material not on keyboard or screen. Correct fingering used consistently on alphabetic keys. Fingers rest lightly on home row Correct fingering used consistently on alphabetic keys. Fingers rest lightly on home row Wrists are elevated, not resting on anything Wrists are elevated, not resting on anything Steady rhythm Steady rhythm Good posture: sitting back in chair, back straight, feet flat on floor Good posture: sitting back in chair, back straight, feet flat on floor Chair height: allows you to create a 90º angle with your forearm and upper arm when fingers are placed over the home row Chair height: allows you to create a 90º angle with your forearm and upper arm when fingers are placed over the home row

11 Ergonomics: Good Ergonomic Strategies Choose a good chair and computer desk. Chair should have adjustable height, lower back support, and arm rests. Chair should have adjustable height, lower back support, and arm rests. Desk should have a keyboard shelf at the proper height - this will avoid reaching up for the keyboard. Desk should have a keyboard shelf at the proper height - this will avoid reaching up for the keyboard. Position your monitor correctly. The monitor should be 2 to 2½ feet away, and a little below eye level. The monitor should be 2 to 2½ feet away, and a little below eye level. Position your monitor so that bright lights/sunlight do not reflect off of the screen. Position your monitor so that bright lights/sunlight do not reflect off of the screen. Tilt the monitor face upwards (approx. 10°) Tilt the monitor face upwards (approx. 10°) Keep your screen clean. Keep your screen clean.

12 Sit up straight and keep your feet flat on the floor in front of you. Forearms and thighs are parallel to the floor. Forearms and thighs are parallel to the floor. Keep your wrists straight. Hands should be in a straight line with your forearms as you type. Hands should be in a straight line with your forearms as you type. Do not rest your wrists on anything as you type. Do not rest your wrists on anything as you type. Resting the wrist puts excessive strain on the hands and fingers. Resting the wrist puts excessive strain on the hands and fingers. Rest your eyes occasionally to avoid eyestrain. Avoid pounding the keys or gripping the mouse. Ergonomics (cont'd)

13 An example of an ergonomically correct computer setup: The forearms and thighs are parallel to the floor, The forearms and thighs are parallel to the floor, the keyboard is in easy reach without bending or flexing the wrists, the keyboard is in easy reach without bending or flexing the wrists, the monitor is positioned to reduce eye and neck strain. the monitor is positioned to reduce eye and neck strain. Ergonomics (cont'd)

14 Set your GUI for healthy viewing. Use quiet color settings (neutral or cool shades). Avoid staring at bright colours for long periods of time. Use quiet color settings (neutral or cool shades). Avoid staring at bright colours for long periods of time. Choose the large icon setting if it is easier for you to see the interface. Choose the large icon setting if it is easier for you to see the interface. Take a break when sitting for long periods of time 10 minutes after every 50 minutes 10 minutes after every 50 minutes Ergonomics (cont'd)

15 Security Issues Saving Save frequently, a PCs memory is temporary Save frequently, a PCs memory is temporary Even saved files can be vulnerable to destruction from hardware failure or fire Even saved files can be vulnerable to destruction from hardware failure or fire Essential that organizations keep back-ups of valuable information, in another physical location if possible Essential that organizations keep back-ups of valuable information, in another physical location if possible

16 Security Issues (cont'd) Passwords & User IDs Used to gain access to the computer system in an organization Used to gain access to the computer system in an organization Chosen by user and never divulged Chosen by user and never divulged Changed frequently Changed frequently Not too obvious Not too obvious

17 Security Issues (cont'd) Firewall The purpose of a firewall: The purpose of a firewall: Track and restrict unauthorized outside user Track and restrict unauthorized outside user Control access to authorized network users Control access to authorized network users

18 Security Issues (cont'd) Anti-Virus program A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Use McAfee, Norton Security or AVG to scan and eliminate viruses. AVG is free to download and use. Use McAfee, Norton Security or AVG to scan and eliminate viruses. AVG is free to download and use. Virus Characteristics All computer viruses are manmade All computer viruses are manmade A simple virus that copies itself over and over again is relatively easy to produce. A simple virus that copies itself over and over again is relatively easy to produce. Quickly uses all available memory and brings the system to a halt Quickly uses all available memory and brings the system to a halt An even more dangerous type of virus is one capable of transmitting itself by attaching to a legitimate program An even more dangerous type of virus is one capable of transmitting itself by attaching to a legitimate program Through s or executable files on web sites Through s or executable files on web sites A virus can be harmless or it can destroy data files, erase an entire hard disk or even make your computer inoperable A virus can be harmless or it can destroy data files, erase an entire hard disk or even make your computer inoperable

19 Ethical Issues Ethical Use of Computers Ethics are the standards of honesty, morality and fairness. These standards relate to using computers. It is your responsibly to respect the property, rights and privacy of others in the way you use computers at home and at school.

20 Acceptable Use Agreements A good policy guides the desirable use of the computer system by: protecting school resources, protecting school resources, limiting liability, limiting liability, Promoting safe behaviour by clarifying rights and expectations of both students and staff members. Promoting safe behaviour by clarifying rights and expectations of both students and staff members. Ethical Issues (cont'd)

21 Pick 5 points to record in your notes: Acceptable Use Agreement at St. Benedict Do NOT share your login, password, or workspace with anyone. Do NOT share your login, password, or workspace with anyone. Do NOT use another persons account. Do NOT use another persons account. Login and Logoff appropriately. Login and Logoff appropriately. Virus scan all media before use on the school network. You will be held responsible for any viruses introduced to the network through your workspace. Virus scan all media before use on the school network. You will be held responsible for any viruses introduced to the network through your workspace. Do NOT install personal software in your workspace or on the network. This specifically includes graphic files, games or other executable files unless you have written permission from the schools software technician, information systems facilitator, or from the teacher of the course where these files have been created. Do NOT install personal software in your workspace or on the network. This specifically includes graphic files, games or other executable files unless you have written permission from the schools software technician, information systems facilitator, or from the teacher of the course where these files have been created. Name the files you have created appropriately. Profanity or rude comments are not acceptable filenames. Name the files you have created appropriately. Profanity or rude comments are not acceptable filenames. Do NOT access, distribute or post offensive material on the network. Do NOT access, distribute or post offensive material on the network. Do NOT use the computer to annoy or harass another person. Do NOT use the computer to annoy or harass another person. The school has purchased various software to use on the network. This software is protected by copyright and therefore cannot be copied in any form by anyone. The school has purchased various software to use on the network. This software is protected by copyright and therefore cannot be copied in any form by anyone. Unauthorized access to either system files or other student files is not permitted. Unauthorized access to either system files or other student files is not permitted. Report any damage or problems to the teacher immediately. Abuse of the hardware or software is called vandalism and will be dealt with appropriately. Failure to report any damages or problems may result in the student using the computer being held responsible for the damage. Report any damage or problems to the teacher immediately. Abuse of the hardware or software is called vandalism and will be dealt with appropriately. Failure to report any damages or problems may result in the student using the computer being held responsible for the damage. No food or drink is permitted near the computers or in the computer rooms. No food or drink is permitted near the computers or in the computer rooms. Internet access will be available at St. Benedict based on course requirements, students need, and the system availability. Use of the Internet involves increased responsibilities and expectations. A separate Internet agreement is provided. Internet access will be available at St. Benedict based on course requirements, students need, and the system availability. Use of the Internet involves increased responsibilities and expectations. A separate Internet agreement is provided. Students using a computer in individual classrooms must be supervised by a teacher at all times. Students using a computer in individual classrooms must be supervised by a teacher at all times.

22 Spam is generally advertising for some product sent to a mailing list or newsgroup. In addition to wasting people's time with unwanted , spam also eats up a lot of network bandwidth In addition to wasting people's time with unwanted , spam also eats up a lot of network bandwidth Ethical Issues (cont'd)

23 Hate & Discrimination Promotion The evolution of the Internet into the World Wide Web, with its easily accessible and inviting graphic interface, has provided people, including extremists, with new ways to communicate with each other and with a vast new potential audience, using not only words, but also pictures, graphics, sound, and animation.

24 Ethical Issues (cont'd) Technology Access and Equity access to technology and being proficient in its use is an important key to one's economic status access to technology and being proficient in its use is an important key to one's economic status Digital divide refers to the gap between those with regular, effective access to digital and information technology, and those without this access Digital divide refers to the gap between those with regular, effective access to digital and information technology, and those without this access It encompasses both physical access to technology hardware and, more broadly, skills and resources which allow for its use It encompasses both physical access to technology hardware and, more broadly, skills and resources which allow for its use Groups of people who are divided by this issue are (rich/poor), (white/minority), (able/disabled) or (urban/rural) Groups of people who are divided by this issue are (rich/poor), (white/minority), (able/disabled) or (urban/rural)

25 And now for a little fun! Go to the internet, use a stock information site: Go to the internet, use a stock information site: finance.google.ca finance.google.ca tmxmoney.com tmxmoney.com ca.finance.yahoo.com ca.finance.yahoo.com Pick up to three stocks Pick up to three stocks buy up to $10,000 in stocks buy up to $10,000 in stocks track in Word document (Mr. M will demonstrate) track in Word document (Mr. M will demonstrate)

26 Intellectual Property is a product someone creates based upon his or her thought or ideas. Some examples: a picture or clip art collection computer animations a picture or clip art collection computer animations computer games software music computer games software music Plagiarism is stealing and passing off the ideas or words of another as your own stealing and passing off the ideas or words of another as your own using another's production without crediting the source using another's production without crediting the source Copyright laws exist to protect those who create an idea or product. Most copyrighted material may not be copied without consent of the owner. If you copy software without permission and then distribute it, youre committing software piracy. Some programs have built- in security codes to protect against illegal use. Legal Issues

27 Software Agreements have been established to protect copyrighted material. When you purchase software you are subject to the terms of the agreement established by the owner. You are legally bound to honour software license agreements You are legally bound to honour software license agreements Types of agreements: Freeware, shareware, single machine, site and network licenses Freeware, shareware, single machine, site and network licenses Legal Issues (cont'd)

28 Hacking is the unauthorized use of a computer system or program. Hackers may breaking into a system just for fun, others may be trying to unlawfully access a computer program to change or steal data. Hackers may breaking into a system just for fun, others may be trying to unlawfully access a computer program to change or steal data. Hacking is an invasion of privacy which is against the law and is punishable by the law Hacking is an invasion of privacy which is against the law and is punishable by the law Legal Issues (cont'd)

29 Environmental Issues Digital Dumping: Disposal of Obsolete Equipment What to do with old electronic equipment? Most charitable groups wont take it – its too old. Most charitable groups wont take it – its too old. The city dump wont take it –your old machine is full of toxic substances. The city dump wont take it –your old machine is full of toxic substances. You dont want it sitting in the closet for eternity. You dont want it sitting in the closet for eternity. If youre lucky, you may have an program in your area that will take it for ecycling, removing toxic chemicals for proper disposal and valuable metals for reuse. If youre lucky, you may have an program in your area that will take it for ecycling, removing toxic chemicals for proper disposal and valuable metals for reuse.

30 Environmental Issues (cont'd) What really happens to your old computer or broken printer or fried cell phone? tons of these and other electronic items are loaded onto barges and shipped off to developing countries, where the recycling processes are so substandard that they actually contribute to air and water pollution. tons of these and other electronic items are loaded onto barges and shipped off to developing countries, where the recycling processes are so substandard that they actually contribute to air and water pollution. Whatever isnt salvageable ends up in their landfills. Whatever isnt salvageable ends up in their landfills. North American recyclers say its not cost efficient to fix broken items, so they often donate these goods to developing nations to help bridge the digital divide. North American recyclers say its not cost efficient to fix broken items, so they often donate these goods to developing nations to help bridge the digital divide. Many countries, though, report that up to 75% of this equipment is not usable, nor do they have the technology to repair or recycle it properly. Many countries, though, report that up to 75% of this equipment is not usable, nor do they have the technology to repair or recycle it properly.

31 Digital Literacy What is a computer? What is a computer? What is a computer system? What is a computer system? Software Software Data Data Hardware & PowerPoint presentation Hardware & PowerPoint presentation Networking Networking

32 Software Software is the set of electronic instructions that tells the computer what to do. It is also referred to as a program. Two General Types: Application Software Application Software System Software System Software Application software and system software work together to provide useful output.

33 Application Software Software tells the computer how to accomplish specific tasks selected by the user. Examples of Application Software: Word Processing Word Processing Spreadsheets Spreadsheets Databases Databases Desktop Publishing Desktop Publishing Graphics Graphics Entertainment (games) Entertainment (games) Educational Educational Communication Communication Presentation Presentation

34 System Software Includes: Operating System Operating System System Tools System Tools

35 Operating System Software The operating system tells the computer how to: The operating system tells the computer how to: interact with the user interact with the user use all the attached devices (disk drive, keyboard, mouse, monitor, USB devices, camera, etc.) use all the attached devices (disk drive, keyboard, mouse, monitor, USB devices, camera, etc.) run other software, and run other software, and manage all the files/folders. manage all the files/folders. Examples: Windows 7, Blackberry OS, Apple/Mac OS Examples: Windows 7, Blackberry OS, Apple/Mac OS

36 System Tools File Defragmentation: Re-organizes files on a disk to speed up processing File Defragmentation: Re-organizes files on a disk to speed up processing Data Clean up: Compresses (and cleans up) data Data Clean up: Compresses (and cleans up) data System Restore: Undo harmful changes to your computer and restore settings and performance it to an earlier version before the trouble began System Restore: Undo harmful changes to your computer and restore settings and performance it to an earlier version before the trouble began Data Recovery: Recover erased files Data Recovery: Recover erased files Virus Protection and Firewall protection Virus Protection and Firewall protection

37 Hardware See hardware notes (separate presentation) See hardware notes (separate presentation)

38 Internet The significance of the Internet and particularly the World Wide Web cannot be underestimated! Information is available instantly to the masses Information is available instantly to the masses Communication has few physical barriers (anytime, anywhere) Communication has few physical barriers (anytime, anywhere) Billions of users Billions of users Knowledge is POWER and now that is widely available to those that want it Knowledge is POWER and now that is widely available to those that want it No one organization owns the Internet and so what is available is not controlled or limited No one organization owns the Internet and so what is available is not controlled or limited That provides opportunities for everyone: Business, Governments, Education & Research, Personal That provides opportunities for everyone: Business, Governments, Education & Research, Personal

39 Internet Background The INTERNET is a worldwide network of computers. Created for the U.S. Department of Defense as a tool for military communications, command, and control, and exchanges of data with defense contractors. Created for the U.S. Department of Defense as a tool for military communications, command, and control, and exchanges of data with defense contractors Advanced Research Projects Agency of US Dept. of Defense (ARPA) connected computers at universities to create network that would survive nuclear disaster. Network called ARPANET Advanced Research Projects Agency of US Dept. of Defense (ARPA) connected computers at universities to create network that would survive nuclear disaster. Network called ARPANET. National Science Foundation (NSF) created NSFnet (higher capacity network) and linked it to ARPANET National Science Foundation (NSF) created NSFnet (higher capacity network) and linked it to ARPANET

40 Internet Background (contd) The Internet came about through combination of ARPANET, NSFnet, and other networks. The Internet came about through combination of ARPANET, NSFnet, and other networks. Internet timeline: Internet timeline: * backbones = main communication pipelines

41 How the Internet Works Computer equipment on the internet consists of SERVERS, CLIENTS or ROUTERS Computer equipment on the internet consists of SERVERS, CLIENTS or ROUTERS The SERVERS are like electronic filing cabinets that simply store information and pass it on when requested. They can be file servers; mail servers; or Web servers. The SERVERS are like electronic filing cabinets that simply store information and pass it on when requested. They can be file servers; mail servers; or Web servers. There are something like 20 million servers on the Internet. There are something like 20 million servers on the Internet. The CLIENTS connect to the servers through an ISP (Internet Service Provider) so you can read your messages, look at a web site or download information The CLIENTS connect to the servers through an ISP (Internet Service Provider) so you can read your messages, look at a web site or download information There are far more clients on the Internet than servers probably reaching a billion by now! There are far more clients on the Internet than servers probably reaching a billion by now!

42 How the Internet Works (contd) When two computers on the Internet swap information back and forth on a more-or- less equal basis, they are known as peers. If you use an instant messaging program to chat to a friend, and you start swapping files, youre taking part in whats called peer-to-peer (P2P) communication. When two computers on the Internet swap information back and forth on a more-or- less equal basis, they are known as peers. If you use an instant messaging program to chat to a friend, and you start swapping files, youre taking part in whats called peer-to-peer (P2P) communication.

43 How the Internet Works (contd) Apart from clients and servers, the Internet is also made up of ROUTERS, whose job is really just to make connections between different systems. Apart from clients and servers, the Internet is also made up of ROUTERS, whose job is really just to make connections between different systems. The router is like a switchboard that directs your request to the worldwide network The router is like a switchboard that directs your request to the worldwide network It starts, stop and directs traffic(bits) over the internet. It starts, stop and directs traffic(bits) over the internet.

44 How the Internet Works (contd) Telephone lines or Cable lines ISP like Rogers & Bell

45 Some Key Internet Terms TCP/IP (Transmission Control Protocol/Internet Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) Rules & procedures (software) to control timing & data format so computers can communicate. Rules & procedures (software) to control timing & data format so computers can communicate. IP Address (Internet Protocol Address) IP Address (Internet Protocol Address) Every computer on Internet has unique 4 part numeric address (ex ). Address contains routing information that identifies location Every computer on Internet has unique 4 part numeric address (ex ). Address contains routing information that identifies location DNS Address (Domain Name System Address) DNS Address (Domain Name System Address) is the IP address using words. is the IP address using words. 2 parts: individual name + domain & sub-domains 2 parts: individual name + domain & sub-domains ex. microsoft.com ex. microsoft.com

46 Common Internet Domains.comcommercial business (for profit).edueducation.govgovernment.milmilitary.netgateway or host.orgother organization (usually non-profit).on.caOntario, Canada.frFrance.usUnited States

47 Major Features Of The Internet WWW (web pages) WWW (web pages) News News Chat Chat FTP (file transfer protocol) FTP (file transfer protocol) Bulletin Boards Bulletin Boards Entertainment (gaming) Entertainment (gaming)

48 World Wide Web (WWW or The Web) The WWW is not the same as the Internet. The Internet is a world-wide computer network. The WWW is just one software system running on the Internet. To view a web page you need: Browser: Software that displays graphics and text of a specified site (IE/Firefox). Browser: Software that displays graphics and text of a specified site (IE/Firefox). Uniform Resource Locator (URL): Special address that tells the browser where to go. Uniform Resource Locator (URL): Special address that tells the browser where to go.

49 Example of a URL httpProtocol or rules used to transfer this type of data over the internet. (Hypertext Transfer Protocol) wwwAddress is found on WWW cnnDomain name comType of Domain feedbackDirectory or folder name comments.htmlFilename

50 World Wide Web (WWW or The Web) Web Sites are divided into pages with one page (usually the first) of the site designated as the Home Page. Web Sites are divided into pages with one page (usually the first) of the site designated as the Home Page. Web pages contain internal and/or external hyperlinks. These links allow the reader to click on the highlighted word/phrase/image and jump to another location in the document or another file located anywhere on Internet. Web pages contain internal and/or external hyperlinks. These links allow the reader to click on the highlighted word/phrase/image and jump to another location in the document or another file located anywhere on Internet.

51 Connecting to the Internet To access the Internet your browser sends a request to the SERVER, usually an Internet Service Provider like Rogers or Bell using your computers MODEM To access the Internet your browser sends a request to the SERVER, usually an Internet Service Provider like Rogers or Bell using your computers MODEM Communication occurs over phone lines or cables or satelllites Communication occurs over phone lines or cables or satelllites Your information is not sent all at once but broken up into smaller packets Your information is not sent all at once but broken up into smaller packets Each packet contains some information PLUS the senders and receivers address or IP address Each packet contains some information PLUS the senders and receivers address or IP address The router determines how the packets are sent (the quickest route) The router determines how the packets are sent (the quickest route)

52 Most common use of the Internet Most common use of the Internet programs send text + attachments (graphics, sound, video, etc.) programs send text + attachments (graphics, sound, video, etc.) Offline: Pegasus, MS Outlook, Thunderbird Offline: Pegasus, MS Outlook, Thunderbird Online: Gmail, HotMail, YahooMail Online: Gmail, HotMail, YahooMail normally involves communication between two people, but can also be sent to multiple users (distribution list) normally involves communication between two people, but can also be sent to multiple users (distribution list) Can send to people without others knowing (BCC: blind carbon copy) Can send to people without others knowing (BCC: blind carbon copy)

53 Etiquette Keep messages short and to the point. Keep messages short and to the point. Always include a subject with your message that briefly indicates its content. Always include a subject with your message that briefly indicates its content. Do not send abusive messages to others. Do not send abusive messages to others. Be careful what you say about others, as your messages reflects upon you. Be careful what you say about others, as your messages reflects upon you. Use humour and sarcasm where appropriate, but be sure your intent is understood. Use humour and sarcasm where appropriate, but be sure your intent is understood.

54 Etiquette Do not be critical of others spelling or grammatical errors, youll make them too. Do not be critical of others spelling or grammatical errors, youll make them too. DO NOT USE CAPITAL LETTERS as this is the Internet equivalent of shouting. DO NOT USE CAPITAL LETTERS as this is the Internet equivalent of shouting. You cant take it back: after is sent, its gone, and its a permanent record of what you said. You cant take it back: after is sent, its gone, and its a permanent record of what you said.

55 Evaluating an Information Website Consider the following criteria:

56 Authority and Accuracy What do you know about the author? What do you know about the author? What indicates they are an expert What indicates they are an expert Can you contact him/her? Can you contact him/her? ? ? Why check? Anyone can publish anything! Can you check the information? Can you check the information? Links to other sites? Links to other sites? Why check? no web standards exist to ensure accuracy

57 Advocacy and Objectivity What is the purpose of the website? What is the purpose of the website? Educate, entertain, persuade? Educate, entertain, persuade? Does the website try to persuade you to one side of an issue? Does the website try to persuade you to one side of an issue? Is it opinion or is it strictly facts? Is it opinion or is it strictly facts? Why check? People could be trying to persuade you to do things that might not be right! Youre not hearing both sides of the story.

58 Currency and Coverage Is the information current? Is the information current? When was it last updated? When was it last updated? Does it cover the topic in enough depth? Does it cover the topic in enough depth? Are links relevant and appropriate? Are links relevant and appropriate? Why check? Older information may not still be accurate. You may not be getting the full picture.

59 Style and Functionality Is the site organized in a clear and logical manner? Is the site organized in a clear and logical manner? Is it easy to read and find things? Is it easy to read and find things? Are you able to search or use menues easily? Are you able to search or use menues easily? Why check? Your time is valuable, dont waste it on a website that takes too long to find things.

60 Try this: Go to:

61 Try this: Go to: Click on: Secondhand Smoke: The Big Lie Secondhand Smoke: The Big Lie

62 Evaluation:Give an opinion and back it up with evidence from the website Authority & Accuracy: Authority & Accuracy: Advocacy and Objectivity Advocacy and Objectivity Currency and Coverage Currency and Coverage Style and Functionality Style and Functionality

63 Networking A stand-alone computer system works well for normal use on an individual basis. This refers to regular student use, common household requirements, and perhaps even home office or low-end business needs. However, as tasks become more complex and more users are involved, connecting PCs to create a network is frequently used as a solution to improve efficiency. A stand-alone computer system works well for normal use on an individual basis. This refers to regular student use, common household requirements, and perhaps even home office or low-end business needs. However, as tasks become more complex and more users are involved, connecting PCs to create a network is frequently used as a solution to improve efficiency.

64 Network A network is a system of interconnected computers that communicate with each other and share: A network is a system of interconnected computers that communicate with each other and share: Applications Applications Data Data Hardware Components Hardware Components

65 Advantages of a Network Simultaneous (all at the same time) access to programs and data Simultaneous (all at the same time) access to programs and data Sharing of peripherals (i.e. printers and scanners) Sharing of peripherals (i.e. printers and scanners) Easy communication with others using Easy communication with others using Easy back-up of important data Easy back-up of important data

66 Disadvantages of a Network Need for increased security to protect the network (Users must login using unique ID and password) Need for increased security to protect the network (Users must login using unique ID and password) Higher maintenance due to larger number of users Higher maintenance due to larger number of users Possible loss of privacy through hacking Possible loss of privacy through hacking More complex – need network administrator More complex – need network administrator Vandalism Vandalism

67 Parts of a Network Server: computer that has large storage capacity that holds all shared storage and programs Server: computer that has large storage capacity that holds all shared storage and programs Shared peripherals: printer, scanner Shared peripherals: printer, scanner PCs Specialized Network Software - programs that manage the resources on the network All joined through wired or wireless connections

68 Network Setup A network can be setup as: LAN (Local Area Network) – A network of computers located relatively near each other and connected by a cable or wireless. LAN (Local Area Network) – A network of computers located relatively near each other and connected by a cable or wireless. WAN (Wide Area Network) – Two or more LANs connected together, generally across a wide geographical area using high-speed or dedicated phone lines. WAN (Wide Area Network) – Two or more LANs connected together, generally across a wide geographical area using high-speed or dedicated phone lines. A router is necessary to join the LANs within a WAN A router is necessary to join the LANs within a WAN

69 Most Common Network Layout Star – Places a hub (server) in the center of the network nodes. Groups of data are routed through the central hub to their destination. Groups of data are routed through the central hub to their destination. Broken path affects only one device. Network goes down only if hub is lost. Broken path affects only one device. Network goes down only if hub is lost.


Download ppt "BTT 1O/2O Class Notes. File Management File management is the activity we perform to manage our workspace to ensure that we can find the necessary data."

Similar presentations


Ads by Google