Computer Essentials
Computer Essentials
Windows 10
Moustapha SM 1
Computer Essentials
Moustapha SM 2
ICT : Information and
Communication Technology
• ICT : Using digital technology to access, store and
process information into an organized and
understandable form.
• ICT services and uses
• Internet services - Examples include online banking, online
shopping, e-mail and data transfer.
• Mobile technology - Examples include using the internet on
smartphones, laptops.
• Office productivity applications - Examples include word
processing, spread sheets, presentation software.
Moustapha SM 3
Parts of a Computer
CPU Screen
Keyboard
Mouse
Moustapha SM 4
Computer
Hardware Software
Moustapha SM 6
Identify the main types of devices
Device Presentation
Smartphone Used for phone calls,
e-mail, Internet browsing,
and working with mobile
Applications.
Moustapha SM 7
Types of
Devices
Moustapha SM 8
Input devices
Device Presentation
Scanner Device that read images or text and convert the data
into digital information.
Moustapha SM 9
Output devices
Device Presentation
Moustapha SM 10
Input-ouput devices
Device Presentation
Moustapha SM 11
Parts of a Computer
Moustapha SM 12
Parts of a Computer
Moustapha SM 13
Common input/output ports
• Universal Serial Bus (USB/USB-C):
Typically used to connect storage and
other devices.
Start a computer
• Make sure that both the computer and
monitor are plugged into a power
source.
• Turn on the computer and the monitor.
• Enter a user name and password when
• requested.
• Press the Return key
Moustapha SM 15
Start Up, Shut Down
Shut down a computer using an appropriate
routine
• Close any open files and applications.
• Click the Start button.
• Click Shut Down.
Moustapha SM 16
Keyboard
The keyboard is the computer’s standard input device.
It’s the main way to enter information into your
computer.
Typing Keys
Navigation Keys
Numeric Keyboard
Functions Keys
Moustapha SM 17
Keyboard
Typewriter keys: These keys are the same types of keys you
would find on an old typewriter: letters, numbers, and
punctuation symbols.
• Navigation keys: These keys are used for moving around in
documents or webpages and editing text. They include the arrow
keys, Home, End, Page Up, Page Down, Delete, and Insert.
• Numeric keypad: The numeric keypad is handy for entering
numbers quickly. The keys are grouped together in a block like a
conventional calculator or adding machine
• Function keys: The function keys are used to perform specific
tasks. They are labelled as F1, F2, F3, and so on, up to F12. The
functionality of these keys differs from program to program.
Moustapha SM 18
Keyboard
› Shift
› Ctrl or Control
› Alt or Alternate
› Win or Windows
These keys work in combination with other keys to do
various interesting and unbelievable things. You hold
down a shift key and then press another key on the
keyboard. What happens then depends on the shift key
you pressed and how the program you’re using reacts to
the key combination
Moustapha SM 19
Keyboard
› Tab: Move the curser several spaces forward.
You can also use it to move to next textbox
on a form.
› Enter: Move the cursor to the beginning of
the next line.
› Spacebar: move the cursor one space
forward.
› Backspace: delete the character before the
cursor.
Moustapha SM 20
Keyboard
› Caps Lock: This key works like holding down the Shift key,
but it produces only capital letters. Press Caps Lock again,
and the letters return to their normal, lowercase state.
› Num Lock: Pressing this key makes the numeric keypad on
the right side of the keyboard produce numbers..
› Scroll Lock: This key has no purpose in life. Some
spreadsheets use it to reverse the function of the cursor
keys (which move the spreadsheet rather than the cell
highlight). Scroll Lock does little else that’s significant or
famous.
Moustapha SM 21
Finger names
Moustapha SM 22
Proper Finger Positioning
Moustapha SM 23
Proper Finger Positioning
Moustapha SM 24
Processor, RAM, and Storage
Processor:
A processor, or "microprocessor," is
an essential component of
computers and other electronic
devices. The main role of this
computer chip is to receive input and
provide the appropriate output.
Modern processors can carry out
trillions of calculations per second
Moustapha SM 25
Processor, RAM, and Storage
Random Access Memory (RAM):
RAM is the place where the
computer keeps software and
information that it is currently using
or working on. RAM is a temporary
storage location – when the
computer is switched off the data
here is lost.
Moustapha SM 26
Processor, RAM, and Storage
Storage:
A computer storage device is a type
of hardware that stores data. One
common type of storage device is a
hard drive, which nearly all
computers have. The computer's
main hard drive stores the
operating system, applications, and
files and folders associated with
users of the computer.
Moustapha SM 27
Processor, RAM, and Storage
All computers need memory.
Memory is where the processor saves and stores its work.
The more memory in your PC, the better. With more computer memory on
hand, you can work on larger documents, work graphics programs without
interminable delays, play games faster, edit video.
Remember
Moustapha SM 28
Software
Moustapha SM 29
Software
Moustapha SM 30
Operating System
Moustapha SM 31
Operating System
On PCs, the most common operating
system is Windows.
Remember
Moustapha SM 36
Logging in
› The first step to using Windows is to identify yourself.
That process is called signing in or logging in.
› The signing‐in process is part of the computer’s
security. It’s a good thing.
› In Windows, you identify yourself by choosing your
account picture or typing your account name or an
email address. Then you type a password.
› The password is case sensitive
Moustapha SM 37
Desktop, Icons, Settings
An interface
that displays
icons for files,
folders and
applications.
Moustapha SM 38
Desktop - Windows 10
Recycle Bin
Wallpaper
Start Menu
Moustapha SM 39
Identify common icons
Recycle Bin
Folders
Moustapha SM 40
Identify common icons
Moustapha SM 41
Task Bar
Shows active applications, files and folders
and other icons.
Task Bar
Moustapha SM 42
Icons
• Select and move icons.
• On the desktop, click on an icon and drag and drop to a new location.
• Rename a shortcut/alias.
• Right-click on the shortcut icon.
• Click Rename.
• Enter new name.
• Move a shortcut/alias.
• Right-click on the shortcut icon.
• Click Cut.
• Select location to move shortcut to.
• Right-click and select Paste.
• Delete a shortcut/alias.
• Right-click on the shortcut icon.
• Click Delete.
• Click Yes to confirm deletion.
Moustapha SM 43
Notification Area
Moustapha SM 44
Start Menu
Applications
Widgets
Moustapha SM 45
Using Windows
Rectangular blocks
that display the
contents of a folder
or software;
Can be move or
resize.
Moustapha SM 46
Using Windows
• To close, maximize or resize an open window, click one
of the buttons, located at the top right of it
Moustapha SM 47
Folders
• A folder has exactly the same
function as it does in real life: to
store files and other information.
• The icon that Windows uses to
represent a folder looks like this
• A folder has a name and can
contain an infinite amount of
data.
Moustapha SM 48
Folders
Moustapha SM 49
Folders
Create a new folder
To create a new folder on your
computer, navigate to the place
where you want your new folder
to reside (for instance, the
Desktop), and Right Click >
New> Folder.
As soon as you create a new
folder, the operating system
temporarily names it new
folder.
Moustapha SM 50
Folders
Rename Folder
• Right click on the folder.
• Choose Rename.
• Type the new name
Delete Folder
• Right click on the folder.
• Choose Delete.
• Click yes
Moustapha SM 51
Folders
• Customize a folder
Locate the folder and
right click.
Choose Properties.
Click Customize.
Moustapha SM 52
Folders
Subfolders
Folders exist in a hierarchy,
with folders containing other
folders, called subfolders. The
folder hierarchy is often
visualized as a tree structure.
No limit exists on the number
of subfolders you can create. A
folder can be inside a folder
inside a folder, and so on
Moustapha SM 53
Using File Explorer
Ribbon
Navigation Pane
Address Bar
Title Bar
Moustapha SM 54
Using File Explorer
• Changing the View
• Click an option in the
Layout section of the
View ribbon; or
• right-click in a blank area
of the Contents pane and
then click View
Moustapha SM 55
File Management
Moustapha SM 56
File Management
Moustapha SM 57
File Management
File Type Extension Common icon
Moustapha SM 58
File Management
• Identify selected files
Moustapha SM 59
File Management
Copy/ Paste: to duplicate a file to another folder
After selecting the file(s) or folder(s) to duplicate
Right click on the file/folder, and then click Copy(or
CTRL + C).
Move to the new location, right click, and then click Paste
(or CTRL + V).
Moustapha SM 60
File Management
• Selecting Files and Folders
To select one file or folder, click it.
To select all files and folders within a location, click
the Home tab, and click Select all in the ribbon or
press CTRL+A.
To select multiple files or folders that are
consecutive, point to the first file or folder in the list,
press and hold the SHIFT key, and then point to the
last file or folder in the list.
Moustapha SM 61
File Management
• Selecting Files and Folders
To select multiple files or folders that are non-
consecutive, point to the first file or folder to
be selected, press and hold the CTRL key, and
then point at each file or folder to be selected.
Moustapha SM 62
File Management
• Compressing Files
When you need to reduce the size of one or more files,
you can use a file compression utility.
Compressing one or more files is also referred to as
zipping.
Moustapha SM 63
File Management
• Compressing Files
To compress (zip) a file or folder
• Locate the file or folder that you want to compress.
• Right-click the file or folder, point to Send to, and then
click Compressed (zipped) folder.
Moustapha SM 64
File Management
• Extracting Files
To extract (unzip) compressed files and folders
• Locate the file or folder that you want to compress.
• To extract a single file or folder, double-click the
compressed folder to open it. Then drag the file or
folder from the compressed folder to a new location
• To extract the entire contents of the compressed folder,
right-click the folder, click Extract All, specify a
destination folder, then click Extract.
Moustapha SM 65
File Management
• Task Manager
Occasionally when you are running Windows,
you may find that you are unable to close an
application that has ‘crashed’. If this happens,
you need to press the Ctrl + Alt + Del keys
simultaneously (you can also press Ctrl +
Shift + Esc or Right click an empty area on
the taskbar and select from the menu). A
list of options will be displayed. Select the
Start Task Manager option. This will display the
Task Manager dialog box.
Moustapha SM 66
Changing Desktop Configuration Settings
Moustapha SM 68
Changing Desktop Configuration Settings
• Uninstall an application
› Click the Start button. Find
Windows System and
select Control Panel.
› Click Programs and
Features.
› Select the application that
you want to uninstall. Click
Uninstall and then click
Yes.
Moustapha SM 70
Changing Desktop Configuration Settings
• Screen Capture
› If you need to take a picture of what is shown on your
computer, you can use the print screen key (often
designated PrtScn or PrtScr). Pressing the key will
copy an image of your screen to the Clipboard, after
that, you have to paste it into an application such as
Microsoft Word or Paint to save it.
› If you only want to capture what is in your current
active window instead of the whole screen, press
Alt+PrtScn.
Moustapha SM 71
Hard Drive and Removable Media
• Removable Media
A USB drive, also referred to as a
flash drive or memory stick, is a
small, portable device that plugs
into the USB port on your
computer. USB drives are
commonly used for storage, data
backup, and transferring files
between devices*.
*kingstone.com
Moustapha SM 72
Hard Drive and Removable Media
• Hard Disks
Hard disks are the primary storage location for both data
and programs. Software programs must be installed on a
hard disk before you can use them.
• External Drives
External drives are hard drives contained in a case and
attached to a computer with a cord as a peripheral
device.
Moustapha SM 73
Hard Drive and Removable Media
• Drive Letters
• On a computer, each storage device
(or location) is referred to by a drive
letter. This applies to internal storage
devices and externally connected
storage devices.
• if your computer has two hard
drives: the primary hard drive is
drive C and the secondary hard drive
is drive D.
Moustapha SM 74
Hard Drive and Removable Media
• Measuring Capacity
• Storage capacity:
The amount of space available to store data either on disk or in
memory and is measured in bytes.
Measurement Abbreviation Equal To
Byte B 8 bit
Kilobyte KB 1,024 bytes (a thousand bytes)
Megabyte MB 1,024 KB (a million bytes)
Gigabyte GB 1,024 MB (a billion bytes)
Terabyte TB 1,024 GB (a trillion bytes)
Moustapha SM 76
Networks
• A network is simply an arrangement of computers (and
additional computing devices) that are connected in
such a way that they can communicate and share
information.
• Enable users to share many things, including: files,
resources, internet connection.
Moustapha SM 77
Networks
• LANs and WANs
• Local Area Networks (LANs)
A private, local set-up. Your home network, or a small office or
school network is a LAN. LANs are private networks. LANs come
in different sizes, but are generally confined to one geographic
location.
• Wide Area Networks (WANs)
Networks that connect computers in multiple locations using
communication lines owned by a public carrier (such as the
phone company or an Internet Service Provider).
Moustapha SM 78
Networks
• Connecting to the Internet
› Phone line
Your computer is connected to a modem, which connects to the phone
line.
› Mobile phone
The connection is established using Internet compatible mobile devices,
such as smart phones and tablets, through the mobile phone network.
› Wi-Fi
Wireless network that allows devices to connect to internet
› Satellite
A satellite connection does not require cable or phone lines; it connects
to the Internet through satellites orbiting the Earth
Moustapha SM 79
Networks
• Wireless Connections –
Wi-Fi
• Click the Wi-Fi symbol on
the task bar at the right of
the screen to display a list of
available networks.
• Select your network from
the list.
• When prompted, enter the
passkey for your network,
and click OK.
Moustapha SM 80
Networks
Moustapha SM 81
Networks
• Internet
A global network connecting millions of computers worldwide.
• Internet Connection Sharing
• Stream audio and video to various devices.
• Share stored media (such as audio files, or photographs)
among your devices.
• Share and backup files (including documents, pictures, scans,
and so on.)
• Play games online.
Moustapha SM 82
Networks
• VPN
A network used to connect remote users securely to a business network to
share data and communicate.
Transfer rate
The rate at which information is transferred to or from a disk
drive. Measured in bits per second (bps), kilobits per second
(kbps), megabits per second (mbps), gigabits per second (gbps)
Moustapha SM 83
Networks
• Downloading
To copy a file or image from a web page
• Uploading
To copy a file or image from a computer to a web page
Moustapha SM 84
Security and Well-Being
• User Names and Passwords
Your user name and password protect your account from
unauthorized access.
Moustapha SM 85
Security and Well-Being
• Viruses
A virus is a malicious program designed to take control
of system operations, and damage or destroy data.
All computer viruses are human made and are often
designed to spread to other computer users through
networks or email address books
Moustapha SM 86
Security and Well-Being
• Worms
A worm is a self-replicating program that consumes
system and network resources. The difference between a
worm and a virus is that a worm automatically spreads
from one computer to another, whereas a virus requires
some form of action; for example, a user must pass an
infected disk to someone else, or must forward an
infected email message.
Moustapha SM 87
Security and Well-Being
• Trojans
A Trojan (or Trojan horse) is a program designed to allow
a hacker remote access to a target computer system.
The code for a Trojan is hidden inside seemingly
harmless applications, such as games. Trojans are
installed on the target system when the user runs the
infected application. Unlike worms and viruses, Trojans
do not replicate themselves or copy themselves to other
files and disks
Moustapha SM 88
Security and Well-Being
• Firewall
A security system designed to protect a network against external
threats
• Antivirus
Antivirus is a software used to prevent, scan, detect and delete
viruses from a computer. Once installed, most antivirus software
runs automatically in the background to provide real-time
protection against virus attacks.
Moustapha SM 89
Security and Well-Being
• Backing up data
It’s important to have an off-site backup copy of files in case of
unforeseen network, hardware or software problems, so that a
copy of the data is available if the original data were to become
unusable.
Moustapha SM 90
Security and Well-Being
• Health and Green IT
• User’s well-being while using a computer or a device
Take regular breaks
Ensure appropriate lighting and posture
Lighting should be bright enough and correctly positioned.
Correct positioning of the computer, desk and seat will minimise bad
posture.
Moustapha SM 91
Security and Well-Being
• Energy saving practices
Turning off - When not in use
Adjusting automatic shut down - After a specified number of
minutes not used.
Adjusting backlight - This can be decreased.
Adjusting sleep mode settings - This can be activated after
pre-set timings.
Moustapha SM 92