Skill Sets covered during the session:



European

Computer

Driving

Licence

ECDL Syllabus 5.0

Form 3

ECDL Core

2009

Contents

Module 1 Concepts of Information & Communication Technology (ICT) 1

Input & Output Ports 1

Computer Performance 2

Intranet & Extranet 2

E-Commerce, E-Banking & E-Government 3

( Activity 1 4

E-Learning 5

Teleworking 5

Blogs 6

Online Communities 6

( Activity 2 7

Module 2 Using the Computer & Managing Files 8

Changing the File Status 8

Searching Files or Folders 8

Viewing the List of Recently Used Files 9

( Activity 3 10

File Compression 10

Compressing & Extracting Files 10

( Activity 4 14

Changing the Default Printer 14

Installing a New Printer 15

Printing a Document 15

Viewing the Print Job’s Progress 17

Pausing, Re-Starting & Deleting a Print Job 17

Module 3 Word Processing 19

Saving a Document 19

Displaying & Hide Non-Printing Characters 20

Applying Automatic Hyphenation 20

Applying Styles 21

( Activity 5 21

Creating a Table 22

Inserting & Editing Data in a Table 24

Selecting Cells, Rows, Columns & Entire Table 24

Inserting & Deleting Rows, Columns & Cells 25

Modifying Column Widths & Row Heights 27

( Activity 6 29

Modifying Cell Border Line Style, Width & Colour 30

Adding Shading or Background Colour to Cells 31

Moving, Copying & Deleting Graphics 32

( Activity 7 32

Module 4 Spreadsheets 34

Saving a Workbook 34

Relative & Absolute Cell Referencing 35

( Activity 8 36

Count Function 36

Counta Function 37

Round Function 37

( Activity 9 38

Using the Logical Function IF 39

( Activity 10 41

Aligning Cell Content 41

Adding, Editing & Deleting Data in Headers & Footers 43

( Activity 11 45

Module 6 Presentation 47

Saving a Presentation as another File Type 47

Adjusting Line Spacing 47

Applying & Changing Bullet & Number Styles 48

( Activity 12 50

Entering & Editing Text in Table Slide 51

Selecting Rows, Columns & Entire Table 51

Inserting & Deleting Rows & Columns 51

Modifying Column Widths & Row Heights 52

( Activity 13 53

Inserting Drawn Objects 53

Adding Text to a Drawn Object 55

Formatting Drawn Objects 55

Changing the Arrow Start & Finish Style 55

Applying Shadow to a Shape 56

Grouping & Ungrouping Drawn Objects 56

Bringing an Object to the Front or Sending it to the Back 57

( Activity 14 57

Adding & Removing Transition Effects 59

Adding & Removing Preset Animations 59

Adding Presenter’s Notes 60

Selecting an Output Format 61

Hiding & Showing Slides 61

( Activity 15 62

Module 7 Web Browsing & Communication 63

Secure Web Sites 63

Digital Certificates 63

Encryption 64

Malware 64

( Activity 16 65

Allowing & Blocking Pop-ups 65

Allowing & Blocking Cookies 66

Deleting Cache & Temporary Internet Files 67

Completing Web-based Forms 69

( Activity 17 70

Selecting a Search Engine 70

Using the Keyword Search Facility 70

Searching for Information using a Search Engine 72

Short Message Service (SMS) 72

Computer Viruses & Emails 73

( Activity 18 73

Saving & Opening a File Attachment 73

Previewing & Printing Messages 74

Applying a Setting to Reply with/out Original Message 75

Flagging Emails 76

Searching Messages 77

Sorting Messages 77

( Activity 19 78

Courseware compiled by

James Cilia

2009

Module 1

Concepts of Information & Communication Technology (ICT)

Input & Output Ports

Computers have different input/output ports i.e. slots where cables connect peripherals to the computer.

[pic]

Typically all computers will have these ports:

▪ USB port – is a slot in the computer that supports fast transfer data rates. USB flash disks, digital cameras, mice, keyboards etc can be connected to the computer via the USB port.

▪ Serial port - is a general-purpose interface that can be used to connect mice and keyboards to the computer.

▪ Parallel port – is an interface that connects the printer to the computer.

▪ Network port – is used to connect the computer to a network or a modem.

▪ FireWire port – is a slot that connects digital video cameras to the computer. FireWire supports faster transfer data rates than USB ports.

Computer Performance

The processing speed of a computer is the rate at which the hardware and software interact to manipulate data. There are several factors determining the processing speed of a computer:

1. The clock speed of the CPU – A higher clock speed means more units of data can be processed each second. The clock speed of the CPU is measured in megahertz (MHz) or gigahertz (GHz).

2. The design of the CPU – Different CPUs may be designed to process larger units of data at a time or process certain types of data more efficiently. An Intel Pentium Celeron processor running at 800MHz will not be as fast as an Intel Pentium II processor running at the same clock speed.

3. The amount of RAM – Increasing the memory size of RAM improves the speed of a computer. This is because at any single time more programs and data can be loaded from the hard disk to it. Thus, the CPU can process data more efficiently.

4. The type of hard disk – Different hard disks have different access speeds. Access speed is the time taken to read and write data to the disk. High access speeds improve the processing speed of a computer.

Also the amount of free space on the hard disk affects the processing speed of the computer. MS Windows is constantly shuffling data between the hard disk and RAM, creating a lot of temporary files in the process. Hard disk space is needed for these temporary files. Thus, free hard disk space can optimise the performance of a computer.

5. The type of graphics card – Modern graphics cards often have new design features and more built in memory than older ones. These graphic cards enable computers to run graphics orientated software more quickly and smoothly.

6. The type of CD-ROM or DVD-ROM – Fast CD- and DVD- ROMs reduce the time taken to access data and move data. A 52× speed CD-ROM drive is faster than a 36× speed drive for a given type of disk.

7. The number of applications running – The processing speed of a computer slows down if a lot of programs/applications are running at the same time. It is important to close programs which are not being used.

Intranet & Extranet

An intranet is an organisation’s private network that uses the infrastructure and standards of the Internet and World Wide Web. It is a website accessible only by the organisation’s members, employees or other persons with authorisation.

When an organisation develops a public website on the Internet, it is making selected information available to the general public. When it creates an intranet, it is making selected information available only to authorised personnel.

An intranet's Web site looks and acts just like any other Web sites, but the firewall surrounding an intranet prohibits unauthorized access. Intranets enable employees to have quicker access to internal information and to share knowledge so that they can do their jobs better.

An extranet that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view.

E-Commerce, E-Banking & E-Government

Information and Communications Technology (ICT) includes all technologies (hardware, software & networking) used to process and communicate information.

The following are typical large-scale uses of ICT:

▪ E-commerce - Computer networks are gradually replacing our shopping habits. Nowadays more and more people are buying and selling goods/services through Internet. This online trading is often referred to as electronic commerce or e-commerce. Online buyers use credit cards to purchase goods/services.

Internet users are often concerned about online purchases. Normally payments for online purchases are made by a credit-card. Here are some important facts that you should know before submitting your credit number:

o Information travelling between your computer and a server can be routed through many computer systems.

o Any one of these computer systems can capture and misuse your information. Each of these computers can eavesdrop and make copies of your information.

o An intermediary computer could even deceive you and exchange information with you by representing itself as your intended destination.

If you decide to shop on the Internet, protect yourself by dealing with secure sites. Browsers display security warnings when you are about to enter a secure site. You can tell when you have a secure connection by looking at the URL. Secure sites have URLs starting with “https:” not “http://”.

It is also important that before you purchase products, equipment or service online, you read through the terms/conditions of sale and your rights as a consumer should the product/equipment turns out to be defective or of an inferior quality.

In spite of the above there are also advantages associated with e-commerce:

o Products, equipment or services are available 24 hours a day seven days a week. There are no shopping hours.

o Reduced or no commuting time – Typically products and equipment are delivered to your home. Therefore, you will not need to travel to the shop.

o Wide range of products – The availability of online shops enables users to compare a wide range of products without travelling from one shop to another.

▪ E-banking – Nowadays many banks enable their customers to perform electronic banking transactions through Internet. Users do not need to go to the bank to transfer funds, pay bills, view and check their bank accounts etc.

If you decide to do banking on the Internet, protect yourself by dealing with secure sites. Browsers display security warnings when you are about to enter a secure site. You can tell when you have a secure connection by looking at the URL. Secure sites have URLs starting with “https:” not “http://”.

The advantages associated with e-banking include:

o The banking services are available 24 hours a day seven days a week. There are no banking hours.

o No commuting time – You will not need to go to the bank and therefore avoid queues.

▪ E-government – Nowadays many government departments offer services to the community through the use of ICTs. Locally the government portal that gives access to all information and services provided by government departments is available at .mt. Everyday many people seek information about services offered by government departments. They also make Internet payments for various services such as examinations fees, car licences, income tax payments etc.

( Activity 1

1. Identify the ports used by these devices: (a) printer, (b) digital camera and (c) digital video camera.

2. Distinguish between an intranet and an extranet.

3. Write two advantages of e-commerce and e-banking.

4. Which websites are secure to make a payment using a credit card?

5. What is e-government?

E-Learning

E-learning is a form of learning or education through the use of computers connected to Internet. It includes text, video, audio, animation and virtual environments.

Typical benefits associated with e-learning include:

▪ Flexible learning time - Students and adults can work through and study a course at anytime of the day. E-learning is particularly useful for people who work or have family commitments.

▪ Flexible learning location - Students and adults can work through and study a course from any location even whilst being abroad.

▪ Multimedia learning experience – Typically e-learning includes text, video, audio and animations which facilitate learning.

▪ Cost effectiveness – A large number of people can follow an e-learning course. Because of this registration fees for e-learning courses are often cheaper than those for class-based courses.

Teleworking

Nowadays employers are making arrangements for staff to work away from office using Internet connected computers. Teleworkers use Internet facilities to work from home. There are several advantages associated with teleworking:

▪ Reduced or no commuting time – Teleworkers will be able to start off with their work without having to travel to their office.

▪ Greater ability to focus on one task – Productivity increases because teleworkers experience fewer distractions (i.e. less phone calls & distractions from workmates) at home.

▪ Flexible schedules – Teleworkers can work on a task at anytime which is convenient for them. They can work on a task at night or during the early hours of the day.

▪ Reduced company space requirements – Teleworkers will ease on the demand for office space because they are away from the office.

The disadvantages associated with teleworking include:

▪ Lack of human contact – Teleworkers may feel isolated when working on a task on their own for prolonged periods. This isolation may not be psychologically healthy for teleworkers.

▪ Less emphasis on teamwork – Some people claim that telework may lead to less teamwork.

Blogs

A blog short for web log is a type of website usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. The latest entry is always displayed at the top of the Web page.

Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs.

Online Communities

An online (virtual) community is a group of people that communicate with each other using Internet e.g. email, internet social network service or instant messages. They communicate for social, professional, educational or other purposes.

Many individuals use social networking websites such as Hi5 or Facebook to keep in touch with their friends and seek ‘old’ friends. They set up an online profile, describing their interests, and add links to other profiles. Generally, users are able to post personal information, including photographs, videos etc. Some people join special interest groups on social networking sites.

An Internet forum is also called a message board, discussion group, bulletin board or web forum. An Internet forum usually allows all members to make posts and start new topics.

Before a prospective member joins an Internet forum and makes posts to others, s/he is usually required to register. The prospective member must usually agree to follow certain online rules, sometimes called netiquette. When a member is approved by the administrator or moderator of the Internet forum, the member usually chooses his or her own user name and password. Sometimes, a password is supplied.

The separate conversations in an Internet forum are called threads. Threads are made up of member-written posts. Internet forum members can usually edit their own posts, start new topics, post in their choice of threads and edit their profile. A profile usually lists optional information about each forum member such as the city they are located in and their interests.

An Internet forum administrator or monitor may also participate in the forum. A forum administrator can usually modify threads as well as move or delete threads if necessary. Administrators can also usually change software items in an Internet forum. Moderators often help the administrator and moderate Internet forum members to make sure the forum rules are being followed.

Chat rooms are virtual spaces on Internet where individuals discuss topics in real time. Within a chat room, there may be a moderator who monitors the content of the conversation in order to prevent abuse.

Social networking, Internet forums and chat rooms provide ways to learn, talk and socialize, however some users abuse these systems.

Users should take the following basic precautions when using social networking websites, Internet forums and chat rooms:

▪ Apply privacy settings to their profile to limit the amount of personal information that is publicly available. In particular they should avoid posting their email address, contact telephone numbers, family pictures etc.

▪ Be weary of communication they receive from people they do not know. Some people use these sites anonymously and so they can give incorrect information about themselves. Parents need to be aware of who their children are talking to in chat rooms and social networking sites.

▪ All forms of bullying and harassment should be reported to the administrators of social networking sites, Internet forums and chat rooms.

▪ If they agree to meet a person that they have met through a chat room or any other social networking, they should do so in a public place and ideally in the presence of other friends. Children and teens must never meet a person that they have met through a chat room or any other social networking unless they are accompanied by a parent or an adult family member.

Online computer games refer to any type of game that someone can play through the Internet or over a computer network. Most of the time, online gaming refers to video games played over the Internet, where multiple players are in different locations across the world. Online gaming also refers to gambling over the Internet, through an online casino.

Online gaming is growing in popularity for a variety of reasons. Gamers can easily find opponents of a similar skill level when playing a game over the Internet. Players also can compete in multiplayer games, where many players play an ongoing game in a virtual world. Often times, participants can communicate with other gamers through text chat sessions during online gaming or, sometimes, players can actually speak to other players, using special audio hardware. Some online games charge a monthly fee for access to the video game software.

Parents are encouraged to supervise closely what their children are doing on the computer. Software can be installed on computers to monitor the sites visited by children and teenagers. Parents are encouraged to agree with children on the duration of time that their children spend on the computer.

( Activity 2

1. What is e-learning?

2. List three benefits of e-learning.

3. List two advantages and two disadvantages of e-learning.

4. Briefly explain the term blog.

5. Name two social networking sites.

6. List three precautions you should take when using social networking sites.

7. What is an Internet forum?

8. Briefly explain the term online computer gaming.

Module 2

Using the Computer & Managing Files

Changing the File Status

All files have property sheets which display information such as size, location, date/time last saved and the status of the file i.e. read-only, hidden and/or archive.

To change the status of a file:

1. In My Computer window, right-click the name of the file to change its attributes. A shortcut menu will be displayed.

2. Click Properties. The Properties dialog box for the selected file will be displayed.

3. Tick the appropriate attribute:

[pic]

4. Click Apply button.

5. Click OK button.

|Attibute |Effect |

|Read-only |Specifies whether this file is read-only/locked, which means that it cannot be changed. |

|Hidden |Specifies whether the file or folder is hidden, which means that you cannot see or use it unless you know its |

| |name. |

|Archive |Specifies whether this file or folder should be archived. Some programs use this option to control which files |

| |and folders are backed up. |

Searching Files or Folders

You can search for files or folders:

1. Click Start button.

2. Highlight Search.

3. Click For Files or Folders. The Search Results window will be displayed.

4. In the Companion section, click All files and folders.

5. Type part or all of the name of the file or folder.

OR

Type a word or phrase that is in the file.

If you do not know either piece of information or want to narrow your search further, select one or more of the remaining options (refer to the following table).

6. In the Look in drop down menu, click the drive, folder or network drive where you want to search for the file or folder.

7. Click Search button.

|Option |To Do This |

|When was it modified? |To look for files that were created or modified on or between specific dates. |

|What size is it? |To look for files of a specific size. |

|More advanced options |To specify additional search criteria. |

Note that:

▪ You can also display the Search Results window by clicking the shortcut key combination: Windows key + F.

▪ Sometimes you may not be sure about the name of the file or folder. Wildcards can help you find files or folders for which you only have partial details. Adding the asterisk (*) in your search term uses a wildcard for a string of letters or numbers, whereas the question mark (?) is a single character wildcard.

|Wildcard |Example |Description |

|* |sun* |Returns sung, suns, sunset, sunrise, sunny, sundial |

| |s*n |Returns sin, son, sun, soon, scan, skin, stun |

|? |sun? |Returns sung, suns |

| |s?n |Returns sin, son |

Viewing the List of Recently Used Files

You can view a list of the most recently used files via the Start menu:

1. Click Start button.

2. Highlight Documents. A sub-menu with the most recently used files will be displayed.

If the option Documents is not available in the Start menu, follow these steps:

1. Right-click the Start button.

2. Click Properties.

3. On the Start Menu tab, click Start menu.

4. Click Customize.

5. On the Advanced tab, tick the check box List my most recently opened documents.

6. The next time you click Start, the My Recent Documents folder is on the Start menu. This folder contains the documents and files you opened recently.

( Activity 3

You will use Module 2 practice files.

1. Locate the sub-folder My Work within the folder Module 2 Exercises.

2. Change the status of the file Lecture-1.ppt to Read-Only.

3. Switch off the Read-Only status of the file memo.doc.

4. Search for the file events.doc within Module 2 Exercises.

5. Search for the file containing the words ‘Using the computer’ within Module 2 Exercises.

6. Search for the file saved on 27/11/2000 within Module 2 Exercises.

7. Search for all files with a filesize less than (), less than sign ( |B>A |TRUE |

|Less than |< |B= |B>=A |TRUE |

|Less than or equal to |=250

The value_if_true is the answer returned by B2*2%

The value_if_false is “0”

( Activity 10

You will use Module 4 practice files.

1. Open the workbook sixth.xls in Module 4 Exercises folder.

2. In Sheet1 use the appropriate IF function such that cell C2 will display ‘Yes’ if the Amount in cell B2 is greater than 0. Otherwise cell C2 should display ‘No’.

3. Use the autofill or copy handle tool to replicate the answer in cell C2 to C3 and C4.

4. Switch to Sheet2. Use the appropriate IF function such that cell C2 will display ‘On Order’ if the Amount in cell B2 is less than 5. Otherwise cell C2 should display ‘In Stock’.

5. Use the autofill or copy handle tool to replicate the answer in cell C2 to C3 and C4.

6. Switch to Sheet3. Use the appropriate IF function such that cell C2 will display ‘PASS’ if the Average Mark in cell B2 is greater or equal to 45. Otherwise cell C2 should display ‘FAIL’.

7. Use the autofill or copy handle tool to replicate the answer in cell C2 to C3 and C4.

8. Switch to Sheet4. Use the appropriate IF function such that column C will display a 2% commission of the sales if the Sales is equal to or greater than 250. Otherwise column C should display ‘0’.

9. Use the autofill or copy handle tool to replicate the answer in cell C2 to C3 and C4.

10. Save and close the workbook. Close MS Excel.

Aligning Cell Content

By default, MS Excel aligns text to the left edge of a cell and values (numbers, dates, time) to the right edge of a cell. There are several alignment options in MS Excel:

|Option |Button |Effect |

|Align Left |[pic] |Aligns data to the left edge of the cell. If the data does not fit, excess data is placed in |

| | |the cell to the right (if that cell is empty). If the cell to the right is not empty, the |

| | |display of the data ends at the right edge of the cell. |

|Centre |[pic] |Aligns data in the centre of the cell. Spill over data appears in the adjoining cells if |

| | |either or both are empty. Otherwise, the display of the data is truncated. |

|Align Right |[pic] |Aligns data to the right edge of the cell. Spill over data appears in the cell to the left if|

| | |it is empty. Otherwise, the display of the data is truncated. |

|Merge and Centre |[pic] |Joins the selected cells and centers the data in the resulting single cell. |

To change the alignment (left, centre, right) of data in a cell/s:

1. Highlight the cell/s.

2. Click Align Left, Centre or Align Right button.

To centre data (e.g. a title) across a number of cells:

1. Highlight the cells across which the data will be centred.

2. Click Merge and Centre button.

[pic]

The alignment options indicated above allow you to position cell contents horizontally (left-to-right). MS Excel also allows you to align cells vertically (top-to-bottom):

1. Highlight the cell/s containing the data to be aligned.

2. Click Format menu.

3. Click Cells...

4. Click Alignment tab.

5. Click the drop-down arrow of the Vertical: field.

6. Select the appropriate option.

7. Click OK button.

[pic]

The following table outlines all the available options in the Alignment tab in the Format Cells dialog box.

|Option |To Do This |

|Horizontal |Aligns text to the left, numbers to the right, and centres logical and error values. |

|Left (Indent) |Aligns cell contents to the left. |

|Center |Centres cell contents. |

|Right |Aligns cell contents to the right. |

|Fill |Repeats the contents of the selected cell until the cell is full. If blank cells to the right also have the |

| |Fill alignment, they are filled as well. |

|Justify |Aligns wrapped text within a cell to the right and left. You must have more than one line of wrapped text to |

| |see the justification. |

|Center Across |Centres a cell entry across the selected cells. |

|Selection | |

|Vertical | |

|Top |Aligns cell contents along the top of the cell. |

|Center |Centres cell contents in the middle of the cell. |

|Bottom |Aligns cell contents along the bottom of the cell. |

|Justify |Justifies the cell contents up and down within the width of the cell. |

|Wrap text |Wraps text into multiple lines in a cell. The number of wrapped lines is dependent on the width of the column|

| |and the length of the cell contents. |

|Shrink to fit |Reduces the apparent size of font characters so that all data in a selected cell fits within the column. The |

| |character size is adjusted automatically if you change the column width. The applied font size is not |

| |changed. |

|Merge cells |Combines two or more selected cells into a single cell. The cell reference for a merged cell is the |

| |upper-left cell in the original selected range. |

|Orientation |Rotates selected cell entries. |

To adjust the cell orientation:

1. Repeat steps 1-4 as for above.

2. Select the appropriate orientation option. You can also specify a value in degrees to rotate the data.

3. Click OK button.

Adding, Editing & Deleting Data in Headers & Footers

To add headers/footers to a worksheet:

1. Click View menu.

2. Click Header and Footer… The Page Setup dialog box will be displayed.

3. Click Header/Footer tab.

[pic]

4. Click Customise Header… button or Customise Footer… button. The Header or Footer dialog box will be displayed depending on your choice.

[pic]

5. Type the text or insert any of the following fields in the appropriate section (left, centre or right) of the header or footer.

6. Click OK button to close the Header or Footer dialog box.

7. Click OK button to close the Page Setup dialog box.

|Option |Button |Effect |

|Font |[pic] |To format text i.e. set font style, size and typestyles. |

|Page number |[pic] |To insert a page number field. |

|Number of pages |[pic] |To insert number of pages in the sheet. |

|Date |[pic] |To insert a date field. |

|Time |[pic] |To insert the time field. |

|File name |[pic] |To insert the name of the workbook. |

|Worksheet name |[pic] |To insert the name of the sheet within the workbook. |

To edit or delete data in headers or footers:

1. Repeat steps 1-4 as above.

2. Edit or delete the data displayed in the appropriate section (left, centre or right) of the header or footer.

3. Repeat steps 6-7 as above.

( Activity 11

You will use Module 4 practice files.

1. Open the workbook third.xls in Module 4 Exercises folder.

2. Apply a centre vertical alignment to the contents of cell range A1:D9.

3. Apply centre horizontal alignment to the contents of cell range B3:D7.

4. Merge and centre the text Computer Shop 2004 in cell range A1:D1.

5. Apply text wrapping to the content of cell A9.

6. Apply a 90° alignment to the cell range B3:D3.

7. Adjust the column widths and row heights to AutoFit as necessary. Your worksheet should be similar to this:

[pic]

8. Apply the following header in the centre section – The Computer Shop 2004.

continued…

9. Apply Comic Sans MS pt. size 11 and bold typestyle to the header text.

10. Insert a date field and a time field in the left section of the footer.

11. Insert a page number field in the centre section of the footer.

12. Insert a filename field in the right section of the footer.

13. Save and close the workbook. Close MS Excel.

Module 6

Presentation

Saving a Presentation as another File Type

You can save a presentation as another file type: Rich Text Format, template, show, image file format and version number.

1. Click File menu.

2. Click Save As… The Save As dialog box will be displayed.

3. Click the drop-down arrow in the Save in: field and select the disk and/or folder where the presentation will be saved.

4. Type a name for your presentation in the File name: field.

5. Click the Save as type drop down arrow.

[pic]

6. Click the file format that you want the file saved in e.g. PowerPoint 95 (*.ppt)

7. Click Save button.

Note that:

▪ The facility to save a presentation to another format can be useful so that this can be read by previous versions of MS PowerPoint.

Adjusting Line Spacing

There is no limit to the amount of text you can add to a slide. However avoid the use of long sentences. Suitably spaced short text is more effective to convey your message.

1. Select the text or the placeholder containing the text you want to adjust its spacing.

2. Click Format menu.

3. Click Line Spacing...

4. Enter the appropriate adjustments.

5. Click OK button.

The new spacing will be applied to the selected paragraphs or paragraph containing the insertion point.

|Option |To Do This |

|Line Spacing |Sets the amount of space you want between lines of selected text. |

|Before Paragraph |Sets the amount of space you want to leave before the first line of each selected paragraph. |

|After Paragraph |Sets the amount of space you want to leave after each selected paragraph. |

Applying & Changing Bullet & Number Styles

To apply bullets to text:

1. Select the text or the placeholder containing the text you want to apply bullets to.

2. Click Format menu.

3. Click Bullets and Numbering... The Bullets and Numbering dialog box will be displayed.

[pic]

4. Click Bulleted tab.

5. Click any one of the 7 bullet styles.

6. Click OK button.

Note that:

▪ You can also apply bullets by highlighting the text and clicking the Bullets button. However, this method does not allow you to choose from the different bullet styles available in MS PowerPoint.

To remove bullet lists:

1. Repeat steps 1-4 as for above.

2. Click None

3. Click OK Button.

Note that:

▪ You can also remove bullets by highlighting the text and clicking the Bullets button.

To modify bullet style:

1. Select the text or the placeholder containing the text you want to change its bullet style.

2. Click Format menu.

3. Click Bullets and Numbering... The Bullets and Numbering dialog box will be displayed.

4. Select the appropriate bullet style or click the Character... button.

5. Select one of the Bullet styles available.

6. Click OK button.

To apply numbering to a list of text:

1. Select the text or the placeholder containing the text you want to apply numbering to.

2. Click Format menu.

3. Click Bullets and Numbering... The Bullets and Numbering dialog box will be displayed.

4. Click Numbered tab.

5. Click any one of the 7 bullet styles.

6. Click OK button.

Note that:

▪ You can also apply numbering highlighting the text and clicking the Numbering button. However, this method does not allow you to choose from the different numbering styles available in MS PowerPoint.

[pic]

To remove numbering:

1. Repeat steps 1-4 as for above.

2. Click None

3. Click OK Button.

Note that:

▪ You can also remove numbering by highlighting the text and clicking the Numbering button.

To modify the numbering style:

1. Select the text or the placeholder containing the text you want to change its numbering style.

2. Click Format menu.

3. Click Bullets and Numbering... The Bullets and Numbering dialog box will be displayed.

4. Select the appropriate numbering style.

5. Click OK button.

( Activity 12

You will use Module 6 practice files.

1. Open the presentation file third.ppt located in Module 6 Exercises folder.

2. Save third.ppt in an image format JPEG File Interchange Format. Use the name thirdmodified when saving the file as an image format. Export every slide in the presentation.

3. Adjust the line spacing of the body text in slide 2 to 1.25 lines.

4. Adjust the paragraph spacing of the body text in slide 3 to 0.5 Lines before paragraph and 0.5 Lines after paragraph.

5. Apply the default bullet style to the body text in slide 2.

6. Apply the following bullet character ( to the body text in slide 3. The bullet characters (only) should have a blue colour.

7. Apply the default numbering style to the body text in slide 4.

8. Apply the following numbering style a., b., c… to the body text in slide 5.

9. Remove the bullet characters from the body text in slide 2.

10. Save and close third.ppt. Close MS PowerPoint.

Entering & Editing Text in Table Slide

To create a table in a slide:

1. Apply a Table slide layout.

2. Double-click the icon in the middle of the slide to add the table.

3. Set the number of columns and rows needed for the table.

4. Click OK button.

To insert text in the table:

1. Click in the cell where you want to insert the table.

2. Type the text.

Note that:

▪ To move from one cell to the next press TAB key.

Selecting Rows, Columns & Entire Table

To highlight a row, column or the entire table:

|Highlight |Action |

|Row |Drag the mouse across the row. |

|Column |Drag the mouse down the column. |

|Table |Drag the mouse from the top left to the bottom right of the table. |

Inserting & Deleting Rows & Columns

To insert a row:

1. Highlight the row where the new row will be inserted.

[pic]

2. Right-click the highlighted row.

3. Click Insert Rows.

To insert a column:

1. Highlight the column where the new column will be inserted.

[pic]

2. Right-click the highlighted column.

3. Click Insert Columns.

To delete a row:

1. Highlight the row to delete.

2. Right-click the highlighted row.

3. Click Delete Rows.

To delete a column:

1. Highlight the column to delete.

2. Right-click the highlighted column.

3. Click Delete Columns.

Modifying Column Widths & Row Heights

You can change the width/height of selected columns and rows by dragging the column/row borders

To modify the column width:

1. Rest the pointer on the column boundary you want to move until it becomes

2. Drag the the boundary to the left or right until the column is at the width you want.

To modify the row height:

1. Rest the pointer on the row boundary you want to move until it becomes

2. Drag the the boundary up or down until the row is at the height you want.

( Activity 13

You will use Module 6 practice files.

1. Open the presentation file third.ppt located in Module 6 Exercises folder.

2. Insert a new slide at the end of the presentation. Apply the Title and Table layout to this slide.

3. In the Title placeholder type the text Hardware.

4. In the Table placeholder create a table with 3 columns and 2 rows.

5. Type the following text.

|system unit |keyboard |monitor |

|disks |modem |printer |

6. Apply horizontal centre alignment to all table text.

7. Apply green colour to the text in the first column.

8. Insert a blank column between column 1 and 2. Type mouse in the first cell of the blank column. Type scanner in the second cell of the blank column.

9. Insert a blank row between row 1 and 2.

10. Type the following text:

|speakers |web camera |cables |microphone |

11. Adjust the widths of the columns and heights or the rows so that the entire table will fit within the slide.

12. Save and close third.ppt. Close MS PowerPoint.

Inserting Drawn Objects

The Drawing toolbar includes a number of tools for drawing simple objects, including lines, free drawn lines, arrows, rectangles, squares, circles, text boxes and other shapes. You will use the Drawing toolbar to draw shapes in your documents.

To draw a line:

1. Click Line button on the Drawing toolbar.

2. The mouse pointer changes to a cross hair.

3. Place the cursor where you want the line to begin.

4. Click and drag to where you want the line to end.

5. Release the mouse button.

Note that:

▪ If the Drawing toolbar is not visible, click View menu, point to Toolbars and click Drawings.

▪ To constrain the line to draw at 15-degree angles from its starting point, hold down SHIFT key as you drag.

▪ To lengthen the line in opposite directions from the first end point, hold down CTRL key as you drag.

To draw a free form line:

1. Click AutoShapes button.

2. Point to Lines.

3. Click Freeform button.

4. Place the cursor where you want the line to begin.

5. Click and drag to draw the line.

6. Release the mouse button when ready.

To draw an arrow:

1. Click Arrow button on the Drawing toolbar.

2. The mouse pointer changes to a cross hair.

3. Place the cursor where you want the arrow to begin.

4. Click and drag to where you want the arrow to end.

5. Release the mouse button.

Note that:

▪ To change the arrow start/end style click the Arrow Style button on the Drawing toolbar. Select the appropriate option.

To draw a rectangle/square:

1. Click Rectangle button.

2. Place the cursor where you want one corner of the rectangle.

3. Click and drag diagonally to where you want the opposite corner of the rectangle.

4. Release the mouse button.

Note that:

▪ To draw a square, hold down SHIFT key as you drag the mouse.

To draw an oval/circle:

1. Click Oval button.

2. Place the cursor where you want the shape to begin.

3. Click and drag until the shape is the size you want.

4. Release the mouse button.

Note that:

▪ To draw a circle, hold down SHIFT key as you drag the mouse.

A text box is a rectangular area where you can insert text. To draw a text box:

1. Click Text Box button.

2. Place the cursor where you want to type.

3. Click the cursor.

4. Start typing.

Note that:

▪ You can resize the text box by clicking on this, position the pointer on one of the sizing handles and drag.

To draw other shapes:

1. Click AutoShapes button.

2. Select the appropriate category of shapes.

3. Draw the shape.

Adding Text to a Drawn Object

You can add text into a text box, block arrow, rectangle, square, oval and circle:

1. Right click the drawn object.

2. Click Add Text. The drawn object displays a cursor.

3. Type the text.

Formatting Drawn Objects

To change the background colour of a drawn object:

1. Click the drawn object.

2. Click Fill Colour button.

3. Select the appropriate background colour for the drawn object.

To change the line colour of a drawn object:

1. Select the line to modify.

2. Click Line Colour button.

3. Select the colour to apply.

To change the line style & weight of a drawn object:

1. Select the line to modify its style. Sizing handles appear at the left and right edge of the line.

2. Click Line Style button.

3. Select the appropriate line style and weight (thickness)

Changing the Arrow Start & Finish Style

To change the arrow start style and finish style:

1. Double-click the drawn arrow in the slide.

2. Choose the appropriate Begin style: and / or End style:

3. Click OK button.

[pic]

Applying Shadow to a Shape

1. Click the drawn object.

2. Click Shadow button. A menu containing different shadow styles appear.

3. Click the appropriate shadow option.

Note that:

▪ When you apply a shadow to a text box, all text and attributes of the text box take on the shadow effect.

Grouping & Ungrouping Drawn Objects

Before you can group two or more objects you need to select these:

1. Click the first drawn object.

2. Press and hold CTRL key.

3. Click the next drawn object/s.

4. Release the mouse button.

5. Release the CTRL key.

To group drawn objects:

1. Select the objects you want to group.

2. On the Drawing toolbar click Draw button.

3. Click Group.

To ungroup drawn objects:

1. Select the group you want to ungroup.

2. On the Drawing toolbar click Draw button.

3. Click Ungroup.

Bringing an Object to the Front or Sending it to the Back

1. Click the object to bring to front or send to back.

2. Click Draw button on the Drawing toolbar.

3. Point to Order.

4. Click the appropriate option.

|Option |To Do This |

|Bring to Front |To bring an object to the front. |

|Send to Back |To send an object to the back |

|Bring Forward |To bring an object one step closer to the front. |

|Send Backward |To send an object one step toward the back |

( Activity 14

You will use Module 6 practice files.

1. Open the presentation file third.ppt located in Module 6 Exercises folder.

2. Insert a new slide at the end of the presentation. Apply Blank layout to this slide. Refer to the following diagram whilst working on tasks 1-16.

[pic]

3. Draw a vertical line to the left of the slide.

4. Draw a horizontal line at the bottom of the slide.

continued…

5. Use the free form tool to draw three hills as shown.

6. Draw a rectangle on the first hill.

7. Draw a square on the first hill

8. Draw an oval on the third hill.

9. Draw a circle at the top right corner of the slide.

10. Draw small straight lines around the circle.

11. Draw vertical arrows below the rectangle and square.

12. Draw a block arrow below the oval.

13. Use the text box to type your name and surname at the bottom right of the slide. Change the font style of the text to Comic Sans MS.

14. Add the text Highest Cliff to the rectangle.

15. Add the text Lowest Height Cliff to the square.

16. Add the text Medium Height to the oval.

17. Apply 6 point straight line style and red colour to the vertical line.

18. Apply a 6 point dotted line style and blue colour to the horizontal line.

19. Apply a yellow fill colour to the circle.

20. Insert a new slide at the end of the presentation. Apply Blank layout to this slide. Refer to the following diagram whilst working on tasks 21-29.

[pic]

21. Draw the three circles shown above. Apply the colour fills as shown.

22. Apply a setting to send the yellow circle below the red circle but above the green circle.

23. Apply a setting to send the red circle below the green circle.

24. Group the three circles into a single drawing object.

25. Draw a horizontal line to the right of the circles.

26. Apply an arrow head to each end of the horizontal line.

27. Create a square as shown above. Apply a blue colour fill.

continued…

28. Apply a shadow to the square.

29. Ungroup the three circles. Apply a grouping to the yellow and green circle only.

30. Save and close third.ppt. Close MS PowerPoint.

Adding & Removing Transition Effects

Transitions are the visual special effects you see when you go from one slide to the next in an electronic slide show.

To add the same transition effect to all the slides:

1. Click Slide Show menu.

2. Click Slide Transition... The Slide Transition task pane will be displayed.

3. Click the transition effect to apply.

4. Click Apply to All Slides button.

To add different transitions between slides:

1. On the Slides tab in normal view, select the slides you want to add a transition to.

2. Repeat steps 1-2 as above.

3. In the list, click the transition effect you want.

Note that:

▪ Repeat the following process for each slide you want to add a different transition to.

Adding & Removing Preset Animations

You can animate text, graphics, sounds, movies, and other objects on your slides so you can focus on important points, control the flow of information, and add interest to your presentation.

You can have each main bullet point appear independently of others, or you can have objects appear progressively, one after another. You can set up the way you want each bullet point or object to appear on your slide to fly in from the left, for example, and whether you want other bullets or objects to dim or change colour when you add a new element.

You can apply a preset animation scheme:

1. Click Slide Show menu.

2. Click Animation Schemes… The Slide Design task pane will be displayed.

3. Under Apply to selected slides, click an animation scheme in the list.

Note that:

▪ If you want to apply the scheme to all slides, click the Apply to All Slides button.

▪ To preview animations for a slide click Play button in the Slide Design task pane.

▪ To preview how the set animations will be displayed, click Slide Show button in the Slide Design task pane.

▪ To change a preset animation repeat steps 1-3 as above.

▪ To remove a preset animation repeat step 1-2 as above and click No Animation under Apply to selected slides.

Adding Presenter’s Notes

You can add speaker’s notes for any or all of the slides in your presentation. Normally, these notes are used as a quick reference for key points you want to make during a presentation. You can print the notes for your reference during the presentation.

You can add presenter’s notes using the Normal view or the Notes Page view.

To add presenter notes using the Normal view:

1. Click the notes pane.

2. Type your notes for the current slide.

Note that:

▪ To see more of the notes pane, point to the top border of the notes pane until the pointer becomes a double-headed arrow, and then drag until the pane is the size you want.

▪ To move to other slides (to add notes) use the Slide/Outline tab.

To add presenter notes using the Notes Page view:

1. Click View menu.

2. Click Notes Pages. The Notes Page that corresponds to the slide you are working on appears. An image of the current slide appears at the top of the Notes Page.

3. Click the notes box below the slide.

4. Type your notes in the box below the slide image.

Note that:

▪ To enlarge the Notes Page view, click the Zoom Control button on the Standard toolbar.

▪ If you want to provide pages on which your audience can make notes, then print notes pages but leave the notes area blank. If you plan to make some notes by hand below the slide, try putting some lines in the notes box.

Selecting an Output Format

You can select an appropriate output format for the slide presentation such as: overhead, handout, 35mm slides and on-screen show. You can also change the slide orientation (portrait or landscape) and paper size.

1. Click File menu.

2. Click Page Setup…

[pic]

3. Click the drop-down arrow below Slides sized for:

4. Select the appropriate option.

5. Click OK button.

Hiding & Showing Slides

You may wish to hide a slide from being displayed during your presentation. To hide a slide:

1. On the Slides tab in normal view, select the slide you want to hide.

2. Click Slide Show menu.

3. Click Hide Slide.

Note that:

▪ The hidden slide icon appears with the slide number inside, next to the slide you have hidden.

▪ The slide remains in your file, even though it is hidden when you run the presentation.

To reset a hidden slide to be viewed in a slide show:

1. On the Slides tab in normal view, select the hidden slide you want to make visible again.

2. Repeat steps 2-3 as above.

( Activity 15

You will use Module 6 practice files.

1. Open the file third.ppt located in Module 6 Exercises folder.

2. Select slide 1 and apply the transition effect Box out. Set this transition effect to a medium speed.

3. Set the transition effect Cover Down at slow speed for slides 2 to 8.

4. Set the animation effects/scheme Dissolve in for slide 1.

5. Set the animation effects/scheme Fade in one by one for slide 4.

6. Add the following presenter’s notes to the slide 2.

Examples of hardware include monitor, keyboard, tower, mouse etc.

Examples of software include MS Windows, MS Word, MS Excel etc.

7. Set the presentation such that the slides will be output in portrait orientation on A4 paper.

8. Apply the appropriate setting so that slides 7 and 8 will not be displayed whilst the slide show is running.

9. Save and close third.ppt. Close MS PowerPoint.

Module 7

Web Browsing & Communication

Secure Web Sites

A secure (protected) Web site is a site that can only display its content if the user types in a username and a password. Many organisations restrict access to sections of their Web sites. When users try to access these sites, the browser prompts for a username and a password. The Web sites will be displayed if the correct username and password are entered.

Digital Certificates

Internet users are often concerned about online purchases. Normally payments for online purchases are made by a credit-card. Here are some important facts that you should know before submitting your credit number:

▪ Information travelling between your computer and a server can be routed through many computer systems.

▪ Any one of these computer systems can capture and misuse your information. Each of these computers can eavesdrop and make copies of your information.

▪ An intermediary computer could even deceive you and exchange information with you by representing itself as your intended destination.

If you decide to shop or do banking on the Internet, protect yourself by dealing with secure sites. Browsers display security warnings when you are about to enter a secure site. You can tell when you have a secure connection by looking at the URL. Secure sites have URLs starting with “https:” not “http://”.

A secure Web site has a digital certificate confirming that it is secure and genuine. It ensures that no other web site can assume the identity of the original secure site. When you are sending personal information over the Internet, you should check the certificate of the web site you are using to ensure that it will protect your personally identifiable information.

Digital certificates are issued by a certificate authority. When you visit a secure web site, the site automatically sends you its digital certificate. Digital certificates are used by organisations involved in online monetary transactions. The certificates ensure that credit card details will not be intercepted as these travel from the buyer’s computer to the web server. Digital certificates can be viewed by double-clicking on the padlock icon in the Web browser.

Encryption

Encryption is the translation of data into a secret code. A secret key or password is required to translate (decrypt) the secret code back to readable data. Encryption is used to safeguard confidential data as this as being transmitted over the Internet.

Public-key encryption is one type of computer encryption system. This uses a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane’s public key to encrypt the message. Jane then uses her private key to decrypt it.

An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key. Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her.

Malware

Malware (malicious software) is a program designed to secretly enter and damage a computer system. Malware includes:

▪ A computer virus is a piece of program designed and written to make additional copies of itself and spread from location to location, typically without user knowledge or permission. Viruses are written by programmers with malicious intent to annoy computer users.

▪ Worms are similar to viruses in that they make copies of themselves, but differ in that they need not attach to particular files or sectors at all. Once a worm is executed, it seeks other systems - rather than parts of systems - to infect, then copy its code to them. Typically worms slow down computer systems.

▪ Trojan horses secretly place illegal, destructive instructions in the middle of a computer program. Once the program is run, the Trojan horse becomes active. Trojans do not replicate themselves like other viruses.

▪ Spyware is a program that secretly installs itself on computers and collects information about users without their knowledge. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited. They can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.

Two sources of viral infections are:

▪ Sharing infected files over the intranet i.e. the internal computer network of an organisation.

▪ Downloading infected files from Internet sites.

You should be careful with program or file downloads from the Web. Files available on bulletin boards or public newsgroups may be infected. Software updates e.g. drivers, multimedia players, should be downloaded from the manufacturer's official website. It is important to update your anti-virus program to prevent against malware.

Firewall

A firewall is a system designed to prevent unauthorised access to your computer system when connected to Internet. A firewall is simply a program or hardware device that filters information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Many users having always-on connections (such as ADSL or cable) are encouraged to install personal firewalls (software) that protects their system from intruders.

( Activity 16

1. How can you tell from the URL that a web page is secure?

2. What is a digital certificate?

3. Briefly explain the term encryption.

4. Briefly explain the term malware. Mention four examples of malware.

5. Distinguish between viruses and spyware.

6. Mention two sources of viral infections.

7. What is a firewall?

Allowing & Blocking Pop-ups

A pop-up is a small web browser window that appears on top of the website you're viewing. Pop-up windows often open as soon as you visit a website and are usually created by advertisers.

MS Internet Explorer has a Pop-up Blocker feature that lets you limit or block most pop-ups. You can choose the level of blocking you prefer, from blocking all pop-up windows to allowing the pop-ups that you want to see. When Pop-up Blocker is turned on, the Information bar displays a message saying "Pop-up blocked. To see this pop-up or additional options click here."

By default, the Pop-up Blocker is turned on in MS Internet Explorer. To turn it off or to turn it on again if you've already turned it off, follow these steps:

1. In MS Internet Explorer click Tools button.

2. Click Pop-up Blocker

3. Do one of the following:

▪ To turn off Pop-up Blocker, click Turn Off Pop-up Blocker.

▪ To turn on Pop-up Blocker, click Turn On Pop-up Blocker.

Allowing & Blocking Cookies

Cookies are text files that save information regarding particular websites. They may save information, shopping cart contents, or user preferences.

When a Web browser requests a Web page from a Web server, the latter can store a piece of text on the user’s computer. The text is sent back to the server each time the browser requests a page from that server.

The main purpose of cookies is to identify users and possibly prepare customised Web pages for them. When you enter a Web site using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.

Many websites require that you enable cookies in order for the website to be properly viewed. To enable cookies:

1. In Internet Explorer click Tools menu.

2. Click Internet Options.

3. Click the Privacy tab.

[pic]

4. Set the slider to Medium. This should be enough to enable cookies.

[pic]

If you want to enable cookies for a particular site, click Sites button. In Address of website: field type the URL. Click Allow button to enable cookies for that site.

5. Click OK button to close the Per Site Privacy Actions dialog box.

6. Click OK button to close the Internet Options dialog box.

To block cookies for a site:

1. Repeat steps 1-4 as above.

2. If you want to block cookies for a particular site, click Sites button. In Address of website: field type the URL. Click Block button.

3. Repeat steps 5-6 as above.

Deleting Cache & Temporary Internet Files

Cache is a special folder on the hard disk that stores Web pages accessed by your browser. The first time visit a Web page, your browser retrieves all content (text, images, audio etc.) and a copy of these will be stored on the hard disk. The next time you visit the same Web page, your browser checks if the last modified dates of the files on the Internet are newer than the ones stored or cached. If the dates are the same, your browser uses the files on your hard disk instead of downloading these again from the Web server. Thus the cache speeds up browsing of Web pages. The files stored in the cache are known as temporary Internet files.

The temporary Internet files are never deleted unless the cache is full. To delete these:

1. In MS Internet Explorer click Tools menu.

2. Click Internet Options.

3. In the General tab click Delete button.

[pic]

4. In the Delete Browsing History dialog box, tick Temporary Internet files.

5. Click Delete button.

[pic]

6. Click OK button.

Completing Web-based Forms

In recent years Web pages have become highly interactive. Nowadays, Web pages do not only display information. Users are purchasing goods and services through the Web. Users are applying for courses through the Web etc.

Web-based forms are one way how users may interact with the Web. Online forms are the equivalent of printed forms. They are so convenient because users can complete and submit these forms quickly.

Web based forms may contain:

▪ Text fields - These are blank boxes where you type in textual information.

▪ Menu fields - These provide you with a choice to make in the form of a menu that “appears” when you click on it.

▪ Check boxes - These are used when you have a choice to make. You can choose as many check boxes as you want.

▪ Radio buttons – These are also used when you have a choice to make. Unlike check boxes, you can only choose the one you want. They are circular.

▪ Submit or Reset buttons - These allow you to clear your form (reset) or to submit your form. What happens to the data after you “submit” depends on how the Web page has been set up.

[pic]

( Activity 17

1. What is a pop-up?

2. Turn off pop-up blocker in your browser.

3. Turn on pop-up blocker in your browser.

4. Enable cookies in your browser.

5. Use the browser facility to delete all temporary Internet files.

6. Visit this web page:



7. Activate the Restaurant Booking Form hyperlink.

8. On the Restaurant Booking Form enter the following details:

Date: 08 April 2009

Time: 20:00

Number of People: 2

9. Click Book Table button.

10. Close MS Internet Explorer.

Selecting a Search Engine

As indicated earlier there are a search engine is a program that locates Web sites via searches for keywords and phrases. You can use different search engines e.g. Google, MS Live Search etc.

To select a search engine:

1. Click Search Options drop-down arrow.

2. Choose the search engine to use e.g. Live Search. The Search field will display the name of the search chosen

f[pic]

Using the Keyword Search Facility

It is possible to look for information using the search facility available on the search engine site. If you know exactly what you are looking for, type the word or phrase that best describes the subject, click on ‘search’ button, and wait for the search engine to come up with the results.

[pic]

In some cases the search engine would list thousands of web pages related to the subject you are searching for. This would make it next to impossible to go through all the Web pages on the list. The following hints might help you select the appropriate information from Internet:

▪ Read the ‘hints’ and ‘help’ for each search engine - these will explain how the search tool works, and which commands can be used to attain more accurate results.

▪ Use specific words instead of general ones – for example, searching for ‘constructivist education’ will have more specific results than a search for ‘education’.

▪ Use quotes around words that are part of a phrase - if you want the words to be found in a specific order, it is important to enclose them in inverted commas. Thus, if you want to find documents about Jean Piaget, type in ‘Jean Piaget’. The former will produce a never-ending list of Web pages having either Jean or Piaget or both.

▪ Use the ‘+’ (plus) for words that the search must contain – if you are looking for Italian cars, you should search for +Italian+cars, which, means that the documents retrieved will all have both the word ‘Italian’ and the word ‘cars’ in them.

▪ Use the ‘-‘ (minus) for words that the search must not contain – if you are looking for information about cars but these must not be Italian cars, you should search for +cars-Italian. The results of this search would include a list of documents about cars with no mention of Italian cars.

▪ Use Boolean operators AND, OR, AND NOT – These operators must appear in capital letters and with a space on each side.

o AND – documents found must contain all words joined by this operator, for example italian AND cars would list all Web pages about Italian cars.

o OR – documents found must contain at least one of the words joined by OR, for example butterfly OR caterpillar would list all Web pages containing either butterfly or caterpillar.

o AND NOT – documents found cannot contain the word that follows AND NOT, for example English language AND NOT England would display of all Web pages containing English language and not England.

Searching for Information using a Search Engine

1. In the Search field: type the keywords.

2. Press ENTER key. The search engine will locate occurrences of the text in its database of Web pages.

3. Examine the search results. These are usually presented as a list of links to pages containing the text you requested. Click any link to display a Web page.

[pic]

Short Message Service (SMS)

Short Message Service (SMS) allows for short text messages to be sent from one cell phone to another cell phone or from the Web to another cell phone. SMS is also referred to as texting, sending text messages or text messaging. SMS text messaging is the most widely used data application in the world.

Computer Viruses & Emails

Files attached to emails may contain viruses that may infect your computer system. Receiving an email with an infected file attachment does not infect your computer. You need to open the file for your system to be infected.

It is important to treat all files attached to emails with caution. Use an updated antivirus program to scan these files before opening. Some file types particularly those carrying the extension .EXE, .COM, .PIF, .JS, .VBS, .SHS, .SCR, .DOT are potential viral infections. Double file extensions e.g. "readme.txt.vbs", should always be treated with suspicion. Just because an email appears to come from someone you trust, this does not mean the file is safe or that the supposed sender has anything to do with it.

( Activity 18

You will use Module 7 practice files.

1. What is a search engine?

2. Select Live Search engine.

3. Type the keyword ECDL.

4. Click the first link in the list of search results displayed by Live Search engine.

5. Select Google search engine.

6. Type the phrase within inverted quotes 'ecdl syllabus version 5.0'.

7. Click the first link in the list of search results displayed by Google search engine.

8. In Google search engine type italian AND cars.

9. Click the first link in the list of search results displayed by Google search engine.

10. In Google search engine type butterfly OR caterpillar.

11. Click the first link in the list of search results displayed by Google search engine.

12. Close MS Internet Explorer.

13. What does SMS stand for?

Saving & Opening a File Attachment

Messages carrying attachments display a paper-clip icon. When you read these messages, the name of the attached file will be displayed below attachments.

It is important that you save the attached file on your computer and use updated antivirus software to scan if the file is infected.

To save a file attachment:

1. Click the email that has the file attachment.

[pic]

2. Double-click the attached file.

[pic]

3. Click Save button. The Save As dialog box is displayed.

4. Browse to the disk/folder location where the attachment will be saved.

5. Click Save button.

To open the attachment/s saved you will need a program that can open files of the same type as the attachment's file format. For example, if you want to open a .DOC file, make sure you have a program on your computer that can open .DOC files.

Previewing & Printing Messages

You can preview a message before printing:

1. Click File menu.

2. Click Print Preview. The Print Preview window will be displayed.

3. Click Page Setup… to adjust the page setup options such as orientation, paper size and margins.

4. Click OK button to close the Page Setup dialog box.

5. Click Close button to close Print Preview dialog box.

[pic]

You can print a message:

1. Click File menu.

2. Click Print… The Print dialog box will be displayed.

3. Adjust the appropriate options such as number of copies.

4. Click OK button.

Applying a Setting to Reply with/out Original Message

By default MS Outlook, when replying to a message, this will also contain the original message. To change this setting:

1. Click Tools menu.

2. Click Options…

3. Click E-mail Options… button.

[pic]

4. In the E-mail Options dialog box, choose one of the following in the When replying to a message drop down menu:

▪ Include original message text

▪ Do not include original message

[pic]

5. Click OK button to close the E-mail Options dialog box.

6. Click OK button to close the Options dialog box.

Flagging Emails

You can use flags to remind yourself to follow up an issue or to categorize messages in your Inbox. To flag a message:

1. Click the message to flag.

2. Click Actions menu.

3. Select Follow Up.

4. Choose the appropriate flag for the message. The subject of the message will displayed a coloured flag.

To remove the flag mark from a message:

1. Click the message to remove its flag mark.

2. Click the flag in the message line. The flag will be replaced with a checkmark.

Searching Messages

You can search for a message by sender, subject or email content:

1. Click Tools menu.

2. Select Find.

3. Click Advanced Find…

4. To search by:

▪ sender, click in the From: field and type the name or email address of the sender.

▪ subject, type a word or phrase in the Search for the word(s): field and choose subject field only in the In: field.

▪ email content, type a word or phrase in the Search for the word(s): field and choose subject field and message body.

[pic]

5. Click Find Now button.

6. Messages which match the search criteria indicated in step 4 will be displayed at the bottom of the Advanced Find window.

7. Double-click the appropriate message to open.

Sorting Messages

You can sort emails by name, by date and by size:

1. Click View menu.

2. Select Arrange By

▪ Choose From to sort emails by name

▪ Choose Date to sort emails by date

▪ Choose Size to sort emails by size.

( Activity 19

1. Start MS Outlook and check for new email messages.

2. Your tutor has sent you a message that contains a file attachment.

3. Save the file to your MS Windows desktop.

4. Open the file saved in the previous step using the appropriate program.

5. Preview the last email you received.

6. Apply a setting so that when you reply to the last email the original message will not be quoted. Reply to your last email as follows:

Dear Teacher,

Thank you for email.

Kind regards,

Send the email.

7. Apply a setting so that when you reply to the last email the original message will be quoted. Reply to your last email as follows:

Dear Teacher,

Thank you for email.

Kind regards,

Send the email.

8. Flag the first and third email in your Inbox folder.

9. Remove the flagging from the first email in your Inbox folder.

10. Sort the messages in your Inbox folder by name.

11. Change the sorting of messages in your Inbox folder so these are sorted by date.

12. Close MS Outlook.

[pic][pic][pic]

-----------------------

Menu field

Text Field

[pic]

[pic]

Button

Check Boxes

[pic]

[pic]

[pic]

[pic]

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download