31
Unit 03: Interfacing with Computer and Internet Computer Literacy 23 A Handling Operating System: Introduction: A Microsoft window is the most widely used graphical user use interface operating system for personal computers. Windows uses graphics to make the program easier to use and sometimes called GUI (Graphical User Interface). All windows operating system support the use of mouse, icons and menus. We can open several applications at the same time and easily move data from one application to another. Windows XP: Windows XP is developed by Microsoft. It was released in 2001. XP stands for Experience. It is more powerful than previous version of Windows. Its new interface makes XP home, XP Professional and XP Media Center. Windows XP Professional has all the features of XP home and many more. It is often used in business environments and by home users with greater computing needs. The Media Center is built on XP Professional. Features of Windows XP: Some important features of Windows XP are as follows: 1. New User Interface: Windows XP provides a new user interface with different visual style. Windows XP desktop and taskbar are more attractive and easier to use. Windows layout has also been changed for windows XP. The design of Stat menu is also changed. 2. Easier To Use: Windows XP provides an easier way to work with files and folders. It saves all files in My Documents folder on Desktop by default. It also manages a list of recently used files by Quick access later. 3. Easier To Manage: Windows XP is easier to manage for user and network administrator. It can install and repair some programs automatically. The user can also add and remove programs easily. 4. Clean Desktop Wizard: Clean Desktop wizard is an important feature of Windows XP. By default, the Desktop clean Wizard runs every sixty days. It clean up desktop by moving unused desktop shortcuts to a folder called Unused Desktop Shortcuts. 5. Multi-User: Windows XP is a multi user operating System. It means that many users can use the computer and utilities multiple processors in a computer. These can be connected to a computer over the internet. 6. Multi Processing: Windows ZP supports multiple processing. Multi-processing is the capability to support and utilize multiple processors in a computer. Two or more processors can execute different programs at the same time. It increases the output of the computer. 7. Plug and Play: Plug and play is the capability to detect and configure a device and install appropriate device drive. Windows XP has the feature of plug and play. It contains a large number of device drivers. When a new hardware device is attached to computer, it detects the device and installs its driver if it is available. 8. Digital Media: Windows XP provides many features to enjoy and share digital music, movies and pictures. Windows Media Player is used to listen to music, watch movies etc. Windows XP also makes it easier to manage and enjoy digital pictures. My Pictures folder provides an easier way to organize photos. The user can view the pictures in

Unit3

Embed Size (px)

Citation preview

Page 1: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 23

A Handling Operating System: Introduction:

A Microsoft window is the most widely used graphical user use interface operating

system for personal computers. Windows uses graphics to make the program easier to

use and sometimes called GUI (Graphical User Interface). All windows operating

system support the use of mouse, icons and menus. We can open several applications

at the same time and easily move data from one application to another.

Windows XP:

Windows XP is developed by Microsoft. It was released in 2001. XP stands for

Experience. It is more powerful than previous version of Windows. Its new interface

makes XP home, XP Professional and XP Media Center. Windows XP Professional

has all the features of XP home and many more. It is often used in business

environments and by home users with greater computing needs. The Media Center is

built on XP Professional.

Features of Windows XP: Some important features of Windows XP are as follows:

1. New User Interface:

Windows XP provides a new user interface with different visual style. Windows XP

desktop and taskbar are more attractive and easier to use. Windows layout has also

been changed for windows XP. The design of Stat menu is also changed.

2. Easier To Use:

Windows XP provides an easier way to work with files and folders. It saves all files in

My Documents folder on Desktop by default. It also manages a list of recently used

files by Quick access later.

3. Easier To Manage:

Windows XP is easier to manage for user and network administrator. It can install and

repair some programs automatically. The user can also add and remove programs

easily.

4. Clean Desktop Wizard:

Clean Desktop wizard is an important feature of Windows XP. By default, the

Desktop clean Wizard runs every sixty days. It clean up desktop by moving unused

desktop shortcuts to a folder called Unused Desktop Shortcuts.

5. Multi-User:

Windows XP is a multi user operating System. It means that many users can use the

computer and utilities multiple processors in a computer. These can be connected to a

computer over the internet.

6. Multi Processing:

Windows ZP supports multiple processing. Multi-processing is the capability to

support and utilize multiple processors in a computer. Two or more processors can

execute different programs at the same time. It increases the output of the computer.

7. Plug and Play:

Plug and play is the capability to detect and configure a device and install appropriate

device drive. Windows XP has the feature of plug and play. It contains a large number

of device drivers. When a new hardware device is attached to computer, it detects the

device and installs its driver if it is available.

8. Digital Media:

Windows XP provides many features to enjoy and share digital music, movies and

pictures. Windows Media Player is used to listen to music, watch movies etc.

Windows XP also makes it easier to manage and enjoy digital pictures. My Pictures

folder provides an easier way to organize photos. The user can view the pictures in

Page 2: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 24

My Pictures folder in several Movie Maker can be used to create and edit home

movies.

9. System Restore:

System Restore feature of Windows XP is used to restore operating system in case of

any problem. The operating system is restored to a previous state without any loss of

data.

10. Remote Assistance:

Remote Assistance feature allows a friend at a different location to connect to your

computer and view its screen. Both persons can chat in real time to discuss any

problem. One user can allow other person to use his mouse and keyboard to fix the

problem of computer.

11. User Accounts and Fast User Switching:

Microsoft Windows XP provides multi-user access to single computer. Multiple users

can share a computer and switch between user sessions without closing the programs.

12. Browsing the Internet:

Windows XP provides improved facilities for browsing the Internet. It offers better

security and privacy when browsing the Internet. It also provides new features for

MSN and windows Messenger users.

File Management: 1. Computer Storage:

Computer data storage, often called storage or memory, refers to computer

components, devices, and recording media that retain digital data used for computing

for some interval of time. Computer data storage provides one of the core functions of

the modern computer, that of information retention. It is one of the fundamental

components of all modern computers, and coupled with a central processing unit

(CPU, a processor), implements the basic computer model.

2. Windows Explorer: Windows explorer acts as a file manager in windows operating system, it is used to

mange files and folder on computer. Files and folders are the basic file management

units in windows. Many actions can be performed files and folders using windows

explorer. It can be used to cut, copy, paste, rename or delete a file or folder. It shows

files and folder in a hierarchical way. It contains two panes:

1. Left Pane: It displays folders and drives on the computer in a tree view shape.

The left Pane allows you to see all of the variable drives and folders on your

computer including those parts of the network to which you have access.

2. Right Pane: It shows the detailed view of the folder or drive selected in the left

pane.

3. Creating a New Folder: 1. Open My Computer or Windows Explorer.

2. Open the drive or directory where you want to create a folder.

3. Select File>New>Folder.

4. Type in a name for the folder.

5. Press the Enter key.

4. Renaming a File or Folder:

1. Click on the file or folder to rename.

2. Click again on the file or folder name.

3. Type in a new name for the file or folder

4. Press the Enter key OR

1. Right-click the file or folder’s icon.

2. Select Rename.

Page 3: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 25

3. Type in a new name for the file or folder.

4. Press the Enter key.

5. Creating Sub-Folders:

1. Open the folder or directory where you want to create a sub folder.

2. Select File>New>Folder.

3. Type in a name for the folder.

4. Press the Enter key.

6. Expanding Folders and Sub-Folders:

1. Open the folder or directory where you want to create a sub folder.

2. Select File>New>Folder.

3. Type in a name for the folder.

4. Press the Enter key

7. Coping Files and Folders:

1. Select the file or folder to be copied in Window Explorer.

2. Click Edit > Copy OR right click on the files or folder and select Copy

command

3. Go to the folder where you want to paste it.

4. Click Edit > Paste. OR Right click and select Paste command.

8. Copying File using Drag and Drop

1. Highlight the file you wish to copy.

2. Press CTRL key.

3. Drag the file from one location to another.

9. Moving Files and Folders

1. Select the file or folder to be moved in Windows Explorer.

2. Select Edit > Cut. OR Right click on the file or folder and select Cut.

3. Go to the folder where you want to move it.

4. Select Edit >Paste. OR Right click and select Paste.

10. Moving Files using Drag and Drop

1. Highlight the file to copy and press Shift key.

2. Drag the file form one location to another.

Troubleshooting: Trapshooting is a form of problem solving most often applied to repair of failed

products or processes. It is a logical, systematic search for the source of a problem so

that it can be solved, and so the product or process can be made operational again.

Troubleshooting is needed to develop and maintain complex systems where the

symptoms of a problem can have many possible causes.

1. Checking the of Configuration Our PC:

First, go to Start>All Programs>Accessories>System Tools>System Information

Under the System Summary Tag you will find:

1. Next, under Components, click on the “+” to expand the listing, then click on

“USB”.

2. Next go to Conflicts/Sharing under Hardware Resources. Although this is no

prefect way to determine your type of video slot/card (AGP or PCI-e), this is probably

the best method.

2. Modifying Desktop Settings:

The windows operation system provides a variety options to customize graphical

interface. The options include color, font size, display resolution, icons and taskbar

options etc. the Display Properties dialog box is used to customize their properties.

Page 4: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 26

The Display propertied dialog box has five tabs:

1. Desktop Theme:

A desktop theme affects the appearance of desktop. It includes desktop background,

screen saver, window appearance, pointers and sounds. The user can choose between

the Windows XP theme and windows Classic theme. By default, Windows XP theme

is applied.

2. Wallpaper:

Wallpaper is the background image that appears on desktop. Windows XP provides

many wallpaper options. The desktop background can be customized with a picture,

texture or color. The user can choose from window XP background or use different

images.

3. Screen Saver:

A screen saver is a moving image that appears on screen if the computer is not used

for specified period of time. It saves screen from possible damage called burn-in. the

damages may occur if screen displays a static image for a long time. The screen saver

displays a moving images to prevent this damage.

4. Appearance:

The Appearance tab of Display Properties dialog box is used to change color, size

and fonts of windows interface. Desktop color and icon fonts can be changed using

this option. It provides difference color schemes.

5. Screen Setting:

The user can increase screen resolution to view more information at one time. Higher

resolution displays everything smaller including windows, stat menu and icons etc. it

increases space on desktop.

6. Changing Desktop Theme:

1. Right click on desktop. A popup menu will appear.

2. Select properties. The Display Properties dialog box will appear.

3. Select a theme from Theme drop- down menu. The selected theme will be

applied.

4. Click Ok

OR

1. Click Start > Control panel > Appearance and Themes,

2. Click Change the computer’s theme in Pick a Task are of click Display in or

Pick a Control Panel icon area. The Display properties dialog box will appear.

3. Select a theme from Theme drop-down menu.

4. Click OK. The selected theme will be applied.

7. Changing Desktop Background:

1. Right click on desktop. A pop-up menu will appear

2. Select Properties. The Display properties dialog box will appear.

3. Click Desktop tab.

4. Select a background from background list.

5. Select how image should appear on screen. Choose from the following

a. Center: place the image in the center of the screen

b. Tile: Have the image display as tiles across and down the screen.

c. Stretch: Stretch the image so the image covers the entire screen.

6. Use the drop down boxes to alter wallpaper color.

7. Click OK. The selected background will be applied.

OR

1. Click Start > Control Panel > Appearance and themes.

Page 5: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 27

2. Click Change the desktop background in Pick a Task area. The Display

Properties dialog box open with Desktop tab selected.

3. Click or use the arrow keys to view background from Background list.

4. Use drop down boxes to alter wallpaper Position or Color.

5. Click OK. The selected background will be applied.

8. Applying your own image to Desktop Background:

1. Click Start > My Pictures.

2. Select the picture from My Pictures folder to apply as desktop background.

3. Click Set as Desktop background link in a task panel.

9. Apply Screen Saver:

1. Right click on desktop. A pop-up menu will appear.

2. Click on Screen saver tabs.

3. Select desire screen saver from Screen Saver drop-down menu.

4. Click on Setting to set display option associated with screen saver.

5. Check the on resume, password protect box.

6. Set the number of minutes of inactivity before the screen saver starts in Wait

box.

7. Click Preview button to preview the screen saver.

8. Click Ok. The screen saver will be applied.

OR

1. Click Start > Control Panel > Appearances and themes.

2. Click; choose a screen saver in the Pick a Task area. A Display properties

dialog box will appear with the Screen Saver tab Selected.

3. Repeat the above steps from 4 to 9.

10. Changing Window Appearances:

1. Right click on desktop. A pop-up menu will appear.

2. Click on Properties. A Display Properties dialog box will appear.

3. Click on appearance tab.

4. Select the color form Color Scheme drop-down menu.

5. Select the font size form the font size drop-down menu.

6. Click OK.

11. Displaying folder on the Desktop:

1. Right click on desktop. A pop-up menu will appear.

2. Select properties. The display properties dialog box will appear.

3. Click Desktop tab.

4. Click Customize Desktop button.

5. Check the icons to be displayed on desktop in Desktop icons area.

6. Click OK.

7. Click OK to close Display Properties dialog box.

12. Changing Desktop Icons:

1. Right click on desktop. A pop-up menu will appear.

2. Click on Properties. A display properties dialog box will appear.

3. Click on Desktop tab.

4. Click Customize Desktop button. A Desktop items dialog box opens.

5. Select the icon to change.

6. Click change icon button.

7. Select an icon from the list.

8. Click OK.

9. Click OK to close Desktop Items dialog box.

10. Click Ok to close Display Properties dialog box.

Page 6: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 28

Getting Help: The help of windows XP can be used to solve some of the questions regarding the use

of a Windows XP component or tool. Windows help consists of different pages that

are similar in navigation as the pages on a web site. The user can search information

about a particular theme from keywords and key phrases. The main part of window

help is called help center and technical support.

Opening Help and Support Center: The following procedure is used to access the Help and Support Center:

Click; Start → Help and Support. The Help and Support Center window opens.

The home section is displayed. The home section is displayed when the user opens

Help and Support Center for the first time. The user can pick a help topic, pick a task,

search and ask for outside assistance. The Home section looks and acts much like a

web page. Some Help files are stored on computer and others are stored on the

Internet.

1. The Index: The Index option provides a fast and easy way to locate topics and resources.

Open the Help and Support Center.

Click Index button. The Index opens. The entire index appears in alphabetical

order in the left pane.

Type and keyword.

Double click a topic to explore in the left pane. Information about the topic

displays in the right pane or a Topics Found dialog box appears.

Click Display or Cancel if a Topics Found dialog box appears. Information

about the topic displays in the right pane if the user clicks Display.

Click Cancel to close the dialog box and begin in a new search.

2. Favorites and History: The Favorites option works much like Favorites in Internet Explore. The user can

add any search page here to visit it again easily by clicking Add to Favorites button.

The user can review Help Favorites by opening Help and Support Center and

clicking the Favorites button. The History option keeps track of all of Help and

Support Center pages visited on the Internet. The user can click History button to

review the visited pages.

3. Support:

The Support option is used to solve a problem that cannot be solved by the user. The

user can access support by clicking the support button. The user can get support as

follows:

Ask a friend to help: The user can invite any friend to chat, view desktop and

work on computer by using Internet connection.

Get help from Microsoft: The user can also allow Microsoft support professional

to answer questions via email, chat, view screen, or work on computer.

Go to a Windows Web site forum: Windows Newsgroups are online resources

to communicate with other windows users about any problems.

4. Help’s Search Function: Searching for help topics is the fastest and most useful way to use the Help and

Support Center. The following procedure is used to use the search function:

Open Help and Support Center.

Type and keyword in Search box.

Click the green arrow key. The search result will appear in the left pane.

Page 7: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 29

Click to select the desired result. The explanation will display in the right pane.

Recovering Files from the Recycle Bin: Restoring a file from Recycle Bin:

The process of bringing back the deleted file from Recycle Bin to its original location

is called restoring recycle Bin.

1. Restoring All Items:

Double click on Recycle bin icon. A Recycle Bin window will appear.

Click Restore All Items lick in Recycle Bin Tasks list. The items are restored to

their original location.

2. Restoring One File:

Double Click Recycle Bin on Desktop. A Recycle Bin window will appear.

Select the items to be restored.

Click restore this item link in recycle bin tasks area. The item is restored to its

original location.

Working with Windows Defender: Windows Defender is software that helps protect your computer against pop-ups, slow

performance, and security threats caused by spyware and other unwanted software by

detecting and removing known spyware from your computer. Windows Defender

features Real-Time Protection, a monitoring system that recommends actions against

spyware when it's detected, minimizes interruptions, and helps you stay productive.

The benefits of installing Windows Defender include:

1. Spyware Detection and Removal:

Windows Defender quickly and easily finds spyware and other unwanted

programs that can slow down your computer, display annoying pop-up ads,

change Internet settings, or use your private information without your consent.

Windows Defender eliminates detected spyware easily at your direction, and if

you inadvertently remove programs that you actually want, it's easy to get them

back.

Windows Defender allows you to schedule your scanning and removal times

when it's convenient for you, whether it's on-demand or on a schedule that you

set.

2. Improved Internet Browsing Safety:

Windows Defender helps stop spyware before it infiltrates your computer.

Windows Defender also offers a continuous safeguard designed to target all the

ways that spyware can infiltrate your computer.

Windows Defender works without distracting you. It runs in the background and

automatically handles spyware based on preferences that you set. You can use

your computer with minimal interruption.

3. Protection against the latest threats

A dedicated team of Microsoft researchers continuously searches the Internet to

discover new spyware and develop methods to counteract it.

A voluntary, worldwide network of Windows Defender users helps Microsoft

determine which suspicious programs to classify as spyware. Participants help

discover new threats quickly and notify Microsoft analysts, so that everyone is

better protected. Anyone who uses Windows Defender can join this network and

help report potential spyware to Microsoft.

To help protect your computer from the latest threats, you can choose to have

updates that counteract new spyware automatically downloaded to your computer.

Firewall:

Page 8: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 30

A firewall is a part of a computer system or network that is designed to block

unauthorized access while permitting authorized communications. It is a device or set

of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out)

computer traffic between different security domains based upon a set of rules and

other criteria. Firewalls can be implemented in either hardware or software, or a

combination of both. Firewalls are frequently used to prevent unauthorized Internet

users from accessing private networks connected to the Internet, especially intranets.

All messages entering or leaving the intranet pass through the firewall, which

examines each message and blocks those that do not meet the specified security

criteria.

There are several types of firewall techniques:

1. Packet filter: Packet filtering inspects each packet passing through the network and

accepts or rejects it based on user-defined rules. Although difficult to configure, it

is fairly effective and mostly transparent to its users. In addition, it is susceptible to

IP spoofing.

2. Application gateway: Applies security mechanisms to specific applications, such as

FTP and Telnet servers. This is very effective, but can impose a performance

degradation.

3. Circuit-level gateway: Applies security mechanisms when a TCP or UDP

connection is established. Once the connection has been made, packets can flow

between the hosts without further checking.

4. Proxy server: Intercepts all messages entering and leaving the network. The proxy

server effectively hides the true network addresses.

System Restore and Back Up: One of the greatest utilities in newer versions of Windows (Windows 2000 and

Windows XP) is that of system restore. This is a backup system built into your

computer that will allow you to restore your computer to a previous state in the case

that something happens to your computer making it inoperable or greatly limiting

your computing abilities. If you are infected with a computer virus or have other

problems with your system, using system restore to revert to a backup setting for your

computer can greatly assist you in restoring your computer to normal in the event of

damage to your system. Operating systems which allow for system restore will

usually automatically save settings periodically to ensure that you always have a

working system in backup, and will also allow you to backup your settings yourself if

you feel that you: 1. Creating different Restore Points:

To use System Restore to restore Windows XP to a previous state, follow these steps:

1. Log on to Windows as Administrator.

2. Click Start, point to All Programs, point to Accessories, point to System Tools,

and then click System Restore. System Restore starts.

3. On the Welcome to System Restore page, click Restore my computer to an

earlier time (if it is not already selected), and then click Next.

4. On the Select a Restore Point page, click the most recent system restore point in

the On this list, click a restore point list, and then click Next.

Note A System Restore message may appear that lists configuration changes that

System Restore will make. Click OK.

5. On the Confirm Restore Point Selection page, click Next. System Restore

restores the previous Windows XP configuration, and then restarts the computer.

Page 9: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 31

6. Log on to the computer as Administrator. The System Restore Restoration

Complete page is displayed.

7. Click OK.

2. How to undo a system restoration after you perform a System Restore: You may have unintentionally restored Windows XP to a previous configuration that

you do not want. To undo the restoration, follow these steps:

1. Log on to Windows as Administrator.

2. Click Start, point to All Programs, point to Accessories, point to System Tools,

and then click System Restore. System Restore starts.

3. On the Welcome to System Restore page, click Undo my last restoration, and

then click Next.

Note A System Restore message may appear that lists configuration changes that

System Restore will make. Click OK.

4. On the Confirm Restoration Undo page, click Next. System Restore restores the

original Windows XP configuration, and then restarts the computer.

5. Log on to the computer as Administrator. The System Restore Undo Complete

page appears.

6. Click OK. You can now run System Restore again from a different restore point.

3. Covering to Some Restore Points

Windows XP includes its own backup program, although you may need to do some

digging to find it. If you use Windows XP Professional, the Windows Backup utility

(Ntbackup.exe) should be ready for use. If you use Windows XP Home Edition, you'll

need to follow these steps to install the utility:

1. Insert your Windows XP CD into the drive and, if necessary, double-click the CD

icon in My Computer.

2. On the Welcome to Microsoft Windows XP screen, click Perform Additional

Tasks

3. Click Browse this CD.

4. In Windows Explorer, double-click the Value Add folder, then Msft, and then

Ntbackup.

5. Double-click Ntbackup.msi to install the Backup utility.

By default, the Backup utility uses a wizard that makes the process straightforward.

To start Backup:

1. Click Start, point to All Programs, point to Accessories, point to System Tools,

and then click Backup to start the wizard.

2. Click Next to skip past the opening page, choose Back up files and settings from

the second page, and then click Next.

3. Now choose the location of the data, which you want to take backup

4. Now after taking the backup click on finish.

Using Desktop: The Windows Desktop:

The on-screen work area that contains windows, icons, menus and dialog boxes is

called Desktop. The Desktop is the entering point in windows. Desktop is the first

object that appears when windows is started the user can also changed the look of the

desktop.

Element of Desktop: Different elements of Desktop are as follows.

1. Icon:

An icon is a small graphic that represent a program, drive, folder or document

windows operating system used icons frequently to make the environment user-

Page 10: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 32

friendly. Some important icon that appears on Desktop is My Computer, My

Documents, and Recycle etc.

2. Taskbar:

The Taskbar appears at the bottom of desktop. It includes start button and a button for

each open application. It also includes Quick Launch icons and notification area. By

default the taskbar is always displayed on top of any opened windows.

3. Start Button:

Start button is used to access most of the Programs installed on the Computer. It is

used to perform the following tasks easily:

Open or search a document

Change Windows settings

Manage Files

Getting Help

Maintain System etc

Icons on Desktop: Following are the important icons that appear on Desktop

1. My Documents:

My Document is as folder that is automatically created by Windows during

installation. It is used for saving documents; many application programs like MS

word use this folder as default location for storing files

The following procedure is used to open My Documents folder.

Click Start > My Documents

2. My Computer:

My Computer icon is a graphical representation of everything on the computer. It is

displayed on Desktop. It is used to view difference resources of computer. The user

can double-click my Computer icon to view these resources. The resources include

the drives, files and folders etc. My computer also contains Control Panel option. The

control panel provides different tools to configure the computer

Locating a File Using My Computer:

Double c-click the My Computer icon on Desktop.

Double Click a drive icon.

Scroll through the list of folders (if necessary), and double click a folder.

Repeat Step for any subfolder if necessary.

Double-Click the file too open it.

3. My Network Places:

My Network Places is a folder on the Desktop. It contains icons that represent all the

computer System Connected via a network. It is used to access the computers and

printers that are connected to the network. It is also used to access the shared devices

and folder in the network. The user can connect and disconnect form the My

Network Places using My Network places. The following procedure is used to open

My Network Places folder.

Click Start> My Network Places.

4. Recycle Bin:

Recycle Bin is a temporary storage area. It appears on Desktop. It is used to keep

deleted files. When a file or folder is deleting, it is not removed from the disk

permanently. Windows moves it to Recycle Bin. The files remain there until the user

recovers them or deletes them permanently. Recycle Bin can be helpful to recover a

file that is detected accidentally.

Page 11: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 33

Deleting a Files or Folder from Desktop:

The following procedure is used to delete a file of folder from Desktop:

Click and hold down the left mouse button on the desired file or folder

Drag the icon into the Recycle Bin icon. The files are now in the recycle bin and

will remain the recycle bin until the recycle bin is empty.

OR

Right click the file or folder to be deleted. A pop-up menu will appear.

Choose Delete. A dialog Box will appear.

Click yes.

Empty Recycle Bin:

Empty Recycle Bin is a process of removing the contents of Recycle Bin. The file or

folder is removed from the disk permanently when the user deletes it from Recycle

Bin. The files or folder deleted from Recycle Bin cannot be restored later. Windows

automatically removes older files from Recycle Bin if its size becomes full.

The following procedure is used to empty recycle bin:

Double-click Click the left mouse button on the Recycle Bin icon. A Recycle bin

windows appear. Select the Empty Recycle Bin option from File menu OR click

Empty the Recycle Bin link in Recycle Bin Tasks area. All items will be deleted

permanently.

OR

Right Click Recycle Bin on Desktop. A pop-up menu will appear.

Select Empty Recycle Bin. All items will be deleted permanently.

The Start Menu: The Start menu appears when start button on Taskbar is activated. All programs in

the computer are accessible from start menu. The start menu has been redesigned in

Windows XP. It is divided into two panes. The left pane displays the most recently

used program. The right pane contains useful icons to access files, configure computer

and find information and assistance. It also displays the name of the use that is logged

onto the computer. The classic start menu contains only a single pane.

Common Option on Start Menu:

The following options appear on start menu:

1. Most Frequently Used Programs:

The most frequently used programs are automatically displayed at the beginning of

start menu. Only five programs are displayed when windows XP is used for the first

time. The start menu displays up to sic frequently used programs by default. The

following procedure is used to access the most frequently used programs.

Click start button.

Select the program to open.

2. Internet and Email:

By default, Internet and email programs are displayed above the most frequently used

programs. Internet Explorer is built - in web browser. It provides an interface to

access the internet. E- Mail option starts the default email application such an

Outlook Express. A separator line divides the two sections. The top section above

the most frequently used programs is known as pinned items list. The pinned items

list does not change like the most frequently used programs.

The following procedure is used to access internet and email programs:

Click the start button.

Select the Internet or E – mail program you want to open.

Page 12: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 34

3. All Programs:

The All Programs in start menu displays a list of programs installed on computer.

The following procedure is used to access all programs:

Click Start > All Programs.

Select the program to open.

4. My Recent Documents:

The My Recent Document folder on start menu gives quick access to most recently

opened documents. It displays the document sub – menu. The submenu displays a list

of files that are used recently. The following procedure is used to open My Recent

Documents folder:

Click start > My Recent documents. Most recently used documents will appear.

5. My Documents:

My documents folder stores all files. Many application programs like MS Word use

this folder as default location for storing files. The following procedure is used to

open My Documents folder:

Click start > My Documents.

6. My Pictures:

My Pictures folder provides a convenient way to organize photos. The user can view

pictures in My Pictures folder in several ways. The filmstrip and thumbnail views

show pictures without opening them. My picture folder also contains sample pictures.

By default, it is located in My Document folder. The following procedure is used to

open My Pictures.

Click Start > My Pictures.

7. My Music:

Windows XP stores music in My Music folder by default. It contains some sample

music. By default, My Music folder is located in My Documents folder. The

following procedure is used to open My Music folder:

Click start > My Music.

8. My Computer:

My Computer is used to view different resources of computer. The resources include

drives, files and folders etc. It also contains Control Panel option that provides

different tools to configure computer. The following procedure is used to open My

Computer:

Click start > My computer.

9. Control Panel:

The control panel provides different tools to configure the computer. It determines the

appearance of desktop and controls the performance of hardware. The following

procedure is used to open the Control Panel:

Click start > Control Panel.

10. Printers and Faxes:

Printers and Faxes are used to connect, create or manage printer and fax resources.

The following procedure is used to open the Printers and Faxes:

Click start > Printers and Faxes.

11. Help and Support:

It is used to access Windows XP Help and Support resources. It provides description

of different concepts and commands of windows operating system. It provides

different methods to search help topic. The following procedure is used to open Help

and Support:

Click start > Help and Support OR Press F1 on Desktop.

Page 13: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 35

12. Search:

Search Companion makes it easy to search files and folders, printers, people and

others computers on network. It also has and indexing service to maintain and index

of all the files on computer for faster searches. The user can specify several search

criteria using search companion. The following procedure is used to use the Search:

Click start > Search to open Search companion.

Choose the type of search.

Type search criteria in the boxes. The search criteria changes depending on type of

search.

Click Search to start the search

When the search completes, the user can refine the search or click Yes, Finished

searching to close the search panel.

13. Run:

The Run command is used to run a program or open folders and document etc. It

opens a Run dialog box. The user types the name or path of a program in Run dialog

box to start the program. The following procedure is used to open Run dialog box:

Click start > Run. The Run dialog box will appear.

Type the name of the program, folder, document or website to open.

Click OK.

14. Log off:

Log off option does not shut down the computer. It closes all open programs. The

following procedure is used to close all programs and log off:

Click start > Log Off. Log Off dialog box will open.

Click Log Off.

15. Switching Between Users: A Computer can be used by more than one person. Windows XP allows everyone to

create separate computer accounts. When the user switches between user accounts, all

programs keep running and the computer switches to another user account. The

following procedure is used to switch between users:

Click Start > Log Off. Log Off dialog box will open.

Click Switch user.

16. Restarting Computer:

The process of starting a computer again without turning the power off is called

restarting computer. The following procedure is used to restart the computer:

Click start > Turn Off Computer. The Turn off Computer dialog box will open.

Click Restart.

17. Properly Shutting Down the Computer:

Turn Off Computer is used to close all files and shuts down the computer. It is very

important to use this option to shut down the operating system before turning off the

power. The following procedure is used to shut down the computer:

Click start > Turn Off. Turn Off dialog box will open.

Click Turn off.

Stand by Computers:

The following in standby mode consume less electricity but it is ready for immediate

use. The following procedure is used to put the computer in standby mode.

Click Start > Turn Off Computers. The Turn Off Computers dialog box will

open.

Click Stand By.

Page 14: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 36

Introduction to the Control Panel: You don't have to be a computer genius to use Windows XP, but if you know

something about how to set up some basic features and functions, it will do a lot more

for you. Windows XP makes this easier than ever with the Control Panel. The

Control Panel features a number of tools that will help you control how Windows XP

features look and act. But first you must learn how to access the Control Panel.

To access the Control Panel:

Click Start.

Click Control Panel.

The Control Panel opens.

OR

Type Control Panel in the Address dialog box found on any Windows XP

window.

OR

Many folders feature a link to the Control Panel in the See Also dialog box (only

in XP view). No matter how you get to the Control Panel.

Navigate the Control Panel: If you're used to a previous version of Windows, you'll notice that the Control Panel

in Windows XP looks very different.

The Windows XP Control Panel is divided into Categories. If you click a Category,

the window presents a List of Tasks and related Control Panel icons.

Note: Task and Control Panel icons perform basically the same functions. For

example, notice that you can "Choose a screen saver" in the Pick a Task list. Clicking

this link opens the Display Properties dialog box. However, if you were to choose

the Display icon, the Display Properties dialog box opens.

If you look at the left side of the window, you'll notice that they See Also and

Troubleshooters dialog boxes provides several more related options.

The new Control Panel design provides multiple ways to do something, thereby

making it more user-friendly. However, the new Control Panel design doesn't

provide you with access to every available Control Panel tool - it only provides

you access to the most commonly used tools.

To access ALL of your Control Panel tools, you must switch to Classic View.

To switch to Classic View:

Click the Classic View link on the left side of your Control Panel.

Click the Switch to Category View link to switch back.

Use the menu bar and toolbar buttons to navigate and further explore Control Panel

options.

1. Set the Time and Date

In the following pages, we'll explain how to perform some common Control Panel

tools.

To change the time and date:

1. Open the Control Panel (located in Start menu).

2. Under Pick a Category, click Date, Time, Language, and Regional Options.

3. Under Pick a Task, click Change the date and time.

4. The Date and Time Properties dialog box opens.

5. Use the drop down box to set the month and year.

6. Click the correct date on the calendar.

7. Click and select the current time to make a change.

Page 15: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 37

8. If necessary, click the Time Zone tab and use the drop down box to change the

time zone.

9. Click OK to close the dialog box.

OR

1. Right-click the time in the lower right on your desktop.

2. Choose Adjust Date/Time.

3. The Date and Time Properties dialog box opens.

4. Follow above steps 5-9.

2. Changing the Wallpaper:

Wallpaper is the background image that appears on your desktop. Windows XP

offers many wallpaper choices.

To change the wallpaper:

1. Open the Control Panel (located in Start menu).

2. Under Pick a Category, click Appearance and Themes.

3. Under Pick a Task, click Change the desktop background.

4. The Display Properties dialog box opens with the Desktop tab selected.

5. In the Background box, click or use the arrow keys to view the choices.

6. Use the drop down boxes to alter wallpaper position or color.

7. Click OK to close the dialog box.

Advanced Users:

Click Browse to choose a picture from the My Pictures folder (or navigate to a

picture located in another folder.)

Click the Customize Desktop button to alter your desktop icons or display a web

page on your desktop.

3. Changing the Screensaver

In the early days of computing, screen savers helped prevent images from being

burned into the monitor. Now, screen savers entertain us, provide some privacy, and

enhance or work or home environment. Windows XP comes with several screen

savers.

To change the screensaver:

Open the Control Panel (located in Start menu).

Under Pick a Category, click Appearance and Themes.

Under Pick a Task, click Choose a screen saver.

The Display Properties dialog box opens with the Screen Saver tab selected.

Click the arrow to open a drop down box. Click or use the arrow keys to view the

choices. Or, click Preview to view each option on your computer screen. Press any

key on your keyboard to return to the dialog box.

Click Settings to customize the appearance or your chosen screen saver.

(A dialog box will notify you if your choice doesn’t have any options.

In the Wait box, determine how many minutes should pass before your screen

saver turns on.

Click OK to close the dialog box.

4. Customizing the Taskbar:

You already know about the Taskbar, but did you know you can customize its

appearance?

To customize the Start menu:

Open the Control Panel (located in Start menu).

Under Pick a Category, click Appearance and Themes.

Under Pick a Control Panel icon, click Taskbar and Start Menu.

Page 16: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 38

The Taskbar and Start Menu Properties dialog box opens with the Taskbar tab

displayed.

Use the checkboxes to customize its appearance and click OK.

Click the Start Menu tab to switch between the XP Start menu and Classic

Start menu. Classic Start menu is the Start menu featured in older versions of

Windows.

Challenge!

If necessary, adjust the date and time on your computer

Choose new wallpaper and a screen saver for your desktop

5. The Printers and Faxes Folder

Windows XP stores any information about any printer or fax machines connected to

your computer in a Printers and Faxes folder, making it easy to install, manage, and

use printers and fax machines.

To view the Printers and Faxes folder:

Open the Control Panel.

Under Pick a Category, choose Printers and Other Hardware.

The Printers and Other Hardware folder opens.

Under Pick A Task, choose View installed printer or fax printers or Add a

printer.

The Printers and Faxes folder opens.

In the left pane, you'll see several helpful links.

In the right pane, you see a list of any printers or faxes that are installed on your

machine.

Adding a Printer: Adding a printer is simple using the Add Printer Wizard available in the Printers

and Faxes folder.

Before trying to add a printer:

Make sure your printer is compatible with Windows XP. If buying a new printer,

make sure to do your research before you make a purchase.

Get out your printer's manual or CD-ROM and read it.

Set up your printer and attach it to your computer using a printer's cable and

correct port on your computer.

Note: Many of the latest Plug and Play printers connect through a USB port. If

your printer falls into this category, you may not need the Add a Printer Wizard.

If you do have to use the wizard and your printer isn't listed in the Windows XP

list (which usually displays when you try to add a new printer) you may have to

contact the printer manufacturer for a driver. When you get the driver, follow the

Add a Printer instructions on your computer.

Having Trouble Printing It?

Perhaps you've written a great report and you want to share it with your boss. The

problem is, you're having trouble printing it.

Try these troubleshooting techniques:

Take care of the basics. Make sure the printer is plugged in, turned on and has

paper in it.

Make sure the printer cable is properly connected to the printer and to the

computer.

Check to see if there is a paper jam. Most printers have a flashing light to indicate

a jam. Also, if the paper size selected differs from the one in the paper tray, you

Page 17: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 39

will not be able to print. To choose a paper size, select File Page Setup. Click

the Paper Size tab.

Check to see that the printer toner, cartridge or ribbon is fresh and adequate. If

not, printed documents may appear streaky, blotchy, or even blank.

Make sure the printer switched to Online mode. There is usually a button on your

printer's control panel. If it is switched to Offline mode, it will not print.

Make sure the computer knows what printer you are using. Check this by clicking

Start Control Panel Printers and Other Hardware View installed

printers or fax printers. If an icon for your printer doesn't appear, try restarting

your computer. If you printer still doesn't appear, you may need to add it. Click

Add a Printer and follow the instructions in the Add Printer Wizard.

Using Systems Tools for Basic Maintenance: What are Systems Tools?

Do some basic maintenance from time to time to keep Windows XP running

smoothly. Luckily, Windows XP provides you with some basic tools to make the

maintenance process as painless as possible. You can access these tools via the

System Tools menu.

To open the System Tools menu:

Choose Start All Programs Accessories System Tools.

A cascading System Tools menu opens.

Disk Defragmenter:

All Windows XP computers have at least one hard disk. The hard disk acts as your

computer's storage area. Almost everything installed on your computer - applications,

files, folders, and operating system - is stored here.

With general use, (creating new files, deleting files, installing new software, etc) your

hard disk can become fragmented. This means that parts of the same disk file

become scattered over different areas of the disk. A fragmented hard disk slows down

your computer and hinders its performance.

To keep your hard disk running smoothly, you must routinely defragment or

"defrag" the hard disk. The Disk Defragmenter tool can help you do this.

To use Disk Defragmenter:

Choose Start All Programs Accessories System Tools Disk

Defragmenter.

The Disk Defragmenter opens.

To open Microsoft Management Console:

Open Disk Defragmenter.

Open the Action menu.

Click Help.

A Microsoft Management Console opens and explains how to run Disk

Defragmenter.

Note: You may need to be logged in as an administrator or as a member of the

Administrators group to perform some tasks associated with the Disk Defragmenter.

Disk Defragmenter should be run every three months.

Disk Cleanup:

Disk Cleanup is another tool that helps keep Windows XP operating as it should. It

inspects your hard disk and looks for files that can be safely deleted. Deleting

unnecessary files frees up valuable disk space.

To run Disk Cleanup:

Choose Start All Programs Accessories System Tools Disk Cleanup.

Page 18: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 40

The Disk Cleanup window opens. Click the Disk Cleanup tab if it's not showing.

Disk Cleanup lists several potential files that can be deleted and the amount of disk

space you'll gain by emptying each one.

To learn more about a file category, click it and click the View Files button. A

description appears.

Click the checkboxes next to the categories you want to delete and click OK.

A dialog box appears, stating, "Are you are sure you want to perform these

actions?" Click Yes or No as appropriate.

The More Options tab gives you even more disk cleanup options.

Note: It's recommended that you run Disk Cleanup every three months.

The Scheduled Task Wizard:

Fortunately, you don't need to remember to run each of these utilities. Windows XP

includes a Scheduled Task Wizard that runs each of them for you.

To open the Scheduled Task Wizard:

Choose Start All Programs Accessories System Tools Scheduled

Tasks.

OR

Choose Start Control Panel Performance and Maintenance Scheduled

Tasks.

THEN

The Scheduled Tasks folder opens.

Double-click Add a Scheduled Task.

The Scheduled Tasks Wizard opens.

Keep clicking Next to select the program(s) you want Windows to run. If the task

you want is not listed, click the Browse button to locate it. Then schedule a

convenient time.

Dealing with an Unresponsive Computer:

While doing regular maintenance on your computer should keep it running smoothly,

your computer may occasionally freeze up or become unresponsive to the click of a

mouse or keyboard.

If your computer freezes, try waiting it out. Sometimes it takes your computer a

few seconds to complete a task.

OR

Press the ESC on your keyboard.

OR

Press Ctrl + Alt + Delete on your keyboard. The Windows Task Manager opens.

Here, monitor applications, processes, performance, networking, and users. If you

need to restart your computer, choose Shut Down Restart. If you need to turn

off your computer, choose Shut Down Turn Off.

Challenge!

Locate the Systems Tools menu.

Open the Disk Defragmenter. Open the Action menu. Click Help. Learn more

about running Disk Defragmenter.

Open Disk Cleanup. Run Disk Cleanup if necessary in order to free up hard disk

space.

Windows XP Security Features: With the over-growing that of malicious code such as worms, virus, and hacker

threats -- it is critical that all customers take immediate action to help lock-down their

desktop and laptop systems. This guide explains how to implement the security

Page 19: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 41

measures recommended in the Windows XP Security Guide in a small or medium

business environment without an Active Directory deployment. These

recommendations help ensure that your desktop and laptop systems running Windows

XP Professional SP1 are more secure from the majority of current security threats,

while ensuring that users can continue to be efficient and productive on their

computers. In addition to the advanced step-by-step guidance in this document, you

will also find information on the top security recommendations that Microsoft is

making to all customers, from the home to the enterprise. These include:

Use a firewall, like the Internet Connection Firewall already in Windows XP

Use Microsoft Windows Update to get and keep your PC up-to-date

Install antivirus software and ensure it’s up-to-date

This section provides you step–by–step instruction for downloading and installing the

password and security templates provided with the Windows XP Security Guide, and

other key steps to help you secure your Windows XP systems. The first step you take

is to download the security templates to your Windows XP client. The next step is to

import the password and security policies. Finally, you apply these policies to your

desktop or laptop computer.

Downloading the Windows XP Security Templates:

A security template is a file that represents a recommended security configuration.

Security templates are applied to a system by importing them on the desktop or

laptop. This section shows you how to download the pre-built security templates,

which are detailed in the Windows XP Security Guide, to secure your desktop and

laptop systems.

To download the Security Templates:

Log in to the Windows XP Client with an account that has administrative rights.

Open a Web browser and navigate to:

http://go.microsoft.com/fwlink/?LinkId=14840.

On the bottom of the page, in the Files in this Download section, select the

Windows_XP_Security_Guide.exe.

In the File Download window, click Save.

When prompted for a location, select the Desktop, and click Save.

In the Download Complete window, click Open.

In the WinZip Self-Extractor window, click Browse.

Select My Documents and click OK.

In the WinZip Self-Extractor window, click Unzip.

After all files have finished extracting click OK.

In the WinZip Self-Extractor window, click Close.

Importing the Security Templates:

After you have downloaded and extracted the security templates, use the Microsoft

Management Console (MMC) snap–in for the Security Configuration and Analysis

tool to apply these policies on the stand–alone machine.

Importing the Password Policy:

This security template enforces the requirement that users of the system choose

complex passwords that are greater than 8 characters in length. Additionally, it

requires them to change their password every 42 days. The policy monitors for failed

Page 20: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 42

attempts to log in to the computer. If 50 failed login attempts occur within 30 minutes,

the account is locked for 30 minutes, or until an administrator manually unlocks it.

You will use the SA Enterprise Account.inf file that is included with the Windows XP

Security Guide to perform this task.

To import the recommended password policy:

On the Start menu, click Run, type mmc, and then click OK.

On the File menu, click Add/Remove Snap–in.

Click Add on the Stand–alone tab in the Add/Remove snap–in properties box.

Select Security Configuration and Analysis and then click Add.

Click Close, and then click OK.

Under Console Root, right–click the Security Configuration and Analysis item

and then click Open Database.

Type a new database name (Windows XP Security Guide.sdb), and then click

Open.

In the Import Template window, navigate to \My Documents\Windows XP

Security Guide\Tools and Templates\Security Guide\Stand Alone Clients\.

Select the SA Enterprise Account.inf security template, and click Open.

Note: If you do not see the SA Enterprise Account.inf file, you may have saved it

to a different location. You may need to extract the files from the

Windows_XP_Security_Guide.exe self-extracting file again.

You have now successfully imported the security policy. Do not close out of the

Security configuration and Analysis snap-in yet. Now, you must import the

security policy before applying these changes to the system.

Importing the Security Policy:

The next step to securing your computer is to configure many of the built–in security

settings. While this seems like a daunting task, step–by–step instructions for using the

Enterprise Client - Desktop.inf file that is included with the Windows XP Security

Guide are provided below to perform this task.

This policy will configure settings that ensure only valid users can connect to the

computer, only administrators can backup and restore files on the computer, and that

only administrators can add new drivers to the system.

To import the recommended Security Policy:

Right–click the Security Configuration and Analysis scope item and then click

Import Template.

In the Import Template window, navigate to \My Documents\Windows XP

Security Guide\Tools and Templates\Security Guide\Security Templates.

Select the Enterprise Client–Desktop.inf security template, and click Open.

Right–click the Security Configuration and Analysis scope item, and then click

Configure Computer Now.

In the Configure System dialog box, accept the default name of the log file by

clicking OK.

Completing the Process

You are now ready to apply the password and security settings to your desktop or

laptop. To ensure they are applied, use the gpupdate.exe command.

To run gpupdate:

On the Start menu, click Run, type cmd, and then click OK.

Type gpupdate.exe /force and press ENTER.

When you are prompted with "OK to Reboot?", type Y and then press ENTER

Page 21: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 43

After the system restarts, the password and security policies are successfully applied.

After pressing Control + Alt + Delete to log in, you should see the "It is an offense to

continue without proper authorization" dialog box. Click OK and log in as normal. If

you have trouble, refer to the Troubleshooting section below..

Using Antivirus Software

An antivirus software program will help protect your computer against most viruses,

worms, Trojan horses, and other malicious code. Many new computers come with

antivirus software already installed. However, antivirus software requires a

subscription to stay up to date. If you don't have a current subscription for these

updates, your computer is likely to be vulnerable to new threats. Computer viruses are

programs that are loaded on to your system without your knowledge or approval.

Viruses and other forms of malicious software have been around for years. Today's

viruses can replicate themselves and use the Internet and e-mail applications to spread

across the world within hours.

Antivirus software continually scans your computer for viruses and helps detect and

remove them. Installing antivirus software only solves part of the problem - keeping

the antivirus signature files up to date is critical to maintain a secure desktop or

laptop.

User education regarding safe email practices is another critical step in preventing

virus attacks. Users should not open an email or take action on an email attachment

unless they are expecting the file. All email attachments should be scanned with the

antivirus software prior to its execution.

Page 22: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 44

Hypermedia: Defining Media:

Media refers to any material, methodology, procedure and / or technique that are used

to complete a task. In other words, media includes helping tools and technologies

used to generate a product. This product can be some work, relaying information,

presenting views etc.

1. Basics of Hypermedia and its Significance: To understand the term

“Hypermedia”, one should be familiar with “Hypertext”. Hypertext is the type of

text which has some references and / or links to other media associated with it.

Usually, these references can be followed by using a single mouse-click. For

example, by clicking on the following hypertext one can directly link to the

Google Website. www.google.com In short, hypertext is the text having link

and / or relation with some other information. Hypermedia is the arrangement of

various inter-linked media including (text, image, video etc.). These inter-linked

media (with embedded hyperlinks) are together used to relay a single idea,

scheme or information. Communicating information using the hypermedia is

very helpful for the readers (information gathers) as well as for writers

(information providers). A single concept may be delivered using simple text,

with some embedded link to the video or to the some sound file depicting the

same concept in some different manner etc.

2. Significance of Hypermedia in teaching: For lecture delivery, hypermedia is

regarded as a very powerful tool. For example, if a teacher is teaching the

students “How to Check E-Mail” then oral explanation may not be enough.

However, if a video representation guiding how it can be done is shown, it will

be much more understandable to the students and also fewer efforts will be

required by the teacher. A video representation of “How to Check E-Mail” can be

shown by clicking on the text directly. Moreover, if there are scarce resources for

the practical implementation or experiment during lecture delivery, the use of

hypermedia will support both teacher and student. For example, if the topic of the

lecture is: “How to install a computer memory”, and all the required resources

are not available, then Hypermedia may be used. Using Hypermedia also helps in

maintaining the lecture’s sequence and avoids skipping important points during

lecture delivery.

3. Comparison between normal media sources and hypermedia The normal media

sources include the media (as discussed earlier) without having embedded links

to other media. However, the hypermedia provides a complete system, structure

and / or scheme which include all necessary links, and the information is

communicated in a more effective manner.

Internet and Intranet:

1. Basic Definitions and History of Internet and Intranet:

Internet is defined as a global network that is publicly accessible. This is the network

which allows the user to access various networks in the world. A simple way of

defining the Internet is that it is a network that comprises of many other networks. On

the other hand, intranet is regarded as a proprietary or private network of any

organization, company or enterprise. Before the emergence and popularity of inter-

communication of various networks, the organizations had their own concealed

networks (regarded as intranets). These intranets were limited to their domains and

people were facing many problems when need to communicate from outside domain.

The need of communication and sharing became stronger and stronger and the

researchers started thinking of some effective and readily accessible way

Page 23: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 45

communication. In late sixty’s network linkage was established among various

universities and research organizations networks. This linkage was named as

“ARPANET”. ARPANET forms the basis of the modern world Internet.

2. Comparison between Internet and Intranet:

Internet is a publicly shared network while Intranet is limited to the employees

or people of a particular organization

Internet covers much wider scope, while the Intranet’s scope is limited to its

organization’s domain

The data is more secure within the Intranet then that of Internet

As, Intranet is a localized network of an organization, it provides much higher

speed then that of the Internet

3. Introduction to emergence of World Wide Web (WWW):

The World Wide Web (WWW or W3) is the collection of various hypermedia which

is accessible (using web browser) on Internet and / or intranet. The sharing and

communication of ideas and knowledge is the pilot thinking behind the development

of WWW. Using the WWW teachers are able to share their lectures on Internet, make

use of the various research results found by other people and to participate in various

projects (teaching, learning, research etc.) placed miles apart.

Internet Connectivity: 1. Overview:

Internet connectivity is a very vital issue. This is the point where the accessibility and

availability of different networks (incorporated in Internet) is involved. The main

challenge in the evolution of the Internet is the development of a common

connectivity protocol and / or tool, which is used by all the networks involved in the

Internet. The common protocol developed and used by the Internet is TCP/IP. TCP/IP

is used as a common standard protocol to send and / or receive data in the packet

network. The Internet connectivity needs both software and hardware. The software

part is usually covered with the common protocol (i.e., TCP/IP) on the other hand

various hardware technologies are introduced for the said purpose. The next section

discusses various emerging technologies used for Internet connectivity.

2. Current and Emerging Technologies for Internet Connectivity (DSL, Wi-

Max etc):

Internet connectivity and / or Internet connection is of the following types:

a. Dial-up connection:

Dial-up connections are the most inexpensive and slowest connection usually

provided by Internet Service Providers (ISPs). A modem is needed to dial to the ISPs

server using PSTN (telephone connection) and connect to the Internet.

b. DSL/ADSL:

Digital Subscriber Line (DSL) / Asymmetric Digital Subscriber Line (ADSL) are now

becoming more and more popular. DSL and ADSL splits the telephone line into two

portions i.e., one for data and other is for voice. The users and / or subscribers can use

Internet and attend a telephone call simultaneously. DSL connection guarantees

quality of service (QoS) while QoS is not guaranteed in ADSL connection.

c. ISDN:

Integrated Services Digital Network (ISDN) provides multiple services included

voice, data, fax etc. via a single telephone connection / line. Not only the single line is

used for the provision of various services but also it provides high data rate i.e., fast

access to Internet. There are many other Internet Connections available e.g., T1/E1

connection, broadband connections including WiMAX etc.

Page 24: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 46

3. Popular Web Browsers used for Web Surfing (IE, Netscape, Navigator,

Mozilla FireFox etc):

Surfing the World Wide Web (WWW) means that we visit various web pages and

web sites which provide and communicates information, for this purpose the software

and / or application used is known as Web Browser. Web Browsers are the most

popular software used for retrieving and sharing information from WWW. Most

popular web browsers used for web surfing are Internet Explorer (IE), Mozilla

Firefox, Google Chrome etc. All of the stated web browsers help the user to browse

the web, they maintain some history and also provide easy navigation between web

pages. Other than the features mentioned here, each browser is having its localized

features.

Applications of Internet and WWW: Internet and World Wide Web (WWW) are used in many domains. Together the

Internet and WWW provides solutions to many problems. The usage and / or

application of Internet and WWW are very wide however, some of the applications

are discussed below:

1. Web Browsing/Surfing:

Web Browsing/surfing is the method of exploring the web. Any Web Browser

software (e.g., Internet Explorer, Netscape Navigator etc.) can be used for the said

purpose. Web Browsing/Surfing makes use of Hypermedia. Different web pages, text,

audio and video files and other information are linked together using “Hyper links”.

Hyper linking of the documents provides easy navigation and helped in visiting inter-

related web pages.

2. E-Learning/ Distance Learning:

E-learning can be defined as learning via technology. The technology here refers

explicitly to the electronic media. However, Distance Learning is the learning

provided at remote location. Distance learning may also be regarded as the E-learning

as most of the time electronic media is used for the provision of distance learning.

Internet and WWW provides the facility to put lectures online at one place and then

those lectures can be downloaded at some other place. This sharing of educational

material for learning process, when the two or more users are geographically apart is

an example of e-learning / distance learning. Another very important feature of e-

learning / distance learning is that it provides a self-learning environment. Internet

and WWW provide a good platform for self-learning. Thus people can develop

expertise and try to excel in their respective domains.

3. Digital Libraries and E-Books:

Another very important application of Internet and WWW is the provision of digital

libraries. Now the researchers and educators need not pile their desks with numerous

hard covered books. The books in electronic format are readily available on Internet.

People get access to those books using the Digital Libraries. Digital Libraries not only

provides the books, but also help the researchers in getting the latest and updated

research results. Various magazines, journals, articles, papers are also available in

Digital Libraries. The Higher Education Commission (HEC), Pakistan, also provides

access to the Digital Library. Information and access to the HEC’s digital library can

be achieved through HEC website or direct access to the HEC’s digital library

program (http://www.digitallibrary.edu.pk/)

4. E-Commerce:

Internet and WWW not only supports the education sector but also focuses on the

business division. All the business activities those take place using the Internet and /

or WWW becomes part of the E-Commerce. Almost all the business giants, small

Page 25: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 47

corporate and private commercial companies, make use of Internet and WWW in their

business. Internet and WWW provide information regarding current market trends

and on-going business activities. One of the most important features of E-Commerce

is the provision of comparative studies and status of different business enterprises of a

particular domain.

5. Sharing of Information and Knowledge:

Internet and WWW provides a platform where information and knowledge is shared

publicly. There are number of ways, tools and techniques used for sharing

information. A few are explained below:

Web Communication (Emails, Discussion forums, Individual and Group

chatting etc):

Web communication is nowadays one of the most popular way of sharing

information, knowledge, news, events etc. Most commonly used and effective tool of

web communication is electronic mail (E-Mail). There are a number of platforms

which provide the e-mail services free of cost. Users create their own e-mail address

and then using that e-mail address; communicate with their friends, co-workers,

family and other professionals. The detail of how to create e-mail address and how to

use it is covered in later in the following chapters. Discussion forums are another

important tool used for sharing ideas and knowledge. Many people become part of a

forum. On the forum different topics are posted to be discussed publicly with all the

forum members. These discussions may include solution for a specific problem, latest

research about any particular topic and / or comments on current affairs issues.

Chatting is also like discussion forums. The difference is that for chatting all the

members need to be online. The geographically apart users can be online at the same

time and discuss any topic among them. The chatting can between two or more users.

Weblogs and Resource sharing

Weblogs are the websites which have discussions and / or comments on some topic.

The discussions and comments are added to the website on regular basis. Usually,

there is a person who owns a weblog, i.e., creator of that particular weblog. The

weblogs is an important tool through which students and teachers can communicate

on some on-going course issues, projects, assignments and /or research. These

weblogs help teachers and students in solving their problems and / or sharing

information in more effective way.

Web-Casting/Pod-Casting:

Web-casting / pod-casting is another useful application which is provided on Web.

Web-casting / pod-casting includes sharing of live or recorded streaming multimedia

files (audio, video etc.) over the Internet. This sharing may be in the form of

entertainment i.e., showing the recorded or on-going matches, live broadcasting of the

TV channels etc. Similarly, the application of web-casting / pod-casting is also in the

domain of education. Live lectures from one university campus can be viewed in

some other university campus. Moreover, teachers can evaluate a student’s project,

research etc. while viewing the recorded or live presentation of the student.

Search Engines:

Search engines are also one of the very useful and most popular applications of

Internet and WWW. Whenever we need to search something, we connect to the

Internet and then use a search engine for searching our requested item. Widely used

search engines are Google, Yahoo Search, MSN Search etc. The mechanism to search

a particular topic is similar in all the search engines. We open the webpage of a search

engine e.g, (www.google.com) in the browser. On that page there is a search bar

followed by a search button. In case of Google the search button has given the caption

Page 26: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 48

of “Google”. Type the word or word-phrase (search query) in the search bar and then

press the search button. The search engine looks for the given words and phrases in all

the documents, files, figures etc. it can access and usually returns the research results

in order of their relevance to the search query. For example if we search the string

“Higher Education in Pakistan” the top most result which Google search engine gives

us is the link to the “Higher Education Commission of Pakistan”.

Social Networking:

Social networking is one of the most effective ways of communications over the

Internet. People having similar interests group together to form a network. This

network is usually built among friends, family and/or colleagues. Facebook is one of

the popular social networks now days. It is used to share educational, professional and

entertainment information among people. Such type of networks not only supports the

educational and professional life of a person but also help in building good relations

among colleagues, friends and family.

Web Page/Site Designing: Designing a website is very important. However, from teacher’s view point its

important to understand the design of a website. It is also important to know how

changes can be made to a particular website to accommodate a teacher’s need.

Before going into more details about web page/site design, lets us first discusses the

broad categories of websites, as follows:

Static Websites:

Static websites are those websites which presents static information. The website

developer creates some web pages (static web pages) which contain information that

does not change or update automatically. Such static web pages are useful for

displaying the history of a university, presenting some past event etc.

Dynamic Websites

On the other hand dynamic websites are those which either have some input form user

at the runtime or retrieve information from the database or some other server. The

information presented by such web pages is dynamic in nature i.e., it changes on

runtime and varies from user to user. A very good example of dynamic websites is the

“Course Management System (CMS)” explained later in the following chapter.

1. Hypertext Mark Up Language (HTML):

To design a web page/site, some language needs to be used. The most widely used

language for the development of web pages (that also incorporates hyper media) is

known as Hyper Text Mark-Up Language (HTML). HTML is used to create and

develop organized / structured web site. Different web pages are linked together to

present the information effectively. Moreover, various hyper media and multi-media

may be incorporated in a web page using the HTML.

2. Web Graphics and their formats:

Another important domain to be discussed is the Web graphics and their formats.

Most of the time teachers search and download some image from the Internet.

Pictures can effectively present the whole idea or theme of the work therefore most of

the teachers make use of images in their lectures. One of the problems usually faced

by the users is how to save a web graphic and what should be its format. To save a

web graphic you just need to right click on the image and click “Save Picture As”. It

then opens a dialog box asking at which location to save the image and in which

format. The place or location of the image to be saved, can be selected from the “Save

in” box. To select that in which format that image can be saved is selected from the

“Save as type” box at the bottom of the screen. From this box different image formats

can be selected. Most commonly used image formats include .bmp, .jpg, .gif, .tif etc.

Page 27: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 49

3. Site Map Construction:

Another important feature of the web site development is the construction of site map.

Site map is the textual and / or pictorial representation of web pages and their linking

among them. Site map is a very important tool which help the visitor of any web site

to find out how to access some particular information or how (following which path)

to reach to some specific web page.

4. Saving Files of different formats in Hypertext Format:

Whenever, a web site is developed, different information and data need to be added as

multiple web pages to that web site. Most of the time the data or information to be

added as a web page is not in the Hypertext (HTML) file format. So, there is a need to

convert that files or documents from different file formats to the one compatible with

WWW. In other words, we need to find the way to convert other format documents

into the hypertext format. Almost all the application software which provide facility

to develop such types of documents have the feature to save the same document in the

hypertext format. For example, if there is a document written in MS-Word, then to

convert that document to hypertext format we need to go to the “File” menu then

select “Save As” option. A dialog box will open asking to save the document where

and in which format. At the bottom of the dialog box there is “Save as type”, from

there select “Web Page (*.htm;*.html). and then saved the document. This will save

the currently opened MS-Word document to the hypertext (HTML) format.

Self Course Management: 1. Introduction of Self Course Management:

As a teacher or instructor, we need to be organized so that we can conduct courses

effectively and efficiently. Self course management includes:

Planning a course

Deciding course contents

Lecture wise course breakdown and scheduling

Grading policy

Evaluation plans

Result generation and display

Attendance management etc.

2. Online Applications for Course Management:

Due to Internet, applications/programs available online can be accessed anywhere and

anytime. Many educational institutes are now using online course management

systems (CMS). This facilitates both teachers and students.

Online CMS allows the administrator user (teacher) to add course outlines, course

related announcements, lectures/notes, lab manuals, book references, samples papers,

upload of quizzes and assignments, etc. The student user can download these

resources and upload completed assignments. Course Management can be done using

proprietary software which can be custom developed or by using freely available

software on internet.

3. Database Driven Websites:

All the course management systems (CMS) used now days are database driven i.e.,

CMS websites get and / or retrieve their data from the database every time they load.

Data of each faculty member along with the detail of courses that faculty member is

teaching is stored / maintained in a database. Whenever, a teacher performs a login

operation in CMS, the CMS website looks for his/her details and data in the database.

The data retrieved from the database is then presented in an organized way on the

CMS website. The CMS website provides a user friendly interface that allows the

Page 28: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 50

teacher to add new data and update/delete existing data in the database. For example,

whenever, a new lecture or assignment is uploaded by a teacher, the CMS stores this

information in the database.

4. Course Tracking:

Planning the course ahead of time is a good practice. This plan should involve lecture-

wise break down of course contents to be covered. The plan can be developed using

specialized software, e.g. Microsoft Project’s Gantt charts or even simply using tables

in Microsoft office Word or Excel, etc. Once the course has started, it is also

important to keep track of the course progress according to the plan. The teacher must

cover up for any lapse in the course plan or scheduled activities.

5. Sharing Lectures/Assignments and Results:

There are many ways in which students and teachers share course related resources. A

popular way is using group-based emails, for example yahoo groups. Another

interesting way of handling this is through CMS.

6. Online Discussion forums for Teachers, Students:

These days the Internet provides discussion platforms for sorting out different

problems whether general or educational. Many technical discussion forums provide a

healthy environment for exchanging ideas and sharing knowledge. Discussion can be

initiated by anyone and experienced people of the related field give their suggested

answers. Discussion forums are available for a diverse range of fields, for example,

programming languages, operating systems, configuration and use of software,

research topics, etc. Teachers and students can gain benefit from such forums. These

forums can help them build knowledge bonds with peers all around the world. The

same idea of forums can be used for online discussions among teachers and students

after university hours.

7. Online Teachers Evaluation:

Many educational institutes use the “teacher evaluation forms” as a tool for analyzing

teachers’ performance. These forms contain a number of questions. There are

different answer options against each question. For example:

Does the teacher always come prepared in class?

Answers options: (a) Always (b) Sometimes (c) Never

Does the teacher encourage students to ask questions?

Answers options: (a) Always (b) Sometimes (c) Never

These forms (if truthfully) filled by students can provide performance analysis data.

These forms are usually distributed to the students towards end of the term/semester.

This involves taking hard copies of forms, getting them filled form students,

collecting them and analyzing results.

The same forms if placed online can save the cost of forms printing, the exercise of

forms distribution and collection. Online availability of forms will also facilitate

students as they will be able to fill forms whenever they have free time.

8. Resource Management:

All course related resources including lecture notes and tutorials can be managed

either at a central server or on the online course management website. The teachers

should update these resources after every lecture so that students can get the latest

copy of lectures and other reference material.

Email Management: 1. Selecting an email service:

For Personal Use:

Many email services are commercially available and most of them are free of cost.

Using a free email service like yahoo, hotmail, etc. is appropriate for personal

Page 29: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 51

communications. Personal use can include sending emails to your friends and family

members.

For Professional Use:

If available, you must use the professional email service hosted by your university

domain server or email provider for all professional communication. Professional

emails can be written to your students, peers, seniors and colleagues from other

universities. The professional email services build a better repute for you as a teacher.

2. Choosing an email ID:

Your email ID (address) is your reflection. Choosing an appropriate ID is very

important especially for professional communication. If you are using a professional

email service hosted on your university domain server, then this can be taken care of

by the email/web administrator. Example of appropriate email IDs are:

[email protected], [email protected], etc.

3. Defining the Email Subject:

Just like news paper headlines, your email subject line should be precise and

meaningful that draws the reader’s attention. It should clearly state what the email is

about. In other words, the subject line should deliver the message’s bottom line. A

simple rule that may be followed in writing the subject is “What” + “what about

What”, i.e., what the email is about + any relevant brief description about that what.

For example, if you want to announce a faculty meeting by your email, you would

write this in the subject: “Faculty Meeting for Course Allocation, Monday 4-Jan-09”.

Another example of email subject line can be for inviting participants for a seminar,

“Two days seminar on Education and Culture”.

4. Learning how to handle email recipients

To:

This includes email addresses of the primary recipients of your email

CC:

It is short for carbon copy. This feature is just like the CC used in official hard copy

letters. It should include email addresses of people who are not the primary recipients

of your email but will receive it as a copy (for their information). The email addresses

entered in this section are also visible to the primary recipients.

BCC:

It is short for blind carbon copy. Many times you want to send emails to other people

as a copy without letting the primary users know about it. BCC should include all

such email addresses.

5. Managing Emails Content:

The email content should be brief. A lengthy email will overwhelm the reader and the

real content will be lost in the details. Try to keep the emails as concise as possible.

Like any other professional write-up, your email will consist of three parts:

Introductory statement

Actual matter

Closing statements

Avoid using too many font styles and colors for your email text. Use plain text and

avoid such character representations which may not be properly displayed in the

recipients email application.

6. Emails Attachments:

You can attach documents, spread sheets, images and any other content on your

computer along with emails. It is very important that your email attachments do not

exceed a reasonable size limit. Sending huge attachments with email can choke the

Page 30: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 52

network by consuming available bandwidth. This will also affect both you and your

colleagues who are sharing the network bandwidth.

7. Configuring an email program (Outlook, Eudora, etc.):

Learning about your email program is very important even if you are a technology

expert and know most of the things already. In this regard, tutorials available on the

manufacturer’s website can help you build a better understanding of the email

program. The better you understand your email program, the more you will utilize its

benefits.

Let us consider Microsoft Outlook 2003 as an example. Launch this email program:

Start -> Programs -> Microsoft Office-> Microsoft Office Outlook 2003

After launching Outlook, you can use the Help menu to look for solution of any thing

that you want to do in Outlook. Press F1 function key to start using help or select

Microsoft Office Outlook Help option from the Help menu.

On left panel of your Outlook application, you will see a number of Folders.

Inbox contains the received emails

Sent Items contains the emails that you have sent

Drafts contains emails that you have composed but saved them to be sent later

Junk-Email contains all emails that may be spam

Outbox contains out-bound emails which are in the process of being sent

Deleted items contain all emails that have been deleted from any of the above

folders.

8. Adding a New Email Account:

Activate Outlook Help from Help menu as mentioned earlier. To set up a new

account, type “add email account” in the search box of help window. It will provide

you a step by step guide to add email account.

OR

If you do not want to use the Help menu, then go to Tools menu and select Email

accounts option. This will launch a wizard that will help you set up your email

account. Select the option Add a new e-mail account from the wizard. Click Next

button to proceed.

Select POP3 (POP3 is used to download email from mail server to local email client).

Click Next.

In the next dialog box, enter your name, email address, user name, password and mail

server info. Outgoing mail is based on smtp protocol as smtp delivers emails from

email client to mail server. Click More Settings button

A dialog box for Internet email Settings appears. Select the Outgoing Server Tab.

Place a check in box labeled My outgoing server (SMTP) requires authentication.

Also select the option use same settings as my incoming mail server.

Click OK to return to previous window. In that window, when you click Test Account

Settings, all entered fields will be tested and following will be displayed. Click on

Close. Click Next when you return back to settings window.

On clicking Next, the following window is displayed. Click on Finish to close the

wizard.

9. Setting Folder Options:

To manage folder settings, go to Tools menu and select Options. This will display the

following dialog box. You can explore each tab and change settings. Select Email

Options button in the Preferences Tab to manage message handling options.

10. Setting Outgoing Mail Format: Select Mail Format Tab. You can choose the message format (HTML, Rich text, Plain

text) of your choice for your outgoing emails.

Page 31: Unit3

Unit 03: Interfacing with Computer and Internet

Computer Literacy 53

11. Creating Signatures:

You can select the Signatures button to create your signature. The following appears.

Select New… button to create a new signature. A signature can be edited once created

or removed. Enter Signature text, format it and click on Finish button. When you

return to the previous window, click on OK button. This signature can be

automatically inserted whenever you compose an email.

12. Setting Auto-replies / Out of Office Assistant:

When you are away from office (for conference, workshop, vacation or some other

reason), you can set up an automatic reply option so that your emails do not remain

unanswered for a long time during the time you are away.

Reference: http://support.microsoft.com/kb/311107 : The Out of Office Assistant

feature in Microsoft Outlook is a Microsoft Exchange Server service. It is available

only when the Exchange Server transport service is included in an Outlook user's

profile. You can emulate this feature by creating an e-mail template and defining a

rule in the Rules Wizard to automatically reply with the template.

13. Backup Of Emails:

A regular backup of important emails will ensure email recovery in case your system

or email server crashes. In case of Microsoft Outlook 2003, email messages in

particular folders can be archived in .pst file format (export operation) and later

retrieved (import operation) using either of the two ways:

1. From File menu, select New, then select Outlook Data File. A dialog box asks for

type of storage. Select Office Outlook Personal Folder File (.pst) and click OK.

Next dialog box asks for storage location and name of the backup file, give a

name and click OK.

2. From File menu, select Import and Export option. When the following window

appears, select Export to a file option as shown below. Click Next

Select the file type as shown above and click Next. The next window lets you choose

a folder whose contents will be exported. Select Inbox and Click Next.

The next window required name of the exported file. Specify a name and click on

Finish.

To restore/ retrieve the file, use either of the two options.

1. From File menu, select option Open, then Outlook Data File. A dialog box opens

so that you can browse the file to be opened. Select the file and click Open. The

file will be imported in the Personal Folders.

2. Use the option Import and export from the File menu. This time select the import

from another program or file option. Click Next.

3. Select Personal Folder File (.pst) and click Next.

4. Browse the file to be imported and click Next.

5. Select destination where file will be imported and click Finish.