Marquee16 presentation-it essentials

38
Marquee Series Microsoft Office 2016

Transcript of Marquee16 presentation-it essentials

Page 1: Marquee16 presentation-it essentials

Marquee Series Microsoft Office 2016

Page 2: Marquee16 presentation-it essentials

© Paradigm Publishing, Inc. 2 Concepts

The Information Processing CycleInputProcessingOutputStorage

CHECKPOINT 1System Unit Ports

Computer Software Networks

CHECKPOINT 2 The Internet Security Issues Email Etiquette and

Computer Ethics

CHECKPOINT 3

Information Technology CONCEPTS

Page 3: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 3

The Information Processing Cycle

The information processing cycle can be divided into four segments:1. Input2. Processing3. Output4. Storage

Page 4: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 4

Input

A keyboard is primarily used for typing text. A mouse is a pointing device used to issue

commands and select text or files. With a touchpad, move your forefinger

across the pad to position the cursor, then use your thumb to press the button located at the bottom of the pad.

A touch screen allows you to select an item and input commands by physically touching a specific area of the monitor.

Page 5: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 5

Input…continued

A scanner works like a photocopier to transfer pictures or text into the computer.

Better detail can be achieved with a digitizing pen and drawing tablet.

A joystick is an input device used to move objects on a computer screen and is a common input device for computer gaming.

A digital camera captures images in a digital format and often contains an output device for viewing those images.

A webcam is a digital camera that can be controlled remotely over the Internet.

Page 6: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 6

Input…continued

With a microphone you can add a “sound bite” to a computerized slide presentation or speak to a friend over the Internet.

A bar code reader scans a UPC, and resulting input can be used to check a patient’s identity and medication requirements.

Flash drives are small, easy-to-handle, portable storage devices that many people use to carry important data with them wherever they go.

Page 7: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 7

Processing

A processor chip performs the calculations in a computer.

Memory chips are the hardware that provides the workspace for the data and instructions the computer is processing.

The motherboard is a container for the computer’s CPU and RAM, and contains slots for adding expansion cards.

Page 8: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 8

Output

A monitor is the screen used to display graphics and text.

Printers provide hard copy printouts on paper.

Speakers and headphones provide audio output in stereo for movies, radio programs, streaming video, online learning courses, and telephone calls.

Page 9: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 9

Storage

Hard drives contain a stack of metal platters (disks), a drive motor, and read/write heads.

Data CDs are made of the same material that is used for music CDs.

DVDs can hold from 4 GB to 8 GB, depending on whether they can record on both sides and on one or two layers per side.

Blu-ray discs are used both for high-definition video and for data.

The flash drive storage device has a USB connector that fits into a standard USB port.

Page 10: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 10

1) The information processing cycle can be divided into how many segments?a. 2b. 3c. 4d. 5

3) This is a temporary version and includes any output that cannot be physically handled.a. hard copyb. soft copyc. temp copyd. perm copy

2) This works like a photocopier to transfer pictures or text into the computer.a. scannerb. mousec. touch padd. joystick

4) CDs can hold about this much data.a. 100 MBb. 100 GBc. 700 MBd. 700 GB

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECK POINT 1

Page 11: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 11

System Unit Ports

Ports are the sockets that the input, output, and storage devices plug into as displayed in the image on this slide.

In the early days of personal computing, serial, parallel, and printer cables and ports were found on all PCs. Today, most peripheral devices use Universal Serial Bus (USB) cables and ports.

Page 12: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 12

Computer Software Software refers to the operating

instructions and applications that allow computers to process the numbers, pictures, sounds, and text we enter into them.

Today, most operating systems use Graphical User Interfaces (GUIs), in which a mouse is used to manipulate graphic objects such as icons and windows onscreen.

The Windows 10 operating systems require a CPU that runs at 1 GHz and has 1 GB of RAM.

The Mac OS X operating system can run on IBM-compatible PCs.

Page 13: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 13

Computer Software…continued The thousands of software

applications available provide the instructions that empower users to perform these and other tasks from the mundane to the amazing.

A word processing program such as Microsoft Word can support photos and drawings, mathematical calculations, text in table format, text in varying sizes, shapes, and colors, and even sound bites.

Spreadsheet software such as Microsoft Excel can be used for both simple and complex calculations.

Page 14: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 14

Computer Software…continued

Database software such as Microsoft Access is designed to keep track of information.

Presentation software such as Microsoft PowerPoint allows users to create slide shows that can be viewed on the computer or projected onto a large screen.

Page 15: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 15

Computer Software…continued

Photo editing software is used to organize, retouch, and edit photographs and videos that have been saved on CDs and DVDs, scanned, or transferred directly from the camera to a PC.

Applications such as CorelDraw, Adobe Illustrator, and PaintShop Pro are popular software packages that provide the tools to design graphical images that can be used for web pages, posters, marketing brochures, and greeting cards.

Page 16: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 16

Computer Software…continued

Software applications are often bundled into packages called suites.

Money management software enables users to manage their money by helping them pay bills, balance checkbooks, keep track of income and expenses, maintain investment records, and manage other financial activities.

Tax preparation software allows users to efficiently fill out state and federal tax forms, submit them electronically, and direct the refund to your bank account.

Page 17: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 17

Computer Software…continued

Microsoft Outlook and Lotus Organizer are examples of personal information management (PIM) programs that keep track of your to-do list, address book, and personal calendar.

Collaborative software or groupware, such as Lotus Notes and Microsoft Office SharePoint, provide a way to keep track of who has made or suggested changes to documents or plans and to distribute everything electronically.

Page 18: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 18

Computer Software…continued

Today’s games contain high-quality 3D animation, sound, and action that are very realistic.

Open source software is the general term for applications that are provided completely free of charge, with no license fees or restrictions, and no copyrights to worry about. You can download the software, copy it, and give it to your friends.

Page 19: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 19

Networks

A Local Area Network (LAN) consists of several computers that are physically connected to one another via a central hub called a switch.

LANs can be connected to one another to form Wide Area Networks (WANs).

Page 20: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 20

Networks…continued

Clients are the computer workstations where end users run the various applications necessary for them to do their jobs.

Servers are data providers that are often larger and more powerful computers than clients. They house the network operating system software that organizes the sharing of data among the end users’ PCs.

Page 21: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 21

Networks…continued

A switch provides a central connection place for cables from multiple computers.

A router enables you to join two or more networks, or to join your LAN to the Internet.

Page 22: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 22

Networks…continued

The PCs that make up a network have to be connected to each other in some way.

The original method uses physical cables containing several strands of wire.

The latest method is wireless and uses radio frequencies to carry data over short distances from a PC to a switch or router.

All the devices are often located in the same room, but the signals are strong enough to penetrate the types of walls found in homes and offices.

The most commonly used network cable is unshielded twisted pair cable (UTP).

Page 23: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 23

Networks…continued

continued on next slide…

COMMON NETWORK PROTOCOLS802.11ac is the current Wi-Fi standard. It has a maximum data rate of 1,300 Mbps and a range of about 70 meters indoors or 250 meters outdoors. 802.11n is the most common Wi-Fi standard; many 802.11n devices are still in use today. It has a maximum data rate of 450 Mbps and a range of about 70 meters indoors or 250 meters outdoors. 802.11g is an earlier Wi-Fi standard. It has a maximum data rate of 54 Mbps and a range of 38 meters indoors or 140 meters outdoors. 802.11b and 802.11a are now obsolete Wi-Fi standards, with maximum data rates of 54 Mbps and 11 Mbps, respectively. TCP/IP (Transmission Control Protocol/Internet Protocol) defines the rules for sending and receiving data between network devices. Each device has a unique IP address, which is a series of four numbers between 0 and 255, separated by periods, like this: 192.168.0.1.

Page 24: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 24

Networks…continuedHTTP (HyperText Transfer Protocol) defines the rules for sending and receiving web pages (hypertext) on the Internet. For example, you might see http:// ParadigmCollege/myschool.edu on the uniform resource locator (URL) or Address line of your Internet browser. Figure 8 shows how data travels across the Internet. HTTPS (HyperText Transfer Protocol Secure Sockets) encrypts data before sending it over the web. You can see the letters https on the URL line when you reach a web page asking for your credit card number or when you are paying your bills online, such as https://emcp/mybank.com/myaccount. POP3 is the current version of Post Office Protocol for receiving email. POP is a store-and-forward system in which your email waits on the mail server until you pick it up via an email application such as Outlook; then it forwards it to that application. SMTP (Simple Mail Transfer Protocol) enables you to send email. The message is transferred to the recipient’s mail server on the Internet, where it waits for the user to pick it up via his or her email application. FTP (File Transfer Protocol) provides an efficient, fast way to transfer files between computers. It is commonly used for files that are too large for email attachments and for large repositories of files.

Page 25: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 25

Networks…continued

Data moves across the Internet by traveling through a collection of physical devices.

Page 26: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 26

1) The Windows 8 operating system requires a CPU that runs at this speed.a. 100 GHzb. 100 MHzc. 1 GHzd. 1 MHz

3) Software applications are often bundled into packages called this.a. suitesb. collectionsc. groupsd. piles

2) Microsoft Access is an example of this type of program.a. word processingb. presentationc. spreadsheetd. database

4) This is the term for applications that are provided completely free of charge.a. Open Useb. Open Sourcec. Source Freed. Source Use

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECK POINT 2

Page 27: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 27

The Internet

The World Wide Web is a collection of hypertext files containing graphics, audio, and video that can be accessed on the Internet.

Page 28: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 28

The Internet…continued

Electronic mail (email) uses its own protocols (such as SMTP and POP3) to route a message between computers on the Internet and hold it at a destination mail server until the recipient picks it up.

File Transfer Protocol (FTP) is an information workspace on the Internet and is used to transfer files.

Page 29: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 29

Security Issues

Malware is a term describing computer programs that have malicious intent. Viruses, spyware, ransomware, worms, and adware programs all fall into this category.

A computer virus is a string of code written by someone who wants to hurt others by damaging or destroying their computer files or making their computer experience difficult.

Page 30: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 30

Security Issues…continued

A worm is a self-replicating computer program that distributes itself via a network. Unlike a virus, it does not necessarily attach itself to another file.

Named after the infamous Trojan horse of the Greek legend, a Trojan is malware that masquerades as a useful program.

Page 31: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 31

Security Issues…continued

Spyware tracks your activity as you surf the Internet and reports it to companies that want to sell you their products—or steal your identity.

Adware looks at files on your computer and then sends pop-up advertisements that try to sell you products and services.

Page 32: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 32

Security Issues…continued Several computer programs are

available to provide protection from virus attacks and from the installation of spyware or adware on your computer.

Some examples are McAfee VirusScan and BitDefender AntiVirus for viruses; and Spybot Search & Destroy, SpySweeper, AdAware, and Spyware Detector for spyware and adware.

Windows 10 includes an anti-spyware program called Windows Defender.

Page 33: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 33

Email Etiquette and Computer Ethics

Etiquette refers to the rules that govern courteous behavior.

Etiquette also involves the rules for language appropriate in a businesslike environment.

Using proper etiquette is a way of showing a person respect.

Ethics are the moral principles that govern behavior.

Ethics are the rules we use to determine what is right and wrong.

Page 34: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 34

Email Etiquette and Computer Ethics…continued

Speedy communication with other people all over the world can be fun, exciting, and productive. However, it can also cause problems.

What you write in an email message can hurt someone’s feelings, be misinterpreted, or might accidentally be sent to the wrong person.

You can cause yourself embarrassment or even get yourself fired.

Page 35: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 35

Email Etiquette and Computer Ethics…continued

continued on next slide…

TEN RULES OF EMAIL ETIQUETTE1. Be brief and to the point. Emails are supposed to be a fast way to

communicate. Don’t slow down the process.2. Don’t use ALL CAPITAL letters. It looks and feels like you’re shouting or angry.

3. Remember to attach the attachment. Mentioning what you are “attaching” in any type of email is a good idea. Get in the habit of stopping as soon as you type the phrase “I am attaching…” and immediately clicking the button for attaching the file.

4. Use the spelling check (even if you’re a great speller). Using the spelling check feature only takes a few seconds and it shows that you care about quality. But watch out! It is easy to click “Change” instead of “Ignore” and change a person’s name to a common word.

5. Reread what you wrote from the perspective of the receiver. Ask yourself how the recipient is likely to interpret your words. Did you leave out or misspell a word that changes the meaning?

Page 36: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 36

Email Etiquette and Computer Ethics…continued

6. Double-check the address in the To box. Confirm that you clicked the correct name in your address list. Once you click the Send button, there is no way to stop the message or undo an address mistake.

7. Watch your language. Profanity can come back to haunt you.

8. Assume your email will be read by lots of other people. Emails are often forwarded so others can take action or to inform a supervisor. Avoid cute or friendly asides and comments that you only want a close friend to see.

9. Always put something in the Subject line. A well-written subject will help the receiver decide where to file your message and whether to read it now or wait until later.

10. Privacy does not exist in emails, especially those in a corporate environment. The email administrator can potentially see the contents of any email. Company policy may allow checking emails to ensure that no company secrets are exposed, or to stop harassing or abusive email.

Page 37: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 37

Email Etiquette and Computer Ethics…continued

Most software is copyrighted. The exception is open source software.

Infringing on a copyright is illegal.

Page 38: Marquee16 presentation-it essentials

Concepts© Paradigm Publishing, Inc. 38

1) This is an information workspace on the Internet and is used for file transfer.a. ftfb. ftpc. fptd. fft

3) This is a self-replicating computer program that distributes itself via a network.a. Spywareb. Trojanc. Wormd. Virus

2) This is typically spread via an email attachment.a. Spywareb. Trojanc. Wormd. Virus

4) This refers to the rules that govern courteous behavior.a. Etiquetteb. Ethicsc. Moraled. Protocol

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECK POINT 3