ECDL Module 1
ECDL Module 1
ECDL Module 1
ECDL Module 1
REFERENCE MANUAL
Concepts of Information Technology (IT)
PC Edition for ECDL Syllabus Four
All reasonable precautions have been taken in the preparation of this document,
including both technical and non-technical Proofing. Cheltenham Courseware and all
staff assume no responsibility for any errors or omissions. No warranties are made,
Expressed or implied with regard to these notes. Cheltenham Courseware shall not
be responsible for any direct, incidental or Consequential damages arising from the
use of any material contained in this document. If you find any errors in these
training modules, please inform Cheltenham Courseware. Whilst every effort is
made to eradicate typing or technical mistakes, we apologies for any errors you may
detect. All courses are updated on a regular basis, so your feedback is both valued
by us and will help us to maintain the highest possible standards.
PLEASE REMOVE THIS NOTICE WHEN YOU PRINT YOUR MANUALS
To receive download instructions for newly released titles
within the 'Courseware Library' please register at
www.cheltenhamcourseware.com/registration
This service is only available to clients who have purchased a 'Courseware Library Site License' from
Cheltenham Courseware, and who have a current, valid subscription. Please do not attempt to register, if you
have merely received a copy of this document as a result of attending a training course.
""European Computer Driving License" and ECDL and Stars device are registered trade
marks of the European Computer Driving License Foundation Limited in Ireland and other
countries. Cheltenham Courseware Ltd is an independent entity from the European
Computer Driving License Foundation Limited, and not affiliated with the European
Computer Driving License Foundation Limited in any manner. ‘Cheltenham Courseware Ltd
ECDL Courseware’ may be used in assisting students to prepare for the European
Computer Driving Licence Examination. Neither the European Computer Driving License
Foundation Limited nor Cheltenham Courseware Ltd warrants that the use of this
‘Cheltenham Courseware Ltd ECDL Courseware’ will ensure passing the relevant
Examination. Use of the ECDL-F approved Courseware Logo on this product signifies that it
has been independently reviewed and approved in complying with the following standards:
Acceptable coverage of all courseware content related to the ECDL Syllabus Version 4.0.
This courseware material has not been reviewed for technical accuracy and does not
guarantee that the end user will pass the associated ECDL Examinations. Any and all
assessment tests and/or performance based exercises contained in this ‘Cheltenham
Courseware Ltd ECDL Courseware’ relate solely to this ‘Cheltenham Courseware Ltd ECDL
Courseware’ and do not constitute, or imply, certification by the European Driving License
Foundation in respect of any ECDL Examinations. For details on sitting ECDL Examinations
in your country please contact the local ECDL Licensee or visit the European Computer
Driving License Foundation Limited web site at
http://www.ecdl.com.
“Candidates using this courseware material should have a valid ECDL/ICDL Skills Card/Log
book. Without such a skills card/Log book no ECDL/ICDL tests can be taken, no ECDL/ICDL
certificate, nor any other form of recognition can be given to the candidate. ECDL/ICDL
Skills Cards may be obtained from any accredited ECDL/ICDL Test Centre or from your
country's National ECDL/ICDL designated Licensee".
References to the European Computer Driving License (ECDL) include the International
Computer Driving License (ICDL). ECDL Syllabus Version 4.0 is published as the official
syllabus for use within the European Computer Driving License (ECDL) and International
Computer Driving License (ICDL) certification programme."
1.4.1.1 Understand the terms, local area network (LAN), wide area network (WAN). Understand
the term client/server. .................................................................................................................................41
1.4.1.2 List some of the advantages associated with group working such as: sharing printers,
applications, and files across a network. .................................................................................................42
1.4.2 INTRANET, EXTRANET ...............................................................................................................................43
1.4.2.1 Understand what an Intranet is and understand the distinction between the Internet and
an Intranet.....................................................................................................................................................43
1.4.2.2 Understand what an Extranet is and understand the distinction between an Intranet and
an Extranet. ..................................................................................................................................................43
1.4.3 THE INTERNET ..........................................................................................................................................44
1.4.3.1 Understand what the Internet is and know some of its main uses. .......................................44
1.4.3.2 Understand what the World Wide Web (WWW) is and distinguish it from the Internet.....45
1.4.4 THE TELEPHONE NETWORK IN COMPUTING............................................................................................45
1.4.4.1 Understand the use of the telephone network in computing. Understand the terms Public
Switched Telephone Network (PSTN), Integrated Services Digital Network (ISDN), Asymmetric
Digital Subscriber Line (ADSL). .................................................................................................................45
1.4.4.2 Understand the terms analogue, digital, modem, transfer rate, (measured in bps – bits
per second)...................................................................................................................................................47
1.5 THE USE OF IT IN EVERYDAY LIFE........................................................................................................48
1.5.1 COMPUTERS AT WORK.............................................................................................................................48
1.5.1.1 Identify some situations where a computer might be more appropriate than a person for
carrying out a task and where not. ............................................................................................................48
1.5.1.2 Know some of the uses of large-scale computer applications in business such as:
business administration systems, airline booking systems, insurance claims processing, online
banking..........................................................................................................................................................49
1.5.1.3 Know some of the uses of large-scale computer applications in government such as:
public records systems (census, vehicle registration), revenue collection, electronic voting. .......50
1.5.1.4 Know some of the uses of large-scale computer applications in hospitals/healthcare such
as: patient records systems, ambulance control systems, diagnostic tools and instruments,
specialist surgical equipment. ....................................................................................................................51
1.5.1.5 Know some of the uses of computer applications in education such as: student
registration and timetabling systems, computer-based training (CBT), distance learning,
homework using the Internet......................................................................................................................51
1.5.1.6 Understand the term tele-working. List some of the advantages of tele-working such as:
reduced or no commuting time, greater ability to focus on one task, flexible schedules, reduced
company space requirements. List some disadvantages of tele-working such as: lack of human
contact, less emphasis on teamwork........................................................................................................52
1.5.2 ELECTRONIC WORLD................................................................................................................................53
1.5.2.1 Understand the term electronic mail (e-mail) and know its main uses. ................................54
1.5.2.2 Understand the term e-Commerce. Understand the concept of purchasing goods and
services online, including giving personal details before a transaction can be carried out,
payment methods, consumer’s basic right to return unsatisfactory goods. ......................................54
1.5.2.3 List some of the advantages of purchasing goods and services online, such as: services
available 24 hours a day, opportunity to view a wide range of products. List some of the
disadvantages of purchasing goods and services online such as: choosing from a virtual store,
no human contact, risk of insecure payment methods..........................................................................56
1.6 HEALTH AND SAFETY, ENVIRONMENT................................................................................................58
1.6.1 ERGONOMICS............................................................................................................................................58
1.6.1.1 Understand what elements and practices can help create a good, working environment
such as: appropriate positioning of monitors, keyboards and adjustable chairs, use of a mouse
mat, use of a monitor filter, provision of adequate lighting and ventilation, frequent breaks away
from the computer. ......................................................................................................................................58
1.6.2 HEALTH ISSUES ........................................................................................................................................59
1.6.2.1 List some common health problems which can be associated with using a computer such
as: injuries to wrists caused by prolonged typing, eye strain caused by screen glare, back
problems associated with poor seating or bad posture.........................................................................59
1.6.3 PRECAUTIONS...........................................................................................................................................60
1.6.3.1 List some safety precautions when using a computer such as: ensuring power cables are
safely secured, power points are not overloaded...................................................................................60
1.6.4 THE ENVIRONMENT ..................................................................................................................................61
1.6.4.1 Be aware that recycling printed outputs, recycling printer toner cartridges, using a monitor
which consumes less power while the computer is inactive can help the environment..................61
1.6.4.2 Understand that using electronic documents can help reduce the need for printed
materials........................................................................................................................................................61
1.7 SECURITY......................................................................................................................................................62
1.7.I INFORMATION SECURITY ............................................................................................................................62
1.7.1.1 Understand the term information security and the benefits to an organization of being
proactive in dealing with security risks such as: adopting an information security policy with
respect to handling sensitive data, having procedures for reporting security incidents, making
staff members aware of their responsibilities with respect to information security. .........................62
1.7.1.2 Know about privacy issues associated with computers, such as adopting good password
policies. Understand what is meant by user ID and differentiate between user ID and password.
Understand the term access rights and know why access rights are important. .............................65
1.7.1.3 Know about the purposes and value of backing up data software to a removable storage
device.............................................................................................................................................................67
1.7.1.4 Be aware of possible implications of theft of a laptop computer, PDA, mobile phone such
as: possible misuse of confidential files, loss of files, loss of important contact details if not
available on a separate source, possible misuse of telephone numbers. .........................................68
1.7.2 COMPUTER VIRUSES................................................................................................................................69
1.7.2.1 Understand the term virus when used in computing and understand that there are
different types of virus. Be aware when and how viruses can enter a computer system. ..............69
1.7.2.2 Know about anti-virus measures and what to do when a virus infects a computer. Be
aware of the limitations of anti-virus software. Understand what ‘disinfecting’ files means. ..........70
1.7.2.3 Understand good practice when downloading files, accessing file attachments, such as:
use of virus scanning software, not opening unrecognized e-mail messages, not opening
attachments contained within unrecognized e-mail messages. ..........................................................71
1.8 COPYRIGHT AND THE LAW......................................................................................................................73
1.8.1 COPYRIGHT...............................................................................................................................................73
1.8.1.1 Understand the concept of copyright when applied to software, and also to files such as:
graphics, text, audio, video. Understand copyright issues involved in downloading information
from the Internet. .........................................................................................................................................73
1.8.1.2 Understand copyright issues associated with using and distributing materials stored on
removable media such as CD’s, Zip disks, diskettes. ...........................................................................74
1.8.1.3 Know how to check the Product ID number for a software product. Understand the terms
shareware, freeware, end-user license agreement. ..............................................................................75
1.8.2 DATA PROTECTION LEGISLATION .............................................................................................................76
1.8.2.1 Know about data protection legislation or conventions in your country. Understand the
implications of data protection legislation for data subjects and data holders. Describe some of
the uses of personal data...........................................................................................................................76
ABBREVIATIONS & TERMINOLOGY.............................................................................................................78
Hardware
The term hardware refers to the physical components of your computer such
as the system unit, mouse, keyboard, monitor etc.
Software
The software is the collection of instructions which makes the computer work.
For instance, when you type in words via the keyboard, the software is
responsible for displaying the correct letters, in the correct place on the
screen. Software is held either on your computer’s hard disk, CD-ROM, DVD
or on a diskette (floppy disk) and is loaded (i.e. copied) from the disk into the
computers RAM (Random Access Memory), as and when required.
What is a PC?
IBM invented the PC (Personal Computer) way back in 1981. All PCs
released since then are in many ways compatible with the original design,
though many extensions have been made. The term PC compatible relates to
PCs manufactured by companies other than IBM which are compatible with
the traditional PC specification. In the early days, most PCs ran an operating
system called DOS (Disk Operating System). These days most PCs will be
running a version of Microsoft Windows.
What is a Mac?
The Apple Mac is a computer, but NOT a PC. It uses a different operating
system, and requires special versions of application programs (such as word-
processors or Spreadsheets). Even the hardware add-ons have to be
customized to some extent to be able to be connected to a Mac. In the early
days the thing which really distinguished the Mac over the PC was the GUI
(Graphical User Interface), or in plain English the way you could use the
mouse to drive the computer. In the early days of the PC, you really had to be
a bit of an expert to use and maintain your PC. Recently the differences
between the PC and the Mac have blurred, with Microsoft buying a stake in
Apple.
Types of computer - PC
Capacity: Large hard disks combined with a work working memory (RAM)
Typical Users: Home users, large and small offer users. Education, Doctors.
In fact just about everyone needs to know how to operate a PC these days.
Typical Users: Due to ease of networking a PC these days just about anyone can
network PCs together.
Speed: Fast. Normally measured in GHz. Often speed specifications are less than for a
PC of equivalent price.
Costs: Components need to be much more compact, so there is a price overhead when
compared to a PC of equivalent power.
The CPU
The CPU (Central Processing Unit) is normally an Intel Pentium (or
equivalent) and it is one of the most important components within your
computer. It determines how fast your computer will run and is measured by
its MHz or GHz speed. Thus, a 2 GHz Pentium is much faster than say a 1
GHz Pentium CPU. It is the CPU which performs all the calculations within
the computer, when running programs such as word-processors,
spreadsheets and databases. See page 19 for more information.
Memory (RAM)
The RAM (Random Access Memory) within your computer is where the
operating system is loaded to when you switch on your computer and also
where your applications are copied to when you start an application, such as
a word processor or database program. When you create data, (e.g. letters
and pictures), these are initially created and held in RAM and then copied to
disk when you save the data. As a rule of thumb, the more RAM you have
installed in your computer the better. These days you will commonly find over
128 Megabytes of RAM installed.
ROM-BIOS
The ROM-BIOS (Read Only Memory - Basic Input Output System) chip is a
special chip held on your computer's system (mother) board. It contains
software which is required to make your computer work with your operating
system, for instance it is responsible for copying your operating system into
RAM when you switch on your computer.
Serial Port
The serial port is a socket located at the back of your computer which enables
you to connect items to the computer, such as a modem. They are commonly
labeled as COM1 or COM2.
Parallel Port
The parallel port is a socket located at the back of your computer which
enables you to connect items to the computer, such as a printer. It is
commonly labeled as LPT1 or LPT2.
The Keyboard
An Input device. The keyboard allows you to type information into the
computer. It as evolved over the years and many people now use a Microsoft
style keyboard, which has additional keys designed to make Microsoft
Windows easier to use.
The Mouse
An Input device. When using an operating system, such as Microsoft
Windows, you use the mouse to select drop down menus, to point and click
on items, to select items and to drag and drop items from one place to
another.
CD
Most computers are now supplied with a CD-ROM (Compact Disc - Read
Only Memory) drive. CD-ROM discs look exactly like music CDs but contain
computer data instead of music. The advantage of a CD-ROM is that it can
hold a vast amount of data (equivalent to the storage capacity of over 450
floppy disks). The other big advantage of CD-ROMs is that they are
interchangeable. This means that you can own a range of different CD-ROMs
and choose which one to insert into your CD-ROM drive.
DVD Drives
Short for "Digital Versatile Disk”. Similar to CD-ROM drives but allows you to
use DVD disks, which contain vastly more information than a traditional CD-
ROM disk. These also transfer the data from the disk to the computer far
faster, allowing you to watch movies on your computer screen. A CD-ROM
can store 650 MB of data, while a single-layer; single-sided DVD can store
4.7 GB of data. The two-layer DVD standard allows a capacity of 8.5 GB. A
double-sided DVD increases the storage capacity to 17 GB (or over 25 times
the data storage capacity of a CD-ROM).
Floppy disk
Floppy disks are also known as diskettes. They are very slow compared to
hard disks or CD-ROMs, and hold relatively small amounts of data (1.44
Mbytes). Sometimes people will backup (i.e. copy) important data from their
hard disk to floppy disks. However, as diskettes are notoriously unreliable this
is not the best way of backing up valuable data (but is better than nothing).
Zip Disc
A Zip disk is like a bigger version of the floppy disk, the main difference being
that a single Zip disk can hold up to 250 Mbytes of data. They also offer
increased speed compared to the old floppy disk.
The Monitor
An output device. The monitor is the TV type screen on which you view your programs.
They are supplied in different sizes, common sizes range from 15" to 21" screens. You
should be aware that poor quality or badly maintained monitors could harm your
eyesight.
Modems
A modem is a device which is used to attach your computer to the telephone
system. The modem converts data into sound which is sent over the
telephone line, the receiving modem turns the sounds back into data. If you
wish to connect to the Internet, you will need a modem (or equivalent device).
Modems used to be large boxes that you had to plug into the computer, but
now modems boxes have become very small and in many cases the modem
is actually inside the computer. If you are using ISDN or broadband then you
will use another device similar to a modem.
Printers
Most data is printed once you have created it and there are a vast number of
different printers available to accomplish this. Most common are ink jet and
laser printers both of which can now produce colored output (at a cost).
Scanners
Scanners allow you to scan printed materials into your computer, which can then be
stored within the computer. These pictures can then be altered, resized and printed
as required.
Recordable CDs
CD-ROMs are read-only devices, but increasingly people are purchasing a
special type of CD drive unit which allows you to record data, music or video
to your own CDs. These devices require the purchase of special CDs to
which you can write, called CD-R (Compact Disc – Recordable).
Tape backup
A tape backup unit allows for regular backing up of your data. These tapes
can store a vast amount of data at a low cost. DAT (Digital Audio Tape)
devices are commonly used for backups. The DAT tapes which are used can
backup enormous amounts of data (i.e. over 4 GBytes per tape). The devices
are also fast and reliable.
What is PCMCIA?
Portables by their very nature are very compact and require smaller than
standard parts such as hard disks and CD-ROM drives. Many portables are
supplied with special adaptor sockets which enable what are called PCMCIA
compatible hardware to be connected to them. PCMCIA components tend to
be more expensive than standard computer parts which are designed for
more bulky desktop computers.
More information: http://www.pcmcia.org
RAM size: As a rule the more memory you have the faster the PC will appear
to operate. Windows also uses the hard disk a lot, so logically the faster the
hard disk can operate then again the faster the PC will appear to run.
Hard disk speed and storage: Hard disks are also measured by their speed,
defined by the disk access time, which is measured in milliseconds. The
smaller this access time the faster the hard disk will store or retrieve data.
The data storage capacity of hard disks continues to increase as new
products are released. The disk storage capacity is measured in Gigabytes
(GBytes). 1 GByte is equivalent to 1024 Mbytes.
Free Hard Disk Space: To get the most out of your Windows based PC, you
not only need a fast hard disk but also a large hard disk with plenty of "spare
space". This is due to the fact Windows is constantly moving data between
the hard disk and RAM (Random Access Memory). Microsoft Windows will
create many so-called “temporary files” which it uses for managing your
programs. In fact, if you have very little free hard disk space you may find that
Microsoft Windows will not be able to run your programs at all.
De-fragmenting Files: If you are running Windows you may find that if you
click on the Start menu, select Programs, and then select the Accessories /
System tools group, there is a de-fragmentation program. Running this
periodically may noticeably speed up the operation of your PC. When you use
a PC, over a period of time the files get broken up into separate pieces which
are spread all over the hard disk. De-fragmentation means taking all the
broken up pieces and joining them back together again.
More information:
Intel: http://www.intel.com
AMD: http://www.amd.com
Cyrix: http://www.viatech.com
1.2.2 Memory
What is RAMMING ?
Random Access Memory (RAM) is the main 'working' memory used by the
computer. When the operating system loads from disk when you first switch
on the computer, it is copied into RAM. The original IBM PC could only use up
to 640 KB of memory (just over half a megabyte), whereas a modern
computer can effectively house as much RAM as you can afford to buy.
Commonly modern computers are supplied with over 128 MB of RAM. As a
rough rule, a Microsoft Windows based computer will operate faster if you
install more RAM. When adverts refer to a computer having 128 Mbytes of
memory, it is this RAM which they are talking about. Data and programs
stored in RAM are volatile (i.e. the information is lost when you switch off the
computer).
What is ROM?
Read Only Memory (ROM) as the name suggests is a special type of memory
chip which holds software which can be read but not written to. A good
example is the ROM-BIOS chip, which contains read-only software. Often
network cards and video cards also contain ROM chips.
1.2.2.2 Know how computer memory is measured; (bit, byte, KB, MB, GB,
TB). Relate computer memory measurements to characters, files and
directories/folders.
In this example, we have the root folder at the top. Below this are three sub-
folders called Data, Programs and Games.
The Mouse
• The mouse came into common use on a PC with the introduction of the Microsoft
Windows operating system. Before this, the operating system (DOS) would normally
be controlled via the keyboard. These days it is vital to be a competent mouse user.
There are many different types of mice, a commonly used model now has a small
wheel on it which when combined with the correct software allows additional
functionality and fine control over the use of your applications.
The Keyboard
The keyboard is still the commonest way of entering information into a
computer. There are a number of different types, including those specially
designed for use with Microsoft Windows. The quality of the keyboard is often
overlooked when buying a PC; it should be robust and easy to use.
Tracker Balls
A tracker ball is an alternative to the traditional mouse and favored by graphic
designers. Tracker balls often give much finer control over the movement of
the items on the screen. They may take a while to get used to if you are used
to the traditional mouse, but offer a lot in terms of added flexibility.
Scanners
scanner allows you to scan printed material and convert it into a file format
which may be used within the PC. You can scan pictures and then manipulate
these inside the PC using a graphics application of your choice. In addition,
you can scan printed text and convert this not just to a picture of the text but
also to, actual text which can be manipulated and edited as text within your
word-processor. There are a number of specialist programs, generically
called OCR (Optical Character Recognition) programs which are specifically
designed for converting printed text into editable text within your applications.
Touch Pads
A touch pad is a desktop device and responds to pressure. Used in
conjunction with a special pen they can be used by graphic artists wishing to
create original, digital artwork
Light Pens
A light pen is used to allow users to point to areas on a screen and is often
used to select menu choices.
Joysticks
Many games require a joystick for the proper playing of the game. There are
many different types, the more sophisticated respond to movement in 3 axis
directions, as well as having a number of configurable buttons. Like most
things in life you get what you pay for with joysticks and it is worth investing in
a good, strongly constructed model, especially bearing in mind that children
will hammer these devices whilst playing games.
Web Cams
Ever since it was invented, the Web has become increasingly interactive. You
can now use a small digital movie camera (a Web cam) mounted on the PC
monitor to allow two way communication involving not just text communication
but sound and video communication as well. While not yet considered a
standard piece of PC kit, it is only a matter of time …
Digital Cameras
A digital camera can be used in the same way a traditional camera can, but
instead of storing images on rolls of film which require developing, the images
are stored digitally in memory housed within the camera. These pictures can
easily be transferred to your computer and then manipulated within any
graphics programs which you have installed on your computer. Currently they
are limited by the quality of the image recorded and the number of pictures
which you may store within the camera.
Screen size
You should be aware that often if you specify a screen of a certain size, say a
17-inch screen, this is the size measured diagonally, not horizontally across
the screen. If you are upgrading you should also ask for the "visible viewing
area" of the screen.
Laser printers
Laser printers produce high print quality at high speed. They are called "laser
printers" due to the fact that they contain a small laser within them. There is a
wide range of laser printer manufacturers and one buzzword to be aware of is
Postscript, a type of printer which is designed to give very high quality
reproduction of pictures.
Inkjet printers
Inkjet printers work by using tiny jets to spray ink onto the paper. Inkjet
printers are very quiet in operation and produce print quality comparable to
that of laser printers, though laser printers still have the edge in terms of
speed. Inkjet printers are ideal for low volume printing where high quality print
is required and speed is not a high priority, e.g. printing letters in a small
office or in the home.
Printer Memory
It is important to realize that most printers have their own memory chips, in
the same way that each computer has its own memory. If you are printing
very large graphics (i.e. pictures), and want the best quality output from your
printer then you should consider adding more memory to your printer. This
must only be done by a qualified person, and has the benefit of really
speeding up the rate at which you can print pages in many cases.
Plotters
A plotter is an output device similar to a printer, but normally allows you to
print larger images. Their use is common in the design and research sector.
Speakers
Most computers are sold with the capability to add a pair of speakers to your
system unit. In fact, in some cases, the monitor may have speakers built
directly into the unit. This enhances the value of educational and presentation
products and can now be considered a standard PC component.
Speech synthesizers
A recent development is the ability not only to display text on a monitor but
also to read the text to you. Thus, you could receive a text email from a
colleague and the system could read that email to you. This is of enormous
benefit to the visually impaired when using a computer. On the flip side, it is
now possible to use a microphone to talk to the computer and for the
computer to directly convert the spoken word into text which will be displayed
within say your word-processor. Whilst these systems are far from foolproof
they are getting better as more advanced software is being made available.
1.2.5.1 Understand some devices are both input/output devices such as:
modems, touch screens.
Input/Output devices
Some devices are both input and output devices. A modem can be used for
downloading information from web sites and receiving emails. It can also be
used for uploading and sending emails. A touch screen can display a menu
system (output device), and accept input when people touch the menus
displayed on the screen.
Zip drives
You can install a Zip drive into your computer and then you can insert Zip
disks into that drive. The great thing about these disks is that you can remove
one disk and replace it with another, in exactly the same way that you can
place different diskettes in your diskette drive. They are great for backing up
data and exchanging data between non networked computers.
Speed: Slower than normal hard disks but ideal for backups.
Capacity: 100 or 250 Megabytes.
Cost: You have to consider both the cost of the drive, plus the cost of each
disk which you wish to use in the drive. Often suppliers will sell the drive plus
a pack of 5 disks at a bundled discount price.
Jaz drives
A Jaz drive is similar in concept to a Zip drive. The main difference between
them is that a Jaz drive can hold a lot more data. Alas, the disks are not the
same as used in a Zip drive and as a result, you cannot use a Zip disk in a
Jaz drive or a Jaz disk in a Zip drive.
Speed: Slower than normal hard disks but ideal for backups
Capacity: Around 2 Gigabytes (2048 Megabytes).
Cost: You have to consider both the cost of the drive, plus the cost of each
disk which you wish to use in the drive. Often suppliers will sell the drive plus
a pack of 5 disks at a bundled discount price.
More information: http://www.iomega.com
CD Disks
Speed: Much slower than hard disks. The original CD-ROM specification is
now given a value of 1x speed, and later, faster CD-ROMs are quoted as a
multiple of this value. Thus, a 50x CD-ROM is 50 times as fast as the original
1x speed CD-ROM specification.
Capacity: Around 650 Mbytes.
Cost: CD drives are becoming very inexpensive. The disks themselves are
so cheap that they are often given away when they contain samples or demo
software (i.e. free versions).
DVD Drives
Speed: Much faster than CD drives but not as fast as hard disks.
Capacity: Up to 17 GBytes.
Cost: Slightly higher than CD drives.
1.3 Software
1.3.1 Types of Software
1.3.1.1 Distinguish between operating systems software and
applications software. Understand the reasons for software versions.
IBM produced an operating system called OS/2 but this was largely ignored
and is only used by a few companies.
UNIX and Linux are other examples of operating systems which may be run
on PCs.
Word processing
A word processing program (such as Microsoft Word) allows you to produce
letters, memos, etc., easily. You can easily mail merge a list of names and
addresses to produce mass mailers, individually addressed to customers or
subscribers.
Spreadsheets
A spreadsheet program (such as Microsoft Excel) allows you to work out a
company’s income, expenditure and then calculate the balance. It enables
you to make 'what if' type projections of how the company will fair in the future
and to forecast how changes in prices will affect profits.
Databases
A database program (such as Microsoft Access) allows you to compile
information and then to search this information to extract just the information
you require. For instance, if you have a database of all the equipment housed
within an office you can very simply produce a report listing only the
equipment above a certain value.
Microsoft Access http://www.microsoft.com/office/access
Lotus Approach http://www.lotus.com/home.nsf/welcome/approach
FOR USE AT THE LICENSED SITE(S) ONLY ( ISI )
© Cheltenham Courseware Ltd. 1995-2004 www.cheltenhamcourseware.com
PAGE 36 ECDL SYLLABUS FOUR MANUAL - PC EDITION - MODULE 1
Presentation
A presentation program (such as Microsoft PowerPoint) allows you to
produce professional looking presentations, which can be printed out directly
onto slides for use with an overhead projector. Alternatively, you can display
your presentations directly on a computer screen or via a computerized
projector.
Accounts / Payroll
In most large organizations, the accounts are maintained by a computerized
system. Due to the repetitive nature of accounts, a computer system is ideally
suited to this task and accuracy is guaranteed.
Web browsing
Applications used to view and interact with the World Wide Web (WWW).
Web authoring
These applications allow almost anyone to create a web site, quickly and
easily.
If you used an old operating system like the original version of DOS, there
was no GUI and the screen would look like this.
As you can see there are no menus, no icons and nothing for the mouse to
click on. You had to know a special language which you then typed into the
computer to make it do anything!
The programmer will take the specifications from the Systems Analyst and
then convert the broad brushstrokes into actual computer programs. Ideally at
this point there should be testing and input from the users so that what is
produced by the programmers is actually what they asked for.
Finally, there is the implementation process, during which all users are
introduced to the new systems, which often involves an element of training.
Once the users start using the new system, they will often suggest new
improvements and the whole process is started all over again. These are
methodologies for defining a systems development cycle and often you will
see four key stages, as detailed below.
- Analysis
- Design
- Programming
- Testing
1.4.1.1 Understand the terms, local area network (LAN), wide area
network (WAN). Understand the term client/server.
What is a WAN?
A WAN (Wide Area Network) as the name implies allows you to connect to
other computers over a wider area (i.e. the whole world).
1.4.1.2 List some of the advantages associated with group working such
as: sharing printers, applications, and files across a network.
1.4.3.1 Understand what the Internet is and know some of its main uses.
1.4.3.2 Understand what the World Wide Web (WWW) is and distinguish
it from the Internet.
What is the difference between the World Wide Web (WWW) and the Internet?
The World Wide Web (WWW) is just a small part of the Internet as a whole. The Internet
relates to all the hardware and software involved, as well as the WWW, it also includes
FTP (File Transfer Protocol), email and newsgroups. The WWW is basically the text and
pictures which you can view using your web browser, such as Microsoft Internet
Explorer, or Netscape Navigator.
What is PSTN?
PSTN (or Public Switched Telephone Network) is the technical name for the
public telephone system. It is based on traditional 'copper wire' technology
and can transmit analogue voice data.
What is PSDN?
PSDN (or Public Switched Data Network) is simply the technical name for the
telephone system in use today.
What is ISDN?
Stands for "Integrated Services Digital Network." ISDN dates back to 1984,
and allows much faster transfer rates than when using modems. Using ISDN,
you can transfer 64 Kbit or 128 Kbit of data per second.
What is ADSL?
Short for 'Asymmetric Digital Subscriber Line'. A more recent technology
which allows more data to be sent over existing copper telephone lines, but
requires a special ADSL modem.
ADSL allows data transfer rates of ranging from 0.5 to 8 Mbps when receiving
data (called the downstream rate) and from 16 to 640 Kbps when sending
data (called the upstream rate).
What is DSL?
Refers collectively to all types of 'Digital Subscriber Lines', the two main
categories being ADSL and SDSL. DSL technology allows faster data transfer
while still using copper wires (as opposed to optic fiber cables).
Modem
Modem stands for “MODulate/DEModulate”. The modem sends information
from your computer across the telephone system. The modem at the other
end of the phone line, converts the signal back into a format which can be
used by the receiving computer.
Baud rate
The baud rate tells you how fast a modem can send/receive data. Most
modern modems have a maximum baud rate of 56 Kilobits per second
(Kb/sec).
Easily automated tasks: The phone system is now largely automatic, while
in former times all calls were made through an operator. Many other
examples exist. How many can you think of?
Despite the uptake of e-commerce, (selling on the Net, banking on the Net
and so on), there are many people (myself included) who still like to have the
option of a real person to whom you can talk, be it the local bank manager or
a real person on the end of a telephone sales line. Does anyone like ringing a
large organization and being greeted with a range of buttons to press, in order
to communicate with a computerized telephone system? Even ordering
cinema tickets can now involve a lengthy phone call, listening to a synthetic
voice describing many films you do not want to see, and pressing many
buttons.
For many years, science fiction has portrayed images of a thinking, sentient
android (Lieutenant Data from Star Trek for instance). In reality this is a long
way from present capabilities and when it comes to anything requiring
creative thought, a human wins every time. Computers in their present form
would gain little from studying philosophy for instance. They can memorize
the facts, but cannot make the creative leaps which humans can. On a more
mundane level, when it comes to even a simple task such as cleaning your
home, a human can deal with mess, clutter and items (such as chairs) which
have changed their position recently. Even this simple task is beyond a small
computer.
Computers are very bad at recognizing and interpreting shapes. They can
take photographs and record images on video, but they have no
understanding of the meaning of shapes, and will be easily confused when
presented with two overlapping shapes. The human process of pattern
recognition, as recent research had demonstrated, is vastly more complicated
than we used to think. For these reasons it is humans, not computers who will
examine tissue smears for signs of abnormality within hospitals.
In time things may change, it was not very long ago that a computer was
incapable of beating a chess grand master.
Airline booking systems: Airline booking systems have long been computerized. This
maximizes profit for the airline companies and is often more convenience for the
customer. Many of these airline-booking systems have now also been integrated with
online airline ticket sales.
Online banking: Most banks now offer some form of online banking. This has
the advantage to the bank that costs can be reduced. Some banks are
completely online, with no physical branches at all. The customers benefit
from 24-hour access to banking services. The downside is that this leads too
many job losses in the banking industry and when things go wrong there is no
physical person you can go and see and make your complaints to. Some
leading banks have demonstrated a degree of incompetence when it comes
to the security of their online systems and many people are very reluctant to
trust online banking systems yet.
Smile: http://www.smile.co.uk
Egg: http://www.egg.co.uk
Vehicle registration: All car and lorry details are kept centrally; this makes it
easy to find the owners of cars, which can be useful for police, customs and
security services.
Uses of computer applications within hospitals and the health care system
Patient record systems: Appointment and record systems are computerized
and centralized. This means that doctors at one location can access medical
records from another location. The results of tests can be emailed rather than
being posted, which speeds up treatment.
printed books, through to advanced use of video images with sound. In many
cases there can be real-time two-way communication between the teacher
and the student.
Advantages include:
- One trainer can train many people at many different locations.
- If the training is solely computer based, then the students can work at their
own pace, and repeat parts of a course which they do not understand. Also
the teaching can be at any time, 24 hours a day, 7 days a week.
- Often e-learning solutions are cheaper to provide than other more traditional
teaching methods.
Disadvantages include:
- There may be no opportunity to ask a question of a real person.
- The Internet connection may temporarily fail for some reason.
- You may have to pay for the connection time, by the minute.
- The download speed may be too slow for some forms of e-learning
- Because of the increased time required to produce some types of e-learning
packages, the e-learning tutorials may not be available for some time
following the release of a new version of software, or a new certification
syllabus.
1.5.1.6 Understand the term tele-working. List some of the advantages of tele-
working such as: reduced or no commuting time, greater ability to focus on
one task, flexible schedules, reduced company space requirements. List some
disadvantages of tele-working such as: lack of human contact, less emphasis
on teamwork.
What is tele-working?
Tele-working is a broad term which refers to people working at home
connected to the rest of the organization via a computer network.
Communication is via email or the telephone. This arrangement has
advantages and disadvantages to both the employer and the employee.
Flexible schedules:
In many cases, as long as the job gets done, it does not matter when the job
gets done. This means there is time for other activities, such as picking up the kids
from school. It also means that work can be finished in the evening if required. If it is a
beautiful day, why not take advantage of the weather, and finish your work later.
Self-discipline:
It can take a lot to work from home and remain focused on work. It is all very well
saying 'I will take the afternoon off and work this evening', but come the evening
you may not feel like working.
1.5.2.1 Understand the term electronic mail (e-mail) and know its main uses.
What is email?
Email allows you to send a message to another person almost instantly, anywhere in the
world. It requires both computers to be connected to the Internet. As well as sending a
text message, files can be sent as email attachments.
What is E-commerce?
The phrase e-commerce is a buzzword which relates to buying or selling via
the Internet. Increasingly you can purchase directly via a Web site by
selecting the goods or services which you require and entering your credit
card details. When you send your credit card details these SHOULD be
encrypted by the site operators so that no one can intercept your details. Most
sites which accept credit card payment are on secure services and your
Internet browser program (i.e. Microsoft Internet Explorer or Netscape
Communicator) will normally inform you (via a popup) when you are entering
or leaving a secure server.
What is E-banking?
The phrase e-banking relates to managing your money online. Instead of
having to go to the local branch, or telephoning them, you can pay your bills
online and move money from one place to another. Some online banks have
no physical branches at all, making it a very profitable operation for the bank.
There are security considerations relating to online banking, with numerous
examples of poor security coupled with sloppy operations.
1.5.2.3 List some of the advantages of purchasing goods and services online,
such as: services available 24 hours a day, opportunity to view a wide range of
products. List some of the disadvantages of purchasing goods and services
online such as: choosing from a virtual store, no human contact, risk of
insecure payment methods.
Services available 24 / 7:
Unlike a normal shop which closes in the evening, you can shop via the
Internet 24 hours a day, 7 days a week, and 365 days a year.
make sure that someone is not you. Check the small print on your credit card
agreement.
How are you covered when you purchase goods from another country?
This is a minefield. Each country may have its own laws relating to consumer
protection. Be warned!
1.6.1 Ergonomics
1.6.1.1 Understand what elements and practices can help create a good,
working environment such as: appropriate positioning of monitors,
keyboards and adjustable chairs, use of a mouse mat, use of a monitor
filter, provision of adequate lighting and ventilation, frequent breaks
away from the computer.
Your chair:
Your chair should be fully adjustable, and be able to be moved up or down. It
should have an adjustable back.
Your screen:
Your screen should be fully adjustable so that your eyes are at the same
height as the top of the screen. You may wish to use a filter attached to the
screen to reduce glare. If the screen is badly focused, too bright or appears to
flicker, then get a qualified technician to take a look at it. You should
periodically refocus into the distance, as opposed to always gazing at a
screen a few inches from your eyes.
Your keyboard:
Use a good keyboard and you may also wish to use a wrist pad to relieve
pressure on your wrists.
Your feet:
You may wish to use a footpad to rest your feet while using the computer.
Your mouse:
Use a mouse mat to make the mouse easier to use. Ensure that you have
enough space to comfortably use the mouse. If your arms or fingers become
tired or painful when using the mouse, take a break and do something else.
Breaks:
Take frequent breaks when using a computer.
Other factors:
Make sure that the area where you are using the computer is adequately lit
and well ventilated. Ventilation is especially important if you are using a laser
printer, which may produce ozone when printing.
More information:
http://intranet.linst.ac.uk/student/services/health/computer.htm
http://www.ibm.com/ibm/publicaffairs/health/summary.html
http://www.ics.uci.edu/~chair/comphealth2.html
Bad posture
When sitting at your computer you should have a monitor at eye level which
can be adjusted to suit you. In addition, you may want to consider a footrest.
Neck ache and backache can result from prolonged bad posture.
1.6.3 Precautions
1.6.3.1 List some safety precautions when using a computer such as:
ensuring power cables are safely secured, power points are not overloaded.
1.6.4.2 Understand that using electronic documents can help reduce the
need for printed materials.
1.7 Security
Passwords
If your computer has a password which prevents other users from accessing
it then do NOT give this password to anybody else. Do not write the password
on a card and prop this up next to the monitor and above all do not attempt to
hide your access passwords on the underside of your desk (this is the first
place most criminals would look if trying to break into your system). Make
sure you do not forget your passwords; in many cases, data cannot be
recovered once the password is lost.
Some operating systems, such as the later versions of Windows 95 and also
Windows NT have a facility which will automatically detect that the computer
was not properly shut down the last time it was used. If this situation is
detected, then a special recovery program will be run which will attempt to fix
any damage caused by the power cut.
When using Windows 95 or Windows NT, you MUST always use the
shutdown command (located on the Start menu) to close down the operating
system, before switching off the power.
What is a UPS?
A UPS (Un-interruptible Power Supply) is a device which you can attach to
your computer which will guard against power cuts (or indeed someone
tripping over your power cable and pulling the plug out). It contains batteries
which will keep your computer alive long enough for you to use the shutdown
command and turn off the computer in the proper way. This is especially
important for PCs on a network which might provide data for many users on
the network.
Things to avoid
Dust
Drinking and eating over the keyboard
Heat, Cold
Moisture
Prior to contacting your computer support staff you may (if authorized by your
organization) check that the various external components, such as the
mouse, keyboard, monitor and network connections are in fact properly connected to
the back of the computer. A very common complaint to support groups is that the screen
is not working. You may wish to check that someone has not inadvertently switched off
the screen, prior to ringing the support group. One of the more common reasons for a
network not working is that someone (maybe an overnight cleaner) has accidentally
pulled the network cable out of the back of a computer.
Hard disks: If you delete a file, then it is actually only moved to the Recycle
Bin. As a first step, empty the Recycle Bin of deleted files. Even where a file
appears complete deleted, it can still often be recovered using specialist data
recovery programs. Be warned. If you are disposing of an old hard disk which
used to contain sensitive data, the safest way is to crush it.
Tape backups and removable drives (ZIP and JAZ drives): Apart from file
deletion, physical crushing of the media is the only totally safe way to
guarantee that your data remains secure.
Old Computers: When disposing of old computers, remove all data storage
media and crush them.
Paper output: Always put unwanted paper output through a paper shredder,
prior to disposal.
You can issue electronic badges to visitors. This often allows the movement
of visitors to be monitored electronically by your security staff. It can also be
used to allow access to certain areas of the building, but deny access to more
sensitive areas.
Electronic passes can also be used to control which members of staff have
access to which area of your building.
1.7.1.3 Know about the purposes and value of backing up data software
to a removable storage device
1.7.2.1 Understand the term virus when used in computing and understand
that there are different types of virus. Be aware when and how viruses can
enter a computer system.
More Information:
McAfee Anti-virus software http://www.mcafee.com
Norton Anti-virus software http://www.symantec.com/avcenter
Dr Solomon anti-virus software http://www.drsolomon.com
1.7.2.2 Know about anti-virus measures and what to do when a virus infects a
computer. Be aware of the limitations of anti-virus software. Understand what
‘disinfecting’ files means.
Always make sure that all computers require an ID and password to access
them. Make sure that all relevant 'security patches' from Microsoft have been
applied.
Make sure that the password is long enough, contains a random mixture of
numbers and letters, and that the passwords are changed on a regular basis.
There are many examples, where people have used passwords which relate
to something personal, such as a partner’s first name, the dog’s or cat’s
name, etc. For a determined, serious computer hacker, these are easy to
guess. If you have a system, where lots of different passwords are required to
access the system, then security often breaks down and computer users will
sometimes keep a list of these passwords in their disk. This defeats the whole
object. If you forget your network access password, the network administrator
should be able to assign you with a new one.
If you work within a larger company, you should have a company IT support
group which will come and rid your computer of viruses. Be sure that you are
familiar with your company’s policy regarding viruses.
Anti-virus Precautions
You should have an anti-virus program installed on your computer. This
should be updated on a regular basis, so that the anti-virus program is aware
of new viruses which are in circulation. Even the best anti-virus program will
only offer protection against known viruses or viruses which work in a
particular way. New types of viruses are constantly being developed which
may attack your computer in new and novel ways. Your anti-virus program
may not be able to defend you against every possibility. Be warned, if you are
connected to a Local Area Network (LAN), or to the Internet you are
vulnerable.
Make sure that your virus checker is configured so that as well as scanning
your computer for viruses when you first switch on your PC, it remains active
in the computer’s background memory, constantly looking for signs of virus
attack. This is very important when connecting to the Internet.
1.8.1 Copyright
1.8.1.1 Understand the concept of copyright when applied to software,
and also to files such as: graphics, text, audio, video. Understand
copyright issues involved in downloading information from the Internet.
Most text which you will find on the Internet is copyrighted. Never copy text
without authority to do so and always quote your sources.
There are many sites offering free graphics and clipart. Some are genuine
and have the authority to offer you a free download of images. Many sites
however may not have this authority. Popular examples are pictures, sound
clips, or movie clips from Star Trek. If you visit the official Star Trek site
(www.startrek.com) you will see that use of images, and even the name 'Star
Trek' is protected and may not be used on 'fan sites'. Even downloading
sound clips to replace the bleeps which Microsoft Windows makes is often
illegal. Some sites even allow the 'free' download for complete films or music
tracks. If you can download a film for free before it is even officially available
on video/DVD, it is a pretty good bet that the site is unauthorized. Cover
yourself. Get written permission to used downloaded materials and 'if in doubt
- don't' is the safe rule. Because CD-ROM writers have become so widely
available, it has become possible to copy entire CDROMs which can contain
software, games or data. Do not do this. Always be careful of software which
you may find advertised at very cheap prices, it may be illegally copied.
Copyright Issues
Transferring files across a LAN:
You need to be careful that you do not accidentally make copies of software
via your Local Area Network (unless of course you are authorized to make
such copies).
Freeware:
This is software which can be copied or downloaded for free. It is often fully
functional. Examples may include software developed by organizations such
as Universities, where the aim was not to profit from the software. It is very
important not to confuse freeware and shareware.
Shareware:
This is where you can use software for a free trial period. Sometimes the
shareware versions may be fully functional, but after a time period will either
start to display an annoying message, asking you to register (i.e. pay for) your
software, or in some cases it may stop working altogether after the trial
period. This 'try before you buy' method of getting software is becoming
increasing popular with the major software suppliers.
User Licenses:
If you have more than one PC, then you can either purchase a separate copy
of the software you require for each PC, or better: you can purchase a user
license. This user license allows you to make copies and install them on each
computer. The more copies you make the more the user license will cost, but
the cheaper the effective cost per PC.
1.8.1.3 Know how to check the Product ID number for a software product.
Understand the terms shareware, freeware, end-user license agreement.
What is freeware?
Some software is made freely available. Demonstration disks often come
under this category. In addition, a lot of software is produced by the
educational community and is made freely available. Always read any
licenses supplied with such software very carefully before use.
What is shareware?
Shareware is software which is freely available and is designed to let you use
the product for free, for a limited period while you decide if you like it or not.
After this period, you must legally either remove it, or pay an amount to the
producers of the product.
http://www.hmso.gov.uk/acts/acts1984/1984035.htm#aofs
http://www.pro.gov.uk/recordsmanagement/dp/default.htm
Personal data shall be held only for one or more specified and lawful
purposes.
Personal data held for any purpose or purposes shall not be used or
disclosed in any manner incompatible with that purpose or those purposes.
Personal data held for any purpose or purposes shall be adequate, relevant
and not excessive in relation to that purpose or those purposes.
Personal data held for any purpose or purposes shall not be kept for longer
than is necessary for that purpose or those purposes.
Personal data held by data users or in respect of which services are provided by
persons carrying on computer bureau. Appropriate security measures shall be taken
against unauthorized access to, or alteration, disclosure or destruction of, personal
data and against accidental loss or destruction of personal data.
Abbreviations & Terminology
Item Meaning
ADSL Asymmetric Digital Subscriber Line
Bit 1 or 0 level of storage is called a bit
BPS Bits Per Second
Byte A measurement of storage capacity
CBT Computer Based Training
CD Compact Disk
CD-R Compact Disk - Recordable
CD-ROM Compact Disk - Read Only Memory
CPU Central Processing Unit
DAT Digital Audio Tape
DOS Disk Operating System
DSL Digital Subscriber Lines
DVD Digital Versatile Disk
FTP File Transfer Protocol
GByte Gigabyte. A gigabyte consists of 1024 MBytes
GHz Measurement of computer speed. Gigahertz
GUI Graphical User Interface
Hz Hertz ( this is a measurement of frequency (i.e. speed).
IS Information Systems
ISDN Integrated Services Digital Network
IT Information Technology
KByte Kilobyte. A kilobyte (KB) consists of 1024 bytes.
LAN Local Area Network
MByte Megabyte. A megabyte (MB) is one million bytes
MHz Million Hertz
PC Personal Computer
PSTN Public Switched Telephone Network
RAM Random Access Memory
ROM Read Only Memory
ROM- BIOS Read Only Memory - Basic Input Output System
RSI Repetitive Strain Injury
TByte Terabyte. A terabyte (TB) is one million MBytes
UPS Uninterruptible Power Supply
USB Universal Serial Bus
VDU Visual Display Unit
WAN Wide Area Network
WWW World Wide Web