WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT.

Slides:



Advertisements
Similar presentations
Data Storage A Module of the CYC Course – Computer Basics
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Shutdown the Computer Note : Dont Use Ctrl + Alt + Del.
Storing Data Chapter 4.
An Overview of the Computer System
MODULE TWO MANAGING, FINDING AND SELECTING INFORMATION Functional ICT.
Backing up Your Computer Jamie Leben IT-Works Computer Services Copyright 2010.
5-1note. 2 BUSINESS TECHNOLOGY TODAY Chapter Five Killer Applications— Using Your Operating System and Word Processor.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
ICAICT101A Operate a Personal Computer. A computer is an electronic device that allows you to process and store data (information)… 2.
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
Unit C-Hardware & Software1 Hardware & Software GNVQ Foundation Unit C.
FIRST COURSE Windows XP Managing Your Files. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 Objectives Develop file management strategies.
Functional ICT Lesson Four Finding and Selecting information.
Chapter 7 Working with Files.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter 2: Finding and Organizing Information © 2010, 2006 South-Western, Cengage Learning.
Tutorial 11 Installing, Updating, and Configuring Software
Computer Lab Teachers are welcome to change or add slides within this presentation to suit the needs of their students or better accommodate the structure.
Practical PC, 7th Edition Chapter 5: Organizing Files and Folders
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Organising Files and Folders Module 1. Task 1 – Folder Structure Organising folders to store your work is a key factor to success. Organising folders.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Operating Systems Foundation Computing Half the people you know are below average.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Windows and File Management
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Managing Data & Information Procedures & Techniques.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Unit 4 – Technology literacy
Nat 4/5 Computing Science Software
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Year 8 ICT Internet Security
Unit 4 IT Security.
Year 8 ICT Internet Security
Microsoft Windows 7 - Illustrated
Understanding File Management
Understanding File Management
Backup your Data © EIT, Author Gay Robertson, 2017.
Things To Avoid: 1-Never your password to anyone.
Chapter 8 Managing Files.
Windows exam.
Part 3.
INTRODUCTION TO BASIC DETAILS
Lesson 3 Data Storage.
Operating Systems Tasks 17/02/2019.
Unit 4 IT Security Kerris Davies.
Paths and Trees and Folders
Presentation transcript:

WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT

Recap – Module One and Two What are interface features?  Windows, Icons, Drop down menus, pointers What can you do in the control panel ? What two parts make up a filename ? The name and the extension i.e. - tableReports.xls How do you know what software has created a file?  The extension will indicate i.e..doc = word When creating file and folders – what should you do?  Make files and folders clear as to what they contain.  Set the permissions to limit what others can do i.e. read, write, edit What should you use when creating passwords?  A mix of letters, numbers, symbols and cases

Managing, Finding and Selecting information Lesson Aims and Objectives  File compression  manage storage areas  work safely and securely You will learn how to:  Compress files into a folder  Check for free storage  Take action against loss of information

File Compression Task : Discuss with person next to you what you found out about file compression. Demonstration of file compression Task – compress several documents and note its size before zipping and after. How much did it reduce in size? 10 mins Extension task : Extract compressed file.

Files and folders storage What can be used to store files and folders?  Memory sticks/drives  Hard drives  Cd’s  Dvd’s  SD cards  Cloud storage Task : Using the internet – find out how much the following can store:  Cd  Dvd  Largest hard drive 10 mins Extension task : Find two providers of cloud storage

Files and folders storage Monitoring storage  kilo = 2 10 = = 1024 bytes,  mega = 2 20 = = 1,048,576 bytes,  giga = 2 30 = = 1,073,741,824 bytes,  tera = 2 40 = = 1,099,511,627,776, Typical file sizes:  A song: between 4,000- 6,000 kb  A movie: around 2-3 gb  Word document 20 pages long with charts : 300kb How to check what size/storage Right click, properties will show file size or available space

Recap - File sizes and storage File sizes are important when ing a document Storage is measure in kb, mb, gb and tb. Compression can be used to decrease file sizes All digital devices have some form of storage in them

Viruses and back up

How to prevent viruses Task – Discuss with a partner what you think computer viruses are and how they can be avoided. One member to feedback to the class Task – Using the internet find three different companies that provide virus protection. What do they offer ? 10 mins

Skill builder 1. Write a set of guidelines for minimising the risk of viruses. 2. Find out what anti-virus software is on your computer and how up to-date it is. 10 mins Extension task : What is a trojan?

Back ups Backing up your data is crucial – why ? How often should you back up ?

Recap- Viruses and backups Viruses can be spread by , internet, networks and memory sticks. Ensure you have adequate protection, which is updated regularly. Whenever you start a new document, save it immediately in the correct location. Give your files and folders meaningful names so that you can identify them easily. Save your work regularly and use version numbers. Compress your files. Carry out housekeeping regularly and delete files no longer needed. Make back-ups and keep them in a different location. Never overwrite your only backup with the next version. If the system fails in the middle of the backup procedure, you will lose everything!

Skill Check - Module Two Managing Information create folders and subfolders move around a folder structure save a file in a folder select an appropriate file type copy, move and delete a file or folder change a file or folder name use passwords to protect files create a strong password make a file ‘read-only’ ‘zip’ and ‘un-zip’ files make backups what a virus is and how to protect a computer against virus attacks why it is important to keep anti-virus software up-to-date

Homework 1. time yourself how long it takes to write brief statements about:  two features of strong passwords  reasons to make a file read-only  the need to have back-ups. Share with me !