ICDL Computer & Online Essentials 1.0 - Neuronet Advanced Training Institute
ICDL Computer & Online Essentials 1.0 - Neuronet Advanced Training Institute
ICDL Computer & Online Essentials 1.0 - Neuronet Advanced Training Institute
This courseware may be used to assist candidates to prepare for the ICDL Foundation Certification Programme as titled on the
courseware. ICDL Foundation does not warrant that the use of this courseware publication will ensure passing of the tests for that ICDL
Foundation Certification Programme.
The material contained in this courseware does not guarantee that candidates will pass the test for the ICDL Foundation Certification
Programme. Any and all assessment items and / or performance-based exercises contained in this courseware relate solely to this
publication and do not constitute or imply certification by ICDL Foundation in respect of the ICDL Foundation Certification Programme or
any other ICDL Foundation test. This material does not constitute certification and does not lead to certification through any other process
than official ICDL Foundation certification testing.
Candidates using this courseware must be registered with the National Operator before undertaking a test for an ICDL Foundation
Certification Programme. Without a valid registration, the test(s) cannot be undertaken and no certificate, nor any other form of
recognition, can be given to a candidate. Registration should be undertaken at an Approved Test Centre.
The ICDL Computer & Online Essentials module introduces you to the world of computers,
ICT, software and online tools, helping you use computers and digital devices effectively for
work. Almost every industry in the world utilises computers and digital devices in some way,
so having the core skills to complete common technology tasks is essential for workers.
And with a growing reliance on the Internet for work and communication, having the ability
to use online tools effectively is another crucial component of digital literacy. ICDL
Computer & Online Essentials will guide you through the key skills you need in a work
environment to effectively use computers and devices and engage securely in online
activities.
On completion of this module, you will be able to:
• Understand key concepts and carry out key activities relating to hardware and
software.
• Manage files and folders, store data, and manage applications.
• Understand network concepts and connect to a network.
• Find and manage online information effectively and manage browser settings.
• Understand considerations relating to the effective use of common communication
tools.
• Send, receive, and manage emails, and use calendars.
• Understand potential threats and ways to protect computers, devices, and data.
• Recognise considerations relating to safety, well-being, accessibility, and the
environment.
It will give you the stepping stone to kick start your computer experience and provide a
base to build on in the future. Once you have developed the skills and knowledge set out in
this book, you will be in a position to become certified in an international standard in this
area - ICDL Computer & Online Essentials.
For details of the specific areas of the ICDL Computer & Online Essentials syllabus covered
in each section of this book, refer to the ICDL Computer & Online Essentials syllabus map
at the end of the book.
Hardware
Two popular types of personal computing devices are desktop computers and
laptop computers. Smaller, cheaper versions of laptops known as netbooks are
also quite common, but these simply allow users to connect to the Internet and
may suffer from poor performance.
Also popular are devices such as tablets, which are smaller again and usually
feature a touch screen. Of course, some of the most popular devices in the world
today are mobile phones and smartphones. Smartphones integrate computing
functionality with mobile phone technology.
Desktops
Desktop
Laptops
Laptop computers, as the name implies, are small portable computers that can
run on a battery as well as mains power. They are usually designed for mobile,
flexible use. They use special screens, rather than the traditional VDUs (Visual
Display Units), which allows for longer battery life as well as portability.
While they tend to be more expensive than an equivalent desktop computer, they
can match the power of a desktop computer.
Laptop
Tablets
A tablet, or tablet PC, is a hand-held mobile device that combines computing and
Internet access. Tablets use a touch screen as the primary input device. Most
tablets are smaller and weigh less than the average laptop.
Early tablet touch screens were designed to work with light pens, but most
modern tablets support human touch input. Many tablets now support multi-touch
input, which allows you to perform gestures using more than one finger, such as
pinching an image to zoom in or spreading your fingers apart to zoom out. Tablets
allow you to enter text using a pop-up keyboard that appears on the touch screen.
Tablet
Smartphones
Other features can include a built-in camera and the ability to play music, display
photos and video clips. Of course, you can also make a phone call using a
smartphone.
Smartphone
There are many types of hardware, sometimes called equipment, used with
computers. Some equipment can be installed in a computer. This is often referred
to as built-in or integrated. And some equipment can be connected to the outside
of a computer. This is often referred to as external. Many tablets, laptops, and
netbooks have integrated equipment.
Screens
A screen is a device used to visually display output such as text and graphics.
There are several different types and they can be external or integrated into
computing devices.
Keyboards
Keyboard
Mouse
When using an operating system such as Microsoft Windows, you use the mouse
to control a pointer on the screen. The pointer can be used to select items, issue
commands, click and drag and drop items from one place to another.
Mouse
Trackpad
Trackpad
Cameras
Cameras are used to capture digital images or videos. They can be integrated into
the computer or device or connected externally. Most modern computer screens,
laptops, tablets and smartphones come with an integrated camera. The image or
video captured can be saved, viewed and transmitted in real time to other
computers and devices using the Internet. Sometimes these types of cameras are
called web cameras (web cams).
Webcam
© 2019 ET000005 Page 7
Lesson 1 – Computers and Devices ICDL Computer & Online Essentials
A digital camera may also take the form of a traditional camera but instead of
storing images on rolls of film which require developing, images or video are
stored digitally in memory housed within the camera, or on memory cards. These
pictures or video can easily be transferred to your computer and then manipulated
using a graphics or video editing programs, which you may have on your
computer.
Speakers
Speakers are used to produce sound waves audible to the human ear. Most
modern computers come with built-in speakers or you can connect external
speakers.
Speaker
Microphone
Microphones are used to digitally capture sound. Most modern computers come
with a built-in microphone or you can connect an external microphone.
Microphone
Docking Station
Docking Stations are external devices used to connect laptops to other devices
such as keyboards, monitors, speakers or printers. They expand the number of
devices that can be connected at one time.
Docking station
Page 8 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 1 – Computers and Devices
Headset
Headset
Storage
A computer storage device is a type of hardware that stores digital data. Storage
devices can be internal or external.
One common type of storage device is a hard drive, which nearly all computers
have. The computer's main hard drive stores the operating system, applications,
and files and folders associated with users of the computer.
Several other types of storage device are common as well. Flash memory
devices, such as USB drives, are popular ways to store data in a small, mobile
format.
USB Drive
Other types of memory, such as memory cards, are frequently used to store
images taken by digital cameras.
Memory cards
External hard drives that connect via cable are also common. These types of
drives are frequently used for backing up internal hard drives, for storing videos
and photographs, or for simply adding extra storage.
Online/Cloud file storage is a type of file storage service available over the
Internet.
Printers
The laser printer is mostly used in offices where large volumes of printing is
necessary. It is more economical and uses the same technology as a photocopier;
these are more common in black and white, but colour laser printers are also
available.
Laser printer
The inkjet printer is the most commonly used printer in the home. It prints by
spraying ink on the page using cartridges filled with ink. While inkjet printers are
commonly cheaper to buy than laser printers, they can be more expensive to run.
Inkjet printer
Scanners
A scanner is an external device, used to scan printed material and convert it into a
digital format. Pictures can be scanned and then edited using a graphics
application. Printed text can be scanned and converted to a picture of the text or
actual text, which can be edited using a word processing application.
Scanner
The best-known input/output (I/O) port is the Universal Serial Bus (USB). USB
ports are standard cable connection interfaces used by personal computers and
other devices.
USB symbol
You will see one or more USB ports on your computer system unit or laptop,
allowing you to plug in devices designed for the USB. USB ports are typically
used to physically connect storage devices. They are also used to connect other
devices including printers, scanners, digital cameras, and mobile phones.
USB port
HDMI
Video Graphics Array (VGA)
VGA
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
a. HDMI
b. VGA
c. USB
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
5. Name the type of printer, which uses the same technology as photocopiers and is
typically found in an office environment.
___________________________________________________________
6. You need to connect your laptop to several devices at the same time. What device
will help you to do this?
___________________________________________________________
The programs used to operate computers and related devices and to carry out
tasks are known generally as software.
• Operating Systems: These systems, and their related utilities, enable the
computer to function. The operating system controls the computer,
schedules tasks, manages storage, and handles communication with other
devices.
The diagram below shows how the operating system software and application
software are layered on a typical desktop computer. The arrows indicate
information flow.
Software is usually held on your computer’s hard disk and is loaded from the disk
into the computer’s RAM when it is needed. Random Access Memory (RAM) is
the place where the computer keeps software and information that it is currently
using or working on. RAM is a temporary storage location – when the computer is
switched off the data here is lost.
Operating systems are designed to control the computer, schedule tasks, manage
storage, and handle communication with other devices. The computer’s operating
system manages its memory, processes, and all its software and hardware. For
example, there are usually many different programs running at the same time on a
computer, and they all need access to the computer’s central processing unit
(CPU), memory, and storage. The operating system ensures each program gets
what it needs by coordinating activities.
Modern operating systems use a graphical user interface (GUI), which lets you
interact with the computer, for example to click on icons, buttons, and menus.
How you control the interaction depends on the type of computer you are using,
for example with desktop computers you typically use a mouse and keyboard,
whereas with tablets and smartphones you typically use touch to interact with a
touchscreen.
Operating systems typically come preloaded with the computer, but it is possible
to upgrade or even change operating systems.
Mobile devices such as smartphones or tablets usually run operating systems that
are designed specifically for mobile devices. Some common operating systems for
mobile are:
1. Apple iOS
2. Android OS
3. Microsoft Windows
In general, operating systems for mobile devices are not as fully featured as those
made for desktop and laptop computers, and they are not able to run all the same
software.
2.3 APPLICATIONS
Concepts
An application is a type of software that allows you to perform specific tasks such
as creating documents, sending messages or searching online. Numerous
applications exist, and they fall into many different categories.
Office Productivity
Among other things, the following examples of office productivity suites include
word processing, presentation and spreadsheet applications:
Web Browser
Web browsers are used for accessing information available on the World Wide
Web, such as web pages and search engines. Examples include:
• Google Chrome
• Mozilla Firefox
• Apple Safari
• Microsoft Edge
Communications
Communications applications are used for communicating over the Internet and
include email, messaging, voice call and video call applications. Skype and Viber
are examples of messaging and video / voice call applications. Microsoft Outlook
and eM Client are examples of email applications.
Social networking
Social networking applications include mobile applications and websites that allow
users to connect and exchange status updates, comments, photographs, videos
and links etc. Examples include:
Internet forums are included in this category. Internet forums are used for
interacting with like-minded people over the Internet based around a topic such as
marketing, architecture or gaming. They are a useful resource for discussing
topics and asking questions. Reddit and Quora are examples of forums.
Design
___________________________________________________________
___________________________________________________________
3. Name three types of software that are typically bundled in an office productivity suite
such as Microsoft Office.
___________________________________________________________
___________________________________________________________
___________________________________________________________
4. Give an example of a task that you could carry out using Google Chrome?
___________________________________________________________
5. Your employer has asked you to set up a video call with an important customer.
Name a software application that you could use for this task.
___________________________________________________________
There are different options for managing access to a computer and these can be
useful when using a computer in the workplace, especially when multiple people
are using a shared computer.
One useful option is logging off the computer, commonly referred to as signing
out. Logging off a system means that the user currently logged in ends their
session but leaves the computer running. This helps to protect the user’s account
from unauthorised access. This is generally done when a system is shared
between multiple users, for example in a school, library or workplace.
Note that the examples in the remainder of this book use the Microsoft Windows
10 operating system.
Steps
2. Click the Profile icon along the left-hand side of the Start menu. Note that
you can customise the Start menu so other folders may display depending on
your set-up.
Steps
5. Select the relevant Profile icon and enter the login information for the
selected account.
Alternative steps:
Page 10 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 3 – User Access Options
4. Select the relevant Profile icon and enter the appropriate login information.
3.3 RESTARTING
Concepts
Restarting (or rebooting) puts the computer through a process that shuts it down
and then starts it back up again. This is frequently required after software
installations or during troubleshooting.
Steps
To restart a computer:
3. Click Restart.
Shutting down (or powering down / powering off) puts the computer through a
process that shuts down the computer completely. It will not come back up again
without someone powering it back on.
Steps
___________________________________________________________
___________________________________________________________
4. You share a desk space and a computer with a work colleague. You have finished
work for the day and your colleague will arrive shortly. What steps should you take
before you leave?
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
• Understand the function of the desktop, the taskbar and the operating
system’s file management application
• Understand how drives, folders and files are organised
• Navigate between drives, folders, sub-folders and files
• Display files and folders in different view modes
• Identify common icons and file types
• Search for files and folders
ICDL Computer & Online Essentials Lesson 4 – File Management
The purpose of the desktop, the taskbar and the operating system's file
management application are to allow you to efficiently manage and access files,
folders, and applications.
The desktop is what you see when your computer has completed the start-up
process and you have logged in. It is a customisable screen which uses icons to
provide quick access to files, folders, applications and the Recycle Bin.
The desktop will look different depending on what type of operating system you
are using, but it generally consists of a bar at the bottom, top, and/or sides of the
screen, with the rest of the screen containing a desktop background or wallpaper.
You can find icons of files, applications, or shortcuts on the desktop background
area. Note that shortcuts are useful for accessing items such as software
programs or files more easily. Using a shortcut on the Desktop avoids having to
search for the file, folder, program or device.
Desktop
Icons
Windows 10
Desktop
Taskbar
Windows 10 Desktop
The taskbar is the long horizontal bar which is usually displayed at the bottom of
your screen. It is a customisable bar – for example, you can add (pin) applications
to the taskbar for easy access. It contains the Start button, which provides quick
access to applications and settings, the search box, pinned and open
applications, and the notification area.
Opens the Shows open programs and files and allows you Shows clock and
Start to quickly switch between them. settings icons.
menu.
You can use the search box beside the Start button to search Windows.
Steps
Data is saved to a computer system as electronic files, files enable you to retrieve
information when required. For example, you may compose and save a
document, such as an Employee Handbook, as a file. Once the document is
saved as a file, it can be retrieved later to be revised or printed off as required. A
file is an item that is used to store information, such as text or images. On your
computer, files are displayed as icons; this makes it easy to recognise the file type
by looking at its icon.
Folders are used to help with the organising of files on a computer. Folders are
placeholders or storage containers used to hold files and other folders known as
sub-folders. Folders keep files organised by grouping them together. Managing
files and their organisation into folders is a fundamental task of computing. It is
vital to use a logical structure for storing files and folders. Folders are used to
organise your files just like a filing cabinet. Grouping files into folders will help you
manage your files in a logical, structured way on the computer.
You can think of the information on your computer as being stored hierarchically.
In other words, your computer has one or more drives which contain folders; these
folders contain files, such as documents or pictures, or other folders.
Windows identifies the different drives on your computer with a series of letters.
For instance, the letter ‘C’ is usually given to the main hard drive on the computer.
Some computers may have two hard disks, one of which will be the C drive and
the other may be the D drive.
USB drives are called Removable Disks and may be assigned different letters,
depending on the number of disks installed on your computer.
You can use these drives to find or save folders and files.
Managing files and folders in Windows 10 is done using File Explorer, the
operating system’s file management application. This is a graphical user interface
used to access and manage the files, folders and drives on the computer.
Tabs
Details pane
One of the activities you can perform in File Explorer is to navigate between your
computer’s drives, folders, sub-folders and files.
Steps
1. Click on the File Explorer app icon on the taskbar. This will launch the
application.
Alternatively:
1. Click the Start button.
To navigate File Explorer to view and open files, folders and drives:
1. If not already open, click the File Explorer icon on the taskbar.
2. In the left-hand pane, click the arrow beside a drive, folder or subfolder to
display its contents in the left-hand pane.
3. In the left-hand pane, click a drive, folder or subfolder to display its contents in
the right-hand pane. For example, choose This PC along the left-hand side of
the File Explorer window. Drives and folders will be displayed in the right-
hand pane.
4. To open a folder in the right-hand pane, double click it or right-click it and click
Open. Its contents display.
5. To open a file in the right-hand pane, double click it or right-click it and click
Open. The file opens.
6. To open a drive in the right-hand pane, double click it or right-click it and click
Open. Its contents display.
7. Click the Back button and the Forward button to navigate through
locations you have already visited.
9. The address bar at the top of the File Explorer window displays your current
location as a series of links separated by arrows. Click one of the links to go to
that location.
Note that a file typically opens in the program used to create or edit it. For
example, a text file will open in your word processing program. Depending on your
set-up, you may be able to change this when opening a file in File Explorer.
Operating systems, such as Windows 10, typically use icons - symbols or images
- to represent files, folders, applications, shortcuts, or devices.
Item Examples
Files
Folders
Applications
Drives
Shortcuts
Printers
File Types
In Windows, each file is represented by a small icon. Windows file names have
two parts: the name and the extension (suffix), separated by a period. The
extension is a three or four letter abbreviation that comes after the period.
Spreadsheet .xlsx
Presentation .pptx
Audio .mp3
Video .avi
Compressed .zip
Executable .exe
When you open a folder or a drive, you can change how the files and folders
appear in the window.
For example, you might prefer to view the contents of a folder as larger (or smaller
or medium) icons, as tiles or as a list. If you want to see different kinds of
information about each file, you should choose the Details view.
To change the appearance of files and folders, you use the View tab and select
from the layout options.
The View tab with Large icons selected in the Layout group
Steps
2. Click the preferred option in the Layout group in the View tab. For example,
click List.
If you have many files and folders, it may be difficult to find the one that you need.
You can use the search box in File Explorer, to help you find a file or folder.
The search function tries to match the text you enter against text in the file name
and contents, as well as in file properties. The search includes all folders and
subfolders in the location where you are searching. The location searched is
determined by what is displayed in the address bar.
You can also use special characters called wild cards in a search. For example,
you can use a question mark (?) instead of a single character and an asterisk (*)
instead of any number of characters.
When you click into the search box you can also select the Search Tools
contextual tab that displays to quickly narrow down a search. This is a very useful
tool for speeding up searches and finding accurate results. You can use it to
search for a file based on one or more if its properties, such as the date the file
was last modified.
For example, if you remember that you created a file last month, but you cannot
remember what you named this file you can search by date modified. Or if you
remember part of the information typed into a document, you can perform a
search by content.
Steps
To search for a file or folder by using the file name or part of the file name.
3. When the file that you want is displayed, stop typing and select the file.
4. Click Close Search in the Search tab to close the search results window and
the Search tab.
2. Type the search word or phrase using wild cards in the search box. For
example:
• To search for all files whose names start with b, type: b*
• To find all files with the extension .txt, type *.txt
• To search for all files whose names start with za and contain 5
characters, type: za???
• To search for all Microsoft Excel files whose names start with za
and contain 5 characters, type: za???.xlsx
3. When the file that you want is displayed, stop typing and select the file.
4. Click Close Search in the Search tab to close the search results window and
the Search tab.
2. Click in the search box and select Advanced Options in the Options group
in the Search tab.
4. In the search box enter the text to search for in the file content. The results will
be displayed.
6. Click Close Search in the Search tab to close the search results window and
the Search tab.
2. Click in the search box, enter the text to search for if appropriate, and select
Date modified in the Refine group in the Search tab.
3. Select a relevant time period from the menu. The results will be displayed.
5. Click Close Search in the Search tab to close the search results window and
the Search tab.
2. Where do you store your files on the computer to keep them organised?
a. Box.
b. Placeholder.
c. Folder.
d. Desk.
• Create folders
• Recognise good practice in naming files and folders
• Rename files and folders
• Select, copy and move files and folders
• Delete and restore files and folders
• Sort files
Lesson 5 – Organising Files and Folders ICDL Computer & Online Essentials
How you organise and name your folders and files will have a big impact on your
ability to find those files later and to understand what they contain. You should be
consistent and descriptive in naming and organising files so that it is obvious
where to find specific data and what the files contain.
Some basic guidelines for structuring folders and naming files are:
• Avoid unnecessary repetition and redundant words in file names and file
paths.
Steps
To create a folder:
2. Right-click a blank area in the window in File Explorer, for example in the
other folder window, or on the Desktop and click New.
3. Select Folder.
2. Click Rename.
Tip: Remember to use meaningful names for folders and files to help with
searching and organisation.
Files and folders that are grouped together are sometimes referred to as
consecutive or adjacent files and folders. Files and folders that are not grouped
together are sometimes referred to as non-consecutive or non-adjacent files and
folders.
Steps
2. To select a consecutive group of files or folders, click the first item, press and
hold down the Shift key, and then click the last item.
3. To select non-consecutive files or folders, press and hold down the Ctrl key,
and then click each item that you want to select.
You can copy or move files and folders by using the copy or cut functions. The
copy function will create a copy of the file or folder and will temporarily store it in
memory, until it is pasted into a new location. The cut function will remove the file
or folder from its current location and temporarily store it in memory, until it is
pasted into a new location.
You can also copy or move files and folders using the drag-and-drop method.
When using the drag-and-drop method across two folders on the same hard disk,
the item is moved; however, if the destination is a different location such as a USB
drive, the item is copied.
Steps
To copy or move files and folders using the copy and cut functions:
2. Click Copy to copy the file or folder, or click Cut to move the file or folder.
3. Click on the new location where you want to copy or move the file or folder to.
To copy or move files and folders using the drag and drop method:
1. Open a File Explorer window and go to the location, for example the folder,
containing the file or folder that you want to move or copy (the source).
2. Open another File Explorer window and go to the location, for example the
folder, where you want to move or copy the file or folder to (the destination).
4. To move a file or folder, drag the file or folder from the first folder (source) to
the second folder (destination).
5. To copy a file or folder, press Ctrl while dragging the file or folder from the first
folder (source) to the second folder (destination).
When you delete a file or folder, it is not deleted right away. Instead, it is stored in
the Recycle Bin until the Recycle Bin is emptied. You can also restore a file or
folder from the Recycle Bin.
Steps
Alternatively, you can also delete a file or folder by dragging it to the Recycle Bin.
Alternative steps:
2. Click Delete in the Organize group in the Home tab to delete the items.
3. Or choose the Delete drop down arrow and select Recycle or Permanently
delete.
1. Open the Recycle Bin by double-clicking the Recycle Bin on the desktop.
3. Click Restore the selected items in the Restore group in the Manage tab. Or
right-click the item and click Restore.
When you are working with files and folders, you may want to sort them in
ascending or descending order by different criteria, such as:
• Name
• Size
• Date modified
• Type
Steps
3. To sort files in ascending order by name, select the Sort By button in the
Current View group. If necessary, select Name and Ascending. The folder
contents will be sorted by name in ascending order. Note that by default,
typically files are listed in ascending order by name.
4. To sort files in descending order by name, select the Sort by button in the
View tab, in the Current View group. If necessary, select Name and click
Descending to sort in descending order. The folder contents will be sorted by
name in descending order. Note that if the files are listed in ascending order by
name, you only need to click Name to sort the files in descending order by
name.
You can sort files by the Date modified or by Type following the same steps as
above.
4. Open the Testing folder and create 3 subfolders with the following names:
a. Reports
b. Photos
c. Emails
5. Set the sort order of the Testing folder in descending order by name.
Network drive
Memory card
Storage capacities and file and folder sizes are measured from lowest to highest
in bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB),
petabytes (PB).
A file’s size is influenced by several factors but ultimately the more information a
file stores, the larger it will be.
If you want to know the size of a file, folder or drive, you can view its properties.
Properties are not part of the actual file content but are pieces of information
about the file. Other properties of a file, folder or drive may include name, date
created, date modified, and location.
For a storage device, such as a local drive or an external USB drive flash drive,
you can view how much space is used on it and how much space it has left by
viewing its properties.
Steps
2. Click Properties.
If you selected a folder, common properties such as name, size and location are
displayed in the Properties dialog box.
If you selected a drive, such as the local drive or a USB flash drive, the properties
including the total size, space used, and available free space are displayed.
1. In File Explorer, click This PC in the left-hand pane. The total size and
available free space on any devices and drives appear below the names in the
right-hand pane.
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
5. Launch File Explorer and go to this PC, how much space is left on your PC?
___________________________________________________________
7. You want to see how much space is left on a USB flash drive. List the steps you
should take to view the properties of the drive?
___________________________________________________________
___________________________________________________________
You can physically connect devices (for example, storage devices, printers,
scanners, digital cameras, and mobile phones) to your computer using a USB
port.
When you connect a device, such as a digital camera, to your computer using a
USB port, a driver – a small programme – may be needed to allow the device to
interact with the computer. Windows usually does this automatically when you
connect a new device.
However, some devices require that you install the drivers manually. In some
cases, the device manufacturer will include a software disc and instructions on
installing the driver before plugging in the device. If the device is not recognised
by Windows and you do not have the driver disc, you may be able to find the
device driver online. The best place to look is the website of the manufacturer of
the device.
Before unplugging storage devices, such as USB flash drives, you need to ensure
that the computer has finished saving any information to the device.
Steps
Note that when you are connecting a device through a USB port, you may receive
a prompt asking for permission to allow the device to connect to the computer.
1. Click the Safely Remove Hardware and Eject Media icon in the notification
area on the right side of the taskbar.
2. In the list of devices that appears, click the device that you want to remove.
3. Remove the device when the Safe to Remove Hardware message appears.
Note that you should only remove the device if a notification appears telling you
that it is safe to do so.
1. Attach the appropriate end of cable to the camera (or video camera as in the
image below) and the other end to the USB port.
Note that most cameras, once plugged in, will automatically be recognised by your
computer. If this does not occur, you will need to install the software included with
the camera.
1. Attach the appropriate end of cable to the media player and the other end to
the USB port.
Bluetooth symbol
Ensure that the device that you are trying to connect to has Bluetooth enabled
before you try to connect/pair it to your Windows 10 computer. You may also need
to check that your computer supports Bluetooth.
Steps
To connect a device using Bluetooth:
3. Click Devices.
6. Click Bluetooth.
7. Select the relevant device. The connecting process will begin, and a Pin
number will display.
3. Click Devices.
6. Click Yes.
a. Ease of access
b. System
c. Network and Internet
d. Devices
2. You are having difficulty connecting a new USB device to your computer. Windows
10 is not recognising the device. What might you do next?
___________________________________________________________
3. You want to disconnect an external hard drive from your computer. The device is
connected via a USB port. What steps should you take before you physically
disconnect the hard drive?
___________________________________________________________
4. You are having difficulty connecting your mobile phone wirelessly to your laptop.
What setting should you check on your mobile phone?
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
6. Which one of the following terms can be used to describe the process of connecting
two devices using Bluetooth?
a. Combining
b. Pairing
c. Coupling
d. Bluetoothing
A. _________________
B. _________________
C. _________________
D. _________________
E. _________________
• Install an application
• Uninstall an application
• Shut down a non-responding application
• Take a screen capture
Lesson 8 – Managing Applications ICDL Computer & Online Essentials
• A CD or DVD
• The Internet
• An online application store
The installation method varies depending on where the application is installed
from.
You may want to install a free application, or you may need to purchase the
application. When installing from the Internet, you may need to purchase the
software using a secure payment method before you can install the application
using a link on the web page. When installing from an online store, such as the
Microsoft store, you will need to create an account and sign in before you can
purchase items.
Microsoft Store
It is important that you trust the application publisher and the website when
downloading and installing programs from the Internet.
Steps
1. Click the appropriate link on the web page to install or download the
application.
You can install the application directly from the website or you can download
and install it later:
Note that installing the software later is safer because you can scan the
installation file for viruses before installing. When downloading and installing
programs from the Internet you should trust the application publisher and the
website.
2. If necessary, scroll to the Microsoft Store tile and click the Microsoft Store
tile.
4. Or if the app is not free, click Buy and enter payment details as required. To
purchase items from the Microsoft Store, you will need to have a Microsoft
account and sign in to your account.
You may want to remove an application from your computer if, for example, you
do not use it anymore, you need to clear up storage space or you experience
problems when it runs.
Steps
To uninstall an application:
3. Select Apps.
4. Select the application that you want to uninstall from the list of applications and
click the Uninstall button.
Steps
1. Press Ctrl, Alt and Delete at the same time on your keyboard.
3. In the Task Manager dialog box in the Processes tab, select the program that
is not responding from the list of programs in the Apps list.
If you need to take a picture of what is shown on your computer screen, you can
use the print screen key (often designated PrtScrn, PrtScn or PrtScr). Pressing
this key will copy an image of your screen to the Clipboard. This is called a screen
capture, or screenshot. You can capture the entire screen, or you can capture an
individual (active) window.
Taking a screen capture allows you to, for example, print out the screen capture
or include it in an email or document. First, you must save the screen capture by
pasting it into an application such as Microsoft Word or Paint. Or you can paste it
directly into an email message.
Steps
2. Open or switch to the application where you wish to paste the print screen,
such as, Microsoft Word or Paint, or open a new email.
1. Click the window that you wish to capture to ensure that it is the active window.
2. Press both the Alt and the Print Screen (PrtScn) keys on the keyboard.
3. Open or switch to the application where you wish to paste the print screen,
such as, Microsoft Word or Paint, or open a new email.
Note that if you are using a laptop, you may need to press another key such as
the FN key in combination with the print screen key. Refer to the manufacturer for
guidelines.
___________________________________________________________
___________________________________________________________
3. Launch the Task Manager to view applications that are currently running.
4. Follow the steps below to take a screenshot of the properties of your C: drive:
9.1 NETWORKS
Concepts
More than one computer or device connected together for the purpose of sharing
information, applications and devices securely is known as a computer network.
Computer networks can range from small local networks with as little as two
connected computers and devices to large networks with thousands of connected
computers and devices around the world.
A small local network can be referred to as a Local Area Network (LAN). This is a
network made up of more than one computer and hardware devices connected
together. This type of network is usually in a relatively small geographic area such
as an office block or school.
All modern computers and laptops, as well as many other devices, such as tablets
and smart phones, are capable of connecting to the Internet.
A connection with the Internet is typically made using an Internet Service Provider
(ISP). Comparison sites are a good starting point to quickly identify which ISPs
have the best combination of speeds and price. You'll also need to visit the
individual ISPs' websites to get the fine details on their packages, so you can
make a thorough comparison for yourself, based on your needs.
There are a range of different ways to connect to the Internet. A common way of
connecting to the Internet is through a telephone line, which can carry normal
phone calls and Internet data at the same time. Alternatively, you can connect to
the Internet by using a service from a mobile network providers. This can be used
anywhere there is a mobile signal but can be slower and more expensive than
connecting through a landline. Or you can connect to the Internet using a wireless
connection.
1. Wired Network
Wired networks connect computers to the Internet using fixed cables, such as
fibre optic, DSL, or cable television lines.
Fibre optic connections are considered among the fastest and most reliable
type of wired Internet connection and are often favoured by businesses. DSL
uses existing phone lines to provide Internet access. And if offered by the
provider, the same cable that supplies TV channels can also supply an
Internet connection. This type of connection can often provide high-speed
Internet access.
Internet compatible mobile devices, such as smart phones and tablets, can
establish an Internet connection through the mobile phone network. This is
generally used when a Wi-Fi connection is not available. This method of
connection may be relatively expensive.
3. Wireless Network
In very remote areas, the only way to connect to the Internet may be via a link
using satellites orbiting the Earth. This may require large satellite dishes and
expensive specialised equipment. The cost of the Internet connection may
also be high.
Particularly if you use mobile devices such as tablets, laptops and smart phones,
your network connections are wireless.
Wireless networks are either secured / protected or unsecured / open. When you
join a secured / protected network you are asked to enter a password – if you do
not have this, you will not be able to join. Open wireless networks, also known as
public, allow anyone to join.
You can review the network status of available networks before joining:
1. Click the network icon in the notification area of the task bar.
Available wireless networks are displayed.
Steps
1. Click the network icon in the notification area of the task bar. Available
wireless networks are displayed.
5. If the network is a secure network, enter the network security key (password),
which can be obtained from a network administrator or ISP.
6. Click Next. You will be connected to the network using a wireless connection.
1. Click the network icon in the notification area of the task bar. The
network that you are connecting to will appear highlighted in blue.
__________________________________________________________
2. What is the name given to copying files from a website on the Internet?
a. Making an attachment.
b. Downloading.
c. Browsing.
d. Uploading.
___________________________________________________________
___________________________________________________________
5. You have travelled to a convention away from the office. You need to connect your
laptop to the internet. What steps do you need to follow, to connect to a secured
wireless network?
___________________________________________________________
___________________________________________________________
The terms the Internet and World Wide Web (or just Web) are often used
interchangeably. However, the World Wide Web (WWW) is a collection of linked
documents (web pages) and other resources, which are stored on Internet servers
around the world and accessed using the Internet.
The URL consists of the name of the protocol (usually HTTP) and is usually
followed by www and the name of the website that you want to connect to - for
example, http://www.icdl.com.
Hyperlinks
The Web uses hypertext, a method of instant cross-referencing, to link documents
and resources. On most websites, certain words or phrases appear in text of a
different colour than the rest; often this text is also underlined. When you select
one of these words or phrases, you will be transferred to the site or page that is
relevant to this word or phrase. These links are known as hyperlinks.
If you move the mouse pointer over a spot on a website and the pointer changes
into the shape of a hand, this indicates that it is a hyperlink and you can click it.
Sometimes buttons, images, or portions of images are "clickable" hyperlinks.
There are a huge range of online activities enabled by the Internet and related
technologies such as the Web. These include:
Information Searching – People browse the Web for information, often using
search engines to identify specific topics that are of interest to them.
Selling – Online sales are becoming an increasingly vital part of conducting day-
to-day business in the global economy. Both consumers and businesses are
increasingly looking online to purchase goods and services. Selling online has
many advantages, your business can sell 24 hours a day, reach more customers
and decrease overheads. E-commerce is a term commonly used to describe the
business of purchasing and selling online.
Banking – More and more financial institutions give their personal and business
customers access to a range of services online, such as paying a bill or
transferring funds between accounts. This gives much more flexibility because
customers are not restricted by the opening hours of a bank branch.
File Storage – Online file storage is also known as cloud storage; this hosts user
files on the Internet. Users can upload files and can then access them over the
Internet from a different computer, tablet, smart phone or other Internet-connected
device. Examples of cloud-based file storage services for business users include
Apple iCloud, Microsoft OneDrive for Business, Dropbox Business, Google Drive
Enterprise.
Address bar
Search box
Note that we will use the Google Chrome web browser in this lesson. If you need
to install the Google Chrome app refer to the lesson Installing an Application for
instructions. For ease of access we will open Google Chrome from the taskbar. If
you need to add (pin) the Google Chrome app to the taskbar follow the steps
below.
Steps
To add the Google Chrome app to the taskbar:
3. Click on the Google Chrome app icon. This will launch the web browser.
6. Click the Google Chrome icon on the taskbar to open the web browser.
Some tips to keep in mind when using a search engine to carry out a search
include:
• Use two or more words, or a short phrase when searching for information.
• Try to use unique words that directly relate to what you are searching for.
For instance, if you are searching for information about ICDL training then
search for ICDL training, not just training, which would include all sorts of
training.
• Often, you would be better enclosing your search phrase with quotation
marks (“”). This will then mean that the search engine will look for the
exact phrase that you have entered. If you search for “ICDL training” you
will only get results that use that exact term, and not results containing just
“ICDL” or just “training”.
Steps
To carry out a search using a keyword or phrase:
1. If not already open, click the Google Chrome icon on the taskbar to
open the web browser.
2. Click in the search box in the Google search engine window or in the
Google Chrome address bar.
3. Enter the keyword or phrase and press the Return/Enter key. For example,
type: ICDL Asia and press Enter.
4. To view one of the returned results, mouse over the blue hyperlink of the result
that you wish to view and click when the hand icon appears. The webpage is
displayed.
2. Click in the search box in the Google Search engine window or in the
Google Chrome address field.
3. Enter the exact phrase in quotes and press the Return/Enter key. For
example, type: “ICDL Computer & Online Essentials” and press Enter.
4. To view one of the returned results, mouse over the blue hyperlink of the result
that you wish to view and click when the hand icon appears.
Steps
To carry out a search using an image:
1. If not already open, click the Google Chrome icon on the taskbar, to open the
web browser.
2. To go to the Google Images search engine, click Images in the top right of
the Google Search page in the Google Chrome window.
3. In the search box in the Google Images search engine, select the camera
icon.
4. Enter an image URL in the search field, or drag an image into the search field.
For example type
https://icdl.org/media/banner/for_employers.jpg?v=MTQzMg
Alternatively, click the Upload an image tab, click Choose file and browse to an
image on your computer or device, select the desired file and click Open.
• Date
• Media types
• Language
• Usage rights
These features can help pinpoint a closer match to what you are searching for.
For example, you may only want to find information from the last month, so you
may refine your search by date.
Or you may only want to find videos or images that have a creative commons
licence. In this case you may refine your search by media type and usage rights.
Or you may want to find results only in a specific language. In this case you may
refine your search by language. By default, results are returned in the default
language set for Google Chrome.
There are various ways to access advanced search features in Google Search.
One option is the Advanced Search page where you can specify search terms
and narrow results by a variety of criteria such as language, date, file type (media
type) and usage rights.
Steps
To refine your search results by date:
1. After carrying out an initial search, click the Tools button below the Google
search box field.
2. Click Any time in the search options displayed below the search box.
Page 82 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 10 – Online Activities
3. Select the desired time period or range from the drop-down options.
Your search results will be refined using the time period selected.
1. After carrying out an initial search, click Images or Videos below the search
field.
3. If required, select from the contextual options displayed to refine your search
results further. For example, if you selected Videos, you can select the
duration of the video by selecting Any duration and selecting one of the
options.
1. After carrying out an initial search, click the Settings button below the Google
search box.
3. Click the any language drop down list in the Then narrow your results by
section.
4. Select the desired language from the available options. For example, scroll
down and select Spanish.
Your search results will be refined using the language option selected.
3. Click the usage rights: drop down list in the Then narrow your results by
section.
4. Select the desired option from the list. For example, click free to use or share.
Your google search results will be refined to only include images with the usage
rights selected.
Note that the options that appear in the Advanced Search page will vary
depending on whether you have selected All, Images or Videos before selecting
Settings.
____________________________________________________________
3. What is a hyperlink?
a. A page containing information found on the Web.
b. An application for browsing the Web.
c. An image or text on a web page that connects to another location.
d. An address of a specific location on the Web.
5. You wish to refine your search, to only include results in Arabic. You have clicked on
the Setting option. Which of the following options should you click next?
a. Advanced search.
b. Languages.
c. Search Settings.
d. Search activity.
6. Open Google search and find four other examples of search engines.
___________________________________________________________
___________________________________________________________
7. Name three types of criteria that you can use to refine a Google search.
___________________________________________________________
8. What are the three ways that you can search using an image?
___________________________________________________________
9. Search Google Images for an image of a desktop scanner. Refine your search to
only include the usage rights Labeled for reuse.
You can use folders so that you can group related bookmarks, or bookmarks with
a common theme. Organising bookmarks will make it easier for you to quickly find
a webpage you want to revisit.
Note that in some web browsers, such as Microsoft Edge bookmarks are referred
to as Favourites.
Steps
To add a new bookmark to a Bookmarks folder:
1. Click the Google Chrome icon on the taskbar to open the web
browser.
6. Click Done.
Note that if you have the Bookmarks bar displayed in your browser, you can add
the current webpage to the Bookmarks bar by right clicking the Bookmarks bar,
selecting Add page and selecting Save.
1. If not already open, click the Google Chrome icon on the taskbar to
open the web browser.
3. Select Bookmarks.
7. Enter the folder name into the Name box. For example, add Computer &
Online Essentials.
2. Select Bookmarks.
4. Right click the folder that you want to delete and select Delete.
Steps
To download files to a location directly from a hyperlink to the file:
1. Right click on the hyperlink to the file in the browser window.
3. In the Save As dialog box, select a location and if desired, enter a filename.
4. Click Save.
3. In the Save As dialog box, select a location and if desired, enter a filename.
4. Click Save.
Steps
To preview and print a webpage using available printing options:
2. Choose Print.
3. In the print preview window, select the desired printer and settings and click
Print.
To preview and print a selection from a web page using available printing
options:
2. Select Print.
3. Select the desired printer and settings and click Print. Only the selected items
will print.
Copyright and intellectual property does not just apply to software. You should
assume that copyright applies to all information that you find on the Web. For
example, if you are researching a topic for a study paper or a blog and you find
some interesting material online, you cannot just copy this and present it as your
own. You may, however, be able to cite or quote from other sources as long as
you give a reference to that source. In addition, permission should be sought to
quote someone.
Some websites have copyright information in their footers or on the home page.
These may set out the terms under which you can copy information from the
website.
Passing someone else’s work off as your own is known as plagiarism. To avoid
plagiarism any content referenced or quoted should be properly acknowledged. If
you are in any doubt about whether you can reuse specific content, you should
always get the permission of the copyright owner. If you are found guilty of
copyright infringement or plagiarism, you could face legal punishment.
A. ____________________________
B. ____________________________
C. ____________________________
2. You have opened a PDF file in a web browser. You want to download the file to a
location on your computer. What should you do next?
______________________________________
3. You want to print out a specific paragraph of information from a website. Which
printing option will allow you do this?
_______________________________________________________________
5. You have written a report for your employer, much of the content was sourced on the
web. What should you do to avoid plagiarism?
a. Check each website for copyright information.
b. Ask permission to use the content.
c. Reference websites used.
d. All of the above.
© 2019 ET000005 Page 97
LESSON 12 -
WEB BROWSER SETTINGS
Steps
To change the home page:
2. Select Settings.
3. Scroll to the On start-up section of the Settings page. If necessary, click the
Open a specific page or set of pages radio button.
4. To change a current home page, click the More button to the right of the page.
5. Click Edit.
6. In the Edit Page dialog box displayed, enter the new URL in the Site URL box.
The next time you open Google Chrome the new home page(s) will display.
Note that in the Settings page under On startup, you can also
• add a new home page to an existing list by clicking Add a new page,
entering the desired URL and clicking Add.
• set the page(s) currently opened in the browser as the home page(s) by
clicking Use current pages.
Pop-up Blocker is a feature that lets you limit or block most pop-ups. Blocking
pop-ups is recommended. In the Google Chrome browser, pop-ups are blocked
by default. You may, however, add and remove specific web pages to a list of
allowed or blocked websites.
Steps
1. If not already open, click the Google Chrome icon on the taskbar to
open the web browser.
3. Select Settings.
7. To block Pop-ups, turn the Blocked slider to Off in the Pop-ups and
redirects options.
Note that allowing sites to save and read cookie data is the recommended setting
in Google Chrome and is the default setting.
Steps
To allow / block cookies:
1. If not already open, click the Google Chrome icon on the taskbar to
open the web browser.
Page 102 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 12 – Web Browser Settings
3. Select Settings.
7. To block Cookies, turn the Allow sites to save and read cookie data
(recommended) slider to Off.
8. To allow cookies, turn the Blocked slider to On. Allow sites to save and read
cookie data (recommended) is displayed.
Steps
To delete your browser history, temporary Internet files, saved form data and
saved passwords:
1. Click the More button.
2. Select Settings.
7. Select the time range from the Time range drop-down list. For example, select
All Time.
8. To delete saved form data and saved passwords, click the Advanced tab,
near the top of the dialog box.
9. To delete saved form data, check the Auto-fill form data checkbox.
10. To delete saved passwords, check the Passwords and other sign in data
checkbox.
11. Select the time range from the Time range drop-down list. For example, select
All Time to fully clear passwords and data.
The browsing history, temporary internet files, all saved passwords and form data
history are cleared for the time range set.
2. Some pop-ups are harmful to your computer while others are not.
a. True
b. False
4. A small piece of data that is sent by a website to your browser when you are
browsing is called a:
a. Cookie
b. Pop-up
c. Web cache
d. Add-on
5. List three items that you can delete from the clear browsing data window:
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
• Understand the function and features of email and identify some common
examples
• Understand the structure of an email address
• Understand the function and features of messaging, audio call and video
call tools and identify some common examples
• Understand the function and features of social networking sites and
identify some common examples
• Understand the function and features of forums and identify some
common examples
• Recognise good practice when using communication tools
ICDL Computer & Online Essentials Lesson 13 – Communicating Online
13.1 EMAIL
Concepts
Electronic mail, generally known as email, is used to send and receive electronic
message and attachments over the Internet. Messages and attached files, can be
exchanged between a sender and one or many recipients. Most email tools also
provide calendar, address book and task management functionality.
Microsoft Outlook, Gmail and Yahoo are commonly used email providers.
An email address contains information about the email account to which email
messages are delivered. For example, an email address such as [email protected] is
comprised of four parts:
And many tools combine messaging, audio call and face-to-face video call
functionality. Many of these tools allow you to communicate with one or more
contacts at the same time.
There are a lot of social networking sites through which virtual communities are
created. Social networking websites offer you the possibility to find old and new
friends, join groups, communicate through posting messages, photos, videos and
links. They also allow you to comment on photos, videos etc. posted by other
platform users.
Internet Forums
An Internet forum is an online discussion site that allows users, typically with
shared interests, to have conversations by posting messages.
Members can post discussions as well as read and respond to posts created by
other forum members. An Internet forum can be focused on a specific subject or
host a range of subsections that can contain hundreds of threads and topics.
An Internet forum is also called a message board, discussion group, bulletin board
or web forum. What makes a forum different to social networking sites is that it is
Page 110 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 13 – Communicating Online
• Use an appropriate communication tool and tone for the audience and
content. For example, in the workplace you may send a formal report to
your management team by email, whereas you may use a messaging or
video call tool to work collaboratively with a colleague to create the report.
• Be accurate, brief, clear. Try not to send messages that are overly long and
complex and choose your words carefully. In emails use clear subject
headings and keep the email short and to the point and when messaging
2. Which of the following does not provide an online audio calling service?
a. Skype.
b. Twitter.
c. Facebook Messenger.
d. WhatsApp.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
4. An online discussion site where members can read, respond to posts written by
other authors, and start their own discussions is called _________.
a. An Internet forum.
b. A web conference.
c. A chat room.
d. A blog.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
Steps
To open Outlook 2016:
Outlook opens.
1. Quick Access Toolbar. The Quick Access Toolbar is in the upper-left corner
of Outlook, containing commonly used commands for Outlook.
2. Ribbon. The Ribbon contains frequently used commands and is organised for
easy access to tabs in Outlook. To hide/minimise the ribbon, click on the
following button. .
3. Folder Pane. The Folder Pane allows easy navigation of Outlook items, and
changes depending on what view you are in. For example, when in your Mail,
you will see a different Folder Pane than when you are in the Calendar view.
The default Mail folders include
• Sent Items – Items/messages that have been sent will be saved in the
Sent Items folder.
• Outbox – Sometimes, your sent mail may move to your Outbox folder but
not move to your Sent Items folder when you are working offline or do not
have a network connection.
• Drafts - If you do not have the time to finish a message, or you need to
add something to a message before sending it, you can save a draft
version of it and send the final version later. When you save a message, it
is automatically saved in the Drafts folder and is not sent.
• Deleted Items - Items that you delete are moved to the Deleted Items
folder but are not permanently deleted until that folder is emptied. These
contents take up part of your mail account storage quota.
4. Message list. The message list lists your email messages depending on
which folder you are looking in, for example the inbox or sent items.
6. Peek. (Navigation bar). Peek allows you to quickly preview the various
Outlook elements by hovering your mouse over each one. You can use the
Navigation bar to switch panes:
The header is organised into fields, for example, From, To, CC, Subject, Date,
and other data about the email.
The body contains the message and sometimes a signature towards the end.
Messages are sent to the addresses you enter in the To, Cc (carbon copy) and
Bcc (blind carbon copy) fields. You can type a recipient’s name or address in
these fields or use the field buttons to access the names and email addresses of
contacts in your Address Book.
• To: Use this field for the main recipients of the email and those who need
to act on the email.
• Cc: Carbon copy. Use this field for optional recipients who are not the
primary intended recipient – for example those who are included for
informational purposes only.
• Bcc: Blind carbon copy. These recipients’ addresses are not visible to the
other recipients, so use this field when you want to keep the recipient
private from the other recipients. Blind carbon copy; addresses are not
recorded in the message information, so that they cannot be read by other
recipients.
• Subject: Enter a brief synopsis of the topic of the message in this field.
Abbreviations are usually utilised as a part of the subject, including "RE:"
for reply and "FW:" for forward.
Steps
To create a new email:
1. In the Mail pane, click New Email in the New group on the Home tab.
2. A new blank email opens in a new window with the insertion point in the To…
box. Type the name of the person, contact group or email address (e.g. a
fellow student). If there is more than one main recipient, separate each entry
with a semi-colon “;”.
3. If required, select the Cc… box. Enter the name of the person, contact group
or email address. If there is more than one cc recipient, separate each entry
with a semi-colon “;”.The name or address of the recipient to whom the carbon
copy will be delivered appears in the Cc box.
4. To use the Bcc field for the first time, you need to enable it. If required, enable
the Bcc (blind carbon copy) field by selecting the Options tab in the new email
window to.
5. Click the Bcc icon in the Show Fields group in the Options tab.
6. Select the Bcc… box. Enter the name of the person, contact group or email
address. If there is more than one Bcc recipient, separate each entry with a
semi-colon “;”.
9. Type the subject of the message. For example, type Communicating through
Outlook
11. Type the body of the message. For example, type Outlook allows you to
send messages and schedule meetings.
12. To copy content such as text from somewhere else into the email select the
content to copy, right-click and select Copy.
13. In the email message click the location where you want to paste the content.
14. On the Message tab, in the Clipboard group, click the Paste button.
It is important to note that different email service providers may have different file
size restrictions. Some Webmail providers will allow you to send a large email
message, but there is no guarantee that the recipient who uses a different email
service provider will receive the email. Because of this the attachment size limit of
the recipient does matter, as your email will be rejected if your file is over the limit.
Do not attach executable files to your email messages, as they might be blocked
by email providers or the antivirus software installed on your recipients’ computer.
For example, Gmail will not allow you to send or receive executable files (for
example, files ending in .exe). In addition, Gmail does not allow these types of
files even if they are sent in a zipped format.
Steps
To attach a file to a new message:
1. Create a new email, add an email recipient, type a subject and if desired, add
a message for your recipient.
2. Select the Attach File button in the Include group on the Message tab.
3. If available, select the desired file from the Recent items list.
4. If the required file is not in the recent items list, select Browse this PC.
5. In the Insert File dialog box, browse to the file location and select the file.
7. The Insert File dialog box closes and an icon representing the file and the file
name appears in the Attached box. Select the Send button.
The message window closes, and the message and the attached file is sent to the
recipient.
Alternatively, click the arrow to the right of the attachment in the Attached file.
Select Remove Attachment from the list.
2. Match the following description to the correct email field: “Addresses added to the list
but not recorded in the message information, so that they cannot be read by other
recipients.”
a. To
b. Cc
c. Bcc
d. Subject
3. Create a new email.
8. Insert an attachment.
Steps
To open and close a message:
1. If necessary, display the Inbox folder and the Reading Pane. Select a
message from the message list.
The message will close, and you return to the main Outlook view.
Steps
To reply to a message:
1. If necessary, display the Inbox folder. Select or open the message to which
you want to reply.
3. The RE: Message window opens with the address and subject boxes
completed and the insertion point in the message box. Type your reply in the
message box.
4. Click Send.
Steps
To forward a message to another recipient.
1. If necessary, open the Inbox. Select or open the message you want to
forward.
3. The FW: Message window opens with the subject completed and the insertion
point in the To box. Enter the email addresses of the desired recipient(s) in the
To… and the Cc… fields as required.
The FW: Message window closes, and the message is forwarded to the recipient.
When you have forwarded an email, the following symbol appears beside the
email in your Inbox.
Steps
To open an attachment:
1. Double click the email with the attachment to open the email.
4. The file will open in a separate window. Click on the X icon to close the open
file.
4. If required, rename the file in the File name box in the Save Attachment
dialog box.
6. Select Save.
The Save Attachment dialog box closes, and the file is saved in the selected
location.
Steps
To change the read status of a message:
1. In the Inbox folder select the message with the read status you want to
change.
2. Click the Unread/Read button in the Tags group on the Home tab.
Unread message
Replied to message
Has Attachment
Flagged by Sender
Flagged message
Follow Up Flags
Steps
To flag a message:
1. In the Mail pane in the Inbox folder select the message.
2. Click the Follow Up button, on the Home tab in the Tags group.
3. Select the desired flag option from the Follow Up dropdown menu. For
example, click Today
4. A flag appears in the message’s Flag Status. To clear or remove a flag, select
Clear Flag.
2. You want to add an attachment to a new email. Which one of the following icons
should you select?
a.
b.
c.
d.
a. -------------------------------
b. -------------------------------
c. -------------------------------
d. -------------------------------
4. What formatting can help you to identify an unread email in your inbox?
a. Italics with blue font colour.
b. Bold with purple font colour.
c. Bold with blue font colour.
d. Underlined and bold with blue font colour.
• Create a contact
• Create a contact group
• Send a message to a contact group
• Update a contact and a contact group
• Delete a contact and a contact group
Lesson 16 – Managing Contacts ICDL Computer & Online Essentials
Steps
To create a contact:
1. Select People from the navigation bar.
2. Select New Contact from the New group on the Home tab.
3. Enter the contact details in the required fields. For example, type
Page 134 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 16 – Managing Contacts
4. .Click the Save & Close button in the Actions group on the Contact tab.
Steps
To update a contact:
1. If necessary, select People from the navigation bar.
2. In the contact list, double-click the contact to be updated. For example, double-
click John Smith
3. Update the fields as required. For example, update the email address to:
[email protected]
Steps
To create a contact group (distribution list / mailing list):
1. Select People from the navigation bar.
2. Select New Contact Group from the New group on the Home tab.
3. Enter the name of the contact group in the Name field. For example, type
Expo team.
4. Select the Add Members button in the Members group on the Contact group
tab.
6. Select the desired contact from the list in the Select Members dialog box.
10. The Select Members dialog box closes, and the names appear in the Contact
Group window. Select the Save & Close button.
The Contact Group window closes, and the new group is saved and appears in
the Contacts folder.
Steps
To send a new message to a contact group:
1. If necessary, create an Expo team contact group with three names from one
of your address books.
3. Create a new message and enter the contact group list name in the desired
recipient field. For example, type Expo team.
5. If required, expand the list, click the plus sign for the distribution list. For
example, click Expo team.
6. An Expand List message box opens warning that once you expand the
names, you will not be able to collapse them. Select the OK button.
7. The Expand List message box closes, and the distribution list expands to
display the email address of each member. Compose the message and click
Send.
2. Double-click the contact group you want to update. For example, double-click
Expo team.
3. Update the contact group details and members as required. For example, add
a new member to the group.
4. Click the Save & Close button in the Actions group on the Contact Group
tab.
The Contact group closes, and any changes made are saved.
1. A contact group is a list of people that you can email in one go without having to add
an address each time you wish to message them:
a. True
b. False
2. You want to create an email list, of your colleagues on the Sales team, so you can
quickly email everyone on the team, without having to add each team member
individually to an email. What term is used to refer to such a list in Microsoft Outlook?
a. Distribution List
b. Contact Group
c. Mailing List
d. Mail Merge Group
3. You want to add two new members to a contact group in Outlook. You will have to
delete the original group and recreate the group in order to achieve this outcome in
Outlook.
a. True
b. False
• Sort messages
• Use search
• Create a new folder
• Move a message to a different folder
• Delete a folder
• Delete a message
• Recover deleted items
• Use the junk email folder
• Use the out of office feature
Lesson 17 - Managing Emails ICDL Computer & Online Essentials
Steps
To sort messages by name (sender), date and size:
1. If necessary, display the Inbox folder with the Reading Pane on the right. You
should have at least two messages that are arranged by Date. If necessary,
click the Reset View button in the Current View group on the View tab. This
button will return the view settings to the default options.
4. Click the Sort button in the Advanced View Settings: Compact dialog box.
Page 142 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 17 - Managing Emails
5. To sort by name (sender), select From in the Sort items by drop down list
box in the Sort dialog box. Select the Ascending or Descending radio button
as required.
6. To sort by date, click Received in the Sort items by drop down list box in the
Sort dialog box. Select the Ascending or Descending radio button as
required.
7. To sort by size, click Size in the Sort items by drop down list box in the Sort
dialog box. Select the Ascending or Descending radio button as required.
8. Click the OK button to close the Sort dialog box. Any changes made to the
sort order settings are saved.
9. Click the OK button to close the Advanced View Settings: Compact dialog
box. The sort order is changed.
Note that the sort order is now changed. If necessary, click the Reset View button
in the Current View group on the View tab to return the view settings to the
default options.
You can search for an email by specifying the sender of the email or the subject
text. You can also search for text that appears in the body of the message.
Use the search tools on the Search tab on the ribbon to help search by a variety
of criteria, for example by sender, subject line, or body.
Steps
To search by content to find emails:
1. If necessary, select the Mail pane and the Inbox.
3. On the Search tab, in the Refine group, click the More button.
4. Select Body.
5. Enter the text that you wish to search by in the Instant Search box. For
example, type: course.
6. Select the required email from the emails highlighted in the search results.
3. On the Search tab, in the Refine group, click the From or Subject button.
4. Enter the search criteria that you wish to search by into the relevant quotation
marks. For example, type: sender’s name or subject text inside the
appropriate quotation marks.
New folders can be created as a folder directly under your personal folder or as a
subfolder under one of the existing folders, such as the Inbox folder.
Steps
To create a new folder:
1. If necessary, select the Mail pane and the Inbox.
2. On the Folder tab, in the New group, click the New Folder icon.
3. In the Create New Folder dialog box, enter a name for the new folder in the
Name: field. For example, type Expo Agenda.
4. Select the folder location in Select where to place the Folder: list. For
example, ensure Inbox is highlighted.
5. Select OK.
The Create New Folder dialog closes and the folder is added to the selected
location.
Steps
To move a message to a different folder:
1. If necessary, open the Inbox folder. The Inbox should contain a subfolder
called Expo Agenda.
4. Select the Move button, from the Move group on the Home tab.
5. Click Other Folder from the drop down list of available folders is displayed.
6. Select the desired folder that you want to move the message to. For example,
click Expo Agenda.
7. Click OK.
The submenu closes, and the message is moved to the selected folder.
Steps
To delete a folder:
1. If necessary, select the Mail pane and the Inbox.
2. Select the folder you want to delete. For example, click Expo Agenda.
3. Select the Delete Folder button, in the Actions group on the Folder tab.
4. A Microsoft Office Outlook warning box opens, prompting you to confirm the
deletion. Select Yes to confirm the deletion.
The Microsoft Office Outlook warning box closes, and the current folder and its
contents are moved to the deleted items folder.
Steps
To delete an email:
1. If necessary, select the Mail pane and the Inbox.
2. Select the message you want to delete. For example, click the first message in
the message list
3. On the Home tab, in the Delete group, click the Delete button.
The email is removed from the folder and moved to the Deleted Items folder.
Steps
To restore a deleted email:
1. If necessary, select two messages from the Inbox folder and delete them.
4. Select the Move button, from the Move group on the Home tab.
5. Click Other Folder from the drop down list of available folders is displayed.
6. In the Move items dialog box, select the destination folder, where you want to
move the message to. For example, click Inbox.
7. Click OK. The submenu closes, and the message is moved to the selected
folder.
Junk Mail
Steps
3. Select the Move button, from the Move group on the Home tab.
4. Click Other Folder from the drop down list of available folders is displayed.
5. In the Move items dialog box select Junk Emails from the list of folders.
6. Click OK.
The submenu closes, and the message is moved to the Junk Emails folder.
6. In the Move items dialog box, select the desired folder that you want to move
the message to. For example, click Inbox.
The submenu closes, and the message is moved to the selected folder.
When you turn on the Automatic Replies feature, Outlook replies automatically to
emails received from other people.
Steps
To turn on Automatic Replies:
1. If necessary, open the Inbox and select the File tab.
3. Select the Send automatic replies radio button in the Automatic Replies
dialog box.
4. Enter the message text for recipients on the Inside My Organization tab. For
example, type I shall be out of the office until next Friday. Please call Jane
Doe for assistance.
5. If required select the Outside My Organization tab and select the Auto-reply
to people outside my organization checkbox and enter the message text for
recipients.
6. If required, enable the Only send during this time range: checkbox and set a
start and end time.
7. Select OK.
The Automatic Replies are turned on and the dialog box closes.
2. On the Info tab click the Turn Off button under Automatic Replies.
2. Emails that end up in the Junk Email folder are always junk / spam:
a. True
b. False
3. Create a new message with the subject called Test and the body of the message
Test.
a. Send the email to yourself.
b. After you receive the email, delete both emails from the Inbox and Sent
folder.
c. Restore the emails from the Deleted Items folder.
4. Move the Test email from your Inbox into the Junk Emails folder.
5. Display the Junk Emails folder and remove the Test email from the Junk Emails
folder and back into the Inbox.
6. Create a new folder with the name called Practice and move the email with the
subject heading Test into the Practice folder.
7. If necessary, display the Inbox folder. Sort the contents of your Inbox by sender
(From) field.
8. Click the Reset View button in the Current View group on the View tab, to restore
your Inbox to the default view settings.
9. An email sent automatically to anyone who emails you while unavailable is called
_______________.
a. A signature
b. An Out of Office reply
c. A Draft
d. An IM
10. You want to create an automatic reply, so colleagues will be notified about who to
contact while you are away. Which one of the following Outlook tabs should you
select?
a. Options
b. File
c. Message
d. Send / Receive
The default calendar view is the Month view. Other view options available from
the buttons in the Arrange group on the Home tab include Day, Work Week,
Week, Month or Schedule View. You can use the Today button in the Go To
group to return to the current date.
Date Navigator
Steps
To open and navigate the Calendar:
1. Click the Calendar button on the Navigation bar to open the Calendar pane.
2. To view the appointments for a specific date, click the date in the Date
Navigator. For example, click tomorrow’s date in the Date Navigator. The
date changes at the top of the scheduling area and the appointments for the
date appear.
3. To view the appointments for a consecutive range of dates, drag the range of
dates in the Date Navigator. For example, drag from Monday to Friday of
this week in the Date Navigator. The appointments for the selected range of
dates appear in the scheduling area.
4. To view the appointments for a non-consecutive range of dates, select the first
date you want to display in the Date Navigator. For example, click the first
Wednesday of the current month. The first date is selected in the Date
Navigator and the appointments for that date appear in the scheduling area.
5. Hold [Ctrl] and click the additional dates you want to display. For example,
hold [Ctrl] and click the second Wednesday of the current month. The
appointments for all the selected dates appear in the scheduling area.
6. To return the display to show only the appointments for one date, click the
desired date in the Date Navigator. For example, click today’s date. The
appointments for the one date appear in the scheduling area.
7. To scroll to another month, click the left or right scroll arrows at the top of the
Date Navigator. For example, click the right scroll arrow next to the month
name in the Date Navigator. The selected month appears in the Date
Navigator.
8. To change the way appointments appear in the scheduling area, select the
Day, Work Week, Week, or Month button on the Standard toolbar. For
example, click Work Week. The appointment display in the scheduling area
changes accordingly.
9. Drag the vertical border between the Folder Pane and the scheduling area
as far to the right as possible to display several columns of months in the Date
Navigator.
10. Return the width of the Folder Pane to display only one column of months in
the Date Navigator.
11. Click the Day button to return the Calendar to the day format.
Steps
To schedule a new meeting:
1. Click the Calendar button in the navigation bar.
2. Click the New Meeting button, in the New group on the Home tab.
3. In the Meeting window, add meeting invitees from your address book /
contacts list, in the To… field. For example, add two names from your address
book.
4. Click the Subject field and enter subject for the Meeting. For example, type
Quarterly Review.
5. Click the Location field and enter a location for the Meeting. For example,
type Conference Room.
6. Enter details in the Start time and the End time fields. For example, select 9
to 10 a.m. this day next week
A meeting invitation is sent to invitees by email and the meeting is added to the
calendar.
Having successfully set up a meeting, you will notice the meeting on your
Calendar when you close the Meeting dialog box.
The same scheduling rules that apply to a person apply to a resource. When
scheduling a meeting, you invite the resource and, if the resource is free, it will
accept the meeting. If the resource is not free, it will automatically reject the
invitation.
Steps
To schedule a resource for a meeting:
1. If necessary, click the Calendar button in the navigation bar to open the
Calendar pane.
2. Click the New Meeting button, in the New group on the Home tab.
3. In the Meeting window, add the meeting resources from your address book /
contacts list, in the To… field. For example, enter Board Room.
4. Continue to add invitees - for example, add two names from your address
book.
A request is sent for the required resource, along with a meeting invitation to the
invitees added to the To.. field.
You can respond to a meeting request from the Reading Pane or the Message
window. When you select the Accept, Tentative, or Decline button, you have
options to edit the response before sending, send the response, or not send the
response at all.
If you accept the meeting, the meeting time changes to busy. If you decline the
meeting, the meeting is removed from your schedule.
Steps
To accept and decline meeting requests:
1. Open the email with the meeting request by double-clicking the meeting
request.
3. Select whether to Edit the Response before sending, Send the Response
Now or Do Not Send a Response. For example, click Edit the Response
before Sending.
4. If required, enter a response to the meeting request. For example, type: Thank
you for the invitation. I will see you there.
The response to the meeting request along with the typed message is sent. The
meeting will no longer be tentative in the calendar after you have accepted it.
Note that if Send the Response Now was selected the response is sent
immediately.
Steps
To update a meeting:
1. If necessary, open the Calendar pane.
4. In the Meeting window, enter the new details as required such as adding more
attendees, changing the location, time etc. For example, delete the location
and type: Meeting Suite 1.
Actions Group
Steps
To cancel a meeting:
3. You can schedule a resource for a meeting just as you would schedule a person.
a. True
b. False
4. List four items you can change when you are updating a meeting:
__________________________________________________
__________________________________________________
__________________________________________________
__________________________________________________
5. You need to cancel a meeting, that you have set up, as it clashes with an important
industry conference. What must you do, if you cancel a meeting in which you have
invited other people to?
_____________________________________________________________
6. You have received a meeting invitation from a colleague. List three options that you
have to respond to a meeting request:
___________________________________________________________________
There are many potential threats to computers, devices and data, including
malware, the risk of unauthorised access, theft, and accidental damage. It is
important to understand these threats so that you can plan appropriately to reduce
the likelihood of them affecting you.
Malware
• Virus: An intrusive program that infects computer files and may cause
damage.
• Worm: Self-replicating malware that uses a computer network to send
copies of itself to other computers.
• Trojan: Destructive program that masquerades as an application.
• Spyware: Malware that collects information on user browser habits without
their consent.
Unauthorised access
Theft
Computers, devices and data, in particular mobile devices and unprotected data,
are vulnerable to theft and may be used to carry out further crimes, such as
identity theft.
Accidental damage
Damage from accidents such as breakages, fires or floods may result in the
destruction, alteration or loss of computers, devices and data.
There are many actions you can take to protect computers, devices and data from
threats:
Install and use an anti-virus software to protect your computer from viruses. There
are numerous free and paid anti-virus software packages available. It is important
to research the available options. It is often possible to download a trial version of
paid anti-virus software before committing to purchasing the software.
• Use anti-virus software to detect viruses and stop them from being
installed or removing them.
• Regularly update anti-virus, application and operating system software to
detect new viruses, fix known problems and security risks.
• You can use antivirus software to scan external drives and downloaded
software.
Regularly update Software
These updates help prevent or fix problems or enhance and improve how your
computer works. Therefore, it is important to regularly check for updates to your
software, such as your anti-virus, application and operating system software.
Issues associated with failing to keep your software up to date may include:
Use Encryption
Encryption is used to protect data as it’s passed over a network. It is often used to
prevent illegal access to or reproduction of information.
Decryption is the process of changing encrypted data back into its original form,
so that it can be read. Decryption uses a key, or algorithm, to “unlock” the
encrypted data. A common use of encryption is when data is sent through a
secure web connection.
• Create passwords with adequate length: While the word adequate may
seem quite vague in this context, it is important to generate a password
that is usually over 8 characters to reduce the chances of someone
figuring it out. Many websites have minimum password length
requirements.
• Create passwords with adequate character mix: Passwords that use a
mix of caps characters and numbers are stronger than passwords that
only use lowercase letters. Like password length, having a password that
has character mix, like starting with a capital letter and including numbers,
can be a requirement put in place by certain websites. For example, a
password such as “fireworks” can be made stronger by varying the
character style. If you capitalise the first letter, and swap the i and o with
the numbers 1 and 0 you get “F1rew0rks” which is less likely to be solved.
• Do not share passwords: This may seem an obvious point, but
disclosing your password to other people, even if they are trusted
colleagues, friends or family, is not recommended. If you need to share a
password, make sure it is with someone who will not take advantage of
your trust or end up revealing it to a third party.
• Change regularly: It is recommended that you change your passwords
from time-to-time. This can help prevent someone who has gained
knowledge of your password from monitoring your activities over an
extended period of time.
Another option is to back up data on the Internet, using a “cloud” storage solution.
By frequently backing up to a Web-based location, the risk of data loss because of
fire, theft, file corruption, or other disaster is virtually eliminated. Viewed through a
Web browser, remote files and folders appear as if they are saved on an external
local hard drive.
There is a range of measures that you can take to protect yourself and your
organisation when you are online.
When you use a website that handles private or financial information, you should
check that it is secure.
To see if a website is secure, make sure that a lock icon displays in the browser
window and that the website's address begins with "https" (instead of "http").
Hypertext Transfer Protocol Secure (“https”) is a combination of the Hypertext
Transfer Protocol and a security / encryption protocol. These connections are
often used for payment transactions on the Web and for sensitive transactions in
corporate IT systems.
Even if you do not plan to view or provide private or company information, it's best
to use a secure login whenever possible, to ensure that your login information is
encrypted.
Note that the URL automatically changes to add https at the front of the web
address, and you will also see the padlock. This means that the connection to this
website is secure.
The same usually applies if you connect to a financial institution: for example,
www.citibank.com
Purchase from secure reputable websites as they are more likely to have secure
connections that support secure payment and data protection.
When shopping online, take steps to check the security and reputation of a
website. For example, is the website linked to an established business that has a
physical presence? Are there independent reviews of the web site? If you cannot
answer yes to these questions, maybe you should reconsider using the website.
Do not give any company or private, sensitive or financial information over the
Internet if the website is not secure. Even if the connection is secure, you should
only provide company/personal and financial information if it is necessary to make
a purchase. In addition, you should be very cautious about providing business,
personal and financial information in other contexts, for example when
communication via social media, email or instant messaging etc.
If you are chatting on a forum or via instant messaging with someone you do not
know personally, use a nickname instead of your real name. Be wary of strangers
who may be interested in getting you to reveal personal or business information
that they might seek to misuse.
Log off from websites to prevent other users from using your personal details. It’s
important that you remember to log out from any website that you have logged in
to when you have finished browsing, especially if you are on a computer or device
to which other people have access. If you do not log out, other people may gain
access to business, personal or financial information, or may impersonate you.
Social networking sites and email have proved to be convenient and powerful
communications tools. Unfortunately, they can also provide scammers and other
malicious individuals with an easy means for attracting potential victims. A
common scam is combining messages on social media accounts / emails, with a
link to a bogus web site to trick victims into revealing sensitive information.
Unsolicited commercial email, or “spam,” can be the starting point for many email
scams. Many scams that spam support have existed for a long time. A common
list includes:
For instance, a message can be designed to look like it is from a major bank. It
might have an alarming subject line, such as “Issue with Your Account.” These
messages usually suggest that there has been an issue with your account details
© 2019 ET000005 Page 171
Lesson 19 – Safety and Security ICDL Computer & Online Essentials
and that you must submit a form to resolve the problem. As some believe these
communications to be legitimate, they will click on the link and follow the
instructions, resulting in sensitive information being passed on to phishers.
Anti-virus software is used to scan files to identify and eliminate malware. Anti-
virus software usually does this using two different methods:
• Quick scan – This searches for viruses in locations where they are most
likely to occur.
• Full scan – This searches the entire computer for viruses but will be
slower and may affect your computer’s performance more when it is
running.
• Custom Scan – This allows you to choose which files and location you
want to check.
• Windows Defender Offline Scan – This helps to find difficult to remove
malicious software.
Steps
To perform a quick scan in Windows Defender Security Center:
1. Open Windows Defender by clicking the search tool on the taskbar and
entering Windows Defender.
4. In the Virus & threat protection page, select Quick Scan to begin a quick
scan.
3. Locate the files or location to scan in the Select Folder dialog box.
3. Match the malware type on the left with the description on the right.
__________________________________________________
__________________________________________________
5. Which of the following is not considered best practice when dealing with potential
phishing threats?
a. Check spelling & grammar
b. Remain wary of dramatic subject lines
c. Follow the link and check what the website looks like
d. Contact the institution directly to validate the request
6. Go to the following web page to test how secure your password is:
http://howsecureismypassword.net/
20.1 ACCESSIBILITY
Concepts
This translates voice commands and is used in place of a mouse and keyboard.
Voice recognition software allows you to give verbal commands to the computer
or input information, such as text. MS Windows has built-in voice recognition
software.
This reads information aloud from a computer display, for users with impaired
vision or people with dyslexia. Screen reader software assists visually impaired
users or people with dyslexia by interpreting the contents of the computer screen
and then communicating that information in different formats, such as speech
output.
Screen magnifier
This displays enlarged screen content. This tool makes an area of the screen
larger, making it easier to read. Microsoft Windows includes basic screen
magnifier software.
On-screen keyboard
High contrast
This makes the screen easier to view. Microsoft Windows includes a basic high
contrast colour scheme.
Steps
To use voice recognition software:
3. Click Narrator.
3. Click Magnifier.
5. Select the required options under High Contrast and click OK.
20.2 WELL-BEING
Concepts
It is important to adjust the environment in which you use your computer so that it
best supports your health and well-being.
Your environment should have adequate lighting to help minimise screen glare
and avoid eye strain.
It is also important to vary tasks and take regular short breaks away from the
computer to help avoid potential eye, neck, back and wrist strain. You can perform
gentle stretching and eye exercises to help.
Correct adjustment of furniture and equipment will aid you in maintaining correct
posture and body alignment. By positioning the computer or device, desk and seat
correctly you can help avoid neck, back and wrist strain. Correct posture will, in
turn, ensure an even distribution of workload on the body and will help minimise
fatigue. In a work environment everyone may have the same furniture and
equipment and there may be multiple people using the one set-up, but this set-up
can be adjustable to the individual user. Monitors, seats and desks come in
adjustable versions that can be lowered or raised to suit the individual.
You should also ensure that your headphone volume is appropriate and not too
loud. This can help to avoid noise-induced hearing damage.
20.3 ENVIRONMENT
Concepts
People are becoming increasingly concerned about the impact of our modern
lifestyle on the environment. When you are using technology, you can help to
reduce your impact on the environment by lowering your energy consumption and
recycling as much as possible.
• Adjust power mode settings – Power mode options allow you to save
energy. For example, you can set your computer or device to run in lower
Page 186 ET000005 © 2019
ICDL Computer & Online Essentials Lesson 20 – Accessibility and Environment
power mode after a specified period of inactivity. If you run your computer
or device in low-power mode, you conserve energy, keep the temperature
of your equipment down, and extend its lifespan. To maximise your energy
savings, set your computer or device to go into sleep mode or to fully shut
down once it has been idle for a period. Of course, you should also
remember to turn off your computer when you are not using it.
Recycling
• Paper – Do not print unless you absolutely need to. Read your documents
on the screen and share them with others electronically. If you must print,
consider printing on the back of old paper. If the paper can no longer be
used put it into a recycling bin.
_________________________________________________________
2. Which of the following does not help ensure your well-being when using a
computer?
a. Take regular breaks
b. Make sure lighting is adequate
c. Work in a dark room
d. Correctly position the computer
4. List three ways in which modern devices and consumables may be recycled.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
5.1.3 Understand the function 5.4.2 Mark an email as read, 15.5 Changing
13.3 Social
and features of social unread. Flag, unflag an the Read Status
Networks and
networking sites, forums, email. of a Message
Forums
and identify some common
15.6 Flagging a
examples.
message
5.1.4 Recognise good practice 13.4 Good Online
when using communication Communication 5.4.3 Create, delete, update a 16.1 Creating a
tools like: use an contact, distribution list / Contact
Practice
appropriate communication mailing list.
16.2 Updating a
tool and tone for the Contact
audience and content; be
accurate, brief, clear; do not 16.3 Creating a
inappropriately disclose Contact Group
private or sensitive 16.5 Updating a
information; do not circulate Contact Group
inappropriate content; use
in accordance with usage 16.6 Deleting a
policies. Contact or
Contact Group
Having reached this stage of your learning, you should now be ready to undertake an ICDL
certification test. For further information on taking this test, please contact your ICDL test
centre.