By: Brittany Bass. Laptop computers Hand-held computers Mainframe computers.
Unit 5: Computers and the...
Transcript of Unit 5: Computers and the...
2/21
Unit 5: Computers and the Internet
Contents:
• 1 What is the Internet?
• 2 The world wide web (WWW)
• 3 Privacy, Security and Safety
Tools and materials for the activities:
tablet smart phone Google account
3/21
4/21
1. Parts of a computer system. Computer systems are made up of hardware and
software. Computer hardware is made up of the parts of the computer that you can touch:
its physical components. Software is the programs, instructions and data that controls
the operation of a computer and enables (allows) the computer to carry out (complete) a
task.
Indicate if the pictures below are related to hardware or software:
Label the pictures below with their name (names in bold). Hardware consists of the
physical devices that make up (constitute) a computer (PC, laptop, tablet…) as for instance
modem/router, flash memory drive and printer. Software is the set of instructions your
hardware executes to carry out (do) a specific task for you such as creating a table or
graph (spreadsheet software, for example) and surfing the Web (web browsers such as
Mozilla Firefox, Internet Explorer…). Hardware and software in aggregate are what people
refer to as a computer, and even that term is becoming more blurred (indistinct) each day
with digital media players, cell phones, and the like.
5/21
2. The computer and its basic parts. Classify the 3 groups of components below into the
3 basic parts of a computer system (system unit, storage devices and peripherals).
6/21
3. Identify the computer devices below by writing their name: DVD, modem/router,
monitor, mouse, laser printer, scanner, RAM memory modules, microprocessor, ROM
memory, hard disk (hard drive), speakers, motherboard and Bluray/DVD drive, flash
memory and system unit.
ROM memory
4. Classify the 15 devices above into the correct group:
System Unit:
Storage devices:
Peripherals:
7/21
5. Software. Software is another name for programs. Programs are the instructions that
tell the computer hardware how to process data into the form you want.
Taking into account the figures above, answer the following questions by indicating:
The mathematical operation we want to do:
INPUT. The input device we use to enter the numbers:
PROCESSING. The program we use to calculate (circle the right answer) ,
, , . This process is taking place in the
RAM memory.
OUTPUT. The output device that displays (shows) the result:
STORAGE. The storage device used to store the result:
The program that enables (permits) us to do the whole thing (use the hardware and the
programs): the operating system.
There are two major kinds of software: system software and application software.
6. System Software. Fill in the blanks:
System software is a collection of programs that allow (permit) the _________________ to
run properly and allow the user to _________________ with the computer. System software
allows the application software to interact with the computer hardware (for example, mp3
players need to use the speakers). Examples of system software: ___________ systems (OS),
utilities and device drivers.
Operating Systems (OS) are programs that coordinate computer resources
(hardware), provide (offer) an interface between users and the computer, and run
applications (application software). Examples of operating systems: Windows XP, Windows
10, Mac OS X, Linux and Android.
8/21
Which operating system (from the examples above) is installed in the devices below?
Utility programs are software that has been designed to carry out (do, perform)
specific tasks on a computer. Essentially, they are programs that help to manage, maintain
and control computer resources. Examples include: antivirus, anti-spyware (programs
placed on your computer without your knowledge), screensavers.
Drivers. A device driver is the name given to software that enables (permits) one or
more hardware devices to communicate with the computer’s operating system. Without
drivers, a device (for example, a printer) would be unable (incapable) to work with the
computer. Examples of drivers include printers, memory sticks, mouse, and so on.
Complete the diagram below:
9/21
7. HIGHLEVEL Application Software. Application software performs a specific job or
task providing additional functionality to the operating system. The most common types of
application software include word processing software for writing letters and reports;
spreadsheet software for calculations and numerical analysis; database software for
storing and finding information; presentation software for creating slide shows; browser
software for navigating the internet, etc.
Identify in the pictures below the application software (programs) listed above.
Label the programs (only application software) you recognise in the picture below.
10/21
8. Hardware and Software. Decide, by circling the letter, if the following statements
are related to software (S) or hardware (H):
ROM memory is located on the motherboard. S H
Application software performs specific tasks to manage computer resources. S H
Drivers are specialized programs to allow input and output devices (a printer) to
communicate with the rest of the computer system (the operating system). S H
The motherboard is a large printed circuit board to which all the other circuit boards
in the computer are connected. S H
Intel Dual Core E2160 is a microprocessor with two processors (cores) in it, that is to
say, two CPUs. S H
Linux is an open-source operating system created by Linus Torvals. S H
Storage capacity of RAM memory of a computer is measured in GB (gigabytes). S H
Hard disks and CDs are storage devices. S H
The CDROM is a pre-recorded CD used for the storage of computer programs and data
(music, software…) S H
Microsoft Word is a word processor. S H
9. Computer network. Read the text and answer the questions below:
In a computer network two or more computers are linked together (connected) with a
medium and data communication devices for the purpose of communicating data (images,
text, video…) and sharing resources (printers, databases…). The computer that provides
resources to other computers on a network is known as a server. In the network the
individual computers, which access shared network resources, are known as clients,
workstations or nodes.
Imagine you have, at home, two computers connected as the figure above illustrates.
Now indicate:
11/21
The medium (devices) they use to communicate with each other: _________________
Which computer could be the server? _________________ And the client? _______________
Give 2 examples of shared resources: (hardware) ____________ and (software) __________
Now imagine you have the equipment the figure below shows. Indicate
The additional hardware (medium for communication) included:
The new shared resources: (hardware): ______________ and (software): the connection to
the internet.
10. HIGHLEVEL A network is two or more computers connected together to share
information and files between them. Computer Networks may be classified on the basis of
geographical area in two broad categories: LAN (Local Area Network) and WAN (Wide
Area Network).
The figure below shows a LAN. LANs are networks used to interconnect computers in a
single room, rooms within a building or buildings on one site for the purpose of sharing
information.
12/21
Indicate the 2 ways of connection in this LAN: cables (optical fibre) and ______________.
The 2 devices used to connect to the internet: _________________ and _________________.
Identify the following elements you can find in a LAN :
WANs (Wide Area Networks) are used to connect LANs together. Typically, WANs
are used when the LANs that must be connected are separated by a large distance.
Examples: a network of bank cash dispensers, a ticket booking system and the internet.
11. The Internet. The Internet is simply a network of networks. It is the actual (real)
physical network that spans (covers) the entire globe. It is made up of computers, wireless
devices (laptops, tablets, mobile phones, etc.), cables, switches, routers, satellites…
Everything that can be accessed on/from the internet is known as resources. These
resources are simply stored on some devices usually known as servers. Servers are
computers with huge storage and processing capabilities.
Identify the following elements you can find as part of the Internet (words in bold)
13/21
12. HIGHLEVEL The Internet is a collection of standalone (independent, separate)
computers (and computer networks in companies, schools, and colleges) all freely linked
together, mostly using the telephone network. The connections between the computers are
a mixture of old-fashioned copper cables, fibre-optic cables (which send messages in
pulses of light), wireless radio connections (which transmit information by radio waves),
and satellite links. When a user connects to the Internet to access information and
services, he or she is considered to be online.
5 examples of digital devices I can use to connect to the internet are: a PC,
14/21
What you need to connect to the internet is: a digital device (a computer), ____________
(with a modem) and an Internet _________________ (Movistar or Vodafone, for example).
When I am online, I can access a _________________ (World Wide Web, www), send
messages through e-mail, download or upload files using FTP utilities, etc.
ISP stands for _______________________________________ and it is the company that
lets________________________________________________________________________________________.
Identify the devices below (words in bold)
The World Wide Web (the web), is a subset (division) of the internet that includes a
vast collection of documents that include text with pictures, sound, animation, and video.
These documents, called web pages, are grouped in web sites all over the world. A website,
or site, is a collection of related web pages managed by an individual or organization.
If I want to access the web (www) I need a _________________ ,
13. HIGHLEVEL Match the key words with their description (write the letter A … G):
KEY WORD DESCRIPTION
A: World Wide Web A device that lets us connect to the Internet:
B: Website The address of a Web page:
C: Web Page A collection of pages about related topics or information and
accessed from the same or related servers:
D: Web Server A computer that holds web pages or other files and allows
access to these by others over a network or the internet:
E: Web address A text document which usually contains instructions to tell the
browser how to display the page. The document is usually written
in HTML:
F: Router Software that displays the content of web pages or lets us
access multimedia files:
15/21
G: Browser A collection of pages of information stored on servers and
accessed via the Internet:
14. Internet Services.
16/21
Indicate ( ) the type of file (filetype) the following files are:
Video
Audio
Image
Webpage
Flash
animation
pepe.swf
pepe.jpeg
pepe.mkv
pepe.mp3
pepe.htm
pepe.png
pepe.mp4
15. Web 2.0. Web 2.0 tools, communities of users and services, like social networks, wikis,
blogs, Google Maps and Youtube. These create and encourage collaboration and the
exchange of information between users to make up what we call the Social Web.
Web 2.0 is not a new version of the internet. Web 1.0 was about connecting computers
and making technology more efficient for computers. Web 2.0 is about connecting people
and making technology more efficient for people and it is still the same technology. Web
2.0 is a two way communication, where the user can not only read and access information
but also add to and make their own contributions to the existing material.
List 4 applications (tools) included in Web 2.0: WhatsApp, __________________,
__________________, __________________ and __________________.
As long as the applications and the data reside online, a variety of devices can function
as information terminals whether they are smartphones, music players, or computers. Web
2.0 not only makes all this possible, it also makes it inexpensive (cheap) and easy to deploy
(arrange). Examples of tools:
17/21
Blogs. A blog (web log) is a web page that contains entries (posts) in reverse
chronological order, with the most recent entry on top (the most recent post appears
first). Blogs are primarily text, but they can include features such as videos, photos,
charts, graphs, music, and other audio enhancements (improvements), such as podcasts.
They contain links to other online locations and are often discussions of topics found at
these links. Readers can write comments and engage in discussion with the blogger about
the topic posted. In education, blogs (edublogs) can be used as instructional resources.
Microblogging is another type of blogging on which one posts brief, frequent updates on
one’s activities. A popular example is Twitter.
Wikis. Hawaiian for “quick,” a wiki is a website which allows people to add, modify, or
delete the content via a web browser. Wikis use specialized wiki software and are usually
created collaboratively. The encyclopaedia project Wikipedia (http://en.wikipedia.org/) is
the most famous wiki on the public web.
Social Networking. Sites that connect individuals in a community, allowing them to
communicate and share resources with friends, colleagues and even strangers. The most
popular examples are Facebook and LinkedIn.
Online collaboration platforms. These tools help users create new documents,
spreadsheets, and presentations on their own or share and collaborate with others in real
time. Examples of this platform include Google Drive and DropBox.
Online presentations like Prezi or SlideShare.
18/21
Online videos like YouTube.
Identify the type of tool the pictures below refer to:
Online collaboration platforms (used to create documents)
16. Despite the many benefits the use of Internet has, there are a number of risks
associated with “going” online. These can be as a result from visiting malicious websites or
inadvertent disclosure (revelation) of personal information. The risks of visiting malicious,
criminal or inappropriate websites include:
Viruses and spyware (collectively known as malware). Malware is software that is
intended to damage or disable computers and computer systems. It may be installed or
executed without your knowledge. Malware may take control of your computer for
purposes such as sending spam (unsolicited messages).
Phishing, designed to obtain your personal and/or financial information and possibly
steal your identity.
19/21
Fraud, from fake (false) shopping, banking, charity, dating, social networking and other
websites.
Copyright infringement – copying or downloading copyright protected software, videos,
music, photos or documents.
Exposure to unexpected and inappropriate content (violence, adult activities…).
17. Are you online aware (conscious, attentive)? Put a to answer the following questions:
YES NO
I ask my parents' permission before giving out any personal information on the
Internet (name, phone number, address, email, credit card information, …)
20/21
I only use websites that my parents have checked out for me.
When I’m online I always use a nickname that doesn’t reveal anything about me –
including if I am a boy or girl.
If an online message makes me feel uncomfortable or frightened (scared, alarmed),
I don’t respond to it. Instead I tell an adult right away.
If I want to arrange a meeting with someone I’ve met on the Internet, I tell my
parents first and make sure one of them comes with me.
I treat people nicely when I’m online and never post or send rude messages or
threats.
I always ask permission from the author before taking words, pictures or sounds
from a website.
I know that things I read online aren’t always true so I check the information with a
parent or teacher.
I use websites and search engines that my parents or teacher have told me about.
I always check with an adult before opening emails from strangers.
18. HIGHLEVEL What Can I Do To Protect My Information Online?
Use your web browser tools and controls ( private browsing, no tracking cookies).
A cookie is a small file that allows a website to store data about your browsing activities, including
identifying the pages and content you've looked at, when you visited, what you searched for, and whether you
clicked on an advert.
Use Strong Passwords to protect your privacy and the security of your information
online. Some tips for building a strong password include:
Don't use your name or birth date - be unpredictable.
Make your password at least 10 to 12 characters long, and use a mix of letters,
numbers, and special characters (like %, $, #, @ or _). Example: _________________,
Don't use the same password for multiple accounts.
Never allow your browser or website, etc, to save your username and password for
convenience
Keep your passwords in a secure place, and don't share them with anyone - especially
over the phone, in texts, or by email.
And remember to log out when you are done.
Roll your mouse pointer over a link to reveal its true destination, displayed in the
bottom left corner of your browser. Beware if this is different from what is displayed in
the text of the link from either another website or an email.
21/21
Extra
19. Bits and bytes. Read the information below and answer the questions:
How many bits are there in the following series of bits (data)? 110011111001:
How many bits are there in a byte? _______ And in 5 bytes? _______
How many bytes form a series of 24 bits? _______and 64 bits? _______
If a character occupies 1 byte in the RAM memory, how many bytes does the following
text occupy? Hello, my name is Theresa Green. Notice that blank spaces are characters
as well. Answer: _______. And in 64 paragraphs like this?
What order (KB, MB, GB, and TB) is the storage capacity of current RAM memory? __.
What order (KB, MB, GB, and TB) is the storage capacity of an internal hard disk? __.