SlideShare a Scribd company logo
TLE04:
Teaching
ICT as an
Explorator
y
PAGE 1
Lesson 01: Introduction to Computer
OBJECTIVES:
 Illustrate the computer parts and accessories and its functions
 Evaluate the disadvantages of Cybercrimes
 Developed the skills in manipulating the mouse and keyboard
 Apply the correct methods of typing
PAGE 2
HOW YOU USE ICT IN
YOUR LIFE?
PAGE 3
What is ICT?
 Information Communication Technology –use of different
communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send and edit
information.
PAGE 4
What is Computer?
A computer is an electronic device that manipulates information, or data. It has
the ability to store, retrieve, and process data. You may already know that you
can use a computer to type documents, send email, play games,
and browse the Web. You can also use it to edit or
create spreadsheets, presentations, and even videos.
PAGE 5
https://edu.gcfglobal.org/en/computerbasics/what-is-a-computer/1/
Elements of Computer
1. Hardware - refers to the physical units.
2. Software - is as vital to effective use of a computer as the hardware.
1. System Software
2. Application Software
3. Human Ware
1. Systems analyst, who studies information and processing requirements.
2. Programmer, who has a skill in writing computer instructions.
3. Computer operator, who operates the computer.
PAGE 6
Elements of Computer
4. User Programs - A program consists of a set of instructions to the computer
to perform operations which accomplish processing task. A data processing job
may require a number of programs
PAGE 7
https://www.businessmanagementideas.com/information-technology/elements-of-a-
computer-system-information-technology/10139
Type of Personal Computer
Personal Computer – a machine designed for use
at a desk, and never pushed anywhere. It has the
metal box called as system unit.
PAGE 8
Netbook PC– a compact computer which is built to
fold up like a carrying notebook.
Type of Personal Computer
PAGE 9
Tablet PC– a handheld device consisting of a
touch-sensitive display panel that is mounted on a
plastic tablet frame with a small computer inside.
Smartphone– a mobile phone that can run
computer application and has internet access
capability.
Basic Parts of the computer – Internal
PAGE 10
 The motherboard is at the
center of what makes a PC
work. It houses the CPU and
is a hub that all other
hardware runs through.
Basic Parts of the computer – Internal
PAGE 11
 The CPU (Central Processing
Unit or processor) is
responsible for processing all
information from programs
run by your computer.
Basic Parts of the computer – Internal
PAGE 12
 also known as volatile
memory, stores data
regarding frequently
accessed programs and
processes. (It's called volatile
memory because it gets
erased every time the
computer restarts.)
Basic Parts of the computer – Internal
PAGE 13
 The hard drive is a storage device
responsible for storing permanent and
temporary data. It is essentially
anything saved or installed to a
computer: for example, computer
programs, family photos, operating
system, word-processing documents,
and so on.
Basic Parts of the computer – Internal
PAGE 14
 A power supply unit, commonly
abbreviated as PSU, does more than just
supply your computer with power. It is
the point where power enters your
system from an external power source
and is then allocated by the motherboard
to individual component hardware.
Basic Parts of the computer – Internal
PAGE 15
 System Unit referred to as a box, main
unit, and system box, a system unit is the
case that contains all the main parts of a
computer.
Basic Computer Parts - External
PAGE 16
 Mouse is a handheld
hardware.
 Controls a cursor in a GUI.
 Can move and select text, icons,
files, and folders on your
computer.
Basic Computer Parts - External
PAGE 17
 a monitor is an output device that
displays video images and text.
 referred to as a VDT (video
display terminal) and VDU (video
display unit)
Basic Computer Parts - External
PAGE 18
 A computer keyboard one of the
primary input devices used with a
computer.
 composed of buttons that create
letters, numbers, and symbols,
and other functions.
Basic Computer Parts - External
PAGE 19
 A speaker is an output hardware
device that connects to a computer to
generate sound.
 The signal used to produce the sound
that comes from a computer speaker
is created by the computer's sound
card.
Basic Computer Parts - External
PAGE 20
 It is an output device that takes the
electronic data stored on a computer
or other device and generates a hard
copy.
DISADVANTAGES OF CYBERCRIME
CYBERCRIMES
1. Phishing/Spoofing – the act of sending multiple emails to multiple
users in hopes of having a number of them clicking on the links or malware
attached to the email.
2. Blackmail/Extortion – the act of using the internet to threaten or
damage someone’s reputation to exert money or anything else of value.
PAGE 21
DISADVANTAGES OF CYBERCRIME
3. Accessing Stored Communication - or hacking; the act of obtaining
unauthorized access to data from a computer network.
4. Sports Betting – the act of wagering on any sports event over the internet. In
some countries, gambling (including sports betting) is illegal even if you are
doing it over the internet.
PAGE 22
DISADVANTAGES OF CYBERCRIME
5. Non Delivery of Merchandise – the act of devising a scheme wherein the
culprit posts an item or service for sale on the internet and once the
transactions have been done, does not really give an item or service.
6. Electronic Harassment – the act of anonymously using the internet to harass,
abuse, threaten or annoy other people.
PAGE 23
DISADVANTAGES OF CYBERCRIME
7. Prostitution – the act of using the internet to engage in prostitution.
8. Drug Trafficking – the act of selling illegal substances using the internet.
9. Criminal Copyright Infringement – the act of piracy mainly for financial gain.
PAGE 24
Mouse action
PAGE 25
Keyboard action
PAGE 26
Software
1. System Software
1. Operating System - "OS," is software that communicates with
the hardware and allows other programs to run.
2. Utility – a software installed with the operating system.
2. Application Software - a type of computer program that
performs a specific personal, educational, and business function.
PAGE 27
Computer Virus
A computer virus is a malicious piece of computer
code designed to spread from device to device. A
subset of malware, these self-copying threats are
usually designed to damage a device or steal data.
PAGE 28
How does a computer get a virus?
 Sharing music, files, or photos with other users
 Visiting an infected website
 Opening spam email or an email attachment
 Downloading free games, toolbars, media players and other system utilities
 Installing mainstream software applications without thoroughly reading license
agreements
PAGE 29
How computer viruses spread?
Viruses can be spread several ways, including via networks, discs, email
attachments or external storage devices like USB sticks. Since connections
between devices were once far more limited than today, early computer viruses
were commonly spread through infected floppy disks.
PAGE 30
Example of Computer Virus
 Worms - A worm is a type of virus that, unlike traditional viruses, usually does
not require the action of a user to spread from device to device.
 Trojans - As in the myth, a Trojan is a virus that hides within a legitimate-
seeming program to spread itself across networks or devices.
 Ransomware - Ransomware is a type of malware that encrypts a user’s files
and demands a ransom for its return. Ransomware can be, but isn’t
necessarily, spread through computer viruses.
PAGE 31
Computer Virus Protection
 Use antivirus protection and a firewall
 Get antispyware software
 Always keep your antivirus protection and antispyware software up-to-date
 Update your operating system regularly
 Increase your browser security settings
 Avoid questionable Websites
PAGE 32
Computer Virus Protection
 Only download software from sites you trust.
 Carefully evaluate free software and file-sharing applications before
downloading them.
 Don't open messages from unknown senders
 Immediately delete messages you suspect to be spam
PAGE 33
THANK YOU! 
PAGE 34

More Related Content

PPTX
Lesson 02 operating system
PPT
Ppt Lesson 02
PPTX
COMPED9 Module 1 Information Technology, the Internet, and You
PPTX
Chapter 4 2016
PPTX
Internet basics
PPTX
Basic Internet Concepts
PPT
World Wide Web (the Internet) Basics
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
Lesson 02 operating system
Ppt Lesson 02
COMPED9 Module 1 Information Technology, the Internet, and You
Chapter 4 2016
Internet basics
Basic Internet Concepts
World Wide Web (the Internet) Basics
Chapter 4 Computer Science :: Computer Ethics and Security

What's hot (20)

PDF
Internet Basics
PDF
Computer Applications - The Information and Communication Technology in the w...
PPTX
Internet Grade 6
PPT
Stid1103 ch2 introduction_to_internet_
PPT
Over view of internet computer studies lesson
PDF
Internet basics
PPT
TID Chapter 2 Introduction To Internet
PPTX
internet world, computer ppt
PDF
ODP
Basic's of internet
PPT
Chapter 6 effects of ict on society
PPT
XML and Societal Impacts Of IT
PPTX
ICT....(Muskan Rasool)
PPTX
Internet application
PPTX
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
POT
Chapter11
PPTX
Societal Impacts Of IT (Class X)
DOCX
Internet working
PPTX
Computers and more
PPTX
Chapter 05 Digital Safety and Security
Internet Basics
Computer Applications - The Information and Communication Technology in the w...
Internet Grade 6
Stid1103 ch2 introduction_to_internet_
Over view of internet computer studies lesson
Internet basics
TID Chapter 2 Introduction To Internet
internet world, computer ppt
Basic's of internet
Chapter 6 effects of ict on society
XML and Societal Impacts Of IT
ICT....(Muskan Rasool)
Internet application
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
Chapter11
Societal Impacts Of IT (Class X)
Internet working
Computers and more
Chapter 05 Digital Safety and Security
Ad

Similar to Lesson 01 introduction to computer (20)

PPTX
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
PDF
3.1 Introduction to computers _ OLCreate.pdf
PPTX
Computer Peripheral Devices (Input, Output, Input/Output Device
PPT
Computer application
PPTX
connecte hardware peripherals level 1.ppt.pptx
DOCX
PPTX
Discovering Computer Chapter 1
PDF
Ch 01-types-and-components-of-computers
PPTX
Computer Basics
PPTX
Report-computer hardware,system, and software
PPTX
connecte hardware peripheralshh.ppt.pptx
PPT
Module1 computerbasics1
PPTX
ICT Grade 9 first term American school.pptx
PPTX
INTRODUCTION TO COMPUTER
PPSX
Computer Applications In Business by Mahatma Gandhi University
PDF
Vocabulary link: Computer Science
PPTX
introduction to computers
PDF
Vocabulary link - Computers
PPT
Basic computer
PPT
computer_basics hardware of computer system
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
3.1 Introduction to computers _ OLCreate.pdf
Computer Peripheral Devices (Input, Output, Input/Output Device
Computer application
connecte hardware peripherals level 1.ppt.pptx
Discovering Computer Chapter 1
Ch 01-types-and-components-of-computers
Computer Basics
Report-computer hardware,system, and software
connecte hardware peripheralshh.ppt.pptx
Module1 computerbasics1
ICT Grade 9 first term American school.pptx
INTRODUCTION TO COMPUTER
Computer Applications In Business by Mahatma Gandhi University
Vocabulary link: Computer Science
introduction to computers
Vocabulary link - Computers
Basic computer
computer_basics hardware of computer system
Ad

More from Rodz Tech (6)

PPTX
What is Synthesis?
PPTX
What is RRS?
PPTX
What is RRL?
PPTX
Platform technologies lesson 01
PPTX
What is capstone
PPTX
Lesson 08 Web Technology
What is Synthesis?
What is RRS?
What is RRL?
Platform technologies lesson 01
What is capstone
Lesson 08 Web Technology

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Lesson notes of climatology university.
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
GDM (1) (1).pptx small presentation for students
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PDF
Sports Quiz easy sports quiz sports quiz
TR - Agricultural Crops Production NC III.pdf
Final Presentation General Medicine 03-08-2024.pptx
Lesson notes of climatology university.
PPH.pptx obstetrics and gynecology in nursing
Renaissance Architecture: A Journey from Faith to Humanism
O5-L3 Freight Transport Ops (International) V1.pdf
Pre independence Education in Inndia.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
2.FourierTransform-ShortQuestionswithAnswers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
GDM (1) (1).pptx small presentation for students
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Sports Quiz easy sports quiz sports quiz

Lesson 01 introduction to computer

  • 2. Lesson 01: Introduction to Computer OBJECTIVES:  Illustrate the computer parts and accessories and its functions  Evaluate the disadvantages of Cybercrimes  Developed the skills in manipulating the mouse and keyboard  Apply the correct methods of typing PAGE 2
  • 3. HOW YOU USE ICT IN YOUR LIFE? PAGE 3
  • 4. What is ICT?  Information Communication Technology –use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information. PAGE 4
  • 5. What is Computer? A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos. PAGE 5 https://edu.gcfglobal.org/en/computerbasics/what-is-a-computer/1/
  • 6. Elements of Computer 1. Hardware - refers to the physical units. 2. Software - is as vital to effective use of a computer as the hardware. 1. System Software 2. Application Software 3. Human Ware 1. Systems analyst, who studies information and processing requirements. 2. Programmer, who has a skill in writing computer instructions. 3. Computer operator, who operates the computer. PAGE 6
  • 7. Elements of Computer 4. User Programs - A program consists of a set of instructions to the computer to perform operations which accomplish processing task. A data processing job may require a number of programs PAGE 7 https://www.businessmanagementideas.com/information-technology/elements-of-a- computer-system-information-technology/10139
  • 8. Type of Personal Computer Personal Computer – a machine designed for use at a desk, and never pushed anywhere. It has the metal box called as system unit. PAGE 8 Netbook PC– a compact computer which is built to fold up like a carrying notebook.
  • 9. Type of Personal Computer PAGE 9 Tablet PC– a handheld device consisting of a touch-sensitive display panel that is mounted on a plastic tablet frame with a small computer inside. Smartphone– a mobile phone that can run computer application and has internet access capability.
  • 10. Basic Parts of the computer – Internal PAGE 10  The motherboard is at the center of what makes a PC work. It houses the CPU and is a hub that all other hardware runs through.
  • 11. Basic Parts of the computer – Internal PAGE 11  The CPU (Central Processing Unit or processor) is responsible for processing all information from programs run by your computer.
  • 12. Basic Parts of the computer – Internal PAGE 12  also known as volatile memory, stores data regarding frequently accessed programs and processes. (It's called volatile memory because it gets erased every time the computer restarts.)
  • 13. Basic Parts of the computer – Internal PAGE 13  The hard drive is a storage device responsible for storing permanent and temporary data. It is essentially anything saved or installed to a computer: for example, computer programs, family photos, operating system, word-processing documents, and so on.
  • 14. Basic Parts of the computer – Internal PAGE 14  A power supply unit, commonly abbreviated as PSU, does more than just supply your computer with power. It is the point where power enters your system from an external power source and is then allocated by the motherboard to individual component hardware.
  • 15. Basic Parts of the computer – Internal PAGE 15  System Unit referred to as a box, main unit, and system box, a system unit is the case that contains all the main parts of a computer.
  • 16. Basic Computer Parts - External PAGE 16  Mouse is a handheld hardware.  Controls a cursor in a GUI.  Can move and select text, icons, files, and folders on your computer.
  • 17. Basic Computer Parts - External PAGE 17  a monitor is an output device that displays video images and text.  referred to as a VDT (video display terminal) and VDU (video display unit)
  • 18. Basic Computer Parts - External PAGE 18  A computer keyboard one of the primary input devices used with a computer.  composed of buttons that create letters, numbers, and symbols, and other functions.
  • 19. Basic Computer Parts - External PAGE 19  A speaker is an output hardware device that connects to a computer to generate sound.  The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card.
  • 20. Basic Computer Parts - External PAGE 20  It is an output device that takes the electronic data stored on a computer or other device and generates a hard copy.
  • 21. DISADVANTAGES OF CYBERCRIME CYBERCRIMES 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malware attached to the email. 2. Blackmail/Extortion – the act of using the internet to threaten or damage someone’s reputation to exert money or anything else of value. PAGE 21
  • 22. DISADVANTAGES OF CYBERCRIME 3. Accessing Stored Communication - or hacking; the act of obtaining unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the internet. PAGE 22
  • 23. DISADVANTAGES OF CYBERCRIME 5. Non Delivery of Merchandise – the act of devising a scheme wherein the culprit posts an item or service for sale on the internet and once the transactions have been done, does not really give an item or service. 6. Electronic Harassment – the act of anonymously using the internet to harass, abuse, threaten or annoy other people. PAGE 23
  • 24. DISADVANTAGES OF CYBERCRIME 7. Prostitution – the act of using the internet to engage in prostitution. 8. Drug Trafficking – the act of selling illegal substances using the internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. PAGE 24
  • 27. Software 1. System Software 1. Operating System - "OS," is software that communicates with the hardware and allows other programs to run. 2. Utility – a software installed with the operating system. 2. Application Software - a type of computer program that performs a specific personal, educational, and business function. PAGE 27
  • 28. Computer Virus A computer virus is a malicious piece of computer code designed to spread from device to device. A subset of malware, these self-copying threats are usually designed to damage a device or steal data. PAGE 28
  • 29. How does a computer get a virus?  Sharing music, files, or photos with other users  Visiting an infected website  Opening spam email or an email attachment  Downloading free games, toolbars, media players and other system utilities  Installing mainstream software applications without thoroughly reading license agreements PAGE 29
  • 30. How computer viruses spread? Viruses can be spread several ways, including via networks, discs, email attachments or external storage devices like USB sticks. Since connections between devices were once far more limited than today, early computer viruses were commonly spread through infected floppy disks. PAGE 30
  • 31. Example of Computer Virus  Worms - A worm is a type of virus that, unlike traditional viruses, usually does not require the action of a user to spread from device to device.  Trojans - As in the myth, a Trojan is a virus that hides within a legitimate- seeming program to spread itself across networks or devices.  Ransomware - Ransomware is a type of malware that encrypts a user’s files and demands a ransom for its return. Ransomware can be, but isn’t necessarily, spread through computer viruses. PAGE 31
  • 32. Computer Virus Protection  Use antivirus protection and a firewall  Get antispyware software  Always keep your antivirus protection and antispyware software up-to-date  Update your operating system regularly  Increase your browser security settings  Avoid questionable Websites PAGE 32
  • 33. Computer Virus Protection  Only download software from sites you trust.  Carefully evaluate free software and file-sharing applications before downloading them.  Don't open messages from unknown senders  Immediately delete messages you suspect to be spam PAGE 33