End User Computing
End User Computing
End User Computing
LEARNER GUIDE
Module # 351201001-KM-06
NQF Level 03
Notional hours 60
Credit(s) 6
Curriculum Code 351201000
SAQA QUAL ID 101408
Qualification Title Occupational Certificate: Computer Technician
PURPOSE OF THE QUALIFICATION ................................................................................ 4
QUALIFICATION RULES...................................................................................................... 5
EXIT LEVEL OUTCOMES .................................................................................................... 6
ENTRY REQUIREMENTS: ................................................................................................... 7
ASSESSMENT REQUIREMENTS....................................................................................... 7
PROVIDER ACCREDITATION REQUIREMENTS FOR THE MODULE: ..................... 7
TOPIC ELEMENTS TO BE COVERED INCLUDE: .......................................................... 9
CONTACT INFORMATION:
Name
Contact Address
Telephone (H)
Telephone (W)
Cellular
PURPOSE OF THE QUALIFICATION
Upon completion of the qualification students will be expected to provides technical assistance
to users, including diagnosing and resolving issues and problems with software, hardware,
computer peripheral equipment, networks, databases, systems and the internet.
The qualification outcomes cover types of software, hardware, components, upgrading and
troubleshooting a computer, formatting and partitioning hard drives, and network topologies.
Green technology, maintaining records of daily problems and remedial actions, and prepare
evaluations for systems performance.
Rationale:
This qualification is a response to Output 3.1.2 of the NSDS III target: Programmes offered to
meet industry needs, including those supporting apprenticeships and N-Courses, are
reviewed, updated and made available to and accessed by employers. With the increase in
personal computers, home computers, and computers in schools and businesses, it is
important that students are trained to be able to maintain and upgrade computers and their
components.
The qualification will prepare students to become competent as a computer technician with an
understanding of computer hardware and software troubleshooting. Students will also be
competent and have hands-on computer repair skills.
Computer technicians provide assistance to computer users by answering questions,
resolving technical problems and maintaining a company's network, software and computer
equipment. They are also called desktop support technicians or computer support specialists.
QUALIFICATION RULES
ASSESSMENT REQUIREMENTS
PROVIDER ACCREDITATION REQUIREMENTS FOR THE MODULE:
Physical Requirements:
● The provider must have lesson plans and structured learning material or provide
learners with access to structured learning material that addresses all the topics in all
the knowledge modules.
● In addition, the following must be provided:
● A computer with the necessary software per student in class
● Printers
● Access to internet facilities
● Distance and e-learning modalities available to learners
Human Resource Requirements:
● Lecturer/ learner ratio of 1:30 (Max)
● Lecturers need to be qualified at a Level 6 or higher in the relevant field or have at
least 5 years relevant experience in Business Communication and Customer services
Legal Requirements:
● Legally compliant venue (i.e. Fire protection services, OHS and other legislation)
● Code of Conduct
● Valid licenced software
● Approved and accredited by the relevant AQP as per QCTO requirements
● It would be advantageous if lecturers are registered with a relevant Professional Body
for continuous professional development purposes
● Assessor and Moderator have professional recognition in the Business
Communication and Customer services field of expertise and approved by the relevant
AQP
Exemptions
● Communication N4, Communication N5, Communication N6, Management
Communication N4, Management Communication N5 and Management
Communication N6
TOPIC ELEMENTS TO BE COVERED INCLUDE:
KT0101 Identify and use a number of keys and explore their effects in
a word document. (Range: includes but not limited to
alphabetical keys, number keys/n um lock, Caps Lock, Enter,
Backspace,
Delete, Spacebar, Shift, Tab, Ctrl + Alt, Delete and F keys)
KT0102 Practice using these keys to create and edit a text document,
for example using tab key for indenting
KT0103 Describe the GIGO (Garbage In Garbage Out) principle using
a word processor document
Identify and use a number of keys and explore their effects in a word document. (Range:
includes but not limited to alphabetical keys, number keys/n um lock, Caps Lock, Enter,
Backspace,
Delete, Spacebar, Shift, Tab, Ctrl + Alt, Delete and F keys
A computer keyboard is an input device used to enter characters and functions into the
computer system by pressing buttons, or keys. It is the primary device used to enter text. A
keyboard typically contains keys for individual letters, numbers and special characters, as well
as keys for specific functions. A keyboard is connected to a computer system using a cable or
a wireless connection.
Functions of Every Key - Keys on the Computer Keyboard and their Functions
Alt key
● A computer key that you press together with another key so that the other key does
something different from what it usually does. You can also refer to this key simply as
Alt.
Arrow key
● one of four computer keys marked with an up, down, left, or right arrow, used for
moving the cursor
Backspace
the key that you press on a keyboard to move one space backwards in a document
Caps lock
● a key on a computer keyboard that makes all the keys produce capital letters
Character set
● a complete set of letters, numbers, or symbols that can be used by a computer
Command key
● on some computers, a key that you press together with another key to make the
computer do a particular thing
Control
● the control key on a computer keyboard
Control key
● A key on a computer keyboard that is used in combination with other keys for doing
particular operations. This key is usually marked ‘Ctrl’.
ctrl abbreviation
● control: the control key on a computer keyboard
Delete key
● Computer key that removes characters. This key is sometimes simply referred to as
Del.
Enter key
● a key on a computer keyboard that makes the computer perform an action or start a
new line of writing
● Escape
the escape key on a computer
Escape key
● A key on a computer keyboard that allows someone to stop an action, leave a program,
or return to a previous menu. This key is usually marked ‘Esc’.
Function key
● a special button on a computer keyboard that is used for a particular operation in a
program. The keys near the top of a keyboard marked ‘F1’ to ‘F12’ are function keys.
Hot key
● a key on a computer keyboard that provides a short way of performing a set of actions
Key
● One of the parts that you press on a keyboard to make it produce letters, numbers etc.
Keypad
● The part at the side of a computer keyboard that has number keys and arrow keys on
it.
Numeric keypad
● The part of a computer keyboard to the right of the main keys that has keys with
numbers on them.
Num Lock
● a computer key that you press to make the number keys below it enter numbers and
not be used for moving up and down a document
Pound key
● American the hash key on a telephone keypad or computer keyboard
Return
● a return key.
Return key
● a key on a computer keyboard that makes the computer perform an action or start a
Keyboard and computer shortcuts are designed to make routine computer functions quicker
and easier. The only problem is that many of these have gone unnoticed by the average user.
By using simple keyboard and computer shortcuts in the workplace, you can increase your
productivity and cut back on the strain caused by repetitive motions.
Most shortcuts serve to eliminate additional gestures that might involve your mouse or extra
steps, such as selecting certain menus in the current window. The shortcuts below pertain
specifically to PC users:
1. Ctrl+A
Highlight everything in the current folder, document, or page.
2. Ctrl+C / Ctrl+Insert
Copy the selected text, image, or item to the clipboard.
3. Ctrl+X
Cut (remove) the selected text, image, or item and moves it to the clipboard.
4. Ctrl+V
Paste contents of the clipboard into current program or window.
5. Ctrl+F
In most programs, this command opens up a search window (includes all browsers and most
Office applications).
6. Ctrl+S
Save an open document, file, or webpage (most browsers and programs).
7. Ctrl+Z
Undo the last action performed (supported by most programs and browsers).
8. Ctrl+Left arrow/Right arrow
Move your cursor to the start of the previous word (left) or to the beginning of the next word
(right).
9. Ctrl+Shift+Left arrow/Right arrow
Highlight the previous word (left) or highlight the next word (right).
10. Ctrl+Backspace
Delete the word to the left of your cursor.
11. Ctrl+Home
Move your cursor to the beginning of a document or page.
12. Ctrl+End
Move your cursor to the end of a document or page.
13. Esc
Cancel current/opened task.
14. Shift+Delete
Delete a highlighted item (permanently) without first moving it to the Recycle Bin.
15. Ctrl+Tab
Move through opened tabs.
16. Alt+Underlined letter
Perform corresponding command/shortcut or select corresponding option.
17. Ctrl+Click / Shift+Click
Select more than one item or file
18. Shift+Arrow
Highlight text to the left or the right.
19. Ctrl+P
Print current document or page.
20. Ctrl+Shift+V
Paste current clipboard as plain text.
21. Alt+F4
Close any opened/active windows app.
22. Shift+F7
Open thesaurus lookup in Microsoft Word.
23. Ctrl+Shift+T
Reopen last closed browser tab.
24. Windows key+M
Minimize all opened windows.
25. Windows key+L
Lock your PC.
26. Ctrl+D
Bookmark current webpage.
27. Ctrl+Shift+B/O
Open your bookmarks menu (depends on browser).
28. Ctrl+R (browser)
Refresh current page
29. Ctrl+R (Microsoft Outlook)
Start a reply to currently selected/opened email.
30. F2
Rename highlighted file(s)
Describe the GIGO (Garbage in Garbage Out) principle using a word processor
document
Garbage in, garbage out (GIGO), in the context of information technology, is a slang
expression that means regardless of how accurate a program's logic is, the results will be
incorrect if the input is invalid.
While the term is most frequently used in the context of software development, GIGO can also
be used to refer to any decision-making systems where failure to make right decisions with
precise, accurate data could lead to wrong, nonsensical results.
A program gives inaccurate results due to inaccurate data provided because a computer will
always attempt to process data given to it. Said another way, the output quality of a system
usually can't be any better than the quality of inputs.
Garbage can be data that is simply filled with errors, but it can also be data that doesn't have
any applicability to the specific circumstance. For example, imagine a company that only sells
to .NET developers. A CRM application might be able to determine the most likely targets from
a batch of leads. However, if the leads were generated from a group of Java developers who
have no interest in the product, the CRM application will produce useless results regardless
of its logic.
The solution is to not just spend time on an application's algorithms, but also spend time
validating the input and/or ensuring that the right sort of data goes into the system.
Microsoft Word is a word-processing application that can be part of the Microsoft Office suite
or a stand-alone program installed on to your computer.
The program can be used to write letters and different types of documents that can include
graphics and pictures. This guide explains how to open Microsoft Word and start a new
document, using the Windows 7 operating system.
It will feature Word 2013 for PCs, and is slightly different to earlier versions of Word. A word
processor included free with the Windows operating system is WordPad, which doesn’t have
all the features of Word but does have some formatting features.
It can be found in the ‘Start’ menu under ‘Accessories’. Click on 'All programs' and then scroll
to 'Accessories' folder
You’ll need:
● A computer with Microsoft Word installed.
Follow these step-by-step instructions to start a document in Microsoft Word
Step 1: From the desktop or from your ‘Start’ menu, open Microsoft Word.
If the Word 2013 icon does not appear you can search for it, using the 'Search programs and
files' box in the picture above.
Step 2: Microsoft Word will open up and present you with an option to select a document
template, or a blank document.
Step 3: If you don't want to use any of the templates on display, click on the blank document.
Step 4: A new blank document will open up ready for you to start typing.
Use basic features to create and edit and format a document
How to create a document
To create a document, you must either have a word processor or a computer capable of
creating a document on an online service.
The most common and widely used word processor program is Microsoft Word. However,
because of all of the different needs of users today, we've included additional options that are
available for creating a document.
1. Open Microsoft Word. If you're not sure how to open or find Word, skip to the finding
Microsoft Word section.
2. In newer versions of Word, the first screen will ask what type of Word document you
want to create. Select the "Blank document" option to create a document from scratch.
You can also select from one of the Word templates provided if you would like to create
a specific type of document.
3. Once the blank document or template is open, any new information can be entered
using a keyboard or on-screen keyboard.
4. Once complete or while working on the document, you can Save through the File tab
at the top of the Word program window.
In Windows 10, the search box is on the Taskbar next to the Start button. In
Windows 8, start typing word on the Start page and the search results will show on the right
side of the screen.
Note: Word and WordPad are two different programs. See the creating a document with
Microsoft WordPad section below for further information on this program.
If Word is not found, it needs to be installed before it can be ran, or one of the other free
alternatives can be used.
Tip: If you've purchased Office or Word in the past, older versions of Office can also be
installed on newer computers, even those running Windows 8 or Windows 10. You must have
the installation discs to install Office or Word again.
Microsoft WordPad is a free rich-text editor included with Microsoft Windows for viewing and
editing rich-text files (.RTF, .DOCX, and .ODT) files. WordPad can perform basic text
formatting like changing the font, alignment, and even inserting multimedia. However, keep in
mind that it does not support all formatting options in .DOCX and .ODT files, so some
formatting may be incorrect. To open WordPad, follow the steps below.
1. In Windows, click the Start button.
2. In the search box, type WordPad and select the WordPad application in the search
results. Once open, you should see a blank window similar to the example below.
Tip: In Windows 10, the search box is on the Taskbar next to the Start button. In Windows 8,
start typing WordPad on the Start page and the search results will show on the right side of
the screen.
blue Menu tab in the top left-hand corner of the window and select New from
the drop-down menu that appears.
Creating a document with LibreOffice and OpenOffice
Libre Office and Open Office Writer are other great free products that allow anyone to create
documents on their computer and can even support most of the features in Word.
Below are the steps on how to run LibreOffice and Open Office in Windows.
In Windows 10, the search box is on the Taskbar next to the Start button. In
Windows 8, start typing writer on the Start page and the search results will show on the right
side of the screen.
In most cases, you’ll see Styles in the Home tab, slightly right of center. This section is
the Quick Styles Gallery.
Microsoft recently added Focus Mode to Office 2016 for Mac, which eliminates distractions
and helps you focus on your work.
If you don’t see the Styles pane, right-click anywhere on the menu box at the top of the Word
document. This is called the Ribbon.
Click Customize the Ribbon. Make sure the Home box under Main Tabs is checked and
click OK.
If the Styles pane still doesn’t appear on your Ribbon, you can add the Styles feature directly
by following the same steps as above and scrolling through the Popular Commands list to
the left of the Main Tabs box.
Click Styles then click Add.
If you get a message saying you have to create a new group, find the tab under which you’d
like Styles to appear. Click it and then click New Group. Rename the group Styles. Then,
give the steps above another try.
That action adds the horizontal toolbar above to the Microsoft Word Home tab. It also
provides a more detailed popup menu on the right of the screen.
Now you know how to find Styles in Microsoft Word. By choosing a particular style, you set
parameters for the whole document. That means you avoid making manual changes.
Microsoft Word can help you be more efficient. It can automate much time consuming
processes, ensuring you spend less time messing around and more time writing. Take a few
minutes now to save hours later.
How Microsoft Word Styles Can Save You Time
Microsoft Word Styles help you automate the formatting of a document. Here’s how you can
make Styles more useful and save time.
The action of highlighting the text first prevents the whole document from changing. That’s
why this tip is good to use if you like some existing formatting in a document but aren’t happy
with other parts. Instead of going through several stylistic alterations, achieve them in a
couple of clicks.
Microsoft Word has various built-in styles. You may find many of them are almost what you
need, but not quite right. Thankfully, you can modify the style, making it completely suit your
specifications.
To get started, right-click any style in the Styles list. Choose Modify.
This opens the Modify Style window. Update the style however you like, and then click OK.
You can also select to apply this updated style to only this current document, or you can apply
it to new documents based on the current template.
If the style you’re modifying was already found in the Word Styles gallery, the Add to the
Styles gallery box is already checked. If not, you may want to check it to make the style more
accessible.
Maybe you’re taking a course, and the professor likes you to write essays with bright red
headers. That’s an example of why you might change a setting like this.
Use what you just learned if you’re generally happy with how a style looks. Your new
knowledge lets you alter specific things in seconds, without going through manual changes
later.
Table of contents are a great way to keep your documents organized and improve navigation.
We show you how to create your own table of contents in four easy steps. Free templates
included. Just place your cursor on the part of the document where you want to feature the
table of contents.
Pay attention to the dialogue box that appears. Selecting Automatic Table 1 or Automatic
Table 2 speeds up the creation process.
A Manual Table gives more control than the automatic tables, but it will take longer to update
if you need to make changes in the future.
Check out the Custom Table of Contents option.
By selecting it, you can use Styles to alter how the table of contents appears. Click on Modify.
(You will only be able to do this if you’re using the From template format.)
If your table of contents has multiple levels, pick the one you want to change and click Modify.
You’ll then see the now-familiar dialogue box used when modifying a style. Switch
characteristics up as necessary, and then click OK.
4. Rely on Styles When Working with Tables
A table is more than a mere grid of cells. In Word, tables are not just containers for data but
essential formatting tools. Find out how to manage this dual role with eight simple tips. To view
charts in Word, click Insert, then Chart.
Select the kinds of chart you want to include in your document, and then click OK.
Now you’ll see a variety of Chart Styles and options appear in a new Design tab under Chart
Tools. Word automatically does this when you select a chart.
The Quick Layout option mostly alters the chart’s dimensions, without really adjusting the
overall format of the chart. For example, if you have a bar graph, the Quick Layout feature will
only allow you to adjust the format to other versions of bar graphs. By contrast, the Chart
Styles section allows you to change the chart’s background and 3D effects.
Don’t see an option you like? Go with the next closest one and modify the Chart Styles to suit
your design preferences. Then just right click on the chart and select Save as Template.
Name your template so that you can easily find it for similar projects later. For example, “Yearly
Report Chart” or “Sales Meeting Chart” might remind you that you already have a template for
the kinds of projects you’re most likely to recreate in the future.
To access this style again, just go to the Templates folder next time you insert a new chart.
Alternatively, if you’ve already created a chart and want to change the style, you can simply
click on the current chart, and then click Change Chart Type from the Chart Tools’ Design
section. Select the previously created template and click OK.
How Will You Use Styles This Week?
As you can see, whether working with text or charts, Styles is a time-saver. Even if this
functionality is brand new to you, you’ll find ways to make it boost efficiency.
Making changes by hand disrupts your creative flow. Thanks to Styles, you can speedily set
up your document and move on with your work.
1. Title Bar - Displays the name of the application followed by the title of the presentation
2. Formatting Toolbar - Provides quick access to commands you need for formatting
3. Outline and Slides Tab - The slides tab gives you a thumbnail view of all the slides in
the presentation and allows to rearrange their order; the outline tab adds textual
content to the slides in an outline format
4. Slide Pane - Area where you build the slides for your presentation
5. View Buttons - Change the way you view the presentation; the Normal view (left
button) is the default, the Slide Sorter view (centre button) shows you only the
thumbnails and is used to sort and rearrange the presentation, and the Run view (right
button) runs the presentation from the current slide
6. Drawing Toolbar - Provides all the tools you need to draw and format objects
7. Notes Pane - Adds notes for yourself for each slide in your presentation
8. Task Pane (Windows version) - Varies based on what you are currently working on;
when you first start PowerPoint, you see the New Presentation task pane; other
possible tasks include Slide Layout, Slide Design, and Effects
9. Menu Bar - Includes all of the PowerPoint menu choices
10. Placeholders - Designate the space that will be filled with titles, text, or other objects
such as graphics or charts
11. Application Close Button (Windows Version) - Exits PowerPoint
12. Presentation Close Button (Windows version) - Closes the current presentation
Title A title
Subtitle A subtitle
Using a Slide Layout ensures that the text and other elements you enter into the placeholders
will have consistent spacing and be optimally arranged.
If the Outline and Slides panes are not displaying in the Normal view, select View
> Normal (restore panes) and it will display on the left side of the screen.
1. After adding a new slide, Type the slide title and press [Return] or [Enter].
2. To change the slide text to a first level bullet, press [Tab] or click the Demote button
on the Outlining toolbar.
3. Type the text for the first bullet and press [Return] or [Enter] to move to the second
bullet.
4. To create a sub-bullet, press [Tab] and type the text.
5. Continue to enter text for bullets and sub-bullets until the slide is complete.
● Use [Return] or [Enter] to create a new instance of the same level you are on.
For example, if you are typing a level one bullet,
pressing [Return] or [Enter]will create another level one bullet.
● To demote a line of text, use [Tab] or the Demote button. This will make a level
one bullet into a level two sub-bullet.
● To promote a line of text, press [Shift] and [Tab] together or click on
the Promote button. This will turn a level one bullet into the Title of a new slide
Navigate in a Presentation
To Move to: Do this:
The last slide in the Drag the scroll box to the bottom of the scroll bar or
presentation press [Ctrl] and [End]
The first slide in the Drag the scroll box to the top of the scroll bar or press [Ctrl]
presentation and [Home]
The next slide in the Click in the scroll bar below the scroll box or press [Page
presentation Down]
The previous slide in the Click in the scroll bar above the scroll box or press [Page
presentation Up]
Selecting Text
Knowing how to select text is a critical skill in all Microsoft Office applications. Selecting text
is a necessary step for many procedures such as deleting blocks of text or formatting.
Selection
Technique
Method
To create a highlighted selection, point at one end of the text to be selected.
Drag Press and hold the mouse button while dragging the pointer to the other end
of the text, then release the mouse button.
Select a
Double-click anywhere on the word you want to select
word
Select a Press [Ctrl] and click anywhere inside the bulleted text. You may also triple-
bullet item click anywhere on the word you want to select.
Deselect Make another selection or click the mouse button in the text area.
Spreadsheet applications
Spreadsheets are frequently used to record information and perform calculations on the
results of investigations and experiments. In mathematics, spreadsheets are particularly
useful when a number of repetitive calculations need to be performed. The main features of
the Microsoft Excel spreadsheet are described below. Open a new Excel spreadsheet to help
you identify the features described.
Formatting toolbar
The Formatting toolbar provides easy access to commands such as bold, italics, font,
alignment of text, etc.
Creating a simple worksheet
Two of the data types that can be entered into the individual cells of the worksheet are:
● Text (labels) - used to make a worksheet more readable by identifying rows and
columns.
● Numbers (values) - the numeric characters 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9 are used to
write numbers in the cells. The numbers can also begin with a + or – symbol.
Editing techniques
● To erase a mistake made while keying in data, use the Backspace key.
● To replace data already entered with other data, move the cell pointer to the cell and
type the new data. Then press Enter. The new data will be displayed in the cell.
Formulas
Numerical data is manipulated by using a formula.
For example, =B2+B3+B4 is a formula that will add the contents of cells B2, B3, and B4.
Note that if the first keystroke is not the equal sign (=), Excel will assume that you have entered
a label and will not calculate a formula.
Likewise, to find the average number of points scored per match by Peter, move the cell
pointer to C6 and key in the formula =C5/3. Then press Enter.
The average score, 14, is displayed in cell C6.
Internal Assessment Criteria and Weight
● IAC0401 Define the term spreadsheet processing
● IAC0402 List and describe different uses of spreadsheet ( types of documents created)
to represent information to users
● IAC0403 Describe the benefits of using a spread sheet application
● IAC0404 Describe the characteristics of a good document
● IAC0405 Duscuss how spreadsheets are used to transform data into useful information
and list examples of such cases
In general, messaging (also called electronic messaging) is the creation, storage, exchange,
and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data
Interchange (EDI) over a communications network
One-to-One communication
● Instant message (on a computer network)
● Personal message (on a computer network)
● Text message (on a cellular phone network)
● SMTP (on a computer network)
● Email (on a computer Network)
● Voicemail (using the PSTN)
● Fax (using the PSTN)
● Pager (using the PSTN)
One-to-Many communication
Below the toolbar are the To, Cc, and Subject fields. They shake out this way.
The To field: This is where you enter the email addresses of those you wish to send the
message to. You can do this in a couple of ways. The first is to simply click in the field and
type the address—[email protected], for instance. To enter multiple email addresses in
this manual way, place a comma after each recipient (except the last one, of course).
The To field also supports auto fill, meaning that if the person you’re intending to send a
message to is in your list of contacts or you’ve received a message from this person in the
not-too-distant past, all you have to do is start typing their name and a list of matching contacts
will appear. Select the one you want, press Return, and the complete address will appear in
the field.
Alternatively, you can expose the Address panel (select Window > Address Panel or press
Command-Option-A) and double-click on contacts you want to add. (If the contact has more
than one email address, double-click the one you want to use.) If you’d like to add a group, it’s
the same idea—double-clicks on the group to add all its members who have email addresses
to the To-field. (Stay tuned for a tip on why you might not want to do this.) To remove a recipient
from the To-field, just select the email address and press the Mac’s Delete key.
Use the Address panel to add recipients.
The Cc field: Seasoned readers will know that Cc stands for Courtesy Copy (some also refer
to it as Carbon Copy) and is the email way of indicating “This message isn’t really directed at
you, but it’s something you should be aware of.” You might, for example, use the To field for
people you’re collaborating with on a work project and Cc the boss so she’s aware of your
progress.
Before we get to the Subject field, here’s that promised tip about the To and Cc fields. There
will be times when it’s unwise to use either. Suppose, for example, you’ve composed a
somewhat delicate message with 25 recipients. If you place those 25 addresses in the To field
(or split some of them out to the Cc field), everyone who receives that message is now aware
of every email address you’ve exposed. This can be a Bad Thing, because some people prefer
that such an address not be shared with every Tom, Dick, and Mary you know.
The Bcc field: It’s for this reason that the Bcc (Blind Courtesy Copy) field exists. Any
addresses placed in the Bcc field are not exposed to your recipients. A helpful technique many
people use is to put their own address in the To field (because you have to
put something there) and place all other addresses in the Bcc field.
And where is this alleged field? Just choose View > Bcc Address Field (or press Command-
Option-B), and it will appear below the Cc field. Once you’ve enabled this option, Bcc will
appear in every New Message window you create.
The Subject field: Every message you send should have a Subject field. And, as its name
implies, this field is where you put a word or short phrase that describes what your message
is about.
The-From menu: If you have multiple email accounts configured in Mail, you can choose
which account to send from via this menu. Why? Suppose you have both work and personal
email accounts configured on your Mac. For work-related messages you’ll want to send from
your work address. For messages complaining to your friends about your work, you’ll use your
personal address.
The Customize menu: To the left of the From pop-up menu is the Customize menu. Click it
and you have options for showing or hiding the Cc, Bcc, Reply-To, and Priority fields. As I
explained when discussing Bcc, once you enable one of these fields, it will appear in every
New Message window. When you choose Customize from this menu, the top of the New
Message window expands and shows you every possible field. Tick the checkbox next to
those fields that you always want to see when composing a new message.
The Reply-To field: Like Bcc, this is another field that’s hidden by default. There may be times
when you want to send a message from one account, but receive any replies to it with a
different account. For example, you’ve sent a message from your iCloud account but want
replies to go to your Gmail account. Place your Gmail account’s address in the Reply-To field,
and when people receiving your message press Reply, their messages will be sent to that
Gmail account.
The Priority menu: It’s possible to mark messages you create as Low, Normal, or High
priority using this menu. Recipients will see your message marked with two exclamation marks
(!!) if it’s sent as high priority.
If all of your messages are high priority, none of them are. And by that I mean that you should
save high priority for only those occasions when something is really, really important—as in,
we’re-all-going-to-be-fired-if-you-don’t-reply-immediately or Timmy-fell-down-the-well
important. Mark each of your kid’s softball game announcements or an entirely uninteresting
press release as high priority, and the people you communicate with will learn to ignore your
messages. In short: Don’t cry wolf.
Composing messages
Finally, to the message body—that large area at the bottom of the New Message window that
begs to be filled. You could, of course, simply click in this area and start typing, but there are
more interesting ways to fill this void. To see what I mean, let’s return to the toolbar.
Attach Document: This first button is one way to send one or more files along with your
message. Click it and a navigation sheet appears which you use to choose the documents
that will be bundled with your message.
Attachments appear inline, meaning that rather than displaying attachments in some kind of
field, they appear in the message body. Image and media files display a preview, whereas
other kinds of documents—Microsoft Word or Apple’s Pages files, for example—appear as
document icons. This inline business doesn’t affect how your recipients will see the
attachments. Rather, the configuration of their email client determines how attachments are
displayed.
You don’t have to use the Attach Document button to add attachments. If you
like, just drag attachments into the message body from the Finder.
Also, be aware of the size of your attachments. It’s not unusual for messages that total more
than 10MB to be blocked by one of the Internet service providers responsible for delivering it.
If you have large files to send to someone, find another avenue such as Drop box or Sugar
Sync for sharing those files.
Show Format Bar: By default, new mail messages are formatted as rich text. Rich text can
be formatted using different fonts, sizes, colours, and justification, much like you’d format text
in a word processor. Plain text is exactly that—no italics, boldface, or colours.
Speaking of rich text, your message will be more readable (and look more professional) if you
keep the formatting to a minimum.
Show/Hide Photo Browser: Want quick access to your iPhoto library so you can easily attach
an image? Click this button, and an Image Browser window appears that includes the contents
of your iPhoto library arranged by events, photos, faces, places, and albums you’ve created.
(If you’re using Apple’s Aperture, its library will appear here as well, as do the images you’ve
captured with Photo Booth.) Browse to the images you desire and drag them into the message
body.
Show/Hide Stationery Pane: Apple’s Mail includes stationery templates much like Pages
includes templates for creating newsletters and business correspondence. Click this button
and you find six stationery categories—Favorites, Birthday, Announcement, Photos,
Stationery, and Sentiments. Within the latter five categories are a number of options—Dinner
Party and Baby in the Announcements category, for example. Select one, and the template
appears in the message body, complete with boilerplate text and, in some cases, images.
Just edit this text to personalize it, drag in images to replace those of the lovely models, and
send. How your recipients see these messages depends on the configuration of their email
clients. Some will see everything inline as intended, while others will receive the stationery as
an attachment.
Another warning regarding taste: For certain kinds of correspondence, these templates may
be a little too cute or casual. Be sure your recipient will appreciate them.
Receiving email
Now that you’ve propelled your thoughts into the world, there’s every chance that you’ll receive
replies to them. Let’s look at getting the messages that are rightfully yours.
When we talked about the anatomy of the Mail window, I told you that you could check for
email any time you liked just by clicking the Get New Mail button on the left side of the Mail
window’s toolbar. (Or by clicking and holding on the dock’s Mail icon and choosing Get New
Mail.) While this gives you absolute control over when you receive your email, it can keep you
from dealing with important messages in a timely manner. Email pros choose, instead, to
automatically receive messages on a regular schedule.
You configure that schedule by choosing Mail > Preferences (Command-comma) and clicking
the resulting window’s General tab. In this window, you’ll spy the Check For New
Messages pop-up menu. From this menu you can choose to check for new mail every 1, 5,
15, 30, or 60 minutes. Or you can choose to receive email only when you issue the Get New
Mail command.
Use the General preference to choose how often Mail checks for new messages.
With one of these automatic options configured, Mail will do its duty and grab what new email
is available. Unless you’ve configured your account to file messages in some other way (a
subject we’ll visit in an upcoming column), your new messages will appear in the inbox in the
Messages pane. Mail needn’t be the front most application to receive email, but it has to be
running.
When you receive new messages, by default you’ll hear a new message sound and the Mail
icon in the dock will bounce. You’ll also see a badge in that icon’s top-right corner indicating
the number of unread messages in your inbox.
Click the inbox and, as I explained in the last lesson, you’ll see a list of your messages in the
Messages pane. New messages are marked with a blue dot. Any messages colored orange
are considered by Mail to be junk. Select a message and its contents will appear in the
Message Viewer area.
Intranet and the extranet
Intranets
Definitions of intranets vary by source, due to the vast range of functions and capabilities
available. However, at their most basic level, intranets can be defined as private networks,
accessible only to an organization’s staff. Commonly, intranets are used to:
● Communicate within the business: both top-down and bottom-up by distributing
news and announcements, providing feedback and sharing information
● Manage documents and business information: intranets offer a centralized location
to host, search and access vital business content
● Facilitate common business processes: through use of workflow and forms, an
intranet can enable users to self-serve for many common business processes, such
as booking holidays or reclaiming expenses
● Enable collaboration: functionality such as team areas, forums, blogs and social
tools can support employees to work together effectively, regardless of their
department or location
● Support strategic business objectives: these may span improved employee
engagement and morale, embedding a business culture, increasing staff retention or
encouraging better productivity and efficiency
At their most basic level, intranets support employees to do their jobs. In an increasingly
globalized workplace, they provide huge benefits by connecting employees across
organizations and providing the digital tools they need to perform and thrive.
From a strategic perspective, these benefits have measurable impact on the employee
experience within the workplace. This, in turn, enhances the experience they deliver for
customers – and ultimately contributes to bottom line benefits and business success.
Intranet portals
Perhaps the easiest way to understand where the distinction lies between an intranet and an
intranet portal is to step back and consider the definition of a portal in isolation:
The focus is on providing access, or an opening. An intranet portal, therefore, is an intranet
platform or window that acts as a doorway to other sites, applications or tools outside of the
intranet itself.
In simple terms, this means users can access multiple applications and tools from one place,
often using a single login, without having appearing to leave their intranet at all.
Extranets
An extranet permits controlled access to authorized external users to a company intranet.
Essentially, extranets take the concept of an intranet to another level, allowing customers,
vendors, partners or selected third parties access to a company intranet, or selected areas of
it. Extranets offer the same benefits to users as an intranet: centralized hosting of content and
information, ensuring a single version of truth and efficiency, alongside communication and
collaboration tools.
This can prove extremely valuable in organizations where you need to share information or
confidential data with a third party, by providing a more secure and efficient process than
traditional channels such as email.
For example, an organization can provide extranet access for a supplier to manage ordering,
tracking and inventory management, improving efficiency and lowering business overheads.
In a collaborative industry such as healthcare, extranets can be used to bring together different
care providers or Trusts to share best practice and improve patient care.
If your organization is undertaking a project that requires input from third party vendors, limited
access can be provided to support efficient collaboration. With effective security and
permissions settings, dedicated areas of your intranet can be opened securely to third parties,
while protecting your company assets.
Intranet vs. Intranet Portal vs. Extranet
As the digital workplace continues to evolve, more and more organizations are looking to bring
together dispersed or silo-ed employees and partners to communicate and collaborate more
effectively.
The demand for streamlined processes and better collaboration means the terms ‘intranet’
and ‘intranet portal’ are already used interchangeably; going forward, this may become the
case for extranets also. Intranets will have these forms of functionality automatically built in,
answering the demand of the consumer. It will simply be a matter of choice as to how and
when we elect to use those features.
(With integration functionality, your company intranet can serve as the hub for all business
processes, applications and content: streamlining day-to-day tasks and improving the user
experience. It’s an intranet portal or ‘doorway’ for your business, but on another level.)
The diversity among networks connected to the Internet is partly due to an evolution of
technology resulting in new networks having higher reliability, better throughput etc. However,
there will (at least for a long time) exist a need for fundamental different network architectures
as no network technology today can supply a solution that covers all aspects of
internetworking.
This section introduces the basic architecture of how the Internet is organized. The description
starts at a certain abstraction level that does not include a description of the underlying
physical network technologies such as Ethernet, Token Ring, FDDI etc. These are all
described in Computer Networks. The basic idea of an internet is to provide the possibility of
transporting data from one network to another through a connection in a way that both parties
agree on and understand. The connection between the two consists of a gateway computer
that is physically or logically connected to both networks (logically in the case of a cordless
network). The situation between two networks looks like:
Each cloud is a network with an arbitrary number of connected nodes. The gateway between
them serves as the only way of exchanging data directly between the two networks. Later in
this chapter it is described how two hosts can communicate even though they are not
connected directly but must go through intermediate networks.
Address Scheme
In order to reference any node as a unique point on the Internet, a global two dimensional 32-
bit integer address space has been defined which gives a maximum number of 4G connected
nodes on the Internet. The first element is a noted and the second is a nodded, that is:
Address = (noted, hosted)
A common notation for specifying an Internet address is by using four fields of decimal integer
numbers ranging from 0 to 255 separated by decimal points, e.g.:
128.141.201.214
. which is the IP-address of the World-Wide Web info server at CERN.
Address Classes
In order to provide IP-addresses which suit both large networks with millions of hosts and
small networks with a few hundred hosts, the noted part and the hosted part can occupy a
varying part of the IP-address. The number of possible nodes on a network, being the number
of bits assigned to the hosted, categorizes the address space into 5 classes:
An interesting thing to note about having the IP-address containing information of the network
is that a gateway as a consequence of being connected to two networks must also have two
IP-addresses in order to be accessible from both sides. This is the reason for not referring to
a number of hosts but nodes or connections to the network. In the Gateways and Routing it is
described how the current addressing scheme influences the routing algorithms used on the
Internet.
Physical Addresses
It is important to note that Internet addresses are an abstraction from the addresses in a
physical network implementation like Ethernet. They assure that the same addressing scheme
can be used in every part of the Internet regardless of the implementation of the underlying
physical network. In order to do this, a binding must exist between the IP-address and the
physical address. Dependent on the physical network addressing scheme, this binding can
either be static or dynamic. An example of the latter is the Ethernet addressing scheme that
is a 48-bit integer. As it is not possible to map 48 bit into a 32-bit IP-address without losing
information, the binding must be determined dynamically. The Addressing Resolution Protocol
(ARP) is specially designed for binding Ethernet addresses dynamically to IP-addresses but
can be used for other schemes as well.
Sub networks
As will be explained in the section Gateways and Routing, Internet routing between gateways
is based on the noted part of the IP-address. In the past few years a very large number of
small networks with only a few hundred nodes have been connected to the Internet. Having
so many nets makes the routing procedure complicated and time consuming. One solution to
this is to introduce a subnet addressing scheme where a single IP-address spans a set of
physical networks. This scheme can also be used to divide a large number of nodes into logical
groups within the same network.
The scheme is standardized and described in the RFC IP Subnet Extension. The idea is
basically to use three coordinates in the IP-address instead of two, that is:
Address = (noted, submitted, nodded)
However, the submitted only has a special meaning "behind" the front subnet gateway. The
rest of the Internet cannot see it and treats the submitted and the nodded as the hosted. Only
the gateways indicated in the figure need to know of the subnets and can then make the
routing accordingly.
Furthermore, the subnet hierarchy does not have to be symmetric. This is indicated in the
figure where subnet 3 and 4 are subnets of subnet 2, whereas subnet 1 does not have any
subnets.
A 32-bit subnet mask for each level in the subnet hierarchy is required in order to make the
gateway routing possible between the subnets. This mask specifies what part of the IP-
address is submitted and what part is the nodded by simple Boolean Ending.
Special Addresses
One advantage of having the network encoded as a part of the IP-address is that it is possible
to refer to the network as well as individual hosts. Three special cases have been specifically
allocated for exploiting this feature:
Broadcast Messages
It is possible to generate as broadcast message to all nodes on a network by specifying the
noted and letting the hosted be all 1s. However, there is no guarantee that the physical actually
supports broadcast messages, so the feature is only an indicator. It is not possible to make a
broadcast message to the whole Internet in one operation. This is to prevent the network from
flooding the Internet with global broadcast messages.
This network
Situations might appear where a host on a network does not know the noted of the network
that it is connected to. This happens every time a host without stationary memory wants to get
on to the net. However, the host does know its physical address which is sufficient for
communicating locally within the network. In this situation it sets the noted to 0 and sends out
a broadcast message on the local network. Two Internet protocols are available for doing this:
Local Host
By convention the Class A address 127.0.0.1 is known as a loopback address for the local
host. This address provides the possibility of accessing resources local to your own system.
On Unix platforms, this is defined in the /etc./hosts system file.
where the top node is called the root domain with the null label (empty string) but referenced
as a single dot. Each node in the tree is labelled with a name consisting of at most 63
characters taken from the set of
● letters from A-Z (case insensitive)
● digits from 0-9
● hyphen
The advantage of having a hierarchical structure of the name space is that administration of
the space can be delegated to different organizations without any risk for name collision. This
is very important as the size of the DNS database is foreseen to be proportional to the number
of users on the Internet as the database not only can contain information about hosts but also
about personal mail addresses.
The structure shown above is very similar to the Unix file system. The most important
difference is that a record in the DNS database is indexed from the bottom of the tree and up
whereas a Unix file is indexed from the top of the tree, e.g.:
info.cern.ch
The info is the host name and the cern.ch is the domain name.
/usr/local/bin/emacs
emacs is the file name and /usr/local/bin is the path
Another similarity is aliases that are pointers to the official host name in the DNS database. In
the Unix file system, it is implemented as (soft) links.
DNS is a client-server-based application consisting of the Domain Name Servers and the
resolvers. A server contains information about some segment of the DNS database and makes
it available to clients or resolvers. Resolvers are often just software libraries that are linked
into any Internet program by default.
In the next section it is described what happens when a host has more than one physical
connection to the Internet and hence more than one host name.
Direct Routing
The transmitting and receiving host are connected to the same physical network
Indirect Routing
The transmitting and receiving host are separated by one or many networks
In the first case, routing is a question of resolving the IP-address into a physical address as
described in Physical Addresses. Then the sender encapsulates the IP-datagram into physical
frames and sends it directly to the destination. This section will give an overview of how the
latter case is handled using gateways.
Routing does not lead to changes in the original message. The source and destination address
remain the same. The source always specifies the address of the original host and the
destination address is that of the destination host. The original message is instead
encapsulated in another message in order to specify the next hop address.
The standard routing algorithm used on the Internet is based on routing tables situated in
every gateway. An advantage of the Internet Address Scheme is that it is sufficient for a
gateway to look at the noted part of the IP-address in order to find the destination network.
Only the gateway directly attached to the destination network needs to look at the hosted in
order to resolve the IP-address into a physical address.
However, even if the routing tables only contains nets, it would be impossible to have routing
information on every node on the Internet. The solution to this problem is to use partial routing
information. The idea is to first look at the routing table to see if the noted is there. If it is not
then the gateway sends the IP-datagram to a default destination as illustrated in the following
figure.
As the default gateway again might send it to its default destination a mechanism must assure
that the routing converges towards the final destination. This guarantee is provided by a set
of core gateways that contain full routing tables. All partial routing finally ends up in an core
gateway and the message can then be directed to the right subnet of the Internet.
Until no assumptions have been made on how the gateways actually get the routing tables
and how updated information gets spread throughout the Internet. There are several protocols
to do this but before mentioning them, it is necessary to look into the organization of gateways
on the internet.
The CORE Gateways are a small group of gateways such as the NFSNET backbone net
which guarantees that the partial routing algorithm will converge towards a final destination.
An autonomous system is a set of networks organized under the same administrative
authority. All routing information within the system are passed to other autonomous system
via a few exterior gateways close to the outer edge of the system. The protocols indicated in
the figure are shortly summarized below:
GGP Gateway-to-Gateway Protocol
This is set of protocols used internally between core gateways in order to exchange updated
routing tables. They are often based on the Shortest Path First (SPF) algorithm where a data
base contains the complete network topology and connectivity in every gateway. Then the
core gateway can compute the best shortest routing path and guarantee that it will converge.
Address Scheme
The basic disadvantage of having the noted as a part of the IP-address is that if a host is
moved from one place to another it must have a new IP-address. As more and more portable
computers are connected to the Internet this has turned out to be a real problem in the address
scheme.
Routing
When routing is based on the noted of the IP-address multi-homed hosts might have a
significant difference in access time dependent of the IP-address used.
If Host B in the figure wants to communicate with Host C in the figure and chooses the IP-
address of node e then the message have to go through Host A. Unless the system
administrators explicitly have told the local part of the Domain Name Service to return the IP-
address of node d there is no way for Host B to know the optimal route.
Security
Another important aspect not described here is security considerations when using the
Internet. What means do people have to gain access to classified information when
communicating to Internet sites? Today security precautions on the Internet are often based
on the assumption that the transport service provided by the Internet can be considered as a
trusted carrier. This is equivalent to the generally accepted assumption that letters send via
the public postal system is actually delivered to the addressee without being read by anyone
during transportation.
Internal Assessment Criteria and Weight
● IAC0601 Define the term internet
● IAC0602 Describe the term connectivity
● IAC0603 Discuss the components/constituents and the purpose of internet enabling
technologies and terms. ( Range: Internet addresses- Internet protocol (IP)
addresses and domain names)
● IAC0604 Discuss how data travels over the internet in relation to networking
concepts
● IAC0605 Explain the different components required to connect to the internet.
(Range: Internet Service Providers (ISPs), wired and wireless connections)
ICT and the internet are powerful educational resources that are transforming the process of
learning and teaching in schools and across the community. With a computer and internet
connection – or even just a mobile phone – pupils and adults alike can gain access to a vast
amount of information and communicate and collaborate in a variety of ways.
Not all information available via the internet is accurate, or even legal, however, and schools
have a duty to teach pupils about safe and responsible behavior using technology. Governing
bodies have a duty to understand the implications of the uses of ICT within schools and the
need to provide suitable safeguards for pupils and the school.
Good practice suggests that all schools should actively consider ICT safety and security and
that they should take the following steps:
• Governors should develop an awareness of the issues and risks of using ICT
in schools alongside the benefits. Schools could consider appointing an ‘e-
governor’ to lead on ICT including safety issues.
• Governors should expect the school to develop a clear strategy on ICT which
defines roles and responsibilities for management, implementation and safety,
including the school’s Acceptable Use Policy (AUP).
• Resources should be made available to provide a secure ICT system for the
school and to support internet proficiency training for children, parents, staff
and, wherever possible, for the wider community.
• Internet/ICT safety should be reviewed regularly as part of the review of the
school’s health and safety and child protection policies. It is suggested that the
annual report and school prospectus should contain a summary of the school’s
policies on ICT safety for the benefit of parents.
• The school’s risk management strategy should look at the risk of breaches of
ICT security and how these should be dealt with both for pupils and for staff.
• Staff disciplinary procedures should cite the serious misuse/abuse of ICT as a
basis for disciplinary action.
All schools want to create a safe and secure ICT learning environment but many are unsure
how to begin. There are three components that schools need to establish:
• An infrastructure of whole-school awareness, responsibilities, policies and
procedures
• A secure ICT system
• A comprehensive internet safety education programme for the whole school
community.
Whole-school awareness
There is a need to raise awareness of ICT safety throughout the school. It needs to be stressed
that this affects every member of the school community, including the governing body. All
schools should put in place overall policies for the reasonable uses of ICT, such as an AUP.
Sample policies are available, online and via LEAs, which schools can use as a basis for their
own policies. An effective internet safety policy needs to be tailored to the individual needs of
the school, and is as much about an understanding and consideration of the issues as having
a written policy document. The policy should be developed in consultation with all key
stakeholders, including parents and children, so that there is an understanding of the issues
and the safeguards across the school community.
All staff and pupils need to observe ‘simple, everyday’ security measures such as not sharing
password information, teachers logging out of MIS software and not leaving their computers
unattended, and regular backing up of vital assessment data. There are a range of tools that
schools can use to make their ICT system secure:
• Firewall and virus protection to prevent unauthorized access to the school’s
network. A firewall can prevent information about pupils and the school being
seen by unauthorized users and protect computer systems and files from
viruses that can corrupt or destroy important information. The governing body
should ensure that a suitable firewall is in place.
• Software filters: different types of filters are available to restrict access to
inappropriate websites and some schools go further by subscribing only to
collections of websites that have been vetted and approved for access by
children. Schools should monitor the use of ICT on a regular basis, by keeping
track of information accessed and/or downloaded from the internet to check its
suitability.
• A clear policy on using personal devices: as increasing numbers of pupils
and staff use laptops, memory sticks and other portable storage devices on the
school network, there needs to be a policy regarding their use, to protect the
school network from viruses and inappropriate access to sensitive data.
Risks to children
There is a risk that, whilst online, a young person may provide information that can identify
them, or arrange to meet someone they have communicated with online. The governing body
needs to ensure that every effort is made to educate pupils regarding these issues. Often, of
course, pupils are at most risk outside the school environs, so where possible, advice should
be supplied to parents and the local community.
Misuse of resources
Electronic access to a wealth of information and imagery brings with it the danger of
assignments and projects being copied from the internet or from a CD-ROM; at best, this may
mean that children have no real grasp of the material they are appropriating, at worst it may
mean they are guilty of plagiarism and cheating.
Unauthorized access
Schools generate information and store data, only some of which may be intended for a wider
audience. The governing body should check that suitable storage and back-up systems are in
place.
Project Management Institute, Inc., A Guide to the Project Management Body of Knowledge
(PMBOK Guide), 4th ed. (Newtown Square, PA: Project Management Institute, Inc., 2008), 273.
Tzvi Raz, Aaron J. Shenhar, and Dov Dvir, “Risk Management, Project Success, and