Professional Documents
Culture Documents
ICDL Computer & Online Essentials 1.0 QRG
ICDL Computer & Online Essentials 1.0 QRG
ICDL Computer & Online Essentials 1.0 QRG
This quick reference is for Microsoft Windows 10, Google Search, Chrome and Outlook 2016.
This module sets out essential concepts and skills relating to the use of
computers and devices, file and application management, networks, online
information, online communication, and safety.
© 1997-2019 ICDL Foundation. This Quick Reference may be used by candidates to assist in preparation for this ICDL module test. ICDL Foundation does not warrant that use of this guide will ensure passing of
the test. Screen shots used with permission from Microsoft. Tool and application-specific details are correct as of March 2019. Please note that some tools and applications are subject to frequent update and
change.
• Click the Start button. OpenOffice (Writer, Calc, Impress), and 2.1.2 Identify common file types like:
LibreOffice (Writer, Calc, Impress).
• Select the Profile icon. File type File File Icon
• Web Browser – Examples include Google Extension
• Select Switch account.
Chrome, Mozilla Firefox, Apple Safari, Microsoft Word Processing .docx
• Select the relevant Profile icon and enter the Edge and Microsoft Internet Explorer. They are
appropriate login information. used for accessing information on the World Wide
Web. Spreadsheet .xlsx
1.1.5 Connect a device, equipment to a computer using
a USB connection. • Communications – Examples include email,
messaging, voice call and video call applications,
• Insert the flash drive (or other device or equipment) Presentation .pptx
which are used for communicating over the
into the USB port on the computer.
Internet.
• The computer will signal that a new device has
• Social networking – Examples include social Portable Document .pdf
been detected.
network websites and Internet forums used for Format
• Save or view files and folders as needed. interacting with like-minded people over the
1.1.5 Disconnect a device, equipment from a computer Internet.
Image .gif, .jpg, .bmp
using an appropriate routine. • Design – Examples include photo-editing
• Click the Safely Remove Hardware and Eject Media applications used for editing digital images
icon in the notification section of the taskbar. (Photoshop, GIMP) and desktop publishing Audio .mp3, .wav
applications used for creating professional page
layouts (Adobe InDesign, Microsoft Publisher).
Video .avi
2 Managing Files and Applications
• Click the device to remove. 2.1 Introducing File Management
Compressed .zip
• When a Safe to Remove Hardware message 2.1.1 Understand the function of the operating
appears, remove the device. system's file management application, desktop,
and taskbar to efficiently manage and access
1.1.6 Connect computers, devices, equipment using a Executable .exe
files, folders, applications.
Bluetooth connection.
• File Management Application – A graphical user
• Click the Start button. interface used to access and manage files and
2.1.3 Understand how an operating system organises
• Click the Settings icon. folders stored on a computer or drive.
drives, folders, files in a hierarchical structure.
• Click Devices. • File Explorer displays the hierarchical structure of
files, folders, and drives on a computer.
2.1.3 Navigate between drives, folders, sub-folders,
files.
• Click the File Explorer icon on the taskbar.
2.2.3 Select adjacent files, folders. • Select Sort by, click Date Modified, click Sort by, • Type the administrator password or provide
and click Ascending. confirmation if prompted.
• Click the first file or folder, hold down the Shift key,
and then click the last file or folder. 2.2.6 Sort files in descending order by date modified. 2.4.2 Shut down a non-responding application.
• Click the View tab. • Press the Ctrl+Alt+Delete keys.
• Select Sort by and click Date Modified. • Click Task Manager.
2.3 Storage
2.3.1 Identify the main types of storage media like:
• Internal hard drive – A non-volatile, random access
storage device for digital data.
• External hard drive – A hard disk located outside
the computer.
• Network drive – A drive shared by multiple users or
devices.
• Online/Cloud file storage – A file storage service
• Release the Shift key. available over the Internet.
2.2.3 Select non-adjacent files, folders. • Select the application.
• USB flash drive – A portable digital storage device.
• Hold down the Ctrl key, and then click each file or • Click End task.
• Memory card – A digital storage device used in
folder to select. cameras and other devices. 2.4.3 Capture a full screen.
2.3.2 Identify file size, folder size, storage capacity • Press the Print Screen key (PrtScn).
measurements like: • Right-click and click Paste as required.
Unit Bit Size Comparable To 2.4.3 Capture an active window.
• Open a window on the desktop.
Kilobyte (KB) 1,024 ½ page of plain
Bytes text • Press the Alt key + Print Screen key.
• Right-click and click Paste as required.
Megabyte (MB) 1,024 KB 700 pages of
plain text or one 3 Networks
picture/graphic
3.1 Network Concepts
Gigabyte (GB) 1, 024 MB A set of 3.1.1 Define the term network.
2.2.4 Copy files, folders between folders, drives. encyclopaedias • More than one computer or device connected
• Right-click the file or folder to copy. 1,024 GB through physical (wired) and/or wireless
Terabyte (TB) A bookstore full
connections.
• Click Copy. of books
3.1.1 Outline the purpose of a network:
• Navigate to the new location. Petabyte (PB) 1,000 TB 500 billion • To enable computers and devices to share data,
• Right-click and click Paste. pages of applications and devices securely.
2.2.4 Move files, folders between folders, drives. plain text
3.1.2 Understand the concepts of downloading from,
2.3.3 Display file, folder, drive properties like: name, uploading to a network.
• Right-click the file or folder to move.
size, location.
• Click Cut. • Downloading from a network – Copying a file from a
• In File Explorer, right-click the file, folder or drive. computer on a remote system to a local computer or
• Navigate to the new location. device.
• Select Properties.
• Right-click and click Paste. • Uploading to a network – Copying a file from a local
• Click OK to close.
2.2.5 Delete files, folders to the recycle bin/ computer or device to a computer on a remote
2.4 Managing Applications system.
wastebasket/trash.
2.4.1 Install an application from a CD or DVD. 3.1.3 Understand the term Internet.
• Right-click the file or folder to delete.
• Insert the disc into your computer. • A world-wide system of linked computer networks,
• Click Delete.
• Many installation CDs or DVDs automatically open connecting billions of computers and devices.
2.2.5 Restore files, folders to original location.
an installation wizard for the program. In these 3.1.3 Identify some of the Internet’s main uses like:
• Hyperlink – A link that transfers the user from one • Click Settings.
web page to another web page by clicking on a • Scroll to the end of the Settings page and click
highlighted word or icon. Advanced.
4.1.2 Understand the function of search engines. • Click Site Settings under Privacy and Security.
• A website used to search for information on the • Click Pop-ups and redirects under Permissions.
World Wide Web, based on the search criteria • Select Bookmarks.
entered in the search field. • To allow pop-ups, turn the Blocked slider to On.
• Select Bookmarks manager. • To block pop-ups, turn the Allowed slider to Off.
4.1.2 Identify some common search engines.
• Click the Organise icon. • Click X to close the Settings tab.
• www.google.com, www.yahoo.com, www.bing.com.
• Select Add new folder. 4.3.3 Understand the term cookie.
4.1.3 Carry out a search using a keyword, phrase.
• Enter a name and click Save. • A text file stored on a user’s computer that monitors
• Click the Google Chrome icon on the taskbar to
open the web browser. 4.2.1 Delete a bookmarks / favourites folder. their web habits.
• Right-click the desired folder in Bookmarks 4.3.3 Allow, block cookies.
manager, and click Delete. • Click the More button in the web browser.
4.2.1 Add web pages to a bookmarks / favourites folder. • Click Settings.
• Click in the search box in the Google search engine • Go to the webpage that you want to add to • Scroll to the end of the Settings page and click
window or in the Google Chrome address bar. bookmarks and click the star icon in the address Advanced.
bar.
• Click Site Settings under Privacy and Security.
• Enter a new name if required.
• Click Cookies under Permissions.
• Select the desired folder from the Folder drop-down
list. • To block cookies, turn the Allow sites to save and
read cookie data (recommended) slider to Off.
• Click Done.
• To allow cookies, turn the Blocked slider to On.
4.2.2 Download files to a location. Allow sites to save and read cookie data
• Right-click on the hyperlink to the file in the browser (recommended) is displayed.
window. • Click X to close the Settings tab.
• Enter the keyword or phrase and press the Return • Select Save link as. 4.3.4 Delete history, temporary Internet files, saved form
key.
• Select a location and enter a filename. data, saved passwords.
4.1.3 Carry out a search using an exact phrase.
• Click Save. • Click the More button in the web browser.
• An example email address is: • Bcc – Blind carbon copy addresses are not visible
to the other recipients, so use to keep the recipient
private from the other recipients.
jdoe@icdl.org 5.2.3 Add a file attachment.
• On the Home tab, in the New group, click the New
Contact button.
Username @ Domain Name Extension
• On the Message tab, in the Include group, click the • Enter the contact’s details in the required fields.
• Username – A unique name identifying the user’s Attach File button.
email name
• @ – Used to separate the user name from the
domain
• Domain Name – The location/company of the email
address
• Extension – Typically identifies the type of • Select the desired file from the Recent items list.
organisation or the country the email address is • Or select Browse this PC, browse to the file
associated with location, select it and click Insert.
5.1.2 Understand the function and features of
5.2.3 Remove a file attachment.
messaging, audio call, video call tools and identify
some common examples. • Select the attachment in the Attached field.
• Used to communicate in real-time with one or more • Press the Delete key.
contacts over the Internet using messages (text, 5.2.4 Send an email.
images, audio and video recordings), voice calls
and face-to-face video calls respectively. Many • Click Send. • In the Contact tab, in the Actions group, click the
tools combine messaging, audio call and face-to- Save & Close button.
5.3 Receiving Email
face video call functionality. 5.4.3 Create a distribution list / mailing list.
5.3.1 Open an email.
• Common examples include Skype, Whatsapp, • Click the People button on the navigation bar.
Facebook Messenger. • Select the Inbox icon in the Folder pane.
• On the Home tab, in the New group, click the New
5.1.3 Understand the function and features of social • Double-click the email. Contact Group button.
networking sites and identify some common 5.3.1 Close an email.
examples. • Enter a name for the group in the Name field.
• Click the Close button at the top right of the window. • On the Contact Group tab, in the Members group,
• Websites that allow users to create profiles,
connect with other users, and share content and 5.3.2 Use the reply, reply to all function. click the Add Members button.
comments, typically for the purpose of building • Open the message. • Select from where to enter members’ details and
online communities. enter the desired contact’s details.
• In the Respond group, click the Reply or the Reply
• Common examples include Facebook, YouTube, all button. • In the Contact Group tab, in the Actions group, click
WhatsApp, Instagram, Twitter, and LinkedIn. the Save & Close button.
• Enter any text required.
5.1.3 Understand the function and features of forums 5.4.3 Delete a contact, distribution list / mailing list.
and identify some common examples. • Click Send.
• Select the contact or contact group to delete.
• Online discussion sites that allow users, typically 5.3.2 Identify when the reply, reply to all function should
with shared interests, to have conversations by be used. • On the Home tab, in the Delete group, click the
Delete button.
posting messages. • Use Reply to send the message to the sender only.
5.4.3 Update a contact.
• Common examples include Reddit and Quora. • Use Reply All to send the message to the sender
5.1.4 Recognise good practice when using and to all of those in the To and Cc fields in the • In the contact list, double-click the contact to
communication tools like: original message. update.
• Use an appropriate communication tool and tone for 5.3.3 Forward an email. • Update the fields as required and click Save.
the audience and content. • Open the message and in the Respond group, click • Click the Close button.
• Be accurate, brief, clear. the Forward button. 5.4.3 Update a distribution list / mailing list.
• Do not inappropriately disclose private or sensitive • Enter email addresses into the To and Cc fields as • In the contact list, double-click the contact group to
information. required. update.
• On the Folder tab, in the New group, click the New • Click Send Update.
• To perform a quick scan, select Quick Scan.
Folder button. • Select Send updates only to added or deleted
• To perform an advanced scan, select Advanced
• Enter a name for the folder in the Name: field. attendees or Send updates to all attendees and
Scan, Full scan and Scan now.
click OK.
• Select where to place the folder, Inbox should be • To perform a custom scan, select Advanced Scan,
highlighted. 5.6.3 Accept, decline an invitation.
Custom scan, Scan now, select the files or location
• Click OK. • Open the meeting request. to scan and click Select folder.
5.5.3 Delete an email folder/label. • On the Meeting tab, in the Respond group, click 6.2 Well Being and Accessibility
Accept or Decline.
• Select the folder for deletion. 6.2.1 Recognise ways to help ensure a user’s well-
being while using a computer or device like:
• On the Folder tab, in the Actions group, click the
Delete Folder button. • Take regular breaks – To avoid potential eye, neck,
back and wrist strain
• Click Yes to the displayed message.
• Ensure appropriate lighting – To minimise screen
5.5.3 Move emails to an email folder/label. • Select whether to send a response with a message glare and avoid eye strain
• Select a message to move. or none at all.
• Ensure appropriate posture – By positioning the
• On the Home tab in the Move group, click Move. 6 Safety computer or device, desk and seat correctly to avoid
neck, back and wrist strain
• Click Other Folder. 6.1 Computers, Devices and Data • Ensure appropriate headphone volume – To avoid
• Select the desired folder. 6.1.1 Understand some potential threats to computers, noise-induced hearing damage
• Click OK. devices and data like:
6.2.2 Identify some options available for enhancing
5.5.4 Delete an email. • Malware – Malicious software typically designed to accessibility like:
install itself on a computer or device without consent • Voice recognition software – Translates voice
• Select the email message for deletion. in order to damage files or steal information. commands and is used in place of a mouse and
• On the Home tab, in the Delete group, click the • Unauthorised access – Accessing computers, keyboard
Delete button. devices or data without permission, whether the • Screen reader – Reads information aloud from a
5.5.4 Restore a deleted email. intention is malicious or not, may have negative computer display
consequences such as the alteration, loss or theft of
• Select the Deleted Items folder. data. • Screen magnifier – Displays enlarged screen
• Select a message to restore. • Theft – Computers, devices and data, in particular
content
• On the Home tab, in the Move group, click the Move mobile devices and unprotected data, are • On-screen keyboard – Provides an alternative to a
button. vulnerable to theft and may be used to carry out physical keyboard for inputting data
further crimes, such as identity theft.
• Click Other Folder. • High contrast – Makes the screen easier to view
• Accidental damage – Damage from accidents such 6.3 Environment
• Select a destination folder. as breakages, fires or floods may result in the
• Click OK. destruction, alteration or loss of computers, devices 6.3.1 Recognise computer and device energy saving
and data. practices like:
5.5.5 Move a message to a junk folder.
6.1.2 Recognise some ways to protect • Turning off – Turn off the computer or device when
• Select the message. computers/devices and data like: not in use.
• On the Home tab in the Move group, click Move. • Use anti-virus software to detect viruses and stop • Adjusting display settings – Reduce the brightness
• Click Other Folder. them from being installed or removing them. of the display or set the display to turn off after a
specified period of inactivity.
• Select Junk Email. • Regularly update anti-virus, application and
operating system software to detect new viruses, fix • Adjusting power mode settings – Set a lower power
• Click OK. known problems and security risks. mode to activate after a specified period of
5.5.5 Remove a message from a junk folder. inactivity.
• Do not download programs, open attachments or
• Click the … button on the Navigation bar then links from unknown sources to minimise the threat • Disabling services when not required – Disable
choose Folders. of malware being installed. services like Internet connections, mobile data,
GPS, Wi-Fi, Bluetooth, and automatic application
• Click Junk Email and select the required message. • Use encryption to encode data so it can be read by updates when they are not needed.
authorised people only.
• On the Home tab in the Move group, click Move. 6.3.2 Recognise that computers, devices, equipment,
• Use strong passwords to prevent unauthorised
• Click Other Folder. batteries, printer cartridges and paper should be
access. Passwords should be of adequate length recycled.
• Select Inbox. and character mix, kept private and changed
regularly.
• Click OK. For more information,
• Regularly back up data to a remote location to keep visit: www.icdl.org
5.6 Using Calendars
it safe in the event of problems such as network,
5.6.1 Create a meeting in a calendar. hardware or software problems, theft or accidental
damage.