Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 107

SUSTAINABLE EMPLOYMENT THROUGH

ENTREPRENEURSHIP & ENTERPRISE


DEVELOPMENT - SEED

BASIC DIGITAL LITERACY TRAINING

Prepared by:
ACT - American College of Technology

Addis Ababa, Ethiopia


February 2024
CONTENTS

1.Introduction 2

1. What is Digital? 2

2. What is Digital Literacy? 2

2.The Importance of Computers 4

1. Specific Importance 5

2. Computers Role 6

3. Types of Digital Devices 6

4. The 5 Main Parts of a Computer 8

1. The motherboard 8

2. Processing Unit (CPU) 9

3. Video Card 9

5. A Computer is Made Up of both Hardware and Software 9

1. Hardware 9

2. Software 12

•Computer Performance and Features 14

1. The Features of Different Types of Computers 14

1. Supercomputers 14

2. Mainframe Computers 14

3. Minicomputers 15

4. Microcomputers or Personal Computers 15


2. The Basics of Computer Performance
16

1. What Affects a Computers Performance?


16

2. Measuring, Interpreting, and Reporting Performance


19

3. Steps for Starting and Shutting Down a Computer.


20

1. Turning on devices
20

2. Hibernating a device
21

3. Shutting down/turning off a device


21

4. Computer software
22

1. Computer operating systems


22

2. Programs and Data


25

3. Application Software
27

4.Computer Networks 30

1. Local Area Network (LAN)


31

2. Wide Area Network (WAN)


31

3. Metropolitan Area Network (MAN)


31

4. Campus Area Network (CAN)


32

5. Internet, Intranet and Extranet


32
5. The Web (World Wide Web)
41

1. How Web Addresses Work?


41

1. Web Addresses
41

2. URLs Scheme
41

3. Clients and Servers


41

4. Domain name
43

2. How Does the Internet Work?


44

1. Two types of Internet connection services


46

2. How to set up a Wi-Fi network


48

3. Using a Web Browser


50

6. Information and System Security


53

1. How to browse contents safely on internet


53

5. Keep your browser updated


53

6. Domain and URL checking


53

7. Be cautious of free software


53

8. Be cautious of peer-to-peer file sharing


54

9. Verifying secure sites


54

2. Secure Websites
1. Purpose of a Password
61

2. Bad password practices


61

2. Using Email
62

1. What is email?
62

2. How Email Works


62

3. Email Structure
63

4. Manage Email Messages


67

5. Identify Correct Email Etiquette


69

6. Create an Email Address


69

8.Key Features of an Online Community 73

1. The Key Features of an Online Community


73

2. How to make business on Social Media


78

9.Emerging Technology 81

1. Introduction to Internet of Things (IoT)


81

1. Some examples of IoT devices


82

2. How do IoT devices work?


84

3. What are the advantages of the IoT?


85

4. The future of IoT


85

• Virtual Reality and Augmented Reality


3. vantages of AI
92

4. Strong AI vs. weak AI


92

APPENDIX – ACTIVITIES 93

Activity 1 – Email Communication 93

Activity 2 – Communication 95

Activity 3 – Handling Information and Content 97

Activity 4 – Transaction 99

Activity 5 – Technology and Social Media 100


Introduction

1 Page
1. INTRODUCTION

1. What is Digital?
The term "digital" is currently used to represent everything that a computer uses
and produces.
The word "digital" describes a numbering process or a series of number processing.
This processing is done by a computer device. Therefore, "digital" is closely
associated with activities that use and are generated by computers.

1.2 What is Digital Literacy?


.
Digital literacy, according to UNESCO is defined as the ability to access,
manage, understand, integrate, communicate, evaluate and
create information safely and appropriately through digital
technologies for employment, decent jobs, and entrepreneurship. It
includes competences that are variously referred to as computer
literacy, ICT literacy, information literacy and media literacy.

The Sustainable Development Goal (SDF) thematic Indicator 4.4.2 highlights the need for a
minimum level of proficiency in digital literacy skills, and measures of competency include:
 Device and software operation – Identify and use hardware tools and technologies.
 Information and data literacy – Articulate information needs, to locate and
retrieve digital data, information and content.
 Communication and collaboration – Interact, communicate, and collaborate through
digital technologies while being aware of cultural and generational diversity
 Digital content creation – Create and edits digital content. To improve and
integrate information and content into an existing body of knowledge.
 Safety -Protect devices, content, personal data and privacy in digital environment.to
protect physical and psychological health, and to be aware of digital technologies for social
well-being and social inclusion.
 Problem-solving – Identify needs and problems and to resolve conceptual programs and
problem situations in digital environments.

These are skills that lead to specific outputs or complementary skills


that are needed to perform jobs in the digital economy. 2 Page
Basic digital skills are generic ICT skills required for nearly all jobs. They relate to the

effective use of technology, which is necessary in most professions. They include web
research, online communication, use of professional online platforms and digital
financial services.
Digital skills are needed to find a job or start a business. Job search and recruitment processes
increasingly take place online. Hence, young jobseekers lacking digital skills and labor
market information face challenges in connecting to employers and vacancies,
hindering their employment prospects. Even basic web navigation skills can bring great
benefits to young people in underserved areas.
Assessment

• Pre-training assessment captures what the trainees already know and what they need to
learn.

• Formative assessments are frequent and ongoing throughout the course and guide
classroom pacing, delivery, choice of content, etc.

• Post-training assessment captures what the trainees have learned and paints a picture of
what they know and are able to do as a result of participation in the course overall.

3 Page
Computer Basics

4 Page
2. The Importance of Computers
The early 1990s saw the emergence of household Internet use, which eventually
spurred common use of email, websites, blogs, social networking, video chat and
Voice-Over- Internet Protocol.

Computers are now fact of life, essential business tools and become very important
nowadays because it is very much accurate, fast and can accomplish many tasks easily.

Computers have created a very effective information system to help


streamline the management of an organization. Today too many tasks wouldn’t
have been computed manually, if we do so much more time is required. Thus, many
traditional communication modes including postal mail and landline phones seem
obsolete.

In terms of speed, computers can do very big calculations in just a fraction of a


second. Moreover, it can store huge amount of data in it. Hence, Computers are
critical for communication and are the centerpiece of information technology. They
are used in every aspect of a company’s operations, including product creation,
marketing, accounting and administration etc. Their critical importance and Role are
described below

1. Specific Importance

a. Internet

The World Wide Web, Internet and email revolutionized the way individuals
communicate with each other. Rather than waiting days or weeks to see information, we
can now view all information at the speed of light.

• VOIP and Video Chat

Voice-Over-Internet Protocol – VOIP – replaced the need for landline telephone in


many instances. These lines can provide instant phone communication over the
Internet.

• Social Networking

Social networking sites including Facebook, Twitter, and LinkedIn allow users to
rapidly generate content for people in their network to view. Rather than sending
individual notes, social networking provides a constant stream of updates 5and
Page
information.

d. Information Access

Technology plays a central role in searching for information, online reference


material, such as Encyclopedia Britanica Online,

e. Creative and Self Expression;

ICT also plays a role in expressing ourselves. Aided by the digital recording functions
integrated into smartphones, tablets and other electronic devices.

f. Communication and collaboration

ICT provides more opportunities to communicate and collaborate. With Learning


Management System such as Blackboard, many courses have an online space
to participate in discussion threads and forums, chats and video conference

2.2. Computers Role

The roles of computers have in many areas increased with the rapid growth of
computer usage time. Some areas where use of computers have been extensively used
are:

6 Page
3. Types of Digital Devices
There are many different types of digital devices that you can use. Devices can beexpensive
but if you are prepared to use less powerful devices, they can be muchless expensive. The size
of devices can vary, and you need to consider storage and portability when buying one.
The physical form of the device and its contents, such as screen and electronic components,
are called hardware. This is because you can physically feel this partof a digital device.
Here is a summary of some typical digital devices.

i. Personal Computer (PC)

A personal computer is a type of computer that is usually placed on a desk and specifically
designed to be used by one person at a time. It is made up of differentparts that are connected
to work as a single entity. The figure below illustrates a desktop computer.

ii. Lapt
op

A laptop is a smaller and lighter type of personal computer


that is designed to be placed on the lap when working.
As these come with batteries you do not need tobe connected
to an electricity source, except when you need to charge
the batteries, this allows you to travel with the laptop.
However, they are more expensive than desktop computers

Advantages of a laptop over Personal Computer

7 Page
● A laptop is portable, so you can move with it from one place to another.

● Some peripheral devices are inbuilt such as keypad, touchpad and speakers.

● You can work with a laptop, even when there is no power, since it has a batterywhich is
chargeable.

ii. Tablet

A tablet is a mobile device that is smaller and lighter than a laptop. It is operated by
touching the screen. It has a chargeable battery. Unlike a laptop its keyboard isthe
screen.

iii.Smartphone

A smartphone is part computer and part mobile telephone. It is a small digital device that is
held in your hand. It is mostly used for communication through making phone calls or
sending a short text message. However, it also has other capabilities such as
taking photos and videos. You can also use a smartphone toconnect to the internet.
A smartphone is navigated through touching the screen (commonly referred to astouch
screen). In this way it is very similar to using a tablet device.

• The 5 Main Parts of a Computer

• The motherboard
Each component is attached to the motherboard. The motherboard receives power from
the computer's power supply. It allows all the components to communicate,
including the CPU. It also contains controllers, which are circuits that help the
operating system work with hardware such as the hard drive.

8 Page
2. Processing Unit (CPU)
The CPU is the "brains" of the computer. The
central processing unit provides the calculations
and manipulation of data sent from the user.
Each time the user clicks a key, executes an
application or browses the Web, the CPU
reads the code involved and returns the response
to the user. The CPU works closely with
memory, which is the component that sends stored
data to
the unit.

3. Video Card
The video card provides the image seen on the
monitor. The video card is attached to a monitor
using a VGA cable. Some video cards have two
monitor connections. This allows the user to
attach two monitors to the computer, so the
desktop can be spread across both monitors
for better usability.
5. A Computer is Made Up of both Hardware and Software

5. Hardware
Hardware is any part of a computer that can be touched or felt. Hardware devicesare
categorized into:

5. Input devices

These are peripherals or devices that help get information into a computer. Inputdevices

9 Page
come in many forms.

Keyboard/Keypad

A keyboard or keypad is used to enter data into acomputer or


laptop. One enters data using the keyboard’s letter, numerical or
special character keys.

Mouse/ touchpad

These are pointing devices. They control a pointeron the screen


usually to select commands.

Light pen

This is a handheld pen-like device that has a light sensitive


point and is used to select options on a touch screen.

Scanning device

This is a device that reads data which may be in a form of


a photo, printed work or handwritten (hardcopies) and converts it
to a soft copy (digital copy) that one can manipulate using
special software.
Mobile phones have scanner apps such as Cam Scanner.
Touchscreen

The user selects an item or enters data by touching the screen of a


laptop screen, desktop monitor, tablet or smartphone screen.

Digital camera

Used to take photos that can be stored in acomputer for sharing or


to be edited

10 P a g e
Microphone

An input device that is used to enter spoken data into a


computer. It mostly used during online meetings or
teleconferencing

b. Output Devices
These are devices that allow you to access processed information from devices. There
are generally two types of output device:
● Soft copy output devices – this is output that can only be seen or heard

● Hard copy output device – this is an output device that can be touched or felt

Monitor/Screen
It’s the most commonly used soft copy output device. Displays
processed information in the formof text, picture and video.

Speaker
It gives output in the form of sounds. The speakers are either
inbuilt or external.
Internal speakers - These are inside the computer External
Speakers - These are bought separately
LCD Projectors
Usually connected to devices to display output to alarger audience
during conferences or training.

c. Storage Device
Storage is not only necessary for saving files, but also for running tasks and applications.
Any
file you create or save on your computer saves to your computer’s storage device.
This storage device also stores any applications and your computer operating system

As technology has advanced over time, data storage devices have also evolved in a
major way. Nowadays, storage devices come in many shapes and sizes, and there are a
few different types of storage device that cater to different devices and functions.
11 P a g e
Computer storage devices
are able to hold information permanently while others can only hold information temporarily.
Every computer has both primary and secondary storage.

i. Random Access Memory (RAM)

RAM is variable in a computer. Older computers had only a few dozen megabytes of RAM
installed. When personal computers became popular in the 1990s, computers had 32
megabytes of memory. Motherboards and software now require at least one gigabyte
to function. RAM contains the information during the time the computer is on. After
the machine is turned off, the information in RAM is lost.

ii. Secondary Storage (Hard Drive)

Unlike RAM, the hard drive stores data even after the machine is turned off. A hard
drive is the storage unit for the machine. Saved documents and applications are stored on
the hard drive using magnetism. The hard drive is made up of small platters with a
moving head. The platters spin as the head moves back and forth to retrieve and
store data.

2. Software

Computer software, also known as software or simply a program, is a set of


instructions that tells a computer what to do. It is an essential part of any computer system,
as it allows users to interact with the computer and perform various tasks.

Software is typically stored on an external long-term memory device, such as a hard drive
or magnetic disk. When the program is in use, the computer reads it from the storage device
and temporarily places the instructions in random access memory (RAM). The process of
storing and then performing the instructions is called “running,” or “executing,” a program.

Software can be classified into two main categories: system software and application
software.

i. System software: is responsible for managing the basic functions of a

12 P a g e
computer system, such as controlling the hardware, managing memory, and
providing basic services to other software. Examples of system software
include operating systems, device drivers, and utility programs.
ii. Application software, on the other hand, is designed to perform
specific tasks for users, such as word processing, spreadsheets, web
browsing, and games. Application software can be further divided into
general-purpose software, which can be used for a variety of tasks, and
specialized software, which is designed for specific tasks.

Computer
Performance &
Features

13 P a g e
3. COMPUTER PERFORMANCE AND FEATURES

3. The Features of Different Types of Computers

There are four different computer types classified according to their performance, power, and
size. These are Supercomputers, Mainframe, Mini, and Microcomputers. Their
difference depends on the number of users they can support at any one time, their size, and
power. Their difference is discussed in detail as follows.

1. Supercomputers

Supercomputers are very expensive, very fast, and the most powerful computers we have in
the world. Supercomputers are optimized to execute a few numbers of programs. This
makes it possible for them to execute these few programs at a very high speed.
Due to their inhibiting cost, they are used in high-end places like in scientific
research centers. The supercomputer consists of thousands of processors making its
clock very high speeds measured by petaflops (a unit of computing speed equal to
one thousand million (1015) floating-point operations per second. One petaflops = 1000
teraflops.

These computer types are also very large in size due to the numerous parts and components
involved in their design. A good example of a Supercomputer is Tianhe-2: TH-
IVB-FEP Cluster; National Super Computer Centre in Guangzhou, China; 3.12 million
cores (33.86 petaflops).

14 P a g e
2. Mainframe Computers

Mainframe computers are large and expensive computer types capable of


supporting hundreds, or even thousands, of users simultaneously. Thus, they are mostly
used by governments and large organizations for bulk data processing, critical
applications, transaction processing, census, and industry and consumer statistics among
others. They are ranked below supercomputers.

3. Minicomputers

Minicomputers are mid-sized computers. In terms of size and power, minicomputers


are ranked below mainframes. A minicomputer is a multiprocessing system capable
of supporting from 4 to about 200 users simultaneously. The use of the term Minicomputer
has diminished, and they have merged with servers.

Note: - Servers are computers that are designed to provide services to other computers over
a network. They can use a laptop or desktop form factor but are sometimes mounted
in a secure rack. Servers usually have a higher specification than the other computers on a
network, as they may have to deal with requests from multiple machines at the same
time.

15 P a g e
4. Microcomputers or Personal Computers

A personal computer is a computer designed to be used by one user at a time. The


term microcomputer relates to the microprocessor which is used with a personal computer for
the purpose of processing data and instruction codes. These are the most common computer
types since they are not very expensive.

Microcomputers are further classified as Desktop and Portable (Mobile) computers.

a. The Desktop Computers

Desktop computers are not built to be mobile. They are moved, but only to a new desktop
location and with the power supply inactive. There are a number of major differences
between computers that are intended to be used in one place as a desktop and portables or
mobiles that can be easily moved from one location to another.

Desktop computers are large and heavy in comparison to portables. They can be carried in
specially manufactured cases, but only to assist a support engineer in moving, not as
a frequent procedure. The monitor, keyboard, and mouse are all separate items on a desktop.

b. Portable (Mobile) Computers

Portable computers are compact computing devices designed for mobility and on-the-go use.
These devices typically feature a built-in display, keyboard, touchpad or trackpad, and
connectivity ports for peripherals. These compact and versatile devices provide users with the
flexibility to work, whether in a coffee shop, on transportation, or in the comfort of their own

16 P a g e
homes.

One of the key advantages of portable computers is their mobility. Unlike traditional desktop
computers, which are stationary and require a dedicated workspace, portable computers allow
users to take their work with them wherever they go. This mobility has significantly
increased productivity and efficiency for professionals, students, and individuals who require
constant access to their digital resources.

Portable computers come in various sizes and configurations to cater to different


needs. These devices typically feature a built-in display, keyboard, touchpad or
trackpad, and connectivity ports for peripherals such as external monitors, mice, and printers.

The evolution of portable computers has been driven by advancements in technology, leading
to thinner and lighter designs without compromising performance. Battery life has also
improved significantly, enabling users to work for extended periods without needing to
recharge.

2. The Basics of Computer Performance

In broad terms, the performance of a computer depends on four factors: the speed and
architecture of its processor or "central processing unit" (CPU), how much random-
access memory (RAM) it has, its graphics system, and its internal hard drive speed and
capacity

1. What Affects a Computers Performance?

Overall, the performance of a computer is dependent on how well it works together


as a whole.

Processor Speed

(MHZ, L1 L2 cache, x86 and other chip types) Average PC Desktop

(1.5 - 2.5 Ghz)

Average Laptop or Macintosh (1.0 Ghz)

Clock speed, a.k.a. Processor speed is often played up to be the major factor in a computer's
overall performance. In rare cases this is true, but an average user rarely uses 100 percent of
17 P a g e
his/her Central Processing Unit's power.

Things like encoding video or encrypting files, or anything that computes large,
complex, numbers require a lot of processor power. Most users spend most of their time
typing, reading email or viewing web pages.

a. Measurement of CPU and RAM Processing Speed

Megahertz (MHZ) or Gigahertz (GHZ or 1000MHZ) is the number of times the CPU can
switch back and forth from 1 to 0. It is the driving force in the power the processor has (all
other things being equal). Higher MHZ chips use more power and produce more heat.
Level 1 (L1) and Level 2(L2) cache is usually on-chip RAM that is extremely fast. SRAM is
different than System RAM and only used on processors. It stores data right before
and after it is processed. SRAM is extremely expensive; most chips today only have 128
Kilobytes of L1 cache, and 256-512K of L2 cache. (This is what makes a Pentium 3 or 4 chip
different than a celeron chip)

Measurement of data in binary

Unit Reference Chart


Bit (b) Smallest unit of storage possible. 1 or 0.
Byte (B) 8 bits
KiloByte (KB) 1000* Bytes
MegaByte (MB) 1000 KB
GigaByte (GB) 1000 MB

* Commonly approximated as 1000 for convenience.


Actual value is 1024.

b. System RAM speed and size

System RAM speed and size (MHZ and Megabytes) Average Desktop - 256 megabytes
Average Laptop - 128 megabytes

The amount and speed of the RAM in your computer makes a huge difference in how
your computer performs. If you are trying to run Windows 10 with 100 MB of RAM it
probably won't even work.

When the computer uses up all available RAM it has to start using the hard drive to cache

data, which is much slower. The constant transfer of data between RAM and virtual memory

18 P a g e
(hard drive memory) slows a computer down considerably. Especially when trying to load
applications or files.

The two types differ in the technology they use to hold data, dynamic RAM being the more
common type. Dynamic RAM needs to be refreshed thousands of times per second. Static
RAM does not need to be refreshed, which makes it faster; but it is also more expensive than
dynamic RAM.

c. Disk speed and size

Disk speed and size (RPM's and Gigabytes)

Average Desktop (40 Gigabytes)

Average Laptop (20 Gigabytes)

The biggest factor in your computer's performance is the hard disk speed. How fast the hard
drive can find (average seek time), read, write, and transfer data will make a big difference in
the way your computer performs. Most hard drives today spin at 7,200 RPMS, older models
and laptops still spin at 5,200 RPMS, which is one reason laptops often appear sluggish to a
desktop equivalent.

The size of your hard drive plays a very little role in the performance of a computer. As long
as you have enough free space for virtual memory and keep the disk defragmented it
will perform well no matter what the size.

d. Video card

On-board video RAM, chip type and speed


Average Desktop (32 - 64 Megabyte low end AGP card) Average Laptop (16
Megabyte On-board chip)

Whenever your computer puts an image on the screen something has to render it. If
a computer is doing this with software it is often slow and will affect the performance of the
rest of the computer. Also, the image will not be rendered as crisp or as smoothly in the case

19 P a g e
of video. Even a low-end video card will significantly improve the performance of
the computer by taking the large task of rendering the images on the screen from the CPU to
the graphics card. If you work with large image files, video or play games you will want a
higher end video card.

2. Measuring, Interpreting, and Reporting Performance

System requirements are the required specifications a device must have in order to
use certain hardware or software. For example, a computer may require a specific I/O
port to work with a peripheral device, minimum system memory (RAM) Minimum free
storage space. Before purchasing a software program or hardware device, you can check the
system requirements to make sure the product is compatible with your system.

Typical system requirements for a software program include:

1. Operating system
2. Minimum CPU or processor speed
3. Minimum GPU or video memory
4. Minimum system memory (RAM)
5. Minimum free storage space
6. Audio hardware (sound card, speakers, etc)

System requirements listed for a hardware device may include:

1.Operating system
2.Available ports (USB, Ethernet, etc)
3.Wireless connectivity
4.Minimum GPU (for displays and graphics hardware)

Minimum vs Recommended Requirements

Some products include both minimum and recommended system requirements. A video
game, for instance, may function with the minimum required CPU and GPU, but it
will perform better with the recommended hardware. A more powerful processor and
graphics card may produce improved graphics and faster frame rates (FPS).

Some system requirements are not flexible, such as the operating system(s) and disk space
required for software installation. Others, such as CPU, GPU, and RAM requirements may
vary significantly between the minimum and recommended requirements. When buying
or upgrading a software program, it is often wise to make sure your system has close
to the recommended requirements to ensure a good user experience.

Below is an example of minimum versus recommended system requirements for a Windows


application.

20 P a g e
1. OS: Windows 7 with SP1; Recommended: Windows 10
2. CPU: Intel or AMD processor with 64-bit support; Recommended: 2.8 GHz or
faster processor
3. GPU: nVidia GeForce GTX 1050 or equivalent; Recommended: nVidia GeForce
GTX 1660 or Quadro T1000
4. Disk Storage: 4 GB of free disk space
5. Monitor Resolution: 1280x800; Recommended: 1920x1080
6. Internet: Internet connection required for software activation

In summary, any system to be used efficiently, all computer software needs certain
hardware components or other software resources to be present on a computer. These
prerequisites are known as (computer) system requirements and are often used as a
guideline as opposed to an absolute rule.

• Steps for Starting and Shutting Down a Computer.

Devices need to be powered on. Portable devices use batteries, so usage needs to be
managed, to ensure you do not run out of power.

3. Turning on devices

You need to switch a digital device on so that you can use it. Devices may need tobe
switched on and off to update software, or to reset the device to fix a problem.

3. Turning on a laptop (Windows 10)

Here are few simple steps you need to take so you can turn on your windows laptop
safely.

3. Ensure its battery is charged or plug the laptop charger to the socket andswitch on the
power socket.
4. Press the power button
5. Wait for the laptop to turn on.

Note: The power button can be on different places depending on the laptop type. For
instance, it can be on the left or right under the screen or to the left or right onthe side
of your keyboard.

3. Turning on Desktop computer (Windows 10)

Here are few simple steps you need to take so you can turn on your Windows desktop
safely.

• Check the power cables for both the monitor and the system unit are both

21 P a g e
connected to the socket.
2.Press the power button of the monitor. This is to turn the screen on
3.Press the power button of the system unit. This is to turn the PC on
4.Wait for the computer to turn on.

2. Hibernating a device

If you are going to take a short break from working on your device you can put it
tosleep, i.e., hibernate it, rather than switch it off. This saves you time, while also
reducing the amount of power used by the device. This option is mostly
available for laptops and might not be available for all PCs.

1. Click or tap the start menu, or the start button.


2. Click settings icon.
3. Click system icon.
4. Click power and sleep option.
5. Choose the length of time, in minutes, that you want to hibernate or sleep.

Importance of hibernating: Hibernating a device is important because it:

●Saves on power consumption of your device and increases battery poweravailability.


●Keeps your device and data safe. People cannot gain access to your device while you
are away. They will be forced to enter security details to access your device
and information.
●Allows you to start working with your open apps on your data from the
point you hibernated the device. You don’t need to start up your device and then re-
open all the programs and work files you were using.

3.3.3. Shutting down/turning off a device

When you want to switch off your device there are certain procedures that need tobe
followed so as not to damage the device.

Shutting down a Computer (Windows 10)

1. Click or tap the start menu or the windows button (Located in the bottomleft
Corner of the screen).
2.Click on the power button.
3.From the options available, click shut down.
4. Wait for the computer to shut down.

3.4. Computer software

A digital device is not one thing, it is made up of many parts. Some of these arephysical
like
22 P a g e
the “hardware” and some you cannot see like the “software”.

Software is the computer instructions that direct a computer on what to do andhow to do it.
Operating systems, sometimes called OS, are very important because it manages the
computer's memory, power, hardware, and other software. Operating systems such as
Microsoft Windows, or MacOS, are well known, and they do the basic tasks
and housekeeping of a computer.

For a computer to be useful we need other programs. These applications, sometimes


shortened to “apps”, are types of software that do specific things such as help us
write a letter, watch a video, or undertake calculations and manipulatedata.

Examples of application software includes Microsoft Word, Microsoft Excel, WordPad and
Calc.

3.4.1. Computer operating systems

An operating system is a program that controls all the functions, including bothhardware and
software, in an electronic device. For any communication and storage of data to take place in
a device, there must be an operating system.

The phrase operating system is sometimes shortened to OS.

Operating system logos Operating system names

Windows Operating system

Mac Operating system

Linux Operating System

Android

iOS for iPhones

a. Functions of operating system

The operating system in a digital device has many jobs. The operating system
makes the tasks you do easier because it uses pictures and symbols to help you
digital
navigatedevice. Thisaapproach to controlling and using acomputer is called a graphical user
and use
23 P a g e
interface (GUI) or user interface (UI).

Between the user and the computer hardware, an operating system serves as a communication
bridge (interface). An operating system’s objective is to provide a platform for a user to run
programs in an efficient and convenient manner.

Hardware coordination must be appropriate to ensure the computer system’s proper operation
and to prevent user programs from interfering with the system’s proper operation.

Example: We request or convey our orders to the OS in the same way as a boss delivers
orders to his employees.

The primary purpose of the operating system is to make the computer environment
more user-friendly, with a secondary goal of maximising resource utilisation. Moreover,
the OS has multiple functionalities.

b. T
hree
Easily
Define
d
Operat
ing

24 P a g e
System Components

i.Kernel

This provides basic-level control over all of the computer hardware devices.
Main roles include reading data from memory and writing data to memory,
processing execution orders, determining how data is received and sent by
devices, such as the monitor, keyboard and mouse; and determining how to
interpret data received from networks.

ii.User Interface (UI)

This component allows interaction with the user, which may occur through graphical
icons and a desktop or through a command line. The UI is further divided into
Command Line Interface (CLI), consisting of a text-based interface where
advanced users can prompt specific commands by typing them, and a Graphical
User Interface (GUI). The latter is a visual interface that allows the end user to
issue commands by interacting with symbols, icons, and menus using an input
device such as a mouse or touchpad.

iii.Application Programming Interfaces (API)

This component allows application developers to write modular code. An API defines
how other systems or components can use a certain application.

c. Strengths and limitations of different of computer operating systems

i. Microsoft Windows

Microsoft Windows is the most common home and office software operating
system. It is also used by many companies and governments. Microsoft Windows
user interface include windows which are panel-screens that represent individual
applications in a rectangular shape.

ii.Apple macOS

Apple laptops use the macOS. Although the graphical interfaces are different, many of the
programming interfaces and command-line features are similar. macOS has The Dock
which is a bar of controls that is used to check for programs and files that are
commonly used, single keyboard keys, including the Command key. macOS is
famous for its user-friendly functionalities like Siri, a natural-voice personal
assistant, and FaceTime a video chatting software.

25 P a g e
iii. Linux Operating System

Linux is a secure and customizable operating system. Linux is open-source


software. This means that it generally very safe against virus attack and errors, and
it is also free to use, although you may have to pay for support. Many electronic
gadgets such as internet routers, washing machines, TVs, refrigeratorsuse special
Linux software.

d. Factors to consider when selecting anoperating system for your device

●The cost: open-source software (such as Linux) is usually free for personal
use, but licensed software (such as Microsoft Windows) needs to be paid for.
●User-friendliness of the operating system.
●Availability and range of applications software that works with the chosen OS.
●Its security features, particularly against viruses e.g., Linux is more secure
than the Windows OS. Antivirus software is available for operating systems
or may have this built into the OS, e.g., Windows Defender.

2. Programs and Data


i. A Computer Program

A computer program is a collection of instructions that can be executed by a


computer to perform a specific task. Most computer devices require programs to
function properly.
A computer program is usually written by a computer programmer in a
programming language.

As a noun, a program, also called an application or software, is a set of


instructions that process input, manipulate data, and output a result. For example,
Microsoft Word is a word processing application that allows users to create and
write documents. A browser, such as the one you use to browse a web page, is an
application.

What is the purpose of a program?

Without application software (programs), your computer would be able to


operate with the operating system (system software) but would not be capable of
doing anything else. A program gives the computer and user the ability to
perform specific tasks. For example, to browse the Internet, you would install a
browser on the computer. A browser is a program that instructs the computer how
to visit, display, and navigate a web page. Without a browser program, the
computer would not be able to browse the Internet.

ii. Data

Data is distinct pieces of information, usually formatted in a special way while


26 P a g e
Programs are collections of instructions for manipulating data. Data can exist in
a variety of forms as numbers or text on pieces of paper, as bits and bytes stored
in electronic memory, or as facts stored in a person's mind.
Data is any sequence of one or more symbols given meaning by specific act(s)
of interpretation. Executable files contain programs; all other files are also data files.

A collection of computer programs, libraries, and related data are referred to as software.

Example of Programs
Program Program Category
Adobe Acrobat PDF reader
Adobe After Effects Video editor
Adobe Dreamweaver HTML editor
Adobe Photoshop Photo editor
Audacity Audio software
FileZilla FTP
Google Chrome Internet Browser
Microsoft Excel Spreadsheet
Microsoft PowerPoint Presentation
Microsoft Word Word processor
C++ Programming language

3.4.3. Application Software

These are types of software that help you do useful tasks. Applications are installed
on a computer and are managed by the operating system e.g., MS Word for document
creation, or Windows Media Player for playing videos.

Types of application software include:

●Word processor – for creating documents e.g., MS-Word.


●Database – for keeping records and files e.g., MS Access.
●Spreadsheet – for calculations e.g., MS Excel.
●Desktop publishing – designing publications such as cards or posters e.g., Adobe Page
Maker.
●Computer-Aided Design – for technical drawing e.g., AutoCAD.
●Graphics software – for designing and manipulating graphics e.g., Photoshop.

The types of communications programmers and their uses.

27 P a g e
Communication software allows you to connect with other computers or mobile devices via
text, video or audio formats in either a synchronous or asynchronous manner. While some
means of communication, such as email, are asynchronous, Web conferencing and video chat
are synchronous -- allowing all parties to communicate in real-time. Video messaging offers a
choice of either method. Some communication software is only available for mobile
devices; others can be used on computers as well.

 Video Chat

Voice over Internet Protocol or VoIP allows you to communicate with others over the
Internet without using phones. With most services, you can communicate directly from one
computer to another, usually at no charge, or connect to a cell phone or landline for a small
fee.

 Video Messaging

Video messaging differs from VoIP in that it is not a medium for discussions, but
one in which you send a contact a short video in lieu of a text; the recipient can watch it
instantly or whenever he wants.

 Web Conferencing

Web conferencing is generally used by businesses for meetings, training events or to relay
other information to people in a remote location. A monthly fee is usually required to use the
software. Standard practice includes a whiteboard, VoIP, screen sharing and chat.

 Email

The old standby of regular email is still a heavily used communication tool, so a good email
client is essential. Inky runs on both Windows and Mac and can be used on mobile devices as
well. This free software works on any IMAP or POP account, allowing you to consolidate
your mail into one place.

28 P a g e
Pag
e

Computer Network
Internet and Cloud services

29
4. COMPUTER NETWORKS

A computer network is a system that connects two or more computing devices


for transmitting and sharing information. Computing devices include everything from a
mobile phone to a server. These devices are connected using physical wires such as fiber
optics, but they can also be wireless. There are many types of computer networks, the
common types of area networks including those five:

A computer network is a set of computers sharing resources located on or


provided by network nodes. Computers use common communication protocols over digital
interconnec tions to communicate with each other. These interconnections are
made up of telecommunication network technologies based on physically wired,
optical, and wireless radio-frequency methods that may be arranged in a variety of network
topologies.

30 P a g e
The nodes of a computer network can include personal computers, servers, networking
hardware, or other specialized or general-purpose hosts. They are identified by network
addresses and may have hostnames. Hostnames serve as memorable labels for the nodes and
are rarely changed after initial assignment. Network addresses serve for locating and
identifying the nodes by communication protocols such as the Internet Protocol.

Computer networks may be classified by many criteria, including the transmission


medium used to carry signals, bandwidth, communications protocols to organize network
traffic, the network size, the topology, traffic control mechanisms, and organizational intent.

1.Local Area Network (LAN) is a group of computers and associated devices


that share a common communications line or wireless link to a server. Typically, a
LAN encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment.
A LAN can go up to 1 KM radius.

1.Wide Area Network (WAN) – No Limit. A wide area network (WAN) is a


network that exists over a large-scale
geographical area. A WAN connects different smaller networks, including
LANs and metro area networks (MANs). This ensures that
31 P a g e
computers

and users in one location


communicate with can computers
users in other locations.and
WAN implementation can done
be
either with the help of the public transmission system or a private network.
3. Metropolitan Area Network
(MAN) - A metropolitan area network is a computer network that interconnects
users with computer resources in a geographic area or region larger than that covered by
even a large local area network (LAN) but smaller than the area covered by a
wide area network (WAN). The term is applied to the interconnection of networks in
a city into a
single larger network (which may then also offer efficient connection to a wide area
network). It is also used to mean the interconnection of several local area networks
by bridging them with backbone lines. The latter usage is also sometimes referred to
as a campus network.
• Campus Area Network (CAN) - A campus
area network is a computer network made up of an interconnection of local area
networks (LANs) within a limited geographical area. The networking equipment’s
(switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling
etc.) are almost entirely owned by the campus tenant / owner: an enterprise, university,
government etc.

4. Internet, Intranet and Extranet

4. The Internet
The internet is a massive network of networks, a networking infrastructure. It connects
millions of computers together globally, forming a network in which any computer
can communicate with any other computer as long as they are both connected to the internet.
By design, the internet is decentralized, meaning that it is not controlled by a single,
central authority.
Each computer, or host, is independent and the owner or operator of that host can
choose which internet services to use and which local services they will make publicly
available.

32 P a g e
By accessing the Internet customer may obtain services include:

a.access to news, weather, sport, financial pages


b.message boards – users can have discussions, or post a message and wait for replies
c.electronic mail – anyone connected to the Internet can be contacted
d.instant messages – users can hold conversations
e.directories of members, giving details of similar interests
f.offers of free software and demonstrations to download
g.member services – keeping track of on-line costs
h.access to on-line shopping – many on-line stores provide goods at very attractive
prices
The requirements for an internet connection
To connect to the Internet, you would need the following four things:
I.A computer.
II.A DSL or (modem) and telephone line (if you are using dial up access) ...
III.An Internet browser (software) and software to connect you to the ISP.
IV.An account with an Internet Service Provider (ISP) Souvenirs.

Using cables to connect to the internet

The oldest, and still a very common way to connect to the internet, is with physical wires. It
is normally the simplest way to connect as a cable is plugged into your device and another
device that provides internet to your house, school or office, known asa router, or hub.

33 P a g e
The cables and connections look like this:

These devices need to have an ethernet port where the cable is connected to anda source of
internet (wall sockets in cyber cafes, offices, homes etc.)

Quick Points about the Internet:


It is a global network connecting millions of computers.
The internet is decentralized.
Each internet computer is independent.
There are a variety of ways to access the internet.
There are more than 4 billion internet users in the world.

2. Intranet
An intranet is a private web-based network, operated by a large company or
other organization, which uses internet technologies, but is insulated from the global
internet. It is a computer network that uses Internet Protocol technologies to securely
share any part of an organization's information or operational systems within that
organization.
To put it simply, an intranet is like a private internet. Very often, a company’s intranet will
have information on it that the company does not want the public to have access to, such as
employee contact details and calendars.
Intranets are also a valuable communication tool in a company as they allow all members of
staff to work together, find information, create content and share tasks quickly and easily.

3. Extranet
An extranet is an intranet that is accessible by authorized users through the internet
from outside the company, or possibly shared by more than one organization.
It is a private network that uses Internet protocols, network connectivity. This is commonly
used to share files and information between businesses, clients, vendors. 34 P a g e
6. The Uses of the Internet and Cloud Services

6. Uses of Internet and Cloud Services


As internet adoption became mainstream in the 1990s, the network of networks increased the
power of decentralized computing. Personal computers not only stored data locally, but could
also download and exchange data found far and wide on the World Wide Web.
The growth in broadband access to the desktop at home and work has been a force multiplier
to this model of computing. Recent evolutions in information technology have led to a more
distributed computing environment, while also reviving the utility of centralized storage.
The growth in high-speed data lines, the falling cost of storage, the advent of wireless high-
speed networks, and the proliferation of handheld devices that can access the web – together,
these factors mean that users now can store data on a server that likely resides in a remote
data center.
Users can then access the data from their own computer, someone else’s desktop computer, a
laptop that wirelessly connects to the internet, or a handheld device.

4.6.1.1. What is the cloud used for?

Cloud computing is the on-demand availability of computer system resources,


especially data storage (cloud storage) and computing power, without direct active
management by the user. The term is generally used to describe data centers
available to many users over the Internet. Large clouds, predominant today, often
have functions distributed over multiple locations from central servers. If the
connection to the user is relatively close, it may be designated an edge server.
Cloud computing is often seen as particularly useful to large corporations. A company
may
have employees in numerous locations running specialized software to carry out
data- intensive tasks. Accessing data and software might be practically impossible
without a grid of networked computers. These computing resources are drawn
from someplace beyond the user’s location, and the fact that they exist at an
ill-defined elsewhere is the source of the image that they come from a
cloud. Clouds may be limited to a single organization (enterprise
clouds), or be available to many organizations (public cloud). Cloud computing relies
on sharing of resources to achieve coherence and economies of scale.
35 P a g e
4.6.1.2.Different types of Cloud Model

Cloud computing can mean many different things these days, but there’s three
main categories of cloud computing services. You might have heard about these or
use them already;

Not all clouds are the same and not one type of cloud computing is right for
everyone. Several different models, types and services have evolved to help offer the right
solution for your needs.
First, you need to determine the type of cloud deployment or cloud computing architecture
that your cloud services will be implemented on. There are three different ways to
deploy cloud services:

Data and other info that is only


accessible to users within your
organization

36 P a g e
A combination of the two.
4.6.1.3. How Does Cloud Computing Work?

To understand the workings of a cloud system, it is easier to divide it into two


sections: the front end and the back end. They are connected to each other through a
network, usually the Internet. The front end is the side of the computer user or client.
The back end is ‘the cloud’ section of the system.
The front end consists of the client’s computer or computer network. Also, the
application essential to access the cloud computing system. It is not necessary that all
cloud computing systems have the same user interface.
On the back end of the cloud technology system, there are various computers, servers and
data storage systems that make up the cloud. A cloud computing system could
potentially include any computer program, from data processing to video games.
Generally, each application will have its own dedicated server.

4. Risks of Cloud Computing Technology

Large companies often require hundreds of digital storage devices. Cloud computing systems
need at least twice the number of storage devices to keep client information stored. That’s
because these devices occasionally break down. A cloud system makes copies of
clients’ information, to store it on other devices. This method of making copies of data as a
backup is called redundancy.

How Is Cloud Computing Technology Managed?


A central server manages the cloud system. Its purpose is to manage traffic and client
demands to ensure everything runs smoothly. It pursues a set of rules called protocols and
uses a special kind of software known as middle ware. Middle ware permits
networked computers to communicate with each other.

5. Top benefits of cloud computing

Cloud computing is a big shift from the traditional way businesses think about IT resources.

37 P a g e
4.6.2. The term bandwidth relates to types of internet connections
Bandwidth describes the maximum data transfer rate of a network or Internet connection. It
measures how much data can be sent over a specific connection in a given amount of time.
For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes
per second). Internet Speed in Bandwidth in Ethiopia.

4.6.2.1. TYPES OF BANDWIDTH

38 P a g e
Because of factors including bandwidth, latency and throughput, some are better fits
for specific business applications than others. The main classes are Public Wireless,
Public Broadband, Private Networks and hybrid Software-Defined Wide Area Networks
(SD-

PUBLIC WIRELESS
•Long Term Evolution (LTE) cellular service, also referred to as 4G, and satellite tend to be
more expensive than terrestrial services offering similar bandwidth.
•Both 4G/LTE and satellite are shared services. They are sold in packages of up to
100 Mbps bandwidth, often with data caps, above which costs rise significantly.
•5G, is currently on agenda in Ethiopia
PUBLIC BROADBAND
•These high-speed Internet connections are provided through either cable or
telephone companies.
•Broadband Internet uses multiple data channels to transfer large quantities of
information.
•Popular broadband services include DSL, cable and fiber. Bandwidth offer up to 10 Gbps .
PRIVATE NETWORKS
•As the name implies, private networks are not shared.
•They are sold through carriers as professional business services with Service Level
Agreements (SLA) .
•More expensive than best effort public broadband services.
•Microwave is a wireless private network service offering symmetrical bandwidth up to 500
Mbps.
WAN).

What Type of Bandwidth is Right for My Organization?

Important questions must be answered while we select type and amount of Bandwidth
How many people use the network?
What do they use the network for? Are they accessing applications in the cloud?
Retrieving information from a data center? Pushing large amounts of data out?
Do they connect to branch locations via a wide area network (WAN)? How many
locations are connecting?
What core applications do they run and how bandwidth-intensive is each? For
example, streaming 4K video consumes considerably more bandwidth than reading
email.
Is there an existing circuit under contract? Does it need to be replaced or combined with
additional circuits for more bandwidth and network resiliency?

39 P a g e
 What are the needs for security and compliance? Are secure virtual private network
(VPN) connections between locations or to remote workers needed?

World Wide Web Web 0 Pa

Browser
4 g
e
5. THE WEB (WORLD WIDE WEB)

The WWW, or simply web, is a way of accessing information over the medium of
the internet. It is an information-sharing model that is built on top of the internet. The web
uses the HTTP (Hypertext Transfer Protocol), only one of the languages spoken over the
internet, to transmit data. It is an application protocol for distributed, collaborative,
hypermedia information systems.

5. How Web Addresses Work?

5. Web Addresses

41 P a g e
Web addresses are synonymous with URL's (Uniform Resource Locators). The URL
path represents the location of files within the directories of a Web server. Directories can
contain multiple directories and/or files.

2. URLs Scheme
Every URL begins with the scheme. This tells your browser what type of address it is so the
browser connects to it correctly.
There are many types of schemes, but for typical web browsing you will
mostly
see http and https. Your browser usually won’t show the scheme in the address bar,
and usually you don’t need to type the scheme when typing a web address; instead, you can
just begin with the domain name. The scheme is still always part of the URL; it just isn’t
being displayed.
http://www.aau.edu.et/course/index.php?categoryid=53

3. Clients and Servers


Computers connected to the web are called clients and servers. A simplified diagram of how
they interact might look like this:
Clients are the typical web user's internet-connected devices (for example, your
computer connected to the Wi-Fi, or your phone connected to your mobile network)
and web-accessing software
available on those devices (usually a web browser like Firefox, explorer or Chrome).
Servers are computers that store webpages, sites, or apps. When a client device wants to
access a webpage, a copy of the webpage is downloaded from the server onto the client
machine to be displayed in the user's web browser.

For now, let's imagine that the web is a road. On one end of the road is the client, which is
like your house. On the other end of the road is the server, which is a shop you
want to buy something from.
 Your internet connection: Allows you to send and receive data on the web. It's basically
liked the street between your house and the shop.

42 P a g e
 TCP/IP: Transmission Control Protocol and Internet Protocol are
communication protocols that define how data should travel across the web. This
is like the transport mechanisms that let you place an order, go to the shop, and
buy your goods. In our example, this is like a car or a bike (or however else you might
get around).

 DNS: Domain Name Servers are like an address book for websites. When you type a
web address in your browser, the browser looks at the DNS to find the website's
real address before it can retrieve the website. The browser needs to find out which server
the website lives on, so it can send HTTP messages to the right place (see below). This is
like looking up the address of the shop so you can access it.

 HTTP: Hypertext Transfer Protocol is an application protocol that defines a language for
clients and servers to speak to each other. This is like the language you use to order your
goods.
 Component files: A website is made up of many different files, which are like
the different parts of the goods you buy from the shop. These files come in two main
types:
o Code files: Websites are built primarily from HTML, CSS, and JavaScript,
though you'll meet other technologies a bit later.
o Assets: This is a collective name for all the other stuff that makes
up a website, such as images, music, video, word documents, and PDFs.

5.1.4. Domain name


The domain name is the most prominent part of a web address. Typically, different pages on
the same site will continue to use the same domain name.
For example, all pages on this site share the act.edu.et domain name.

http://www.act.edu.et/course/index.php?categoryid=53
www.aau.edu.et = Domain name

Each segment of the domain name separated by a period is called a domain.

www.aau.edu.et
Sub domain Third level Second level Top level

43 P a g e
Here, in the domain name Ethiopia.gov.et, the .gov domain means it is a government website
in Ethiopia.

File path
The file path: often just called the path tells your browser to load a specific page.
If you don’t specify a path and only enter a domain name, your browser is still
loading a
specific page; it’s just loading a default page, which usually will help you navigate to other
pages.

http://www.aau.edu.et/course/index.php?categoryid=53
/course/index.php?categoryid=53 = file path

Parameters
You have probably noticed this part of a URL appear in your address bar after performing a
search on Google or YouTube. The parameter string is critical information for the server.

Anchor
Also appearing after the path, the anchor tells your browser to scroll to or load a specific part
of the page. Usually the anchor begins with a hashtag and is used to direct your browser to a
specific part of a very long page, much like a bookmark.

A whole URL
When combined, these elements make up a URL, although not all URLs will have all five
parts.

44 P a g e
5.2. How Does the Internet Work?
Internet has become such a large part of our lives, so a good understanding is needed to use
this new tool most effectively. Because the Internet is a global network of computers each
computer connected to the Internet must have a unique address. Internet addresses are in the
form AAA.AAA.AAA.AAA where AAA must be a number from 0 - 255. This
address is known as an IP address. (IP stands for Internet Protocol.)

The picture below illustrates multiple computers connected to the Internet; the computer
with IP address 255.253.110.12 and another computer with IP address 255.253.190.20 and
the rest as well with a unique identification number or IP Address. The Internet is
represented as an abstract object in-between.

If you connect to the Internet through an Internet Service Provider (ISP), you are
usually assigned a temporary IP address for the duration of your dial-in session.
If you connect to the Internet from a local area network your computer might have a
permanent IP address or it might obtain a temporary one from a DHCP server.

How to connect to the Internet

45 P a g e
 It’s possible to connect to the internet via a range of devices these days —
though
desktop and laptop computers, mobile phones and tablets are the most common.

 However, everyday items such as watches, even central heating systems


and
refrigerators, are now capable of using the internet.

 In order for any device to actually get online though, requires signing up for a
specialized service for accessing the internet.

The two ingredients for connecting to the internet

Connecting to the internet requires two key ingredients:


1.A device capable of connecting to the internet.
2.Access to an internet service that will allow that device to get connected.

People’s choice over the various devices and means of getting online varies according
to many factors, including lifestyle (whether they’re at home or out and about), how
frequently they need to access the internet (every day for a number of hours or just occasional
use), the types of things they want to use the internet to do (catch up with email or
download and watch films and TV programmes), and budget (internet access companies
usually charge to use their services).

1. Two types of Internet connection services


There are two key types of service that can provide you with internet access.

1. Fixed internet

As the name suggests, this is an internet connection that is fixed to a specific location (such as
a home, office or shop) — meaning that the internet connection is unique to that property, and
as such you can only access it when you’re physically situated there. The two most
common types of fixed internet connection are:

a. ADSL broadband
The most widely used form of internet connection, ADSL uses a property’s existing phone
line to get online. This form of broadband has been available for a while, making it often the
most cost-effective way of getting online.

b. Fiber broadband
The most recently rolled out form of internet connection, still not that widely available,
is
46 P a g e
fiber broadband. Fiber broadband claims to offer more consistent and reliable speeds
than cable and ADSL (average download speeds of 59.4mb) — allowing multiple devices to
be performing high-capacity tasks, simultaneously, without any slowdowns or breakages in
the connection, making it an attractive proposition for busy family homes or office
environments.

c.Mobile internet

Mobile internet is a way of getting online anywhere without relying on a fixed-


location connection — as the name suggests, by using your mobile device.
Mobile phone operators provide access to this alternative method of internet usage.
When you sign up to a mobile phone operator’s services — either on a contract or pay-as-
you-go basis. Mobile internet is currently offered at three different speeds and capability
levels:

d.3G Mobile internet:


3G mobile internet has been around for many years and typically offers basic access
and download speeds that allow users to complete basic tasks such as load a web page or
access an email.
3G mobile internet is gradually being replaced by 4G services.

e. 4G Mobile internet:
4G mobile internet is the more recently available level of mobile internet available,
offering much higher speeds than 3G. In fact, due to excellent connection and download
speeds, 4G might eventually replace fixed internet connections in more rural parts of
may the
struggle to get
country thataccess to quicker connections.

47 P a g e
f. 5G Mobile internet:
The 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G,
and 4G networks. 5G enables a new kind of network that is designed to connect
virtually everyone and everything together including machines, objects, and devices.

2. How to set up a Wi-Fi network

If you already have high-speed (broadband) Internet service at your house, it's pretty easy to
create your own home wireless network. Commonly known as Wi-Fi, a wireless
network allows you to connect laptops, smartphones, and other mobile devices to your home
Internet service without an Ethernet cable.

a. Connect the cables


i. Once you've acquired a wireless router, you'll need to connect it to your
existing Internet modem.
ii. Connect an Ethernet cable from your modem to the wireless router. iii.Plug in the
power cable for the wireless router.
iv.Wait at least 30 to 60 seconds, and make sure the lights on your router are working
correctly.
b. Configure your router

Next, you'll need to use your computer to configure your router's default settings.
This includes setting a unique name and password for your wireless network.

48 P a g e
i. Using your web browser, enter the router's default IP address into the address
bar, then press Enter. Your router's instructions should include this information,
but some of the most common addresses include 192.168.0.1,
192.168.1.1, and 192.168.2.1.

ii. The router's sign-in page will appear. Again, the exact sign-in details
should be included with your router's instructions, but most routers use a
standard user name and password combination, such
as admin and password.
iii.
Your router's settings page will appear. Locate and select the Network
Name setting, then enter a unique network name.
iv. Locate and select the Network Password setting and choose an Encryption
option. There are several types of encryptions you can use, but we
recommend WPA2, which is generally considered to be the most secure.
v. Enter your desired password. Make sure to use a strong password to help
ensure no one else can access your network.
vi. Locate and select the Save button to save your settings.

c. Connect!

That's it! Now you're ready to connect to your Wi-Fi network and make sure it's
working. The process for connecting to a Wi-Fi network will vary slightly depending on
what type of
49 P a g e
computer or device you're using, but any system will require these basic steps. To connect
your smartphone to Wi-Fi:

1.Tap on the Settings Icon.


2.Tap on the Wireless and Networks option.
3.Tap on the Wi-Fi icon.
4.Select the Wi‐Fi network you want and enter the password.
a. If the word connected appears under the network name then you areconnected
to the Wi‐Fi.
b. Wi-Fi in public spaces such as libraries, cafes and hotels may need a password.
Some may not. Most are free to use, or free for customers touse.

5.3. Using a Web Browser


A web browser is a type of application software that allows you toaccess resources and
websites on the World Wide Web.
There are many examples of web browsers. The most common ones in use are
Google Chrome, Mozilla Firefox, Apple Safari and Microsoft Edge.

All these browsers work in very similar ways and have similar controls. If you can use one
type of web browser then you will beable to apply those skills to other browsers.

Navigation buttons in Google Chrome


Google Chrome web browser has the following important navigation buttons:

a.Back Button - This button navigates backwards through recently openedpages.


b.Forward Button - This button navigates forwards through recently accessedpages.
c.Refresh Button - This button reloads a page. Useful e.g., when the page doesn't load
correctly, it helps to reload a page correctly.

50 P a g e
Bookmarks and history
You can save your favourite pages in a web browser so that you can view/go backto them
later. This is similar to inserting a bookmark in a book so that you can easily pick up from
where you stopped reading. This is called bookmarking.
To create a bookmark, start by clicking on the star at the extreme right-hand side of
the address bar.

● Select the Add Bookmark option from the dropdown list.


● Give your bookmark a name.
● From the folder option select Bookmarks Bar as shown below.
● Click on done.
● Your bookmark is now added and is available just below the address bar. You open the
bookmark by clicking on it.
While using a web browser, every page you visit is
stored by the browser in history. This allows you to
return to a recently viewed page, in a similar way as
bookmarks. To look at your history on your browser:

●If the back and forward buttons are active, click and
hold your mouse on any of them and select See full
history, or

●Click on the three dots on the top right of the


browser and select history.

51 P a g e
52 P a g e
6. INFORMATION AND SYSTEM SECURITY

6. How to browse contents safely on internet

By adopting safe online practices and ensuring the security of your digital devices, you can
enjoy the benefits of accessing information, social connections, and economic
opportunities on the internet. Engaging in unsafe online practices or neglecting to
secure your devices exposes you to potential dangers. While innocently browsing the
web, you may unknowingly encounter spyware, download malware, or visit fraudulent
websites. However, there is no need to fear every click you make on the internet.
By following some straightforward precautions, you can protect yourself and maintain a
safe browsing experience.

1. Keep your browser updated

New forms of online content that can access and damage your computer are constantly
being introduced. You can help to keep your computer safe by updatingyour browser. This
is done by:

1. Using the latest version of your browser.


2. Installing all recent updates.

1. Domain and URL checking

Malicious sites often use deceptive domains to trick users into believing they are on a
legitimate site. A malicious website is any website that’s been designed to cause harm. The
following are some traits common to many malicious websites.

6. The website asks you to download software, save a file, or run a program
7. The website tells you that your device is infected with malware or that your
browser extensions or software are out-of-date.
8. The website claims you have won a prize and requests your personal
information to
claim it.
6. Visiting the website automatically launches a download window.
7. You are asked to download an invoice or receipt, such as a PDF file, .zip or rar, or an
executable file or .scr screensaver file

6. Be cautious of free software

Common types of free software include desktop backgrounds, free images, emoticons,
53 P a g e
computer games, etc. The consequences of installing unverified anduntrustworthy programs
can range from a minor annoyance to a loss of funds. . Such software can be a drain on your
computer system and resources. Take proper precautions when searching for new software
and avoid the free offers.

4. Be cautious of peer-to-peer file sharing

Peer-to-peer (P2P) file sharing operates differently from the typical method of downloading
files from the internet. In P2P sharing, a dedicated program is utilized instead of a
web browser. This program searches for computers on the internet that possess the desired
file. These computers, known as peers, are ordinary computers like yours. However, it's
important to exercise caution when engaging in peer-to-peer file sharing. Certain P2P
programs like BitTorrent and LimeWire have gained notoriety for hosting malware, adware,
and facilitating illegal downloads. Therefore, it is crucial to be vigilant when downloading
and sharing files from peer-to-peer sites to protect your computer and your data.

If you have no alternative to using such sites, you should take the
followingprecautions:

• Use pop-up blockers.


• Clear the cache in your computer on a regular basis.
• Turn on “I do not want to be tracked” button when browsing the internet.
5. Verifying secure sites

Protecting your computer from malware, spyware, and adware is crucial, and one common
entry point for these threats is through downloads. To safeguard yourself, it is important to
only download from well-established and trusted sites. Here are some simple steps to help
you stay protected from unsafe websites:

Avoid clicking on embedded email links: Instead of clicking on links embedded in emails,
even if they appear to be from someone you trust, it is safer to manually type the link into
your browser. This reduces the risk of accidentally accessing malicious websites.

Trust your instincts and use common sense: If a website looks suspicious or unfamiliar, or
if it requests sensitive personal information, it is best to err on the side of caution
and avoid interacting with it. Trust your intuition and prioritize your online safety.

Verify the website's legitimacy: Look for contact information or signs of a real-
world presence on the website. If you are unsure, consider reaching out to them through
phone or email to confirm their authenticity.

Pay attention to the URL: When visiting a website you frequent, double-check the URL for

54 P a g e
any spelling errors. Cybercriminals often create fraudulent websites with URLs that
closely resemble legitimate ones. Be cautious of mistyped URLs that may lead you
to malicious sites.

Be skeptical of unbelievable offers: If a website is offering a product or service


at an unusually low price or promising an exceptionally high return on investment,
exercise caution. If an offer seems too good to be true, conduct additional research, read
reviews, or look for warnings from other users.

Check link properties: Right-clicking on a hyperlink and selecting "Properties" can


reveal the true destination of the link. Compare the displayed link with the claimed
destination to ensure they match. Any inconsistencies may indicate a potential scam or
malicious intent.

6.2. Secure Websites

SSL, which stands for Secure Sockets Layer, plays a crucial role in maintaining
secure internet connections and safeguarding the integrity of information transmitted
between two computer systems. When SSL is employed, it prevents unauthorized
individuals from intercepting or tampering with the transferred data. You can identify a
website protected by SSL through the presence of a padlock icon displayed next to the
URL in the address bar.

TLS (Transport Layer Security) is an enhanced and more secure iteration of SSL. It
functions similarly to SSL by utilizing encryption techniques to ensure the protection of
data during transmission. TLS serves as an upgraded version of SSL, offering
improved security measures for data and information transfers.

55 P a g e
3. Ensuring your safety online: Cybersecurity and its importance

This article focuses on the significance of cybersecurity in maintaining confidentiality, data


integrity, and overall online and offline safety for your digital devices.

3. What is cybersecurity?

Cybersecurity encompasses the implementation of technologies, processes, and controls


aimed at safeguarding computer systems, networks, programs, devices, and data from
malicious attacks. These attacks, known as cyber-attacks, pose threats to the security
and integrity of digital assets. The primary objective of cybersecurity is to minimize the risk
and impact of cyber-attacks while preventing unauthorized exploitation of systems,
networks, devices, and technologies. It also encompasses practices that protect electronic
devices and personal information from unauthorized access or intrusion.

The scope of cybersecurity extends to various aspects, including internet governance,


combating cybercrime, ensuring data protection, jurisdictional concerns,
safeguarding trademarks, and addressing issues related to copyright and intellectual property.

3. Key Terms used in Cyber Security

Network security is the practice of securing a computer network from intruders,whether it is


by targeted attackers or opportunistic malware or virus.

Application security focuses on keeping software and devices free of threats. A


compromised application could provide access to the data that it is designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.

Information security protects the integrity and privacy of data, both in storage and in
transit.

Operational security includes the processes and decisions for handling and protecting data
assets such as the permissions users have when accessing a network and the
procedures that determine how and where data may be stored.

Disaster recovery and business continuity define how an organization responds to a


cyber-security incident or any other event that causes the loss of operations or data. The
organization uses disaster recovery policies to dictate howit restores its operations and
information to return to the same operating capacity as before the event.

End-user education addresses precautions people should take to avoid accidentally


introducing a virus to a secure system by following good security practices. They teach users
to delete suspicious email attachments, not plug in unidentified USB drives, and

56
various other important lessons vital for the securityof any organization.

4. Types of Personal Data Targeted in CyberAttacks

Personal data refers to any information that pertains to an identified or identifiable


individual. An individual is considered identifiable if they can be directly or indirectly
identified, usually through identifiers like their name, identification number, location data,
online identifiers, or a combination of unique attributes such as physical,
physiological, genetic, mental, commercial, cultural, or social characteristics.

Examples of personal data include identification card numbers, passport numbers, and
social security numbers. Additionally, personal data can encompass details such as
telephone numbers, credit card information, employee identification numbers, account
data, vehicle registration plates, physical appearance, customer numbers, and addresses.
These examples illustrate the wide range of information that falls under the category of
personal data.

4. Consequences of not Securing Personal Data

Many internet users remain unaware of the threats to online privacy and the risks
associated with having their personal data exposed on the internet. It is important to
understand the consequences of these online threats to personal data. Here are some
notable impacts:

Financial Loss:

One of the immediate and severe consequences of a data breach is the financial impact it
can have on both organizations and individuals. Cybercrime incidents can result in
substantial financial losses that are challenging to recover from.

Reputational Damage:

In the digital age, news spreads rapidly, and organizations or individuals can find
themselves at the center of a global news story within hours of a breach or data
disclosure. The negative press coverage, combined with a loss of trust, can cause
significant and lasting damage to the reputation of the affected entity or individual.

Operational Downtime:

Following a data breach, business or personal operations often experience significant


disruption. Efforts must be made to contain the breach, conduct thorough investigations,
and assess the extent of system access. In some cases, the affected entity may
need to temporarily shut down operations until the investigation is completed, which can
take days or even weeks depending on the severity of the breach.

57
Legal Action:

Under data protection regulations, organizations and individuals have a legal obligation
to demonstrate that they have taken necessary measures to protect personal data. If personal
data is compromised, affected individuals have the right to seek legal action against the
responsible party for compensation.

Loss of Sensitive Data:

Biometric data, such as fingerprints or facial recognition, holds significant value for
cybercriminals compared to basic information like credit card details or email addresses.
Breaches that expose biometric data can have catastrophic consequences and surpass the
financial and reputational damages, as it can be exploited to cause serious harm to
individuals.

2. Threats to your personal data

1. Malware

Malware is malicious software such as spyware or virus. It is activated when a user clicks on
a malicious link or attachment, which leads to installing dangerous software. Once a
malware is activated, it can:

•Block access to key network components (Ransomware)


•Install additional harmful software
•Covertly obtain information by transmitting data from the hard drive (Spyware)
•Disrupt individual parts, making the system inoperable (Bricking)
•You can prevent a Malware attack by talking the following steps:
•Install Anti-Virus/Malware software.
•Keep Your Anti-Virus Software Up to Date.
•Run Regularly Scheduled Scans with Your Anti-Virus Software.
•Avoid opening suspicious links or download attachments from unknownsources.
•Keep Your Personal Information Safe by locking down all your privacy settingsthrough
secure passwords.
•Install Firewall which prevents malicious attacks by blocking all unauthorized access to or
from a private computer network.

58
59
Creating an Email
Account and Getting

60
7. Creating Acccounts and Creating Passwords
A user account is an online place that stores the user’s information identified by ausername
and protected by a password, e.g., WhatsApp account, a Facebook account, a Twitter
account, or an ecitizen account.

A password is a string of characters used to verify the identity of a user during an


authentication process. Passwords are typically used together with a username, or user
identification (sometimes called User ID). They are designed to be known only to the user
thus allowing the user, and no one else, to gain access to a document, device, application,
website, or a social media platform.

A username/user ID is a sequence of characters that uniquely identifies a user ona computer


system, a computer application, a website, or a social media platform. Other words used to
mean the same term are login name, logon name, sign in name or sign on name.

1. Creating Accounts and Password

1. Purpose of a Password

While accessing the internet, a user needs a user ID and password to prevent unauthorised
people from accessing the information stored on their device. Suchinformation may include
details of bank accounts, college account, emails, social media accounts, e-citizen account
and any other account created online.

It is therefore important to learn how to create secure passwords and how tomanage them to
protect your information.

2. Bad password practices

Passwords are essential to the security of your personal information. It is importantthat you
avoid bad password practices such as:

1. Using simple formulaic passwords.


2. Sharing passwords.
3. Writing down passwords in physical locations that are easy to find.
4. Reusing the same password for some or all your accounts.

It is important to create a good password, but also to keep the password safe.
Additional software called a Password Manager can help you with this.

61
2. Using Email

1. What is email?

Email, short for electronic mail, is a digital communication method that allows individuals to
exchange messages and files over the internet. It serves as a convenient and efficient way to
send and receive messages electronically.

Email operates through email servers, which are responsible for sending, receiving, and
storing messages. Each user has a unique email address that consists of a username, followed
by the "@" symbol and the domain name of the email service provider (e.g.,
johnsmith@gmail.com).

7.2.2. How Email Works

Emails are routed to user accounts via several computer servers. They route the message to
their final destination and store them so that users can pick them up and send them once they
connect to the email infrastructure. Email can be accessed through an email client or a web
interface.

Here are the simplified steps of how email works:

Composing: The sender creates a new email message using their email client or
webmail interface. They enter the recipient's email address, subject line, and compose the
content of the email.

Sending: Once the sender clicks the "Send" button, the email client or webmail
interface connects to their outgoing mail server, also known as the Simple Mail
Transfer Protocol (SMTP) server.

SMTP Server: The sender's SMTP server receives the email from the client
and
62
authenticates the sender. It then searches for the recipient's domain name in the email address
(the part after the "@" symbol).

Domain Lookup: The sender's SMTP server performs a Domain Name System (DNS)
lookup to find the recipient's domain's Mail Exchange (MX) record. The MX record specifies
the address of the recipient's incoming mail server.

Routing: The sender's SMTP server establishes a connection with the recipient's incoming
mail server, known as the SMTP receiver. It transfers the email to the recipient's server using
the Simple Mail Transfer Protocol.

Delivery: The recipient's SMTP receiver receives the email and stores it in the
recipient's mailbox on their mail server.

Retrieval: The recipient opens their email client or webmail interface, which connects
to their incoming mail server using protocols like POP3 (Post Office Protocol) or
IMAP (Internet Message Access Protocol). The email client retrieves the email from the
server and displays it to the recipient.

Reading and Responding: The recipient reads the email, may reply to it, forward it, or take
other actions as desired.

3. Email Structure

An email is constructed with three parts:

1. The envelope that we’ve just mentioned. This is separate from the body and header. Next
is the body (that contains content of the message). Email clients separate an email header
and the body (the content text).
2. The body is distinct from the header; it contains everything within the message including
images, text and any other data (such as attachments).
3. The header which is arguably the most interesting part of an email’s DNA. The header
always precedes the body text. This is logical, when you receive an email, it’s often the
header that’s scanned first before the email is opened.

63
Write and Send Email Messages
When you write and send an email to your boss, friend or family member you type
their
email address, compose, then hit send and their reply comes back to your email client. To
some extent, this is true, but, there’s much more to it than that. How emails are structured and
transmitted is a complex process, and with the help of relatable analogies, we can explain the
entire process in an easy to absorb manner.
As simple as it seems, email relies on a different set of protocols as those used to
access website content. To order, store and access emails relies on a set of protocols that’s
different from what the rest of the internet depends on. For most email users, it’s not
necessary to understand how email works to use it.
A lot happens when you hit "send."

1.Email messages are composed using an email program (an email client).

2.The email program assembles the email by combining the message content (the body) with
the recipient, subject plus the date and time (the header).

3.Email relies on a set of protocols to arrive at the correct destination.

4.The email program (the email client) comes in two forms, a web based version like Gmail
where users must login through their browser to access their emails, or a client based version
such as Outlook where users install software to access emails from their local computer.

64
How Do I Compose and Send a New Message?

To compose a message:

Click the New Mail icon in the Quick Actions menu in the upper-left corner of the
Convergence UI, or
Click Write in the Messages section of the Convergence UI.

The Compose tab consists of the following part:

Toolbar menu

The toolbar menu contains the following icons:

 Send: Sends the message to the respective recipients.


 Attach: Attaches a file to the message.
 Save: Saves the message as a draft which you can refer later.
 Bcc: Enables you to send a blind copy of the message to recipients.
 Options: Enables you to add more features to your messages.
 Cancel: Closes the current tab and returns to the Messages view.

 From: This field contains a drop-down list with all the configured sender profiles you
have for this account. This field is not displayed if you have not configured external
POP accounts. This list includes the name followed by the email address of
each configured external account. Convergence enables you to collect email
from other POP accounts in addition to the default account.

This feature enables you to receive, send, reply, or forward email from or to other
email accounts that support POP access.

 To and Cc fields to include receivers email addresses.


 Subject field.
 Message format menu bar.

To compose and send a new message:

1. Click the Write icon on the centre panel to display the Compose tab. The Compose

tab contains the To, Cc and Subject fields.

2. Enter the email addresses of the recipients who should receive your message in
the To field. Use a comma to separate multiple addresses.

65
Alternatively, click the Address Book icon next to the To field to select the email address.
To send a copy to a recipient, enter the email addresses in the Cc field or click
the Address Book icon next to the Cc field to select email addresses.

Convergence provides an address book auto completion feature. This feature needs to
be enabled at the back-end Convergence server. When enabled, enter the first
few characters of the display name of the recipient. The list of entries that closely match
the entered characters from the Address Book appear in a drop-down list.

3. To send a blind copy to a recipient, click the Bcc icon. Optionally, click the
Address Book icon next to the Bcc field to select
email addresses from the saved list.
The Bcc field appears. Enter the email address in the Bcc
field.
4. Enter the subject of your message in
the Subject field.
5. Click the Options icon in the top toolbar. The expanded message icons are shown.
6. From the priority drop-down list, select
the required priority.
The priorities are Normal, Urgent, and Low. By default, the messages are sent with normal
priority.
7. From the Receipt drop-down list, select an option.
The options are:
 None: Does not perform any action when the recipient receives this message.
 Read: Sends a notification when the recipient reads the message.
 Delivery: Sends a notification when this message is delivered to the recipient.
 Delivery and Read: Sends a notification when your message is delivered and
read by the recipient.
8. Select the Rich Text check box to include rich text features in the mail editor.
9. Click in the message text box and enter the text of the message.
To attach a message to the mail, click the symbol with a paper clip or a word Attach
written in the menu bar.
10.Click Send to send the message.
Between sifting through spam, crafting the right responses, and keeping tabs on the
messages that require follow-up, staying on top of your inbox can feel like a job in itself.
That’s why

66
we picked the brains of professionals who have figured out the secret to efficient, organized
inboxes—despite getting hundreds of emails a day. Because having a system in place
can help you conquer even the most unruly inbox.

7.2.4. Manage Email Messages

The best way to manage emails is to regularly review the folders for their content and refresh
by deleting unnecessary email messages stored in the folders. It is also advised to follow the
10 key points mentioned below to manage your email messages, improve the speed of
retrieving an email and avoid junking up your inbox.

1.Only Keep Emails Requiring Immediate Action in Your Inbox

There is no need to keep all email delivered into your Inbox folder. Those emails that may not
require an immediate response may be kept in waiting folder.

2.Create a “Waiting Folder” for Action-Pending Emails

So where do emails go if not your inbox? Create a “waiting folder” for emails that require
action from someone else before you can respond. “This is a huge time- saver,” “That
way those emails aren’t junking up your inbox, and it’s a great place to look each day or week
to remind you of what projects are still pending.”

3.Make Subfolders or Labels

Across the board, it is recommended creating an easy-to-decode subfolder or label


system. “Use Subfolders or Labels to group together important email chains, so when you
need to look at something for reference, you can do so easily.”

4.Set Inbox Rules or Filters

Many email providers allow you to set up inbox rules or filters that will take action for you
and can help you quickly categorize emails without depleting any brainpower. Take
advantage of Outlook’s rules functions, “put emails into different folders, colour code, and
prioritize based on sender”.

5.Use Your Calendar to Track Emails That Require Follow-up

Because some emails might require more than a simple reply, it is important to add them to
the calendar. “If you receive an email that requires not only an immediate response but
also some sort of follow-up action, move the email to a designated subfolder and put a
reminder on the calendar that includes the folder location and the date when follow up is
required”.

67
6. Don’t Let Junk Mail Languish in Your Inbox

Feel like you’re playing with promotional emails? Don’t waste your time, be swift
with the unsubscribe button. They are time and space waster, don’t bother just
unsubscribe from the list.

7. Create Templates for Your Go-To Responses

Tailoring a different reply for every email can be a huge time-suck. If you find
yourself sending the same type of email over and over again, you may benefit from keeping
some stock responses in your drafts that you can easily reuse.

8. Set Aside Time Blocks for Checking Email—and Stick to Them

You probably wouldn’t leave your schedule open for meetings of unspecified times and
lengths around the clock, so why give email free rein to intrude on your day? The best you
can do is don't leave emails open all day long;

a. Set specific times during the day to go through each email and
thoughtfully respond, archive, or save for later. This way you may not multitask,
and you can get through all your emails more quickly because you have actually
focused on the task at hand.
b. It is recommended that you start out with three different half-hour blocks a day to
read through and respond to emails and keep inbox closed the rest of the day and
adjust as necessary from there.”
c. In addition to using time-blocking to stay on top of daily emails, it
is
recommended to set aside time once a week for inbox maintenance. Choose a time
each week to maintain your inbox. Protect the time as you would any other important
meetings and get organized. “Sweep away the irrelevant, archive the complete, and
prioritize the to-do list.”
9. Turn off Email Notifications

Even if you’ve resigned yourself to only checking emails in pre-designated blocks, the
siren song of your inbox notification might be too great a temptation to resist. If that’s the
case, the solution is simple: Turn off your notifications because, if you work in time
blocks, you will never go more than a couple of hours without seeing your emails. Hence,
turn off the notifications, as they will distract you from doing what you are currently
working on at your desk.

10.Squeeze in Mindless Email Tasks During Downtime

Ensure email accounts are effectively synced to your phone and use idle moments to do quick
inbox clean-up. Lots of the messages we receive don’t require direct action.
68
Hence, spam can be deleted, other things can be filed, and you can deal with plenty of
these just while you’re in a ten-minute coffee break time.

5. Identify Correct Email Etiquette

The basics of modern email etiquette (protocol) or the most essential rules you need to
know are:

1. Include a clear, direct subject line.


2. Use a professional email address.
3. Think twice before hitting Reply All.
4. Include a signature block.
5. Use professional salutations.
6. Use exclamation points sparingly.
7. Be cautious with humor.
8. Know that people from different cultures speak and write differently.
9. Reply to your emails--even if the email wasn't intended for you.
10.Proofread every message.
11.Add the email address last.
12.Double-check that you've selected the correct recipient.
13.Keep your fonts classic.
14.Keep tabs on your tone.
15.Nothing is confidential--so write accordingly.

6. Create an Email Address

I.Create email account and enjoy the benefits of it


When you create an email account it is very essential to look for most popular
providers but also which offers powerful spam and virus protection. Also a one who
have a good features to organize personal time and manage emails and files easily.

The benefit from great tools and features can help you keep your work safe
and become more efficient. To create email account, you will only need a few
minutes and it's easier than ever. When you are about to create free email account
there are few things worth considering.

a) First of all, before you create email account think of your username. Will you use
your email as private or professionally? Make sure your username defines your
purpose.
b) And of course, the password. Keep your email account safe and remember that
the length of a password determines its security strength as the time required to
crack longer passwords increases exponentially.

69
Therefore, your password should consist of at least 8 characters and contain both
capital and lower-case lettering, as well as numbers and special characters (e.g.,
"!", "&", "-".).

We recommend you change your password from time to time in order to increase
the security. Do not choose a password that is easy to guess, e.g. personal data
such as: your initials, your date of birth, or the name of a family member or a pet.

II.How to create email account/email address?


Follow the default steps below to create an email account (email address) at any
mail service provider’s web site on fee or for free:

1 Click on the Sign-Up Button for a new email account, if you haven’t got
an existing email address
2 Enter all mandatory fields (First Name, Last Name, Gender, etc.) as
shown below for a Google email account screen shot.
3 Type-in the desired Email Address of your choice
4 Choose a secure Password (at least 8 characters, mixing letters, numbers, lower
and upper case, and using special characters)
5 Select your Security Question, type in your Answer (This helps in case
you
forget your password to login into your email account)
6 Verify your registration by typing the numbers and letter shown as picture but
gothic fonts (when it is a requirement)
7 Click the "Accept" – Button to confirm

That's it! You're done. Then Enjoy your new email account immediately
on any device of your choice!
III. Example of creating an email with google.com: -
To sign up for Gmail, create a Google Account. You can use the username and
password to sign in to Gmail and other Google products like YouTube, Google Ply,
and Google Drive.

1. Go to the Google Account creation page.


2. Follow the steps on the screen to set up your account.
3. Use the account you created to sign in to Gmail.

IV. The username I want is taken


You won't be able to get a certain Gmail address if the username you requested is:

 Already being used.


 Very similar to an existing username (for example, if example@gmail.com already
exists, you can't use examp1e@gmail.com).
 The same as a username that someone used in the past and then deleted.
 Reserved by Google to prevent spam or abuse.

70
V. What comes with the free email account?
An email account allows you to take advantage of many great tools and features,
entirely for free:

 Freedom - You can use your account anywhere and anytime you like, on
your Smartphones, Laptop, Tablets and Desktop
 Online Calendar, Entertainment and Promotion emails organized to manage your
time efficiently
 And much more!

71
The Features of Online
Communities

72
8. KEY FEATURES OF AN ONLINE COMMUNITY
They all contribute to the personal experience of the shared space. Here’s something about the
user experience of online communities that you’ve probably never considered: everyone in
an online community is having a unique, individualized experience, even though they’re
all doing it together.
This is because someone’s activity feed is not somebodies activity feed, it has
different
places, people, and pages appearing in it. Some of the posts in the feed may also appear for
someone, depending on their collective preferences. But most of the time one can only see
a small portion of the things others see, and then share those with subset of friends. It’s
like riding the light rail. It’s a personal experience in a shared space: a million small
interactions that can be meaningful, or totally forgettable.

8. The Key Features of an Online Community


Rich User Profiles with Social Integration With communities, people want incredible
value, comfort while interacting with other members, and high level of customization.
They want profiles that will display them as
industry experts and build personal brands. A great way to achieve these is a rich user
profiles integrated with social media.

An improvement over the rich user profiles


is something known as a SSO or single sign on. With just a single instance for logging in you
save user’s time, effort and by tracking the community habits offer better user experience.

73
1. A sample rich user profile should include these details:

 Full Name
 Social Profile
 Photograph
 Company Name
 Designation
 Email
 Phone Number
 Birth Date
 Gender
 Interest areas

2. Responsive Design
A great-to-add feature would be enabling your
customers to read, search, and contribute to your community from any device they
are able to access. Mobile and tablet users access social networking sites and
online communities 26% of the time. On a typical day, people use their
mobiles during the travel, desktops/laptops during the workday, and tablets/mobiles at
night.
With such cross device usage, you have to make sure your community works perfectly on
each platform to deliver a smooth and engaging user experience.

3. Mobile Apps
72% ovf consumers have a more favourable view of the company if they provide a
customer service mobile
app. With an app for your online support community, you can help your customers access
your support
community for support and advice, 24/7. To enrich

74
user experience figure out apps that your target audience needs and wants.
4.Gamification

Gamification taps into basic human psychology to motivate users to contribute, share, and
be active. When your users come to the community, they need
motivation to participate. Additionally, gamification satisfies the “what’s in for me”
urge by rewarding participation, boosting user visibility, and
driving conversations with rewards/freebies/badges/status upgrades and more.
5.Content Resources
Your users come back repeatedly when they see the value your content is providing.
Traditionally content is thought of as only articles, how to videos and some Q/A. For
a truly engaging community, you should look at content in the form of Content: -
Post Tags/Labels, Customer Engagement Videos, Customer Interviews, Social Media
Feeds, Community Newsletter, Case Studies, white Papers, eBooks, User Activity
Streams/Ticker, Community Blog, Similar Discussions, Media Libraries

6. User Groups
Segment customers or members to improve collaboration and
provide a
better customer experience. You need to provide the ability to create private, semi-
private and public forums that the users

75
can create according to their convenience. These are virtual hangouts for people to share new
ideas, best practices, start discussions, and locate experts in their niche.

7.Water-cooler
Think of it as a virtual water cooler. It functions exactly like the water cooler you have in
your office. Strong relationships are key. Off-topic discussions, discussions around a
wide
range of non-business subjects provide an opportunity to users to relax and get to know their
peers.
8.Full text search
Your target audience is busy. With full text search, facilitate right information from
their
computers or mobile devices. It gives them a wide array of results to dive in deeper and get
best answers.
9.Email Notifications
People are notified by e-mail
(not through the platform!) when their discussion has received a response.
They visit, read the response and reply. The individuals that replied are notified
and visit to

cycle
reply and so the
the
continues.
Visiting soon becomes a habit.
platform
Notifications also speed up the community. Most people instantly click on the notification to
see the response. In that visit, they make their own response. The quicker pace equals more
posts and an active community.
10.Event Calendar
Events are a great way to
get traction to your community and increase engagement and
attendance at in-person and
virtual events – from a webinar series to multi-day conferences. Make sure you have included
one that allows participants to add events and customize “who can attend”. Additionally,
in advanced cases you can also manage event registration, conference-related
communication, and session submissions.

76
11.Private IMs and Member
Directory
Peer to peer engagement is a building block for
higher- level frequent activity in a group. One way to
expedite peer-to-peer engagement is by enabling
private IMs. Enable community members to follow the
activity streams of other members and build personal
networks.

12. Security
Security should start right from the sign on capabilities to the content the users can access,
people they can connect with, events they can attend, modules they can access, edit or
even manage. Within security, you should have robust and well-defined privacy
options, safety guidelines that are prominent and easy to understand, options to
block notifications and more.

13. Advanced Custom Reports


Allow capabilities to track which topics are driving conversations, most popular, most
shared, and most
commented. You should also track which type of notification receive instant
response and drive follow-up
action. Other things to track are how people like to access content, which gamification
options are working
and more. Analytics gives employees and management a top-down view of trends, usage, and
specific customer data.

Finally
Communities are the buzzword right now. People want communities that provide value, gives
them a forum to connect with like-minded individuals. Features make this happen.
Think
about it like this, you love the new smartphone because it lets you do so many things with its
cool features. There is little change in the hardware or the software, but you still
love it.
Doesn’t a community function in the same way?

77
8.2. How to make business on Social Media
Creating a successful business presence on social media requires careful planning,
consistent effort, and effective strategies. Here are some steps to help you get started:

Define Your Goals: Determine what you want to achieve through social media. Are
you aiming to increase brand awareness, drive website traffic, generate leads, or
engage with customers? Clearly define your goals to guide your social media strategy.

Identify Your Target Audience: Understand your target audience's demographics,


interests, and preferences. This knowledge will help you tailor your content and messages to
resonate with your ideal customers.

Choose the Right Social Media Platforms: Research and select the social media platforms
that align with your target audience and business objectives. Popular platforms
include Facebook, Instagram, Twitter, LinkedIn, and YouTube. Each platform has its own
strengths and user demographics, so choose the ones that are most relevant to your business.

Create a Consistent Brand Identity: Develop a strong and cohesive brand identity across
all social media platforms. Use consistent branding elements such as logos, colors, and tone
of voice to establish a recognizable and trustworthy presence.

Develop a Content Strategy: Plan and create compelling content that provides value to
your audience. This can include informative articles, engaging videos, captivating
images, infographics, and interactive posts. Mix promotional content with educational,
entertaining, and shareable material.

Engage and Interact: Social media is all about building relationships. Respond promptly to
comments, messages, and mentions. Engage with your audience by asking questions,
running polls, and encouraging discussions. Show genuine interest in your followers
and build a community around your brand.

Utilize Advertising and Promotions: Consider using paid advertising and


promotions to reach a broader audience and boost your social media presence.
Platforms like Facebook, Instagram, and LinkedIn offer targeted advertising options that
allow you to reach specific demographics.

Analyze and Optimize: Regularly analyze your social media performance using
analytics
78
tools provided by the platforms or third-party tools. Track metrics such as engagement, reach,
click-through rates, and conversions. Use this data to refine your strategies and optimize your
content for better results.

Remember, building a successful business presence on social media takes time and effort. Be
consistent, authentic, and focused on providing value to your audience. Adapt your strategies
based on your audience's feedback and evolving trends in social media marketing.

Emerging Technology 79

• Internet of Things
9. EMERGING TECHNOLOGY

1. Introduction to Internet of Things (IoT)


The Internet of Things is an emerging topic of technical, social, and economic significance.
Consumer products, durable goods, cars and trucks, industrial and utility
components,
80
sensors, and other everyday objects are being combined with Internet connectivity.
Projections for the impact of IoT on the Internet and economy are impressive, with
some anticipating as many as 100 billion connected IoT devices and a global economic
impact of more than $11 trillion by 2025.
Key concepts that serve as a foundation for exploring the opportunities and challenges of IoT
include:
Enabling Technologies: The concept of combining computers, sensors, and networks to
monitor and control devices has existed for decades. The recent confluence of several
technology market trends, however, is bringing the Internet of Things closer to
widespread reality.
Connectivity Models: IoT implementations use different technical communications
models, each with its own characteristics. Four common communications models
described by the Internet Architecture Board include: Device-to-Device, Device-to-
Cloud, Device-to-Gateway, and Back-End Data-Sharing. These models highlight the
flexibility in the ways that IoT devices can connect and provide value to the user.
Transformational Potential: If the projections and trends towards IoT become reality,
it may force a shift in thinking about the implications and issues in a world where the most
common interaction with the Internet comes from passive engagement with

connected objects rather than active engagement with content.

81
9.1.1. Some examples of IoT devices
Although the name “Internet of Things” may be unfamiliar, you may recognize this
connected ecosystem better as “smart homes” or “connected homes,” which include
the various IoT devices that make your home life easier.

But IoT devices are also found outside the home. They can range from a Wi-Fi pet camera on
your bookshelf to a medical device implanted in your body, like a pacemaker.

As long as the device is able to connect to the internet and has sensors that transmit data, it
can be considered an IoT device. Although your smartphone can do both, it’s not an
IoT device.

Smart Watch

Also, the IoT ecosystem is accessible through the smartwatch. Your smartphone as well as a
number of other gadgets are connected to it. You might receive a vibrating or sound alarm if
you leave your cell phone behind and move beyond a certain range. Certain smart devices
even allow you to locate a missing phone.

Smart Car

82
The term Smart/ IoT car' refers to embedding IoT technologies into automotive systems to
create new applications and solutions which enable vehicles to provide a smarter,
safer, efficient, and more comfortable driving experiences.

Smart Home

A smart home is a home setup where internet-enabled appliances and devices can be
automatically controlled remotely using a networked device.

Smart City

83
A smart city is a technologically modern urban area that uses different types of
electronic methods and sensors to collect specific data.

Smart Farm

9.1.2. How do IoT devices work?


Smartphones do play a large role in the IoT, however, because many IoT devices can
be controlled through an app on a smartphone. You can use your smartphone to
communicate with your smart thermostat, for example, to deliver the perfect temperature
for you by the
84
time you get home from work. Another plus? This can eliminate unneeded heating or cooling
while you’re away, potentially saving you money on energy costs.

IoT devices contain sensors and mini-computer processors that act on the data collected by
the sensors via machine learning. Essentially, IoT devices are mini computers, connected to
the internet, and are vulnerable to malware and hacking.

9.1.3. What are the advantages of the IoT?


The Internet of Things is designed to make our lives more convenient. Here are a
few examples:

9.1.4. The future of IoT


It’s not science fiction. We are living connected lives filled with internet-enabled devices that
learn our preferences and provide the experiences we want to make our lives more
convenient. And the technology that makes it possible to connect our lives is expanding.

Since 1980s, the IoT has exploded. What about the future? Devices are growing smaller and
smarter. Eventually, everything from your toothbrush to your toaster may be connected to the
internet 24x7. Your gadgets will become household aides, each chatting with one
another, working to serve you better.

Understanding IoT Security and Privacy: What You Should Know

85
Understanding the Risks: What Could Go Wrong with IoT
As with any technology, the Internet of Things (IoT) brings both benefits and potential risks.
It is important to be aware of these risks in order to protect yourself and your data. Here are
some potential issues to consider:

1.Cybersecurity Threats: The convenience and connectivity offered by IoT can also
create opportunities for cybercriminals. They may attempt to access sensitive data such
as bank logins, credit card numbers, or personal information. Strong security measures
are essential to protect against these threats.
2.Hacking of IoT Devices: Imagine if someone gains unauthorized access to your IoT security
cameras and monitors your activities without your knowledge. Similarly, a
cybercriminal could take control of your smart TV, smoke alarms, or front-door lock,
potentially compromising your privacy and security. The interconnected nature of IoT devices
can create vulnerabilities that attackers may exploit.
3.Protecting Connected Devices: Just as you take precautions to safeguard yourself
against cybercrime, it is important to ensure the safety and security of your IoT
devices. The Internet of Things continues to introduce new online threats, so proactive
measures are necessary to mitigate risks.
4.Securing Your Wi-Fi Router: One of the most effective ways to defend your
networked devices is by securing your Wi-Fi router. Your router acts as the gateway to your
online world, and by ensuring its security, you can protect your entire home Wi-Fi network
and all the devices connected to it.
By being aware of these potential risks, you can take proactive steps to enhance the security
of your IoT devices and protect your privacy.
Stay informed about the latest security practices and updates, regularly update your devices'
firmware, use strong and unique passwords, and consider additional security measures such as
network segmentation or firewall protection.

2. Virtual Reality and Augmented Reality

• Virtual Reality (VR)


Virtual Reality is a technology that creates a simulated
environment or experience, completely separate from the real world. By wearing a VR
headset, users are immersed in a digital environment that can be interactive and three-
dimensional.
VR offers a wide range of applications, including gaming, entertainment, training, education,
86
and virtual tours. It provides users with a sense of presence and can transport them to virtual
worlds that are visually and audibly convincing. VR has the potential to revolutionize various
industries by offering unique and immersive experiences that go beyond the limitations of the
physical world.

Benefits of Virtual Reality in a Business

Virtual Reality (VR) offers a range of business benefits across various industries. Here are
some key business benefits of Virtual Reality:
Enhanced Product Development: VR enables businesses to create immersive virtual
prototypes, allowing product designers and engineers to visualize and test products
before physical production.
Improved Training and Education: VR provides realistic and immersive
training
environments, particularly in industries where hands-on experience is crucial, such as
healthcare, aviation, and manufacturing.
Enhanced Customer Engagement: VR can revolutionize the way businesses engage with
their customers. It allows companies to create interactive and immersive experiences,
enabling customers to visualize products or services before purchase.
Virtual Meetings and Collaboration: With VR, geographically dispersed teams can come
together in a shared virtual space, facilitating collaboration and communication.
Marketing and Advertising Opportunities: VR offers innovative marketing possibilities by
creating immersive and memorable experiences that capture consumers' attention.
Remote Collaboration and Remote Work: Virtual Reality can facilitate remote
collaboration and remote work scenarios by providing a sense of presence and
interaction.
Simulation and Prototyping: VR enables businesses to simulate and prototype
various scenarios, helping them identify potential issues and improve decision-making.
For 87
example, architects can create virtual walkthroughs of buildings to evaluate design
choices, while manufacturers can simulate production processes to optimize efficiency.

9.2.2. Augmented Reality


Augmented Reality (AR) is a technology that overlays virtual information, images, or
objects onto the real-world environment, enhancing the user's perception and interaction
with their surroundings. Unlike Virtual Reality (VR), which immerses users in a
completely simulated environment, AR blends digital content with the real
world, creating an augmented experience.
AR has become increasingly accessible, with smartphones serving as a common platform
for
AR applications. By leveraging the capabilities of a smartphone's camera and
display, AR apps can project virtual images, characters, or information onto the
user's view of the physical world. This allows users to interact with digital content
in real-time, seamlessly merging the virtual and physical realms.

9.2.2.1. Benefits of Augmented Reality in a Business

industries. Here are some


AR offers numerous business benefits across
key
various advantages of incorporating AR into business
strategies:
2. Enhanced Customer Engagement: AR provides an interactive and immersive experience
for customers, leading to increased engagement and brand awareness. AR applications can
be used to showcase products, allow virtual try-ons, provide guided tours, and deliver
personalized content, capturing customers' attention and fostering a deeper connection.
3. Improved Sales and Conversions: By enabling customers to visualize products in their
real environment through AR, businesses can enhance the purchasing experience.

88
4. Innovative Marketing and Advertising: AR allows businesses to create unique
and memorable marketing campaigns. AR-powered advertisements, interactive
product catalogs, and gamified experiences can enthral audiences, differentiate
brands, and generate buzz, leading to increased brand recognition and customer loyalty.
5. Streamlined Training and Education: AR can revolutionize training programs by
offering realistic and immersive simulations. It allows employees or students to practice
complex tasks, receive step-by-step guidance, and visualize theoretical concepts in a
practical and engaging manner.
6. Efficient Design and Prototyping: AR enables designers, architects, and engineers
to visualize and iterate on their projects in real-time. By overlaying virtual elements
onto physical environments, AR can provide valuable insights, identify design flaws,
and streamline the prototyping process, leading
7. Data Visualization and Analytics: Businesses can use AR to present data, metrics, and
insights in an interactive and intuitive way, enabling more informed decision-making and
driving business growth.
8. Competitive Advantage: By embracing AR technology, businesses can differentiate
themselves from competitors, showcase innovation, and stay ahead in their industry.

9.2.2.2. Virtual Reality (VR) Vs. Augmented Reality (AR)

The main difference between Virtual Reality (VR) and Augmented Reality (AR) lies in the
way they blend the virtual and real worlds:

I. Virtual Reality (VR): VR completely immerses the user in a simulated environment that
is separate from the real world. By wearing a VR headset, users are visually and audibly
cut off from their physical surroundings and transported to a virtual world. VR aims to
create a sense of presence and can offer highly immersive experiences, often involving
interactions with the virtual environment or objects.
II. Augmented Reality (AR): AR overlays virtual elements onto the real-world
environment, enhancing the user's perception and interaction with their surroundings. AR
does not replace the real world but augments it with digital content. AR is
typically experienced through smartphones, tablets, or AR glasses, where virtual
objects or information are superimposed onto the user's view of the physical world.

89
9.3. Artificial Intelligence
Artificial Intelligence (AI) refers to the simulation of human intelligence in machines,
particularly computer systems. It involves the development of algorithms and
technologies that enable computers to perform tasks that typically require human
intelligence. AI encompasses various subfields, including expert systems, natural
language processing, speech recognition, and machine vision.

 Expert systems involve the use of knowledge-based algorithms to mimic human


expertise in specific domains. These systems can analyze data, make decisions,
and provide recommendations based on their programmed knowledge.
 Natural language processing enables computers to understand, interpret, and generate
human language. This field focuses on tasks such as language translation,
sentiment analysis, and text summarization.
 Speech recognition technology allows computers to understand and interpret
spoken language. It involves converting spoken words into written text and is
widely used in voice assistants, transcription services, and interactive voice response
systems.
 Machine vision refers to the ability of computers to interpret and understand
visual information. It involves the use of cameras and image processing algorithms to
analyze and extract meaningful insights from images or videos. AI technologies
continue to advance, with applications in various industries such as
healthcare, finance, manufacturing, and transportation. AI systems can learn from
data, adapt to changing environments, and improve their performance over time
through techniques such as machine learning and deep learning.
90
Overall, AI aims to replicate and automate human-like intelligence processes, enabling
computers to perform complex tasks, make decisions, and interact with humans in ways that
were once considered exclusive to human capabilities.

9.3.1. How does AI work?


As the hype around AI has accelerated, vendors have been scrambling to promote how their
products and services use it. Often, what they refer to as AI is simply a component of the
technology, such as machine learning. AI requires a foundation of specialized hardware and
software for writing and training machine learning algorithms. No single programming
language is synonymous with AI, but Python, R, Java, C++ and Julia have features popular
with AI developers.
In general, AI systems work by ingesting large amounts of labeled training data, analyzing
the data for correlations and patterns, and using these patterns to make predictions
about future states. In this way, a chatbot that is fed examples of text can learn to generate life
like exchanges with people, or an image
AI programming focuses on cognitive skills that include the following:

Learning. This aspect of AI programming focuses on acquiring data and creating rules for
how to turn it into actionable information. The rules, which are called algorithms,
provide computing devices with step-by-step instructions for how to complete a specific task.

Reasoning. This aspect of AI programming focuses on choosing the right algorithm to reach
a desired outcome.
Self-correction. This aspect of AI programming is designed to continually fine-tune
algorithms and ensure they provide the most accurate results possible.

Creativity. This aspect of AI uses neural networks, rules-based systems, statistical


methods and other AI techniques to generate new images, new text, new music and new
ideas.

9.3.2. Advantages of AI
The following are some advantages of AI.

Good at detail-oriented jobs. AI has proven to be just as good, if not better than doctors at
diagnosing certain cancers, including breast cancer and melanoma.

91
 Reduced time for data-heavy tasks. AI is widely used in data-heavy industries,
including banking and securities, pharma and insurance, to reduce the time it takes
to analyze big data sets. Financial services, for example, routinely use AI to process loan
applications and detect fraud.
 Saves labor and increases productivity. An example here is the use of warehouse
automation, which grew during the pandemic and is expected to increase with the
integration of AI and machine Learning.
 Delivers consistent results. The best AI translation tools deliver high levels
of
consistency, offering even small businesses the ability to reach customers in their native
language.

 Can improve customer satisfaction through personalization. AI can personalize


content, messaging, ads, recommendations and websites to individual customers.

9.3.3. Disadvantages of AI
The following are some disadvantages of AI.

 Expensive.

 Requires deep technical expertise.

 Limited supply of qualified workers to build AI tools.

 Reflects the biases of its training data, at scale.

 Lack of ability to generalize from one task to another.

 Eliminates human jobs, increasing unemployment rates.

9.3.4. Strong AI vs. weak AI

AI can be categorized as weak or strong.

 Weak AI, also known as narrow AI, is designed and trained to complete a specific task.
Industrial robots and virtual personal assistants, such as Apple's Siri, use weak AI.

 Strong AI, also known as artificial general intelligence (AGI), describes


programming that can replicate the cognitive abilities of the human brain. When
presented with an unfamiliar task, a strong AI system can use fuzzy logic to apply
knowledge from one domain to another and find a solution autonomously.

92
APPENDIX – ACTIVITIES

Activity 1 – Email Communication


Time: 30 minutes
Objectives

Students explore elements of a well written vs. a badly written email, discuss the
consequences of communicating poorly over email and practice composing a professional
email.

Advanced Preparation/Facilitator Notes

Written communication through email is an important skill for students to master in our
increasingly technology-based world. Though many young adults consider email an “adult”
way to communicate and would rather communicate in real- time with texting or other
forms of social media, when it comes time to apply for a job, email skills will most likely be
necessary. Therefore, an understanding of “email etiquette” is worthy of discussion.
Students will understand the difference between professional and non-professional emails
and have an opportunity to practice writing professional emails.
Materials
Desktop computer/ laptop/ tablet or mobile phone
Email Short for “electronic mail,” email is one of the most widely used features of the Internet, along with
the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in
the world
Steps

PARTICIPATORY LEARNING ACTIVITY


o Tell participants that they will be thinking about how to apply their
communication skills to written communication through email. Though many young adults
consider email an “adult” way to communicate and would rather communicate in real-time
with texting or other forms of social media, when it

93
comes time to apply for a job, email skills will most likely be necessary.
Therefore, an understanding of “email etiquette” is worthy of discussion.
oThis activity will offer participants the chance to challenge themselves to
translate text to English and then discuss some of the classic rules of email.
o Lead a discussion on the activity by asking:
 “Why is it important to communicate clearly over email?”
o Ask, “What are circumstances you will need to communicate by
email? What are your strategies for communicating clearly? How
can you improve?”
o Go through each email etiquette.
o Ask participants to draft an email and send it to you. The email
should have a proper subject line, greeting, and closing.
Participants can pick from the following scenarios:
 requesting time off
 asking a supervisor, a question
 asking if a job is still available to apply for, etc.

94
Activity 2 – Communication

Objective
Students are able to communicate, collaborating and sharing
information
Materials
▪Desktop computer/laptop/tablet or mobile phone
Skills for life Additional Skills for life Additional Work examples Life Work examples Life
skills for skills for work examples examples
I understand the Understand and conform
importance of with my organization’s IT
communicating securely and social media policies

I can set up an email I can comply with my Use the email address
account organization’s security book of my organization
protocols when accessing to send emails to
my email or working colleagues and use the ‘cc’
remotely option when requested

I can communicate with I can communicate in an Set up a group on Work remotely using a
others digitally using appropriate way for my messaging platforms, such virtual private network
email and other organization by using as WhatsApp or when provided by my
messaging Apps email, online and Messenger, to talk to employer, and use the
collaborative digital tools friends or family members requested authentication
to connect
I can use word processing Use word processing Use different document
applications to create software to create a CV or formats such as PDF to
documents a letter make it easier to share
documents with colleagues

I can share documents Send photographs and Use document sharing


with others by attaching other documents to friends though web-based
them to an email and family as an email applications such as
attachment Google Docs to work on a
document in

95
collaboration with
colleagues
I can communicate I can use digital Set up and use video- Use video-conferencing
with friends and family collaboration tools to telephony products such as products such as Skype
using video tools meet with, share and Facetime or Skype for and Facetime to
collaborate with video communications communicate with
colleagues with friends and family colleagues on conferences
and calls
I can post messages, I can use professional Be a member of and Be a member of and
photographs, videos or online networks and manage personal manage my
blogs on social media communities networking sites, such account on professional
platforms as Facebook networking sites, such
Post appropriately on as LinkedIn
social media.

96
Activity 3 – Handling Information and Content
Objective

Students are able to find, manage and store digital information and content
securely.

Materials
▪Desktop computer/laptop/tablet or mobile phone

Skills for life Additional skills for work Life examples Work examples

I can evaluate what information


or content may, or may not, be
reliable

I can use search engines to find Search for news using a Search for information
information and make use of browser such as Chrome, requested by a
search terms to generate better Internet Explorer or Safari supervisor using
results browsers such as
Chrome, Internet
Explorer or Safari

I can use bookmarks to save and


retrieve information on my web
browser

I can access information and I can access information and Manage a calendar or
content from different devices content from different devices appointments system
on multiple devices,
including work
computer and phone or
tablet

I understand that the cloud is a Use a cloud storage


way that I can store information account for a music or
and content in a remote location photo collection (from
legal sources such as
Apple iCloud, Instagram)
and access the collections
from different devices,
such as a laptop or a
smartphone

97
I can organize my information
and content using files and
folders on my device or on the
cloud

I can organize my information Stream music from legal


and content using files and sites such as Spotify or
folders on my device or on the Apple Music, or watch
cloud I can use the internet to streamed movies from
legally access content for legal sources
entertainment including films,
music, games and books

98
Activity 4 – Transaction
Objective
Students are able to register and apply for services, buy and sell goods and services,
and administer and manage transactions online.
Materials
▪Desktop computer/laptop/tablet or mobile phone
Skills for life Life examples Work examples
Additional skills for
work
I can set up an account online, I can complete digital Set up online accounts for Submit requests for annual
using appropriate websites or records for absence, public services such as with leave, record absence from
apps, that enable me to buy holidays or expenses your local council or a work or submit expenses
goods or services online Government Department claims online

Set up online accounts with

retailers to order and pay for


goods online

Use travel websites and Apps

to book tickets and make


reservations (If applicable)

Schedule an appointment (if


applicable
Complete online forms to
I can access and use public
services online, including filling apply for a television license
in forms or road tax

I can use different payment I can access salary and Set up and use online and Review own payslip and
systems, such as credit/debit expenses information telephone banking through salary payments when
card, direct bank transfer, and digitally including websites or Apps, keeping received digitally
phone accounts, to make password protected pay access information secure
payments for goods or services slips
online

I can upload documents and Upload a CV to an online


photographs when this is recruitment site
required to complete an online Complete an online
transaction application form 0 such as for
I can fill in online forms when a job

required to complete an online


transaction

99
Activity 5 – Technology and Social Media
Time: 30 minutes Objectives
Students will relate the topic of communication via technology and social media to professionalism and
other communication skills and understand the difference between appropriate and inappropriate
technology use.
Advanced Preparation/Facilitator Notes
Students are using technology in multiple ways to communicate. It is important for them to understand that
once their information is shared online, it is made public to a number of audiences. In this lesson, they will
explore the benefits and drawbacks to technology and social media as it relates to their careers and steps
they may want to take to protect their identity.
Materials
▪Desktop computer/laptop/tablet or mobile phone
Technology and social media
Social Media
- Websites and applications that enable users to create and share content or
to participate in social networking.
STEPS

PARTICIPATORY LEARNING ACTIVITY

1.Explain that the group will be discussing social media and technology. Put up two sheets
of flip chart paper (or use the blackboard), one with ‘Advantages’ written at the top and one
with ‘Disadvantages’ at the top.
2.Facilitate a discussion on the benefits and drawbacks of social media by asking,
“What do you think are the best parts of social media? What are the advantages of having
it?” Suggested benefits:
▪ Social skills: Social networking allows people to keep up with current
friends and make new ones. When used in the right way, social media can
increase self- esteem and help someone feel less isolated.
▪ Independence and self-expression: Creating your own “home page” allows
People to express themselves and discuss their interests. They can join groups and support
fan pages and find out about other people’s interests.
▪ Digital competence: Technology is evolving faster than ever before.
As
young adults learn to adapt to new technologies (or new applications of existing
technologies), they will be better equipped to adapt to future technology.
▪ Educational development: Young adults in post-secondary education
will

100
often use social networking to discuss schoolwork and share discussions about
assignments.
▪Research: Students can gather information about topics that are hard to discuss
with others, such as drug use and sexual health. They can also learn a lot about
topics of interest to them and stay abreast of current affairs, social/political/
economic trends, as well as learn information to develop new skills.
▪Additional advantages for students with disabilities: Social networking can
open up a new world of communication, integration, and community
participation. Students can express themselves, including their thoughts and
feelings, more easily and without fear of the rejection or stigma they may
experience in real life.
3.Ask: “What might be the disadvantages of social media? How could it
create challenges, especially when working?” Suggestions:
▪ Sharing one’s personal information with the wrong crowd: Students need to
be
aware that information given out online could also put them at risk
of victimization. People looking to do harm could use posted information
to identify them or gain their trust. They can also be deceptive by pretending
to know a young person. Encourage students to privatize their online
social networking accounts (such as Facebook and Twitter).
▪ Bullying: Harassment may occur online (cyberbullying) and it may spill over to
offline bullying committed by a person who has located their victim
online. Cyberbullying can cause significant emotional harm resulting in
depression, anger, school avoidance, violence, and suicide.
▪ The permanency of online profiles: Once information has been shared on the
Internet, it’s out there—forever! Taking information back that others have read
and captured is nearly impossible. Inappropriate pictures, captions, and
comments could come back to haunt youth as they start looking for jobs.
▪ Disclosure: People tend to be far bolder and less discretionary with information
shared online versus in person. This means there is a greater risk of giving out
information, including the presence of a disability that, given a second thought,
we might not have wanted to disclose.
▪ Additional potential risks for students with disabilities: Social networking
may further isolate those who may already feel isolated or not included
and can ultimately lead to depression and loneliness.
101

You might also like