Professional Documents
Culture Documents
SEED Digital Literacy TOT Manual
SEED Digital Literacy TOT Manual
Prepared by:
ACT - American College of Technology
1.Introduction 2
1. What is Digital? 2
1. Specific Importance 5
2. Computers Role 6
1. The motherboard 8
3. Video Card 9
1. Hardware 9
2. Software 12
1. Supercomputers 14
2. Mainframe Computers 14
3. Minicomputers 15
1. Turning on devices
20
2. Hibernating a device
21
4. Computer software
22
3. Application Software
27
4.Computer Networks 30
1. Web Addresses
41
2. URLs Scheme
41
4. Domain name
43
2. Secure Websites
1. Purpose of a Password
61
2. Using Email
62
1. What is email?
62
3. Email Structure
63
9.Emerging Technology 81
APPENDIX – ACTIVITIES 93
Activity 2 – Communication 95
Activity 4 – Transaction 99
1 Page
1. INTRODUCTION
1. What is Digital?
The term "digital" is currently used to represent everything that a computer uses
and produces.
The word "digital" describes a numbering process or a series of number processing.
This processing is done by a computer device. Therefore, "digital" is closely
associated with activities that use and are generated by computers.
The Sustainable Development Goal (SDF) thematic Indicator 4.4.2 highlights the need for a
minimum level of proficiency in digital literacy skills, and measures of competency include:
Device and software operation – Identify and use hardware tools and technologies.
Information and data literacy – Articulate information needs, to locate and
retrieve digital data, information and content.
Communication and collaboration – Interact, communicate, and collaborate through
digital technologies while being aware of cultural and generational diversity
Digital content creation – Create and edits digital content. To improve and
integrate information and content into an existing body of knowledge.
Safety -Protect devices, content, personal data and privacy in digital environment.to
protect physical and psychological health, and to be aware of digital technologies for social
well-being and social inclusion.
Problem-solving – Identify needs and problems and to resolve conceptual programs and
problem situations in digital environments.
effective use of technology, which is necessary in most professions. They include web
research, online communication, use of professional online platforms and digital
financial services.
Digital skills are needed to find a job or start a business. Job search and recruitment processes
increasingly take place online. Hence, young jobseekers lacking digital skills and labor
market information face challenges in connecting to employers and vacancies,
hindering their employment prospects. Even basic web navigation skills can bring great
benefits to young people in underserved areas.
Assessment
• Pre-training assessment captures what the trainees already know and what they need to
learn.
• Formative assessments are frequent and ongoing throughout the course and guide
classroom pacing, delivery, choice of content, etc.
• Post-training assessment captures what the trainees have learned and paints a picture of
what they know and are able to do as a result of participation in the course overall.
3 Page
Computer Basics
4 Page
2. The Importance of Computers
The early 1990s saw the emergence of household Internet use, which eventually
spurred common use of email, websites, blogs, social networking, video chat and
Voice-Over- Internet Protocol.
Computers are now fact of life, essential business tools and become very important
nowadays because it is very much accurate, fast and can accomplish many tasks easily.
1. Specific Importance
a. Internet
The World Wide Web, Internet and email revolutionized the way individuals
communicate with each other. Rather than waiting days or weeks to see information, we
can now view all information at the speed of light.
• Social Networking
Social networking sites including Facebook, Twitter, and LinkedIn allow users to
rapidly generate content for people in their network to view. Rather than sending
individual notes, social networking provides a constant stream of updates 5and
Page
information.
d. Information Access
ICT also plays a role in expressing ourselves. Aided by the digital recording functions
integrated into smartphones, tablets and other electronic devices.
The roles of computers have in many areas increased with the rapid growth of
computer usage time. Some areas where use of computers have been extensively used
are:
6 Page
3. Types of Digital Devices
There are many different types of digital devices that you can use. Devices can beexpensive
but if you are prepared to use less powerful devices, they can be muchless expensive. The size
of devices can vary, and you need to consider storage and portability when buying one.
The physical form of the device and its contents, such as screen and electronic components,
are called hardware. This is because you can physically feel this partof a digital device.
Here is a summary of some typical digital devices.
A personal computer is a type of computer that is usually placed on a desk and specifically
designed to be used by one person at a time. It is made up of differentparts that are connected
to work as a single entity. The figure below illustrates a desktop computer.
ii. Lapt
op
7 Page
● A laptop is portable, so you can move with it from one place to another.
● Some peripheral devices are inbuilt such as keypad, touchpad and speakers.
● You can work with a laptop, even when there is no power, since it has a batterywhich is
chargeable.
ii. Tablet
A tablet is a mobile device that is smaller and lighter than a laptop. It is operated by
touching the screen. It has a chargeable battery. Unlike a laptop its keyboard isthe
screen.
iii.Smartphone
A smartphone is part computer and part mobile telephone. It is a small digital device that is
held in your hand. It is mostly used for communication through making phone calls or
sending a short text message. However, it also has other capabilities such as
taking photos and videos. You can also use a smartphone toconnect to the internet.
A smartphone is navigated through touching the screen (commonly referred to astouch
screen). In this way it is very similar to using a tablet device.
• The motherboard
Each component is attached to the motherboard. The motherboard receives power from
the computer's power supply. It allows all the components to communicate,
including the CPU. It also contains controllers, which are circuits that help the
operating system work with hardware such as the hard drive.
8 Page
2. Processing Unit (CPU)
The CPU is the "brains" of the computer. The
central processing unit provides the calculations
and manipulation of data sent from the user.
Each time the user clicks a key, executes an
application or browses the Web, the CPU
reads the code involved and returns the response
to the user. The CPU works closely with
memory, which is the component that sends stored
data to
the unit.
3. Video Card
The video card provides the image seen on the
monitor. The video card is attached to a monitor
using a VGA cable. Some video cards have two
monitor connections. This allows the user to
attach two monitors to the computer, so the
desktop can be spread across both monitors
for better usability.
5. A Computer is Made Up of both Hardware and Software
5. Hardware
Hardware is any part of a computer that can be touched or felt. Hardware devicesare
categorized into:
5. Input devices
These are peripherals or devices that help get information into a computer. Inputdevices
9 Page
come in many forms.
Keyboard/Keypad
Mouse/ touchpad
Light pen
Scanning device
Digital camera
10 P a g e
Microphone
b. Output Devices
These are devices that allow you to access processed information from devices. There
are generally two types of output device:
● Soft copy output devices – this is output that can only be seen or heard
● Hard copy output device – this is an output device that can be touched or felt
Monitor/Screen
It’s the most commonly used soft copy output device. Displays
processed information in the formof text, picture and video.
Speaker
It gives output in the form of sounds. The speakers are either
inbuilt or external.
Internal speakers - These are inside the computer External
Speakers - These are bought separately
LCD Projectors
Usually connected to devices to display output to alarger audience
during conferences or training.
c. Storage Device
Storage is not only necessary for saving files, but also for running tasks and applications.
Any
file you create or save on your computer saves to your computer’s storage device.
This storage device also stores any applications and your computer operating system
As technology has advanced over time, data storage devices have also evolved in a
major way. Nowadays, storage devices come in many shapes and sizes, and there are a
few different types of storage device that cater to different devices and functions.
11 P a g e
Computer storage devices
are able to hold information permanently while others can only hold information temporarily.
Every computer has both primary and secondary storage.
RAM is variable in a computer. Older computers had only a few dozen megabytes of RAM
installed. When personal computers became popular in the 1990s, computers had 32
megabytes of memory. Motherboards and software now require at least one gigabyte
to function. RAM contains the information during the time the computer is on. After
the machine is turned off, the information in RAM is lost.
Unlike RAM, the hard drive stores data even after the machine is turned off. A hard
drive is the storage unit for the machine. Saved documents and applications are stored on
the hard drive using magnetism. The hard drive is made up of small platters with a
moving head. The platters spin as the head moves back and forth to retrieve and
store data.
2. Software
Software is typically stored on an external long-term memory device, such as a hard drive
or magnetic disk. When the program is in use, the computer reads it from the storage device
and temporarily places the instructions in random access memory (RAM). The process of
storing and then performing the instructions is called “running,” or “executing,” a program.
Software can be classified into two main categories: system software and application
software.
12 P a g e
computer system, such as controlling the hardware, managing memory, and
providing basic services to other software. Examples of system software
include operating systems, device drivers, and utility programs.
ii. Application software, on the other hand, is designed to perform
specific tasks for users, such as word processing, spreadsheets, web
browsing, and games. Application software can be further divided into
general-purpose software, which can be used for a variety of tasks, and
specialized software, which is designed for specific tasks.
Computer
Performance &
Features
13 P a g e
3. COMPUTER PERFORMANCE AND FEATURES
There are four different computer types classified according to their performance, power, and
size. These are Supercomputers, Mainframe, Mini, and Microcomputers. Their
difference depends on the number of users they can support at any one time, their size, and
power. Their difference is discussed in detail as follows.
1. Supercomputers
Supercomputers are very expensive, very fast, and the most powerful computers we have in
the world. Supercomputers are optimized to execute a few numbers of programs. This
makes it possible for them to execute these few programs at a very high speed.
Due to their inhibiting cost, they are used in high-end places like in scientific
research centers. The supercomputer consists of thousands of processors making its
clock very high speeds measured by petaflops (a unit of computing speed equal to
one thousand million (1015) floating-point operations per second. One petaflops = 1000
teraflops.
These computer types are also very large in size due to the numerous parts and components
involved in their design. A good example of a Supercomputer is Tianhe-2: TH-
IVB-FEP Cluster; National Super Computer Centre in Guangzhou, China; 3.12 million
cores (33.86 petaflops).
14 P a g e
2. Mainframe Computers
3. Minicomputers
Note: - Servers are computers that are designed to provide services to other computers over
a network. They can use a laptop or desktop form factor but are sometimes mounted
in a secure rack. Servers usually have a higher specification than the other computers on a
network, as they may have to deal with requests from multiple machines at the same
time.
15 P a g e
4. Microcomputers or Personal Computers
Desktop computers are not built to be mobile. They are moved, but only to a new desktop
location and with the power supply inactive. There are a number of major differences
between computers that are intended to be used in one place as a desktop and portables or
mobiles that can be easily moved from one location to another.
Desktop computers are large and heavy in comparison to portables. They can be carried in
specially manufactured cases, but only to assist a support engineer in moving, not as
a frequent procedure. The monitor, keyboard, and mouse are all separate items on a desktop.
Portable computers are compact computing devices designed for mobility and on-the-go use.
These devices typically feature a built-in display, keyboard, touchpad or trackpad, and
connectivity ports for peripherals. These compact and versatile devices provide users with the
flexibility to work, whether in a coffee shop, on transportation, or in the comfort of their own
16 P a g e
homes.
One of the key advantages of portable computers is their mobility. Unlike traditional desktop
computers, which are stationary and require a dedicated workspace, portable computers allow
users to take their work with them wherever they go. This mobility has significantly
increased productivity and efficiency for professionals, students, and individuals who require
constant access to their digital resources.
The evolution of portable computers has been driven by advancements in technology, leading
to thinner and lighter designs without compromising performance. Battery life has also
improved significantly, enabling users to work for extended periods without needing to
recharge.
In broad terms, the performance of a computer depends on four factors: the speed and
architecture of its processor or "central processing unit" (CPU), how much random-
access memory (RAM) it has, its graphics system, and its internal hard drive speed and
capacity
Processor Speed
Clock speed, a.k.a. Processor speed is often played up to be the major factor in a computer's
overall performance. In rare cases this is true, but an average user rarely uses 100 percent of
17 P a g e
his/her Central Processing Unit's power.
Things like encoding video or encrypting files, or anything that computes large,
complex, numbers require a lot of processor power. Most users spend most of their time
typing, reading email or viewing web pages.
Megahertz (MHZ) or Gigahertz (GHZ or 1000MHZ) is the number of times the CPU can
switch back and forth from 1 to 0. It is the driving force in the power the processor has (all
other things being equal). Higher MHZ chips use more power and produce more heat.
Level 1 (L1) and Level 2(L2) cache is usually on-chip RAM that is extremely fast. SRAM is
different than System RAM and only used on processors. It stores data right before
and after it is processed. SRAM is extremely expensive; most chips today only have 128
Kilobytes of L1 cache, and 256-512K of L2 cache. (This is what makes a Pentium 3 or 4 chip
different than a celeron chip)
System RAM speed and size (MHZ and Megabytes) Average Desktop - 256 megabytes
Average Laptop - 128 megabytes
The amount and speed of the RAM in your computer makes a huge difference in how
your computer performs. If you are trying to run Windows 10 with 100 MB of RAM it
probably won't even work.
When the computer uses up all available RAM it has to start using the hard drive to cache
data, which is much slower. The constant transfer of data between RAM and virtual memory
18 P a g e
(hard drive memory) slows a computer down considerably. Especially when trying to load
applications or files.
The two types differ in the technology they use to hold data, dynamic RAM being the more
common type. Dynamic RAM needs to be refreshed thousands of times per second. Static
RAM does not need to be refreshed, which makes it faster; but it is also more expensive than
dynamic RAM.
The biggest factor in your computer's performance is the hard disk speed. How fast the hard
drive can find (average seek time), read, write, and transfer data will make a big difference in
the way your computer performs. Most hard drives today spin at 7,200 RPMS, older models
and laptops still spin at 5,200 RPMS, which is one reason laptops often appear sluggish to a
desktop equivalent.
The size of your hard drive plays a very little role in the performance of a computer. As long
as you have enough free space for virtual memory and keep the disk defragmented it
will perform well no matter what the size.
d. Video card
Whenever your computer puts an image on the screen something has to render it. If
a computer is doing this with software it is often slow and will affect the performance of the
rest of the computer. Also, the image will not be rendered as crisp or as smoothly in the case
19 P a g e
of video. Even a low-end video card will significantly improve the performance of
the computer by taking the large task of rendering the images on the screen from the CPU to
the graphics card. If you work with large image files, video or play games you will want a
higher end video card.
System requirements are the required specifications a device must have in order to
use certain hardware or software. For example, a computer may require a specific I/O
port to work with a peripheral device, minimum system memory (RAM) Minimum free
storage space. Before purchasing a software program or hardware device, you can check the
system requirements to make sure the product is compatible with your system.
1. Operating system
2. Minimum CPU or processor speed
3. Minimum GPU or video memory
4. Minimum system memory (RAM)
5. Minimum free storage space
6. Audio hardware (sound card, speakers, etc)
1.Operating system
2.Available ports (USB, Ethernet, etc)
3.Wireless connectivity
4.Minimum GPU (for displays and graphics hardware)
Some products include both minimum and recommended system requirements. A video
game, for instance, may function with the minimum required CPU and GPU, but it
will perform better with the recommended hardware. A more powerful processor and
graphics card may produce improved graphics and faster frame rates (FPS).
Some system requirements are not flexible, such as the operating system(s) and disk space
required for software installation. Others, such as CPU, GPU, and RAM requirements may
vary significantly between the minimum and recommended requirements. When buying
or upgrading a software program, it is often wise to make sure your system has close
to the recommended requirements to ensure a good user experience.
20 P a g e
1. OS: Windows 7 with SP1; Recommended: Windows 10
2. CPU: Intel or AMD processor with 64-bit support; Recommended: 2.8 GHz or
faster processor
3. GPU: nVidia GeForce GTX 1050 or equivalent; Recommended: nVidia GeForce
GTX 1660 or Quadro T1000
4. Disk Storage: 4 GB of free disk space
5. Monitor Resolution: 1280x800; Recommended: 1920x1080
6. Internet: Internet connection required for software activation
In summary, any system to be used efficiently, all computer software needs certain
hardware components or other software resources to be present on a computer. These
prerequisites are known as (computer) system requirements and are often used as a
guideline as opposed to an absolute rule.
Devices need to be powered on. Portable devices use batteries, so usage needs to be
managed, to ensure you do not run out of power.
3. Turning on devices
You need to switch a digital device on so that you can use it. Devices may need tobe
switched on and off to update software, or to reset the device to fix a problem.
Here are few simple steps you need to take so you can turn on your windows laptop
safely.
3. Ensure its battery is charged or plug the laptop charger to the socket andswitch on the
power socket.
4. Press the power button
5. Wait for the laptop to turn on.
Note: The power button can be on different places depending on the laptop type. For
instance, it can be on the left or right under the screen or to the left or right onthe side
of your keyboard.
Here are few simple steps you need to take so you can turn on your Windows desktop
safely.
• Check the power cables for both the monitor and the system unit are both
21 P a g e
connected to the socket.
2.Press the power button of the monitor. This is to turn the screen on
3.Press the power button of the system unit. This is to turn the PC on
4.Wait for the computer to turn on.
2. Hibernating a device
If you are going to take a short break from working on your device you can put it
tosleep, i.e., hibernate it, rather than switch it off. This saves you time, while also
reducing the amount of power used by the device. This option is mostly
available for laptops and might not be available for all PCs.
When you want to switch off your device there are certain procedures that need tobe
followed so as not to damage the device.
1. Click or tap the start menu or the windows button (Located in the bottomleft
Corner of the screen).
2.Click on the power button.
3.From the options available, click shut down.
4. Wait for the computer to shut down.
A digital device is not one thing, it is made up of many parts. Some of these arephysical
like
22 P a g e
the “hardware” and some you cannot see like the “software”.
Software is the computer instructions that direct a computer on what to do andhow to do it.
Operating systems, sometimes called OS, are very important because it manages the
computer's memory, power, hardware, and other software. Operating systems such as
Microsoft Windows, or MacOS, are well known, and they do the basic tasks
and housekeeping of a computer.
Examples of application software includes Microsoft Word, Microsoft Excel, WordPad and
Calc.
An operating system is a program that controls all the functions, including bothhardware and
software, in an electronic device. For any communication and storage of data to take place in
a device, there must be an operating system.
Android
The operating system in a digital device has many jobs. The operating system
makes the tasks you do easier because it uses pictures and symbols to help you
digital
navigatedevice. Thisaapproach to controlling and using acomputer is called a graphical user
and use
23 P a g e
interface (GUI) or user interface (UI).
Between the user and the computer hardware, an operating system serves as a communication
bridge (interface). An operating system’s objective is to provide a platform for a user to run
programs in an efficient and convenient manner.
Hardware coordination must be appropriate to ensure the computer system’s proper operation
and to prevent user programs from interfering with the system’s proper operation.
Example: We request or convey our orders to the OS in the same way as a boss delivers
orders to his employees.
The primary purpose of the operating system is to make the computer environment
more user-friendly, with a secondary goal of maximising resource utilisation. Moreover,
the OS has multiple functionalities.
b. T
hree
Easily
Define
d
Operat
ing
24 P a g e
System Components
i.Kernel
This provides basic-level control over all of the computer hardware devices.
Main roles include reading data from memory and writing data to memory,
processing execution orders, determining how data is received and sent by
devices, such as the monitor, keyboard and mouse; and determining how to
interpret data received from networks.
This component allows interaction with the user, which may occur through graphical
icons and a desktop or through a command line. The UI is further divided into
Command Line Interface (CLI), consisting of a text-based interface where
advanced users can prompt specific commands by typing them, and a Graphical
User Interface (GUI). The latter is a visual interface that allows the end user to
issue commands by interacting with symbols, icons, and menus using an input
device such as a mouse or touchpad.
This component allows application developers to write modular code. An API defines
how other systems or components can use a certain application.
i. Microsoft Windows
Microsoft Windows is the most common home and office software operating
system. It is also used by many companies and governments. Microsoft Windows
user interface include windows which are panel-screens that represent individual
applications in a rectangular shape.
ii.Apple macOS
Apple laptops use the macOS. Although the graphical interfaces are different, many of the
programming interfaces and command-line features are similar. macOS has The Dock
which is a bar of controls that is used to check for programs and files that are
commonly used, single keyboard keys, including the Command key. macOS is
famous for its user-friendly functionalities like Siri, a natural-voice personal
assistant, and FaceTime a video chatting software.
25 P a g e
iii. Linux Operating System
●The cost: open-source software (such as Linux) is usually free for personal
use, but licensed software (such as Microsoft Windows) needs to be paid for.
●User-friendliness of the operating system.
●Availability and range of applications software that works with the chosen OS.
●Its security features, particularly against viruses e.g., Linux is more secure
than the Windows OS. Antivirus software is available for operating systems
or may have this built into the OS, e.g., Windows Defender.
ii. Data
A collection of computer programs, libraries, and related data are referred to as software.
Example of Programs
Program Program Category
Adobe Acrobat PDF reader
Adobe After Effects Video editor
Adobe Dreamweaver HTML editor
Adobe Photoshop Photo editor
Audacity Audio software
FileZilla FTP
Google Chrome Internet Browser
Microsoft Excel Spreadsheet
Microsoft PowerPoint Presentation
Microsoft Word Word processor
C++ Programming language
These are types of software that help you do useful tasks. Applications are installed
on a computer and are managed by the operating system e.g., MS Word for document
creation, or Windows Media Player for playing videos.
27 P a g e
Communication software allows you to connect with other computers or mobile devices via
text, video or audio formats in either a synchronous or asynchronous manner. While some
means of communication, such as email, are asynchronous, Web conferencing and video chat
are synchronous -- allowing all parties to communicate in real-time. Video messaging offers a
choice of either method. Some communication software is only available for mobile
devices; others can be used on computers as well.
Video Chat
Voice over Internet Protocol or VoIP allows you to communicate with others over the
Internet without using phones. With most services, you can communicate directly from one
computer to another, usually at no charge, or connect to a cell phone or landline for a small
fee.
Video Messaging
Video messaging differs from VoIP in that it is not a medium for discussions, but
one in which you send a contact a short video in lieu of a text; the recipient can watch it
instantly or whenever he wants.
Web Conferencing
Web conferencing is generally used by businesses for meetings, training events or to relay
other information to people in a remote location. A monthly fee is usually required to use the
software. Standard practice includes a whiteboard, VoIP, screen sharing and chat.
The old standby of regular email is still a heavily used communication tool, so a good email
client is essential. Inky runs on both Windows and Mac and can be used on mobile devices as
well. This free software works on any IMAP or POP account, allowing you to consolidate
your mail into one place.
28 P a g e
Pag
e
Computer Network
Internet and Cloud services
29
4. COMPUTER NETWORKS
30 P a g e
The nodes of a computer network can include personal computers, servers, networking
hardware, or other specialized or general-purpose hosts. They are identified by network
addresses and may have hostnames. Hostnames serve as memorable labels for the nodes and
are rarely changed after initial assignment. Network addresses serve for locating and
identifying the nodes by communication protocols such as the Internet Protocol.
4. The Internet
The internet is a massive network of networks, a networking infrastructure. It connects
millions of computers together globally, forming a network in which any computer
can communicate with any other computer as long as they are both connected to the internet.
By design, the internet is decentralized, meaning that it is not controlled by a single,
central authority.
Each computer, or host, is independent and the owner or operator of that host can
choose which internet services to use and which local services they will make publicly
available.
32 P a g e
By accessing the Internet customer may obtain services include:
The oldest, and still a very common way to connect to the internet, is with physical wires. It
is normally the simplest way to connect as a cable is plugged into your device and another
device that provides internet to your house, school or office, known asa router, or hub.
33 P a g e
The cables and connections look like this:
These devices need to have an ethernet port where the cable is connected to anda source of
internet (wall sockets in cyber cafes, offices, homes etc.)
2. Intranet
An intranet is a private web-based network, operated by a large company or
other organization, which uses internet technologies, but is insulated from the global
internet. It is a computer network that uses Internet Protocol technologies to securely
share any part of an organization's information or operational systems within that
organization.
To put it simply, an intranet is like a private internet. Very often, a company’s intranet will
have information on it that the company does not want the public to have access to, such as
employee contact details and calendars.
Intranets are also a valuable communication tool in a company as they allow all members of
staff to work together, find information, create content and share tasks quickly and easily.
3. Extranet
An extranet is an intranet that is accessible by authorized users through the internet
from outside the company, or possibly shared by more than one organization.
It is a private network that uses Internet protocols, network connectivity. This is commonly
used to share files and information between businesses, clients, vendors. 34 P a g e
6. The Uses of the Internet and Cloud Services
Cloud computing can mean many different things these days, but there’s three
main categories of cloud computing services. You might have heard about these or
use them already;
Not all clouds are the same and not one type of cloud computing is right for
everyone. Several different models, types and services have evolved to help offer the right
solution for your needs.
First, you need to determine the type of cloud deployment or cloud computing architecture
that your cloud services will be implemented on. There are three different ways to
deploy cloud services:
36 P a g e
A combination of the two.
4.6.1.3. How Does Cloud Computing Work?
Large companies often require hundreds of digital storage devices. Cloud computing systems
need at least twice the number of storage devices to keep client information stored. That’s
because these devices occasionally break down. A cloud system makes copies of
clients’ information, to store it on other devices. This method of making copies of data as a
backup is called redundancy.
Cloud computing is a big shift from the traditional way businesses think about IT resources.
37 P a g e
4.6.2. The term bandwidth relates to types of internet connections
Bandwidth describes the maximum data transfer rate of a network or Internet connection. It
measures how much data can be sent over a specific connection in a given amount of time.
For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes
per second). Internet Speed in Bandwidth in Ethiopia.
38 P a g e
Because of factors including bandwidth, latency and throughput, some are better fits
for specific business applications than others. The main classes are Public Wireless,
Public Broadband, Private Networks and hybrid Software-Defined Wide Area Networks
(SD-
PUBLIC WIRELESS
•Long Term Evolution (LTE) cellular service, also referred to as 4G, and satellite tend to be
more expensive than terrestrial services offering similar bandwidth.
•Both 4G/LTE and satellite are shared services. They are sold in packages of up to
100 Mbps bandwidth, often with data caps, above which costs rise significantly.
•5G, is currently on agenda in Ethiopia
PUBLIC BROADBAND
•These high-speed Internet connections are provided through either cable or
telephone companies.
•Broadband Internet uses multiple data channels to transfer large quantities of
information.
•Popular broadband services include DSL, cable and fiber. Bandwidth offer up to 10 Gbps .
PRIVATE NETWORKS
•As the name implies, private networks are not shared.
•They are sold through carriers as professional business services with Service Level
Agreements (SLA) .
•More expensive than best effort public broadband services.
•Microwave is a wireless private network service offering symmetrical bandwidth up to 500
Mbps.
WAN).
Important questions must be answered while we select type and amount of Bandwidth
How many people use the network?
What do they use the network for? Are they accessing applications in the cloud?
Retrieving information from a data center? Pushing large amounts of data out?
Do they connect to branch locations via a wide area network (WAN)? How many
locations are connecting?
What core applications do they run and how bandwidth-intensive is each? For
example, streaming 4K video consumes considerably more bandwidth than reading
email.
Is there an existing circuit under contract? Does it need to be replaced or combined with
additional circuits for more bandwidth and network resiliency?
39 P a g e
What are the needs for security and compliance? Are secure virtual private network
(VPN) connections between locations or to remote workers needed?
Browser
4 g
e
5. THE WEB (WORLD WIDE WEB)
The WWW, or simply web, is a way of accessing information over the medium of
the internet. It is an information-sharing model that is built on top of the internet. The web
uses the HTTP (Hypertext Transfer Protocol), only one of the languages spoken over the
internet, to transmit data. It is an application protocol for distributed, collaborative,
hypermedia information systems.
5. Web Addresses
41 P a g e
Web addresses are synonymous with URL's (Uniform Resource Locators). The URL
path represents the location of files within the directories of a Web server. Directories can
contain multiple directories and/or files.
2. URLs Scheme
Every URL begins with the scheme. This tells your browser what type of address it is so the
browser connects to it correctly.
There are many types of schemes, but for typical web browsing you will
mostly
see http and https. Your browser usually won’t show the scheme in the address bar,
and usually you don’t need to type the scheme when typing a web address; instead, you can
just begin with the domain name. The scheme is still always part of the URL; it just isn’t
being displayed.
http://www.aau.edu.et/course/index.php?categoryid=53
For now, let's imagine that the web is a road. On one end of the road is the client, which is
like your house. On the other end of the road is the server, which is a shop you
want to buy something from.
Your internet connection: Allows you to send and receive data on the web. It's basically
liked the street between your house and the shop.
42 P a g e
TCP/IP: Transmission Control Protocol and Internet Protocol are
communication protocols that define how data should travel across the web. This
is like the transport mechanisms that let you place an order, go to the shop, and
buy your goods. In our example, this is like a car or a bike (or however else you might
get around).
DNS: Domain Name Servers are like an address book for websites. When you type a
web address in your browser, the browser looks at the DNS to find the website's
real address before it can retrieve the website. The browser needs to find out which server
the website lives on, so it can send HTTP messages to the right place (see below). This is
like looking up the address of the shop so you can access it.
HTTP: Hypertext Transfer Protocol is an application protocol that defines a language for
clients and servers to speak to each other. This is like the language you use to order your
goods.
Component files: A website is made up of many different files, which are like
the different parts of the goods you buy from the shop. These files come in two main
types:
o Code files: Websites are built primarily from HTML, CSS, and JavaScript,
though you'll meet other technologies a bit later.
o Assets: This is a collective name for all the other stuff that makes
up a website, such as images, music, video, word documents, and PDFs.
http://www.act.edu.et/course/index.php?categoryid=53
www.aau.edu.et = Domain name
www.aau.edu.et
Sub domain Third level Second level Top level
43 P a g e
Here, in the domain name Ethiopia.gov.et, the .gov domain means it is a government website
in Ethiopia.
File path
The file path: often just called the path tells your browser to load a specific page.
If you don’t specify a path and only enter a domain name, your browser is still
loading a
specific page; it’s just loading a default page, which usually will help you navigate to other
pages.
http://www.aau.edu.et/course/index.php?categoryid=53
/course/index.php?categoryid=53 = file path
Parameters
You have probably noticed this part of a URL appear in your address bar after performing a
search on Google or YouTube. The parameter string is critical information for the server.
Anchor
Also appearing after the path, the anchor tells your browser to scroll to or load a specific part
of the page. Usually the anchor begins with a hashtag and is used to direct your browser to a
specific part of a very long page, much like a bookmark.
A whole URL
When combined, these elements make up a URL, although not all URLs will have all five
parts.
44 P a g e
5.2. How Does the Internet Work?
Internet has become such a large part of our lives, so a good understanding is needed to use
this new tool most effectively. Because the Internet is a global network of computers each
computer connected to the Internet must have a unique address. Internet addresses are in the
form AAA.AAA.AAA.AAA where AAA must be a number from 0 - 255. This
address is known as an IP address. (IP stands for Internet Protocol.)
The picture below illustrates multiple computers connected to the Internet; the computer
with IP address 255.253.110.12 and another computer with IP address 255.253.190.20 and
the rest as well with a unique identification number or IP Address. The Internet is
represented as an abstract object in-between.
If you connect to the Internet through an Internet Service Provider (ISP), you are
usually assigned a temporary IP address for the duration of your dial-in session.
If you connect to the Internet from a local area network your computer might have a
permanent IP address or it might obtain a temporary one from a DHCP server.
45 P a g e
It’s possible to connect to the internet via a range of devices these days —
though
desktop and laptop computers, mobile phones and tablets are the most common.
In order for any device to actually get online though, requires signing up for a
specialized service for accessing the internet.
People’s choice over the various devices and means of getting online varies according
to many factors, including lifestyle (whether they’re at home or out and about), how
frequently they need to access the internet (every day for a number of hours or just occasional
use), the types of things they want to use the internet to do (catch up with email or
download and watch films and TV programmes), and budget (internet access companies
usually charge to use their services).
1. Fixed internet
As the name suggests, this is an internet connection that is fixed to a specific location (such as
a home, office or shop) — meaning that the internet connection is unique to that property, and
as such you can only access it when you’re physically situated there. The two most
common types of fixed internet connection are:
a. ADSL broadband
The most widely used form of internet connection, ADSL uses a property’s existing phone
line to get online. This form of broadband has been available for a while, making it often the
most cost-effective way of getting online.
b. Fiber broadband
The most recently rolled out form of internet connection, still not that widely available,
is
46 P a g e
fiber broadband. Fiber broadband claims to offer more consistent and reliable speeds
than cable and ADSL (average download speeds of 59.4mb) — allowing multiple devices to
be performing high-capacity tasks, simultaneously, without any slowdowns or breakages in
the connection, making it an attractive proposition for busy family homes or office
environments.
c.Mobile internet
e. 4G Mobile internet:
4G mobile internet is the more recently available level of mobile internet available,
offering much higher speeds than 3G. In fact, due to excellent connection and download
speeds, 4G might eventually replace fixed internet connections in more rural parts of
may the
struggle to get
country thataccess to quicker connections.
47 P a g e
f. 5G Mobile internet:
The 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G,
and 4G networks. 5G enables a new kind of network that is designed to connect
virtually everyone and everything together including machines, objects, and devices.
If you already have high-speed (broadband) Internet service at your house, it's pretty easy to
create your own home wireless network. Commonly known as Wi-Fi, a wireless
network allows you to connect laptops, smartphones, and other mobile devices to your home
Internet service without an Ethernet cable.
Next, you'll need to use your computer to configure your router's default settings.
This includes setting a unique name and password for your wireless network.
48 P a g e
i. Using your web browser, enter the router's default IP address into the address
bar, then press Enter. Your router's instructions should include this information,
but some of the most common addresses include 192.168.0.1,
192.168.1.1, and 192.168.2.1.
ii. The router's sign-in page will appear. Again, the exact sign-in details
should be included with your router's instructions, but most routers use a
standard user name and password combination, such
as admin and password.
iii.
Your router's settings page will appear. Locate and select the Network
Name setting, then enter a unique network name.
iv. Locate and select the Network Password setting and choose an Encryption
option. There are several types of encryptions you can use, but we
recommend WPA2, which is generally considered to be the most secure.
v. Enter your desired password. Make sure to use a strong password to help
ensure no one else can access your network.
vi. Locate and select the Save button to save your settings.
c. Connect!
That's it! Now you're ready to connect to your Wi-Fi network and make sure it's
working. The process for connecting to a Wi-Fi network will vary slightly depending on
what type of
49 P a g e
computer or device you're using, but any system will require these basic steps. To connect
your smartphone to Wi-Fi:
All these browsers work in very similar ways and have similar controls. If you can use one
type of web browser then you will beable to apply those skills to other browsers.
50 P a g e
Bookmarks and history
You can save your favourite pages in a web browser so that you can view/go backto them
later. This is similar to inserting a bookmark in a book so that you can easily pick up from
where you stopped reading. This is called bookmarking.
To create a bookmark, start by clicking on the star at the extreme right-hand side of
the address bar.
●If the back and forward buttons are active, click and
hold your mouse on any of them and select See full
history, or
51 P a g e
52 P a g e
6. INFORMATION AND SYSTEM SECURITY
By adopting safe online practices and ensuring the security of your digital devices, you can
enjoy the benefits of accessing information, social connections, and economic
opportunities on the internet. Engaging in unsafe online practices or neglecting to
secure your devices exposes you to potential dangers. While innocently browsing the
web, you may unknowingly encounter spyware, download malware, or visit fraudulent
websites. However, there is no need to fear every click you make on the internet.
By following some straightforward precautions, you can protect yourself and maintain a
safe browsing experience.
New forms of online content that can access and damage your computer are constantly
being introduced. You can help to keep your computer safe by updatingyour browser. This
is done by:
Malicious sites often use deceptive domains to trick users into believing they are on a
legitimate site. A malicious website is any website that’s been designed to cause harm. The
following are some traits common to many malicious websites.
6. The website asks you to download software, save a file, or run a program
7. The website tells you that your device is infected with malware or that your
browser extensions or software are out-of-date.
8. The website claims you have won a prize and requests your personal
information to
claim it.
6. Visiting the website automatically launches a download window.
7. You are asked to download an invoice or receipt, such as a PDF file, .zip or rar, or an
executable file or .scr screensaver file
Common types of free software include desktop backgrounds, free images, emoticons,
53 P a g e
computer games, etc. The consequences of installing unverified anduntrustworthy programs
can range from a minor annoyance to a loss of funds. . Such software can be a drain on your
computer system and resources. Take proper precautions when searching for new software
and avoid the free offers.
Peer-to-peer (P2P) file sharing operates differently from the typical method of downloading
files from the internet. In P2P sharing, a dedicated program is utilized instead of a
web browser. This program searches for computers on the internet that possess the desired
file. These computers, known as peers, are ordinary computers like yours. However, it's
important to exercise caution when engaging in peer-to-peer file sharing. Certain P2P
programs like BitTorrent and LimeWire have gained notoriety for hosting malware, adware,
and facilitating illegal downloads. Therefore, it is crucial to be vigilant when downloading
and sharing files from peer-to-peer sites to protect your computer and your data.
If you have no alternative to using such sites, you should take the
followingprecautions:
Protecting your computer from malware, spyware, and adware is crucial, and one common
entry point for these threats is through downloads. To safeguard yourself, it is important to
only download from well-established and trusted sites. Here are some simple steps to help
you stay protected from unsafe websites:
Avoid clicking on embedded email links: Instead of clicking on links embedded in emails,
even if they appear to be from someone you trust, it is safer to manually type the link into
your browser. This reduces the risk of accidentally accessing malicious websites.
Trust your instincts and use common sense: If a website looks suspicious or unfamiliar, or
if it requests sensitive personal information, it is best to err on the side of caution
and avoid interacting with it. Trust your intuition and prioritize your online safety.
Verify the website's legitimacy: Look for contact information or signs of a real-
world presence on the website. If you are unsure, consider reaching out to them through
phone or email to confirm their authenticity.
Pay attention to the URL: When visiting a website you frequent, double-check the URL for
54 P a g e
any spelling errors. Cybercriminals often create fraudulent websites with URLs that
closely resemble legitimate ones. Be cautious of mistyped URLs that may lead you
to malicious sites.
SSL, which stands for Secure Sockets Layer, plays a crucial role in maintaining
secure internet connections and safeguarding the integrity of information transmitted
between two computer systems. When SSL is employed, it prevents unauthorized
individuals from intercepting or tampering with the transferred data. You can identify a
website protected by SSL through the presence of a padlock icon displayed next to the
URL in the address bar.
TLS (Transport Layer Security) is an enhanced and more secure iteration of SSL. It
functions similarly to SSL by utilizing encryption techniques to ensure the protection of
data during transmission. TLS serves as an upgraded version of SSL, offering
improved security measures for data and information transfers.
55 P a g e
3. Ensuring your safety online: Cybersecurity and its importance
3. What is cybersecurity?
Information security protects the integrity and privacy of data, both in storage and in
transit.
Operational security includes the processes and decisions for handling and protecting data
assets such as the permissions users have when accessing a network and the
procedures that determine how and where data may be stored.
56
various other important lessons vital for the securityof any organization.
Examples of personal data include identification card numbers, passport numbers, and
social security numbers. Additionally, personal data can encompass details such as
telephone numbers, credit card information, employee identification numbers, account
data, vehicle registration plates, physical appearance, customer numbers, and addresses.
These examples illustrate the wide range of information that falls under the category of
personal data.
Many internet users remain unaware of the threats to online privacy and the risks
associated with having their personal data exposed on the internet. It is important to
understand the consequences of these online threats to personal data. Here are some
notable impacts:
Financial Loss:
One of the immediate and severe consequences of a data breach is the financial impact it
can have on both organizations and individuals. Cybercrime incidents can result in
substantial financial losses that are challenging to recover from.
Reputational Damage:
In the digital age, news spreads rapidly, and organizations or individuals can find
themselves at the center of a global news story within hours of a breach or data
disclosure. The negative press coverage, combined with a loss of trust, can cause
significant and lasting damage to the reputation of the affected entity or individual.
Operational Downtime:
57
Legal Action:
Under data protection regulations, organizations and individuals have a legal obligation
to demonstrate that they have taken necessary measures to protect personal data. If personal
data is compromised, affected individuals have the right to seek legal action against the
responsible party for compensation.
Biometric data, such as fingerprints or facial recognition, holds significant value for
cybercriminals compared to basic information like credit card details or email addresses.
Breaches that expose biometric data can have catastrophic consequences and surpass the
financial and reputational damages, as it can be exploited to cause serious harm to
individuals.
1. Malware
Malware is malicious software such as spyware or virus. It is activated when a user clicks on
a malicious link or attachment, which leads to installing dangerous software. Once a
malware is activated, it can:
58
59
Creating an Email
Account and Getting
60
7. Creating Acccounts and Creating Passwords
A user account is an online place that stores the user’s information identified by ausername
and protected by a password, e.g., WhatsApp account, a Facebook account, a Twitter
account, or an ecitizen account.
1. Purpose of a Password
While accessing the internet, a user needs a user ID and password to prevent unauthorised
people from accessing the information stored on their device. Suchinformation may include
details of bank accounts, college account, emails, social media accounts, e-citizen account
and any other account created online.
It is therefore important to learn how to create secure passwords and how tomanage them to
protect your information.
Passwords are essential to the security of your personal information. It is importantthat you
avoid bad password practices such as:
It is important to create a good password, but also to keep the password safe.
Additional software called a Password Manager can help you with this.
61
2. Using Email
1. What is email?
Email, short for electronic mail, is a digital communication method that allows individuals to
exchange messages and files over the internet. It serves as a convenient and efficient way to
send and receive messages electronically.
Email operates through email servers, which are responsible for sending, receiving, and
storing messages. Each user has a unique email address that consists of a username, followed
by the "@" symbol and the domain name of the email service provider (e.g.,
johnsmith@gmail.com).
Emails are routed to user accounts via several computer servers. They route the message to
their final destination and store them so that users can pick them up and send them once they
connect to the email infrastructure. Email can be accessed through an email client or a web
interface.
Composing: The sender creates a new email message using their email client or
webmail interface. They enter the recipient's email address, subject line, and compose the
content of the email.
Sending: Once the sender clicks the "Send" button, the email client or webmail
interface connects to their outgoing mail server, also known as the Simple Mail
Transfer Protocol (SMTP) server.
SMTP Server: The sender's SMTP server receives the email from the client
and
62
authenticates the sender. It then searches for the recipient's domain name in the email address
(the part after the "@" symbol).
Domain Lookup: The sender's SMTP server performs a Domain Name System (DNS)
lookup to find the recipient's domain's Mail Exchange (MX) record. The MX record specifies
the address of the recipient's incoming mail server.
Routing: The sender's SMTP server establishes a connection with the recipient's incoming
mail server, known as the SMTP receiver. It transfers the email to the recipient's server using
the Simple Mail Transfer Protocol.
Delivery: The recipient's SMTP receiver receives the email and stores it in the
recipient's mailbox on their mail server.
Retrieval: The recipient opens their email client or webmail interface, which connects
to their incoming mail server using protocols like POP3 (Post Office Protocol) or
IMAP (Internet Message Access Protocol). The email client retrieves the email from the
server and displays it to the recipient.
Reading and Responding: The recipient reads the email, may reply to it, forward it, or take
other actions as desired.
3. Email Structure
1. The envelope that we’ve just mentioned. This is separate from the body and header. Next
is the body (that contains content of the message). Email clients separate an email header
and the body (the content text).
2. The body is distinct from the header; it contains everything within the message including
images, text and any other data (such as attachments).
3. The header which is arguably the most interesting part of an email’s DNA. The header
always precedes the body text. This is logical, when you receive an email, it’s often the
header that’s scanned first before the email is opened.
63
Write and Send Email Messages
When you write and send an email to your boss, friend or family member you type
their
email address, compose, then hit send and their reply comes back to your email client. To
some extent, this is true, but, there’s much more to it than that. How emails are structured and
transmitted is a complex process, and with the help of relatable analogies, we can explain the
entire process in an easy to absorb manner.
As simple as it seems, email relies on a different set of protocols as those used to
access website content. To order, store and access emails relies on a set of protocols that’s
different from what the rest of the internet depends on. For most email users, it’s not
necessary to understand how email works to use it.
A lot happens when you hit "send."
1.Email messages are composed using an email program (an email client).
2.The email program assembles the email by combining the message content (the body) with
the recipient, subject plus the date and time (the header).
4.The email program (the email client) comes in two forms, a web based version like Gmail
where users must login through their browser to access their emails, or a client based version
such as Outlook where users install software to access emails from their local computer.
64
How Do I Compose and Send a New Message?
To compose a message:
Click the New Mail icon in the Quick Actions menu in the upper-left corner of the
Convergence UI, or
Click Write in the Messages section of the Convergence UI.
Toolbar menu
From: This field contains a drop-down list with all the configured sender profiles you
have for this account. This field is not displayed if you have not configured external
POP accounts. This list includes the name followed by the email address of
each configured external account. Convergence enables you to collect email
from other POP accounts in addition to the default account.
This feature enables you to receive, send, reply, or forward email from or to other
email accounts that support POP access.
1. Click the Write icon on the centre panel to display the Compose tab. The Compose
2. Enter the email addresses of the recipients who should receive your message in
the To field. Use a comma to separate multiple addresses.
65
Alternatively, click the Address Book icon next to the To field to select the email address.
To send a copy to a recipient, enter the email addresses in the Cc field or click
the Address Book icon next to the Cc field to select email addresses.
Convergence provides an address book auto completion feature. This feature needs to
be enabled at the back-end Convergence server. When enabled, enter the first
few characters of the display name of the recipient. The list of entries that closely match
the entered characters from the Address Book appear in a drop-down list.
3. To send a blind copy to a recipient, click the Bcc icon. Optionally, click the
Address Book icon next to the Bcc field to select
email addresses from the saved list.
The Bcc field appears. Enter the email address in the Bcc
field.
4. Enter the subject of your message in
the Subject field.
5. Click the Options icon in the top toolbar. The expanded message icons are shown.
6. From the priority drop-down list, select
the required priority.
The priorities are Normal, Urgent, and Low. By default, the messages are sent with normal
priority.
7. From the Receipt drop-down list, select an option.
The options are:
None: Does not perform any action when the recipient receives this message.
Read: Sends a notification when the recipient reads the message.
Delivery: Sends a notification when this message is delivered to the recipient.
Delivery and Read: Sends a notification when your message is delivered and
read by the recipient.
8. Select the Rich Text check box to include rich text features in the mail editor.
9. Click in the message text box and enter the text of the message.
To attach a message to the mail, click the symbol with a paper clip or a word Attach
written in the menu bar.
10.Click Send to send the message.
Between sifting through spam, crafting the right responses, and keeping tabs on the
messages that require follow-up, staying on top of your inbox can feel like a job in itself.
That’s why
66
we picked the brains of professionals who have figured out the secret to efficient, organized
inboxes—despite getting hundreds of emails a day. Because having a system in place
can help you conquer even the most unruly inbox.
The best way to manage emails is to regularly review the folders for their content and refresh
by deleting unnecessary email messages stored in the folders. It is also advised to follow the
10 key points mentioned below to manage your email messages, improve the speed of
retrieving an email and avoid junking up your inbox.
There is no need to keep all email delivered into your Inbox folder. Those emails that may not
require an immediate response may be kept in waiting folder.
So where do emails go if not your inbox? Create a “waiting folder” for emails that require
action from someone else before you can respond. “This is a huge time- saver,” “That
way those emails aren’t junking up your inbox, and it’s a great place to look each day or week
to remind you of what projects are still pending.”
Many email providers allow you to set up inbox rules or filters that will take action for you
and can help you quickly categorize emails without depleting any brainpower. Take
advantage of Outlook’s rules functions, “put emails into different folders, colour code, and
prioritize based on sender”.
Because some emails might require more than a simple reply, it is important to add them to
the calendar. “If you receive an email that requires not only an immediate response but
also some sort of follow-up action, move the email to a designated subfolder and put a
reminder on the calendar that includes the folder location and the date when follow up is
required”.
67
6. Don’t Let Junk Mail Languish in Your Inbox
Feel like you’re playing with promotional emails? Don’t waste your time, be swift
with the unsubscribe button. They are time and space waster, don’t bother just
unsubscribe from the list.
Tailoring a different reply for every email can be a huge time-suck. If you find
yourself sending the same type of email over and over again, you may benefit from keeping
some stock responses in your drafts that you can easily reuse.
You probably wouldn’t leave your schedule open for meetings of unspecified times and
lengths around the clock, so why give email free rein to intrude on your day? The best you
can do is don't leave emails open all day long;
a. Set specific times during the day to go through each email and
thoughtfully respond, archive, or save for later. This way you may not multitask,
and you can get through all your emails more quickly because you have actually
focused on the task at hand.
b. It is recommended that you start out with three different half-hour blocks a day to
read through and respond to emails and keep inbox closed the rest of the day and
adjust as necessary from there.”
c. In addition to using time-blocking to stay on top of daily emails, it
is
recommended to set aside time once a week for inbox maintenance. Choose a time
each week to maintain your inbox. Protect the time as you would any other important
meetings and get organized. “Sweep away the irrelevant, archive the complete, and
prioritize the to-do list.”
9. Turn off Email Notifications
Even if you’ve resigned yourself to only checking emails in pre-designated blocks, the
siren song of your inbox notification might be too great a temptation to resist. If that’s the
case, the solution is simple: Turn off your notifications because, if you work in time
blocks, you will never go more than a couple of hours without seeing your emails. Hence,
turn off the notifications, as they will distract you from doing what you are currently
working on at your desk.
Ensure email accounts are effectively synced to your phone and use idle moments to do quick
inbox clean-up. Lots of the messages we receive don’t require direct action.
68
Hence, spam can be deleted, other things can be filed, and you can deal with plenty of
these just while you’re in a ten-minute coffee break time.
The basics of modern email etiquette (protocol) or the most essential rules you need to
know are:
The benefit from great tools and features can help you keep your work safe
and become more efficient. To create email account, you will only need a few
minutes and it's easier than ever. When you are about to create free email account
there are few things worth considering.
a) First of all, before you create email account think of your username. Will you use
your email as private or professionally? Make sure your username defines your
purpose.
b) And of course, the password. Keep your email account safe and remember that
the length of a password determines its security strength as the time required to
crack longer passwords increases exponentially.
69
Therefore, your password should consist of at least 8 characters and contain both
capital and lower-case lettering, as well as numbers and special characters (e.g.,
"!", "&", "-".).
We recommend you change your password from time to time in order to increase
the security. Do not choose a password that is easy to guess, e.g. personal data
such as: your initials, your date of birth, or the name of a family member or a pet.
1 Click on the Sign-Up Button for a new email account, if you haven’t got
an existing email address
2 Enter all mandatory fields (First Name, Last Name, Gender, etc.) as
shown below for a Google email account screen shot.
3 Type-in the desired Email Address of your choice
4 Choose a secure Password (at least 8 characters, mixing letters, numbers, lower
and upper case, and using special characters)
5 Select your Security Question, type in your Answer (This helps in case
you
forget your password to login into your email account)
6 Verify your registration by typing the numbers and letter shown as picture but
gothic fonts (when it is a requirement)
7 Click the "Accept" – Button to confirm
That's it! You're done. Then Enjoy your new email account immediately
on any device of your choice!
III. Example of creating an email with google.com: -
To sign up for Gmail, create a Google Account. You can use the username and
password to sign in to Gmail and other Google products like YouTube, Google Ply,
and Google Drive.
70
V. What comes with the free email account?
An email account allows you to take advantage of many great tools and features,
entirely for free:
Freedom - You can use your account anywhere and anytime you like, on
your Smartphones, Laptop, Tablets and Desktop
Online Calendar, Entertainment and Promotion emails organized to manage your
time efficiently
And much more!
71
The Features of Online
Communities
72
8. KEY FEATURES OF AN ONLINE COMMUNITY
They all contribute to the personal experience of the shared space. Here’s something about the
user experience of online communities that you’ve probably never considered: everyone in
an online community is having a unique, individualized experience, even though they’re
all doing it together.
This is because someone’s activity feed is not somebodies activity feed, it has
different
places, people, and pages appearing in it. Some of the posts in the feed may also appear for
someone, depending on their collective preferences. But most of the time one can only see
a small portion of the things others see, and then share those with subset of friends. It’s
like riding the light rail. It’s a personal experience in a shared space: a million small
interactions that can be meaningful, or totally forgettable.
73
1. A sample rich user profile should include these details:
Full Name
Social Profile
Photograph
Company Name
Designation
Email
Phone Number
Birth Date
Gender
Interest areas
2. Responsive Design
A great-to-add feature would be enabling your
customers to read, search, and contribute to your community from any device they
are able to access. Mobile and tablet users access social networking sites and
online communities 26% of the time. On a typical day, people use their
mobiles during the travel, desktops/laptops during the workday, and tablets/mobiles at
night.
With such cross device usage, you have to make sure your community works perfectly on
each platform to deliver a smooth and engaging user experience.
3. Mobile Apps
72% ovf consumers have a more favourable view of the company if they provide a
customer service mobile
app. With an app for your online support community, you can help your customers access
your support
community for support and advice, 24/7. To enrich
74
user experience figure out apps that your target audience needs and wants.
4.Gamification
Gamification taps into basic human psychology to motivate users to contribute, share, and
be active. When your users come to the community, they need
motivation to participate. Additionally, gamification satisfies the “what’s in for me”
urge by rewarding participation, boosting user visibility, and
driving conversations with rewards/freebies/badges/status upgrades and more.
5.Content Resources
Your users come back repeatedly when they see the value your content is providing.
Traditionally content is thought of as only articles, how to videos and some Q/A. For
a truly engaging community, you should look at content in the form of Content: -
Post Tags/Labels, Customer Engagement Videos, Customer Interviews, Social Media
Feeds, Community Newsletter, Case Studies, white Papers, eBooks, User Activity
Streams/Ticker, Community Blog, Similar Discussions, Media Libraries
6. User Groups
Segment customers or members to improve collaboration and
provide a
better customer experience. You need to provide the ability to create private, semi-
private and public forums that the users
75
can create according to their convenience. These are virtual hangouts for people to share new
ideas, best practices, start discussions, and locate experts in their niche.
7.Water-cooler
Think of it as a virtual water cooler. It functions exactly like the water cooler you have in
your office. Strong relationships are key. Off-topic discussions, discussions around a
wide
range of non-business subjects provide an opportunity to users to relax and get to know their
peers.
8.Full text search
Your target audience is busy. With full text search, facilitate right information from
their
computers or mobile devices. It gives them a wide array of results to dive in deeper and get
best answers.
9.Email Notifications
People are notified by e-mail
(not through the platform!) when their discussion has received a response.
They visit, read the response and reply. The individuals that replied are notified
and visit to
cycle
reply and so the
the
continues.
Visiting soon becomes a habit.
platform
Notifications also speed up the community. Most people instantly click on the notification to
see the response. In that visit, they make their own response. The quicker pace equals more
posts and an active community.
10.Event Calendar
Events are a great way to
get traction to your community and increase engagement and
attendance at in-person and
virtual events – from a webinar series to multi-day conferences. Make sure you have included
one that allows participants to add events and customize “who can attend”. Additionally,
in advanced cases you can also manage event registration, conference-related
communication, and session submissions.
76
11.Private IMs and Member
Directory
Peer to peer engagement is a building block for
higher- level frequent activity in a group. One way to
expedite peer-to-peer engagement is by enabling
private IMs. Enable community members to follow the
activity streams of other members and build personal
networks.
12. Security
Security should start right from the sign on capabilities to the content the users can access,
people they can connect with, events they can attend, modules they can access, edit or
even manage. Within security, you should have robust and well-defined privacy
options, safety guidelines that are prominent and easy to understand, options to
block notifications and more.
Finally
Communities are the buzzword right now. People want communities that provide value, gives
them a forum to connect with like-minded individuals. Features make this happen.
Think
about it like this, you love the new smartphone because it lets you do so many things with its
cool features. There is little change in the hardware or the software, but you still
love it.
Doesn’t a community function in the same way?
77
8.2. How to make business on Social Media
Creating a successful business presence on social media requires careful planning,
consistent effort, and effective strategies. Here are some steps to help you get started:
Define Your Goals: Determine what you want to achieve through social media. Are
you aiming to increase brand awareness, drive website traffic, generate leads, or
engage with customers? Clearly define your goals to guide your social media strategy.
Choose the Right Social Media Platforms: Research and select the social media platforms
that align with your target audience and business objectives. Popular platforms
include Facebook, Instagram, Twitter, LinkedIn, and YouTube. Each platform has its own
strengths and user demographics, so choose the ones that are most relevant to your business.
Create a Consistent Brand Identity: Develop a strong and cohesive brand identity across
all social media platforms. Use consistent branding elements such as logos, colors, and tone
of voice to establish a recognizable and trustworthy presence.
Develop a Content Strategy: Plan and create compelling content that provides value to
your audience. This can include informative articles, engaging videos, captivating
images, infographics, and interactive posts. Mix promotional content with educational,
entertaining, and shareable material.
Engage and Interact: Social media is all about building relationships. Respond promptly to
comments, messages, and mentions. Engage with your audience by asking questions,
running polls, and encouraging discussions. Show genuine interest in your followers
and build a community around your brand.
Analyze and Optimize: Regularly analyze your social media performance using
analytics
78
tools provided by the platforms or third-party tools. Track metrics such as engagement, reach,
click-through rates, and conversions. Use this data to refine your strategies and optimize your
content for better results.
Remember, building a successful business presence on social media takes time and effort. Be
consistent, authentic, and focused on providing value to your audience. Adapt your strategies
based on your audience's feedback and evolving trends in social media marketing.
Emerging Technology 79
• Internet of Things
9. EMERGING TECHNOLOGY
81
9.1.1. Some examples of IoT devices
Although the name “Internet of Things” may be unfamiliar, you may recognize this
connected ecosystem better as “smart homes” or “connected homes,” which include
the various IoT devices that make your home life easier.
But IoT devices are also found outside the home. They can range from a Wi-Fi pet camera on
your bookshelf to a medical device implanted in your body, like a pacemaker.
As long as the device is able to connect to the internet and has sensors that transmit data, it
can be considered an IoT device. Although your smartphone can do both, it’s not an
IoT device.
Smart Watch
Also, the IoT ecosystem is accessible through the smartwatch. Your smartphone as well as a
number of other gadgets are connected to it. You might receive a vibrating or sound alarm if
you leave your cell phone behind and move beyond a certain range. Certain smart devices
even allow you to locate a missing phone.
Smart Car
82
The term Smart/ IoT car' refers to embedding IoT technologies into automotive systems to
create new applications and solutions which enable vehicles to provide a smarter,
safer, efficient, and more comfortable driving experiences.
Smart Home
A smart home is a home setup where internet-enabled appliances and devices can be
automatically controlled remotely using a networked device.
Smart City
83
A smart city is a technologically modern urban area that uses different types of
electronic methods and sensors to collect specific data.
Smart Farm
IoT devices contain sensors and mini-computer processors that act on the data collected by
the sensors via machine learning. Essentially, IoT devices are mini computers, connected to
the internet, and are vulnerable to malware and hacking.
Since 1980s, the IoT has exploded. What about the future? Devices are growing smaller and
smarter. Eventually, everything from your toothbrush to your toaster may be connected to the
internet 24x7. Your gadgets will become household aides, each chatting with one
another, working to serve you better.
85
Understanding the Risks: What Could Go Wrong with IoT
As with any technology, the Internet of Things (IoT) brings both benefits and potential risks.
It is important to be aware of these risks in order to protect yourself and your data. Here are
some potential issues to consider:
1.Cybersecurity Threats: The convenience and connectivity offered by IoT can also
create opportunities for cybercriminals. They may attempt to access sensitive data such
as bank logins, credit card numbers, or personal information. Strong security measures
are essential to protect against these threats.
2.Hacking of IoT Devices: Imagine if someone gains unauthorized access to your IoT security
cameras and monitors your activities without your knowledge. Similarly, a
cybercriminal could take control of your smart TV, smoke alarms, or front-door lock,
potentially compromising your privacy and security. The interconnected nature of IoT devices
can create vulnerabilities that attackers may exploit.
3.Protecting Connected Devices: Just as you take precautions to safeguard yourself
against cybercrime, it is important to ensure the safety and security of your IoT
devices. The Internet of Things continues to introduce new online threats, so proactive
measures are necessary to mitigate risks.
4.Securing Your Wi-Fi Router: One of the most effective ways to defend your
networked devices is by securing your Wi-Fi router. Your router acts as the gateway to your
online world, and by ensuring its security, you can protect your entire home Wi-Fi network
and all the devices connected to it.
By being aware of these potential risks, you can take proactive steps to enhance the security
of your IoT devices and protect your privacy.
Stay informed about the latest security practices and updates, regularly update your devices'
firmware, use strong and unique passwords, and consider additional security measures such as
network segmentation or firewall protection.
Virtual Reality (VR) offers a range of business benefits across various industries. Here are
some key business benefits of Virtual Reality:
Enhanced Product Development: VR enables businesses to create immersive virtual
prototypes, allowing product designers and engineers to visualize and test products
before physical production.
Improved Training and Education: VR provides realistic and immersive
training
environments, particularly in industries where hands-on experience is crucial, such as
healthcare, aviation, and manufacturing.
Enhanced Customer Engagement: VR can revolutionize the way businesses engage with
their customers. It allows companies to create interactive and immersive experiences,
enabling customers to visualize products or services before purchase.
Virtual Meetings and Collaboration: With VR, geographically dispersed teams can come
together in a shared virtual space, facilitating collaboration and communication.
Marketing and Advertising Opportunities: VR offers innovative marketing possibilities by
creating immersive and memorable experiences that capture consumers' attention.
Remote Collaboration and Remote Work: Virtual Reality can facilitate remote
collaboration and remote work scenarios by providing a sense of presence and
interaction.
Simulation and Prototyping: VR enables businesses to simulate and prototype
various scenarios, helping them identify potential issues and improve decision-making.
For 87
example, architects can create virtual walkthroughs of buildings to evaluate design
choices, while manufacturers can simulate production processes to optimize efficiency.
88
4. Innovative Marketing and Advertising: AR allows businesses to create unique
and memorable marketing campaigns. AR-powered advertisements, interactive
product catalogs, and gamified experiences can enthral audiences, differentiate
brands, and generate buzz, leading to increased brand recognition and customer loyalty.
5. Streamlined Training and Education: AR can revolutionize training programs by
offering realistic and immersive simulations. It allows employees or students to practice
complex tasks, receive step-by-step guidance, and visualize theoretical concepts in a
practical and engaging manner.
6. Efficient Design and Prototyping: AR enables designers, architects, and engineers
to visualize and iterate on their projects in real-time. By overlaying virtual elements
onto physical environments, AR can provide valuable insights, identify design flaws,
and streamline the prototyping process, leading
7. Data Visualization and Analytics: Businesses can use AR to present data, metrics, and
insights in an interactive and intuitive way, enabling more informed decision-making and
driving business growth.
8. Competitive Advantage: By embracing AR technology, businesses can differentiate
themselves from competitors, showcase innovation, and stay ahead in their industry.
The main difference between Virtual Reality (VR) and Augmented Reality (AR) lies in the
way they blend the virtual and real worlds:
I. Virtual Reality (VR): VR completely immerses the user in a simulated environment that
is separate from the real world. By wearing a VR headset, users are visually and audibly
cut off from their physical surroundings and transported to a virtual world. VR aims to
create a sense of presence and can offer highly immersive experiences, often involving
interactions with the virtual environment or objects.
II. Augmented Reality (AR): AR overlays virtual elements onto the real-world
environment, enhancing the user's perception and interaction with their surroundings. AR
does not replace the real world but augments it with digital content. AR is
typically experienced through smartphones, tablets, or AR glasses, where virtual
objects or information are superimposed onto the user's view of the physical world.
89
9.3. Artificial Intelligence
Artificial Intelligence (AI) refers to the simulation of human intelligence in machines,
particularly computer systems. It involves the development of algorithms and
technologies that enable computers to perform tasks that typically require human
intelligence. AI encompasses various subfields, including expert systems, natural
language processing, speech recognition, and machine vision.
Learning. This aspect of AI programming focuses on acquiring data and creating rules for
how to turn it into actionable information. The rules, which are called algorithms,
provide computing devices with step-by-step instructions for how to complete a specific task.
Reasoning. This aspect of AI programming focuses on choosing the right algorithm to reach
a desired outcome.
Self-correction. This aspect of AI programming is designed to continually fine-tune
algorithms and ensure they provide the most accurate results possible.
9.3.2. Advantages of AI
The following are some advantages of AI.
Good at detail-oriented jobs. AI has proven to be just as good, if not better than doctors at
diagnosing certain cancers, including breast cancer and melanoma.
91
Reduced time for data-heavy tasks. AI is widely used in data-heavy industries,
including banking and securities, pharma and insurance, to reduce the time it takes
to analyze big data sets. Financial services, for example, routinely use AI to process loan
applications and detect fraud.
Saves labor and increases productivity. An example here is the use of warehouse
automation, which grew during the pandemic and is expected to increase with the
integration of AI and machine Learning.
Delivers consistent results. The best AI translation tools deliver high levels
of
consistency, offering even small businesses the ability to reach customers in their native
language.
9.3.3. Disadvantages of AI
The following are some disadvantages of AI.
Expensive.
Weak AI, also known as narrow AI, is designed and trained to complete a specific task.
Industrial robots and virtual personal assistants, such as Apple's Siri, use weak AI.
92
APPENDIX – ACTIVITIES
Students explore elements of a well written vs. a badly written email, discuss the
consequences of communicating poorly over email and practice composing a professional
email.
Written communication through email is an important skill for students to master in our
increasingly technology-based world. Though many young adults consider email an “adult”
way to communicate and would rather communicate in real- time with texting or other
forms of social media, when it comes time to apply for a job, email skills will most likely be
necessary. Therefore, an understanding of “email etiquette” is worthy of discussion.
Students will understand the difference between professional and non-professional emails
and have an opportunity to practice writing professional emails.
Materials
Desktop computer/ laptop/ tablet or mobile phone
Email Short for “electronic mail,” email is one of the most widely used features of the Internet, along with
the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in
the world
Steps
93
comes time to apply for a job, email skills will most likely be necessary.
Therefore, an understanding of “email etiquette” is worthy of discussion.
oThis activity will offer participants the chance to challenge themselves to
translate text to English and then discuss some of the classic rules of email.
o Lead a discussion on the activity by asking:
“Why is it important to communicate clearly over email?”
o Ask, “What are circumstances you will need to communicate by
email? What are your strategies for communicating clearly? How
can you improve?”
o Go through each email etiquette.
o Ask participants to draft an email and send it to you. The email
should have a proper subject line, greeting, and closing.
Participants can pick from the following scenarios:
requesting time off
asking a supervisor, a question
asking if a job is still available to apply for, etc.
94
Activity 2 – Communication
Objective
Students are able to communicate, collaborating and sharing
information
Materials
▪Desktop computer/laptop/tablet or mobile phone
Skills for life Additional Skills for life Additional Work examples Life Work examples Life
skills for skills for work examples examples
I understand the Understand and conform
importance of with my organization’s IT
communicating securely and social media policies
I can set up an email I can comply with my Use the email address
account organization’s security book of my organization
protocols when accessing to send emails to
my email or working colleagues and use the ‘cc’
remotely option when requested
I can communicate with I can communicate in an Set up a group on Work remotely using a
others digitally using appropriate way for my messaging platforms, such virtual private network
email and other organization by using as WhatsApp or when provided by my
messaging Apps email, online and Messenger, to talk to employer, and use the
collaborative digital tools friends or family members requested authentication
to connect
I can use word processing Use word processing Use different document
applications to create software to create a CV or formats such as PDF to
documents a letter make it easier to share
documents with colleagues
95
collaboration with
colleagues
I can communicate I can use digital Set up and use video- Use video-conferencing
with friends and family collaboration tools to telephony products such as products such as Skype
using video tools meet with, share and Facetime or Skype for and Facetime to
collaborate with video communications communicate with
colleagues with friends and family colleagues on conferences
and calls
I can post messages, I can use professional Be a member of and Be a member of and
photographs, videos or online networks and manage personal manage my
blogs on social media communities networking sites, such account on professional
platforms as Facebook networking sites, such
Post appropriately on as LinkedIn
social media.
96
Activity 3 – Handling Information and Content
Objective
Students are able to find, manage and store digital information and content
securely.
Materials
▪Desktop computer/laptop/tablet or mobile phone
Skills for life Additional skills for work Life examples Work examples
I can use search engines to find Search for news using a Search for information
information and make use of browser such as Chrome, requested by a
search terms to generate better Internet Explorer or Safari supervisor using
results browsers such as
Chrome, Internet
Explorer or Safari
I can access information and I can access information and Manage a calendar or
content from different devices content from different devices appointments system
on multiple devices,
including work
computer and phone or
tablet
97
I can organize my information
and content using files and
folders on my device or on the
cloud
98
Activity 4 – Transaction
Objective
Students are able to register and apply for services, buy and sell goods and services,
and administer and manage transactions online.
Materials
▪Desktop computer/laptop/tablet or mobile phone
Skills for life Life examples Work examples
Additional skills for
work
I can set up an account online, I can complete digital Set up online accounts for Submit requests for annual
using appropriate websites or records for absence, public services such as with leave, record absence from
apps, that enable me to buy holidays or expenses your local council or a work or submit expenses
goods or services online Government Department claims online
I can use different payment I can access salary and Set up and use online and Review own payslip and
systems, such as credit/debit expenses information telephone banking through salary payments when
card, direct bank transfer, and digitally including websites or Apps, keeping received digitally
phone accounts, to make password protected pay access information secure
payments for goods or services slips
online
99
Activity 5 – Technology and Social Media
Time: 30 minutes Objectives
Students will relate the topic of communication via technology and social media to professionalism and
other communication skills and understand the difference between appropriate and inappropriate
technology use.
Advanced Preparation/Facilitator Notes
Students are using technology in multiple ways to communicate. It is important for them to understand that
once their information is shared online, it is made public to a number of audiences. In this lesson, they will
explore the benefits and drawbacks to technology and social media as it relates to their careers and steps
they may want to take to protect their identity.
Materials
▪Desktop computer/laptop/tablet or mobile phone
Technology and social media
Social Media
- Websites and applications that enable users to create and share content or
to participate in social networking.
STEPS
1.Explain that the group will be discussing social media and technology. Put up two sheets
of flip chart paper (or use the blackboard), one with ‘Advantages’ written at the top and one
with ‘Disadvantages’ at the top.
2.Facilitate a discussion on the benefits and drawbacks of social media by asking,
“What do you think are the best parts of social media? What are the advantages of having
it?” Suggested benefits:
▪ Social skills: Social networking allows people to keep up with current
friends and make new ones. When used in the right way, social media can
increase self- esteem and help someone feel less isolated.
▪ Independence and self-expression: Creating your own “home page” allows
People to express themselves and discuss their interests. They can join groups and support
fan pages and find out about other people’s interests.
▪ Digital competence: Technology is evolving faster than ever before.
As
young adults learn to adapt to new technologies (or new applications of existing
technologies), they will be better equipped to adapt to future technology.
▪ Educational development: Young adults in post-secondary education
will
100
often use social networking to discuss schoolwork and share discussions about
assignments.
▪Research: Students can gather information about topics that are hard to discuss
with others, such as drug use and sexual health. They can also learn a lot about
topics of interest to them and stay abreast of current affairs, social/political/
economic trends, as well as learn information to develop new skills.
▪Additional advantages for students with disabilities: Social networking can
open up a new world of communication, integration, and community
participation. Students can express themselves, including their thoughts and
feelings, more easily and without fear of the rejection or stigma they may
experience in real life.
3.Ask: “What might be the disadvantages of social media? How could it
create challenges, especially when working?” Suggestions:
▪ Sharing one’s personal information with the wrong crowd: Students need to
be
aware that information given out online could also put them at risk
of victimization. People looking to do harm could use posted information
to identify them or gain their trust. They can also be deceptive by pretending
to know a young person. Encourage students to privatize their online
social networking accounts (such as Facebook and Twitter).
▪ Bullying: Harassment may occur online (cyberbullying) and it may spill over to
offline bullying committed by a person who has located their victim
online. Cyberbullying can cause significant emotional harm resulting in
depression, anger, school avoidance, violence, and suicide.
▪ The permanency of online profiles: Once information has been shared on the
Internet, it’s out there—forever! Taking information back that others have read
and captured is nearly impossible. Inappropriate pictures, captions, and
comments could come back to haunt youth as they start looking for jobs.
▪ Disclosure: People tend to be far bolder and less discretionary with information
shared online versus in person. This means there is a greater risk of giving out
information, including the presence of a disability that, given a second thought,
we might not have wanted to disclose.
▪ Additional potential risks for students with disabilities: Social networking
may further isolate those who may already feel isolated or not included
and can ultimately lead to depression and loneliness.
101