Complete Computer Training Course – Master Class

About Course

Complete Computer Training Course – Master Class

Introduction

What is a Computer?

A computer is an electronic device that processes data and performs tasks according to a set of instructions called a program. It can store, retrieve, and process data, making it a versatile tool for various applications.

Key Components of a Computer:

1. Central Processing Unit (CPU): Often referred to as the brain of the computer, the CPU performs calculations and executes instructions.

2. Memory (RAM): Random Access Memory (RAM) is used to temporarily store data that the CPU is actively using or processing.

3. Storage: This is where data is permanently stored. It includes hard drives, solid-state drives, and other storage devices.

4. Motherboard: The main circuit board that connects all the components of the computer, allowing them to communicate.

5. Input Devices: Devices such as keyboards and mice that allow users to input data into the computer.

6. Output Devices: Devices like monitors and printers that display or produce results from the computer’s processing.

7. Software: The programs, applications, and operating systems that provide instructions for the computer to follow.

8. Peripheral Devices: Additional devices connected to the computer, such as printers, scanners, and external storage.

Types of Computers:

1. Personal Computers (PCs): These are computers designed for individual use. Desktops, laptops, and workstations fall into this category.

2. Servers: Powerful computers designed to manage network resources and provide services to other computers (clients) on the network.

3. Mainframes: Large, powerful computers used by organizations for handling extensive data processing tasks.

4. Supercomputers: Extremely powerful computers designed for tasks that require massive amounts of calculations, such as scientific simulations and weather modelling.

Basic Operations:

1. Input: Users provide data to the computer through input devices.

2. Processing: The CPU performs calculations and executes instructions, manipulating the input data.

3. Storage: Data is stored in various types of memory and storage devices.

4. Output: Results are displayed or produced through output devices.

5. Control: The computer follows a set of instructions, or a program, to perform specific tasks.

Evolution of Computers:

Computers have evolved from large mainframes to powerful personal computers and portable devices. Advancements in technology have led to increased processing power, storage capacity, and accessibility.

In summary, computers are integral to modern life, playing a crucial role in various fields such as business, education, science, and entertainment. They come in different forms and sizes, each designed to cater to specific needs and applications.

Show More

What Will You Learn?

  • Computers have evolved from large mainframes to powerful personal computers and portable devices. Advancements in technology have led to increased processing power, storage capacity, and accessibility.
  • In this course created alongside with useful activities and real-world examples to help you put what you learn to use.
  • What you will Learn;
  • What is a computer
  • Buttons and Ports on a Computer
  • Insite a Computer
  • Getting to Know Laptop Computer
  • Understanding Operating Systems
  • Understanding Applications
  • Setting up a Desktop Computer
  • Windows Basics: Getting Started with the Desktop
  • Mac OS X Basics: Getting Started with the Desktop
  • Connecting to the Internet
  • What is the Cloud
  • Cleaning Your Computer
  • Protecting Your Computer
  • Browser Basics
  • Intermet Safety: Your Browser's Security Features
  • Understanding Spam and Phishing
  • Understanding Digital Tracking
  • Understanding App Permissions
  • Facebook: Understanding Privacy
  • Creating a Safe Workspace
  • Basic Parts of a Computer
  • Keyboard Shortcuts
  • Zoom Fatigue
  • How to Print from Your Computer
  • Take a Screenshot on Your Computer
  • How to Type Faster
  • Microsoft Word Basics
  • Microsoft Excel Basics
  • Microsoft PowerPoint Basics
  • BONUS RESOURCES (PDFs and eBooks)

Course Content

Introduction To Computer
Introduction To Computer Computer Science is the study of how computers and computer systems work, and how they are designed and programmed. It involves the understanding of algorithms and data structures, as well as the development of software and hardware. Computer Science also covers topics such as artificial intelligence, computer graphics, network administration, databases, and computer security. Computer Science is an ever-evolving field that is essential to the development of our modern world. It is used in almost every area of our lives, from the internet, to mobile phones, to business and government systems.

  • 02:39
  • Type of Computers
    04:22
  • Basic Parts of a Computer
    02:42
  • Buttons and Ports on a Computer
    02:20
  • Assignments: Answer All questions and submit them on the platform

Computer System
Computer System A computer system is a combination of hardware and software components that work together to perform tasks. The hardware components typically include; the processor, memory, storage devices, input/output devices, and networking components. The software components include operating systems, applications, and utilities. Computer systems are used in a variety of applications, including business, gaming, education, and entertainment.

Setting up a Computer
Setting up a Computer 1. Unpack the computer and all of the components. 2. Connect the power cable to the power supply and then to the wall outlet. 3. Connect the monitor to the power supply and then to the computer. 4. Connect the keyboard and mouse to the appropriate ports on the back of the computer. 5. Connect the network cable to the computer if applicable. 6. Connect the speakers or headphones to the appropriate ports on the back of the computer. 7. Turn on the computer and monitor. 8. Install the operating system and any necessary drivers. 9. Install any additional software or applications. 10. Configure any security settings or user accounts.

Cleaning and Protecting your Computer
Cleaning and Protecting your Computer 1. Run antivirus scans regularly: Make sure you routinely scan your computer for viruses and malware. This will help keep your system safe from any malicious software. 2. Install updates and patches: Keeping your operating system and other software up to date will help protect your computer from the latest threats. 3. Use a secure web browser: Using a secure web browser such as Google Chrome or Firefox will help protect your data from malicious websites. 4. Use strong passwords: Use strong, unique passwords for all of your accounts. This will help protect your data from being accessed by hackers. 5. Back up your data: Backing up your data regularly will help protect you from losing any important information if something goes wrong with your computer. 6. Use a secure internet connection: Make sure you are using a secure internet connection whenever you are online. This will help protect your data from being intercepted by hackers.

The Internet and The Cloud
The Internet and The Cloud The Internet and the cloud are often used interchangeably, but they are two different concepts. The Internet is a global network of computers, servers, and other devices that are connected together and share information, while the cloud is a virtual network of servers and applications used to store and access data and services over the Internet. The cloud is made up of a network of computers, storage devices, and applications used to store and access data and applications remotely. The Internet is the physical network of wires and cables that connect computers and devices, while the cloud is a virtual platform that allows users to access data and applications from anywhere in the world.

The Internet Browser
The Internet Browser An Internet browser is a software application used to locate, retrieve, and display content on the World Wide Web. It can be used to access websites, as well as other content such as videos, music, and games. Internet browsers allow users to navigate the web by entering URLs, navigating to a link, or using a search engine. Common browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari.

Understanding Digital Tracking and APP Permissions
Understanding Digital Tracking and APP Permissions Digital tracking is the process of monitoring a user’s online activity, such as the websites they visit, the content they view or interact with, and the online purchases they make. It is done primarily for the purpose of gathering data about users so that it can be used to target advertising, improve website performance, and better understand user behavior. APP permissions are the set of rules that govern how an app can access and use a user’s data. These rules can include access to a user’s location, contacts, camera, microphone, and other data. Users must agree to these permissions before they can install and use the app. It is important for users to understand what they are agreeing to when they give an app permission to access their data, as this can have a significant impact on their privacy.

Social Media
Social Media Social media will be a great tool for marketing. It can be used to create content that is engaging and shareable, which can lead to increased brand awareness and more customers e.g. Facebook. Additionally, it can be used to build relationships with customers and provide customer service. Social media can also be used to create an online community and drive conversations around a brand. Additionally, it can be used to track and measure the success of campaigns, as well as to gain insights into customer behavior. Finally, it can be used to stay up to date with trends in the industry and to gain a better understanding of customer needs and preferences.

Creating a Safe Workspace and Zoom Fatigue
Creating a Safe Workspace and Zoom Fatigue Creating a Safe Workspace Creating a safe workspace involves a few steps. First, establish a clear set of safety protocols and rules that all employees must follow. This should include rules related to the proper use of safety equipment and clothing, as well as guidelines for handling hazardous materials safely. Ensure that the protocols are enforced consistently to maintain a safe environment. Next, regularly check the workspace for hazards, such as damaged equipment or slippery surfaces. Identify any potential hazards and take steps to address them immediately. Also, provide adequate safety training and education for all employees. This should include topics such as how to properly handle materials, how to operate equipment safely, and how to respond to emergencies. Finally, keep the workspace well-maintained and organized. This will help to reduce the potential for accidents and injuries. By following these steps, you can create a safe workspace for all your employees. Zoom Fatigue 1. Set boundaries: Establish clear expectations for when and how often people should be available for work-related tasks and meetings. Communicate and respect these boundaries. 2. Limit Zoom meetings: Avoid having too many Zoom meetings in a day. If possible, try to have meetings in person or over the phone instead. 3. Schedule breaks: Schedule regular breaks throughout the day to give people a chance to step away from their screens and take some time for themselves. 4. Reduce multitasking: Encourage people to focus on one task at a time and limit multitasking. 5. Prioritize self-care: Make sure people are taking care of themselves by getting enough sleep, eating well, and exercising regularly. 6. Encourage social interactions: Make time for social conversations and activities during the workday to help people stay connected and engaged.

How to Print and How to Take Screenshots on Your Computer
How to Print and How to Take Screenshots on Your Computer Printing 1. Open the document or image you want to print. 2. Click on the “File” menu and select “Print”. 3. Select the printer you want to use and adjust any print options as needed. 4. Click “Print”. Taking Screenshots 1. Press the “Print Screen” or “PrtScn” key on your keyboard. 2. Open an image editing program, such as Microsoft Paint or Photoshop. 3. Press “Ctrl” + “V” to paste the screenshot into the program. 4. Crop the screenshot as desired. 5. Save the screenshot as an image file, such as a .jpg or .png.

Computer Short-Cuts and Typing Skills
Computer Short-Cuts and Typing Skills Shortcuts 1. Copy (Ctrl + C): Copies the selected text or item. 2. Cut (Ctrl + X): Cuts the selected text or item. 3. Paste (Ctrl + V): Pastes the copied or cut text or item. 4. Undo (Ctrl + Z): Undoes the last action. 5. Redo (Ctrl + Y): Redoes the last action that was undone. Placing Your Hands on The Keyboard When typing on a keyboard, your hands should be placed in a comfortable position. Generally, the index fingers should be placed on the F and J keys, as these keys have raised dots that act as a home-base for the hands. The thumbs should rest on the space bar. The other fingers should be placed lightly on the other keys. The wrists should be slightly bent to avoid any strain on the hands.

Bonus Lessons: Microsoft Office
Microsoft Office Microsoft Office is a suite of productivity software created and developed by Microsoft. It includes a range of applications, such as Word, Excel, PowerPoint, Access, Outlook, OneNote, Publisher, and Skype for Business. It is available in both a desktop and mobile version, allowing users to access their documents and work from anywhere. Microsoft Office is used by many businesses and individuals for creating, editing, and managing documents, spreadsheets, presentations, and more.

Final Quiz
Answer All questions.

Certificate of Completion/Achievement

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?