Page 24 - Computer Basics- Student Textbook
P. 24
Study Section 4: Computers and the Internet
4.1 Connect
You probably have heard of the Internet. In 1983 computer researchers began to assemble a
“network of networks” called the internet. Basically, they started connecting a bunch of computers
together so they could access information from one another. Then in 1990 a computer scientist
named Tim Berners-Lee invented the World Wide Web which gave connected computers addresses,
like street addresses in your neighborhood. Computers then could access any individual computer
within the network of computers and glean information. From there, a company could connect to this system of
networks and provide access to millions of computers to talk with one-another. The Internet is used for just about
any kind of communication between two parties, either via data, video, and sound. Today, the Internet continues
to grow, driven by ever greater amounts of online information, commerce, entertainment, and social networking.
The internet is a treasure trove of information when a student is researching information about a topic. In fact, it
will not be too long before libraries will become obsolete, since most media is now in digital format. Treasure your
books, because they may be valuable antiques someday!
Today we are going to learn about various ways computers can be connected to the internet to be able to access its
power.
4.2 Objectives
1. The student will be able to explain how to log off and shut down a computer to avoid damaging the
hard disks.
2. The student should be able to explain what the internet is and how a computer is connected to it
either by WIFI or cable connection
3. The student will learn how to setup and write and send emails to enhance communication.
4.3 Shutting Down the Computer
Logging Off vs. Shutting Down
To log off or shut down the computer, click the Start
button.
Logging off your computer and shutting down your
computer are two different things. Remember the
analogy of the car: Logging off a computer is like locking the car (the
computer is password-protected, and you can’t do anything). When you
first log in to a computer, it’s like using a key (password) to get in, and
when you are done using the computer, you need to log off (the
computer will remain on) to make sure no one can make changes while
you are away.
23