SlideShare una empresa de Scribd logo
1 de 27
Computer Operations
Work with computers
1.1 Start And Shutdown ,[object Object],[object Object],[object Object],[object Object],[object Object]
1.2 Interface ,[object Object],[object Object],[object Object],[object Object]
1.3 System Settings ,[object Object],[object Object],[object Object],[object Object]
1.4 Access The Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.5 Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information storage and retrieval
2.1 Manage files & folders
2.2 Organize and store Information
2.3 Storage Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety and Security
3.1 Work safely ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.2 Physical stress ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.3 Computer Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.4 Information security
Strong Password & Phishing
3.1 Information security ,[object Object],[object Object],[object Object],[object Object]
3.2 Guidelines: Copyright ,[object Object],[object Object],[object Object],[object Object],[object Object]
3.3 Guidelines: Netiquette ,[object Object],[object Object]
3.4 Online Communications ,[object Object],[object Object],[object Object],[object Object]
4.1 Maintenance of Computer  ,[object Object],[object Object],[object Object],[object Object]
4.2 Maintenance of Printer ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.3 Troubleshooting ,[object Object],[object Object],[object Object],[object Object]
4.4 Help ,[object Object],[object Object],[object Object]
5.1 Hardware ,[object Object],[object Object],[object Object]
5.2 Software ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Kara Milligan Device Classification
Kara Milligan Device ClassificationKara Milligan Device Classification
Kara Milligan Device Classification
bugred2
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
angbeelee
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
Albrecht Jones
 

La actualidad más candente (20)

Computer security
Computer securityComputer security
Computer security
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Kara Milligan Device Classification
Kara Milligan Device ClassificationKara Milligan Device Classification
Kara Milligan Device Classification
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Security and protection
Security and protectionSecurity and protection
Security and protection
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
185
185185
185
 

Similar a Computer Operations

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
aptexx
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
haimkarel
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 

Similar a Computer Operations (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
 
Computer security
Computer securityComputer security
Computer security
 
discovering computer chapter 1
discovering computer chapter 1discovering computer chapter 1
discovering computer chapter 1
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Comp2
Comp2Comp2
Comp2
 
Intro Ch 01 B
Intro Ch 01 BIntro Ch 01 B
Intro Ch 01 B
 

Más de thinkict

Photostory
PhotostoryPhotostory
Photostory
thinkict
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
thinkict
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
thinkict
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
thinkict
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
thinkict
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
thinkict
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
thinkict
 
Text Writer
Text WriterText Writer
Text Writer
thinkict
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
thinkict
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
thinkict
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
thinkict
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
thinkict
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
thinkict
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
thinkict
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
thinkict
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
thinkict
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
thinkict
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
thinkict
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
thinkict
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
thinkict
 

Más de thinkict (20)

Photostory
PhotostoryPhotostory
Photostory
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
 
Text Writer
Text WriterText Writer
Text Writer
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Último (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Computer Operations

Notas del editor

  1. Course Overview Intro:Livebinder,Multiurl
  2. First Demo one item then learner hands on, then demo next Also explain Log Out Shut Down Menu Non-routine Start-up Standby Quick quiz of terminology
  3. First Demo one item then learner hands on, then demo next: (may be done simultaneously) Also explain: Dialog Box Submenu Icon & Buttons Scrollbar Drag And Drop Zoom, Minimize & Maximize Wizards Shortcuts Help Quick raise-your-hand quiz of features
  4. First Demo one item then learner hands on, then demo next: Also explain: Multiple Monitors Accessibility Settings Shortcuts
  5. Explain features and requirements: Pros / cons Cost, Speed, Connectivity: always on / connect, Stability, Cable/ wireless
  6. Explain IT System Computer (PC Or Laptop) Input Device (Keyboard, Mouse Or Other Pointing Device) Processor Output Device (Screen, Printer) Storage Media (Memory, Disk, CD, DVD, Data/Memory Stick, Hard Drive, Network Drive) Distribute “ Cool PC Lingo” page-2 “PC Just the steps for Dummies” Cheatsheet_Laptop
  7. First Demo one item then learner hands on, then demo next: Use the windows explorer and explain: 1. create, name, open, save, save as, print , close 2. move, copy, rename, share, delete, compress, extract files 3. display file lists, sort, search 4. properties, access control, size, file types First Demo one item then learner hands on, then demo next: create and name folders and subfolders: ICT Training - > PC Operations - > Material change default settings Quick recap
  8. First Demo one item then learner hands on, then demo next: Insert, remove, name, label, archive, share, permissions
  9. Explain features and requirements: (show physical demo if possible) Data storage Data recovery Quick quiz of terms and features randomly
  10. Discuss and explain: Extreme temperatures, Voltage problems, Hackers, Physical Theft, Virtual Theft Viruses, Worms, and Trojan Horses, Spyware, Internet Scams, Online Predators Human Error Hardware damage Health and safety issues: fire, voltage, overheating risks from hardware: shock, power leakage, manufacturer guidelines electrical connection risks and guidelines: shock, leakage, voltage fluctuation use and disposal of cleaning materials: what to use, what not, how to use, how not handling equipment: damage, temperatures, manufacturer guidelines Risks to self and others from using hardware: signals, radioactive, overexposure to light, sound risk assessment safe disposal of IT equipment and consumables: manufacturer guidelines
  11. Discuss and explain: adjust seating and lighting (give live demo personally) avoid hazards: standby, voltage, ups take breaks: after every 20mins – look 20feet away – 20eyeblinks (20-20-20) arrangement of hardware and cables: untangled, tagged, labeled wrist rests workspace working conditions Quiz: yes / no questions
  12. Virus has received fame after 3 Idiots Viru Shahastrabuddhe Discuss and explain: What are the d angers involved and How to minimize risk Explain: Virus-checking software (give examples) Treat files, software and attachments from unknown sources with caution anti-spam software (give examples) Firewall
  13. Discuss and explain: avoid inappropriate disclosure of information: logout, shared computers, online forms Tips: Installing computers in secure locations, Controlling operating environment Surge protection and line conditioning, Uninterruptible Power Supply (UPS) Data Storage in Safe Locations, Virus and Spyware Protection
  14. Discuss and explain: Plagiarism Inappropriate-use and piracy: Music, Software, Logo Unauthorized access Legal use Using copyrighted material for educational purposes Sharing links instead of downloaded material Using copyrighted material with the copyright owner's permission
  15. Discuss and explain: Do's and Don’ts Email and Instant messaging: include a descriptive subject line, Keep it short spelling and grammar mistakes excessive formatting excessive punctuation CAPITAL LETTERS emoticons like: :-) = happy :-( = sad ;-) = wink :-o = shocked
  16. Discuss and explain: Protect personal information avoid misuse of images use appropriate language respect confidentiality
  17. Discuss and explain: Manufacturer’s guidelines what maintenance can be done safely; what should be left to experts what problems may happen if maintenance is not done what non-routine maintenance may be needed what maintenance should be carried out by specialist technicians First Demo one item then learner hands on, then demo next: disk cleanup wizard, scheduled tasks, temporary files, cache Cleaning – different components to maintain functionality and appearance.
  18. First Demo one item then learner hands on, then demo next: replace printer consumables (paper, toner, cartridge) print test page align cartridge Distribute “WindowsGuidePrint”
  19. First Demo one item then learner hands on, then demo next: (Inquiry, need-based) Task manager Trouble shooter tool Device manager Discuss and explain: Inquire and identify needs and solve them along with these: Program not responding error dialogue storage full paper jam virus threat lost network connections memory low driver missing Plug-in not installed monitor does not display correct colors mouse does not respond to movement keyboard error
  20. Discuss and explain: help menus manufacturer’s guidelines how to follow advice where to get advice to deal with different hardware and software problems
  21. Discuss and explain: Demo how to install: (physical connection and software) keyboard, mouse, speaker, printer, pen-drive, camera
  22. First Demo one item then learner hands on, then demo next: