Technology · 1st ESO · Colegio Reina Sofía · Totana

Hardware, Software
& Cybersecurity

Visual revision of the last two units. Read, practise and test what you know. 🚀

⚙️ Unit 7 · Hardware & Software
🌐 Unit 8 · The Internet & Cybersecurity
⚙️

Unit 7 · Hardware & Software

The physical components of a computer and the programs that make it work.

1. What is hardware? 2. Parts of a computer 3. What is software? 4. Working with Windows 5. What is Linux? 6. Mobile OS 7. Installing programs
1

What is hardware?

🔧

HARDWARE

The physical components of a computer — everything you can touch, such as the processor, memory cards, keyboard and monitor.

💡 Remember Computers are classified into three categories based on their specs: low-end (4 GB RAM, 1 TB HDD), mid-range (8 GB RAM, 2 TB HDD) and high-end (+16 GB RAM, 500 GB SSD).
⚠️ Be aware Some apps and online services have age restrictions. Before signing up, look for information or ask a trusted adult.
2

The parts of a computer

CPU / Processor

The "brain" of the computer. Executes instructions at millions of operations per second. Measured in GHz.

Motherboard

The main component that connects everything together. Has slots for RAM, graphics cards and other components.

RAM

Fast-access memory. Stores data temporarily while the computer is on. Measured in GB.

Hard Drive / SSD

Stores data permanently. SSDs are much faster than traditional HDDs.

GPU / Graphics card

Processes images and video. Essential for gaming and design. Can be integrated or dedicated.

Power Supply

Converts mains electricity (AC) into the direct current (DC) that internal components need.

The best-known processor brands are Intel and AMD.

🔢 Cores & Threads Modern processors have multiple cores. More cores = more tasks at once. Threads let each core handle more than one task at the same time.

🔌 Key ports and connectors on the motherboard

🔵 USB
🟡 RJ-45 (network)
🟢 HDMI / DisplayPort
🔴 PCI Express
⚪ SATA (drives)
🟠 M.2 (fast SSD)
3

What is software?

💻

SOFTWARE

The programs and instructions that tell the hardware what to do. Without software, a computer cannot function.

Type of software What is it? Examples
Operating system Controls the hardware and lets you run other programs. Windows, macOS, Linux, Android, iOS
Application software Programs designed for specific user tasks. Word, Chrome, Spotify, Minecraft
Free / open-source You can use, modify and share it for free. Linux, LibreOffice, VLC
Proprietary You need to pay or get permission to use it. Windows, Microsoft Office, Photoshop
Freeware Free to use but you cannot modify it. Zoom (basic), Skype
4

Working with Windows

Windows is the most widely used PC operating system in the world. It has a graphical interface with a desktop, icons and windows.

Desktop

The main screen with icons and shortcuts to your programs.

Taskbar

At the bottom of the screen. Shows open programs and the Start menu.

File Explorer

The file and folder manager of the system.

Control Panel / Settings

To configure the system: updates, users, network, etc.

⌨️ Useful keyboard shortcuts Ctrl+C copy · Ctrl+V paste · Ctrl+Z undo · Win+D show desktop · Alt+F4 close window
5

What is Linux?

🐧

Linux / GNU·Linux

A free and open-source operating system. Anyone can use, improve and share it freely. There are many versions (Ubuntu, Debian, Fedora...). It's also used on servers and supercomputers.

When you start Linux, the first thing you see is the desktop. The launcher bar gives quick access to applications. You can even run it from a USB stick without installing it (LiveCD).

6

Operating systems for smartphones and tablets

System Company App store Open source?
iOS Apple (iPhone, iPad) App Store No
Android Google (based on Linux) Google Play Yes
📱 Smartphones have sensors that PCs don't Gyroscope, accelerometer, GPS, front and rear cameras, proximity sensor, fingerprint reader, NFC…
7

Installing programs

1

Search for the app in an official store (App Store, Google Play, Microsoft Store) or on the developer's official website.

2

Download the installer. Always check that the source is trustworthy before running it.

3

Run the installer and follow the steps. Read the permissions the app asks for carefully.

4

The app will appear on your desktop or menu. Keep it updated to get the latest security patches.

⚠️ Never download programs from unknown websites They may contain viruses or malware that can damage your computer or steal your data.
🌍

Emerging Technologies & Sustainability: Recycle your e-waste

When an electrical or electronic device stops working, it becomes electronic waste (e-waste / WEEE).

🚨 Alarming facts The world generates around 50 million tonnes of e-waste every year. Only 17.4% is properly recycled. Toxic metals in e-waste are harmful to health, especially for children and pregnant women.
1

Collection and storage — safe gathering of electronic waste.

2

Transport — taking it to a specialist recycling facility.

3

Processing — separating valuable metals and recyclable materials.

✅ What can you do? Take old devices to recycling centres or shops that collect them. Many supermarkets and electronics stores have dedicated collection bins.

🖥️ Practical Activities · Unit 7

🔍

Compare computers online
Visit an online shop (Amazon, Currys, etc.). Find two computers from different categories. Note and compare: processor, RAM, storage and price. Which would you buy and why?

💻

Explore your device
On the iPad or classroom PC, find out how much RAM it has, what processor it uses and how much free storage is left.

📊

Component map
Draw a diagram of a motherboard and label where these go: CPU, RAM, GPU, SSD and connectors. You can use Google Slides or paper.

♻️

Find your nearest recycling point
Use Google Maps to find the nearest electronics recycling centre to your home. How long does it take to get there from school?

🎤

Computer architecture presentation
Prepare a Google Slides presentation covering at least 5 hardware components. For each one include: a photo, its function and when you would need to upgrade it.

📝 Quiz · Unit 7 — Hardware & Software

1. What is computer hardware?

A
The programs that control the computer.
B
The physical components you can touch.
C
The installed operating system.
D
The internet connection.

2. Which of these is NOT a component found on the motherboard?

A
USB port
B
CPU socket
C
OLED display
D
SATA connector

3. Linux is an operating system that is...

A
Proprietary and paid.
B
Only for smartphones.
C
Free, open-source and modifiable.
D
Exclusive to Apple devices.

4. What type of software is Microsoft Windows?

A
Free software
B
Freeware
C
Proprietary software
D
Public domain software

5. The official store for installing apps on Android is called:

A
App Store
B
Google Play
C
Microsoft Store
D
Steam
🌐

Unit 8 · The Internet & Cybersecurity

Networks, browsing, finding information and how to stay safe in the digital world.

1. Communication systems 2. Computer networks 3. The Internet 4. Browsing the web 5. Finding information 6. Publishing online 7. Images & the Internet 8. Netiquette 9. Internet safety
1

What is a communication system?

📡

COMMUNICATION SYSTEM

A set of actions and devices that allow two or more people to connect and communicate with each other.

Every communication system has four elements:

Interlocutors

The people (or machines) taking part in the communication.

Messages

The content being communicated (text, image, audio, video…)

Medium / Channel

The tool used to communicate (phone, Wi-Fi, cable…)

Code

The system of signs used to understand each other (language, protocol…)

2

Components of a computer network

🖧

COMPUTER NETWORK

A set of two or more interconnected computers that can share resources (files, printers, internet…). When there is a central computer managing the network, it is called a server.

📐 Network topologies (ways to connect)

⭐ Star
⭕ Ring
〰️ Bus
🔗 Double ring
🕸️ Mesh
🔀 Mixed
🏫 At school Your school's network connects the classroom computers to each other and to the server. That's how you can access Google Drive, print to the shared printer and browse the internet. At home, your Wi-Fi router does the same job.
3

The Internet

🌍

THE INTERNET

The network of networks. A global infrastructure that connects millions of networks and computers worldwide using common protocols (such as TCP/IP).

WWW (World Wide Web)

The web-page service that runs on top of the Internet. It is NOT the same as the Internet itself.

Email

A service to send and receive messages. Uses protocols such as SMTP and IMAP.

Cloud

Storage and services on remote servers that you access over the internet (Google Drive, OneDrive…).

Streaming

Watching or listening to content in real time without downloading it (YouTube, Spotify, Netflix…).

4

Browsing the web

Browser

A program for viewing web pages: Chrome, Firefox, Safari, Edge…

URL

The unique address of a web page. E.g. https://www.google.com

HTTP / HTTPS

Web communication protocol. HTTPS is the secure (encrypted) version. Look for the 🔒 padlock icon.

Domain

The name of a website. E.g. google.com.uk domains are British.

Cookies

Small files that websites save in your browser to remember you and your preferences.

Browser history

A record of the pages you have visited. You can clear it for more privacy.

🔒 Always check for HTTPS Before entering personal data or passwords on a website, make sure the URL starts with https:// and that there is a padlock icon.
5

Finding information on the Internet

🔍

SEARCH ENGINE

A website with a database of millions of pages. You type keywords and it shows results ranked by relevance. The most widely used is Google.

🎯 Tips for better Google searches

1

Use specific keywords. Avoid articles and prepositions. E.g. "France capital" instead of "What is the capital of France?"

2

Use quotation marks for an exact phrase: "climate change"

3

Use Google's Advanced Search to filter by date, language or file type.

4

Cross-check information across multiple sources. Don't rely on only the first result.

🚨 Watch out for fake news! Not everything on the internet is true. Before sharing something, check whether the source is reliable and whether other reputable outlets confirm it.
6

Publishing on the Internet (CMS)

A CMS (Content Management System) is a tool that lets you create and manage content on the internet without knowing how to code.

WordPress

The world's most popular CMS. Used for blogs and full websites.

Blogger

By Google. Free and simple for creating blogs.

Joomla / Prestashop

For more complex websites or online shops.

© Content licences Before publishing other people's images or text, check what licence they have: Attribution (credit the author) · Non-commercial · No derivatives · Share alike. Copy-pasting without permission is illegal!
7

The use of images on the Internet

Licence type Can I use it? Conditions
Copyright Not without permission Only with the author's authorisation
Creative Commons Yes (with conditions) Depends on the type (CC-BY, CC-NC…)
Public domain Yes, freely No restrictions at all
🖼️ Where to find free images Unsplash, Pixabay, Freepik (with attribution), Google Images (filter by licence).
8

Netiquette: good manners on the Internet

🤝

NETIQUETTE

A set of rules for polite and respectful behaviour on the internet and in digital communications.

✅ Good practice

Greet people, use respectful language, don't write in ALL CAPS (= shouting), cite your sources.

❌ Bad practice

Insulting, spamming, sharing private content without permission, impersonating others.

📩 Email tips Use CC for visible copies and BCC for hidden copies. The subject line should be clear. Mind your tone: email is more formal than WhatsApp.
9

Using the Internet safely 🔒

There are three types of security problems on the Internet:

1

Computer security — Protecting systems and networks from attacks and data theft.

2

Information security — Preventing unauthorised people from accessing, revealing or deleting data.

3

Personal security — Protecting ourselves as users: personal data, passwords, online activity.

🛡️ 5 rules to protect yourself online

1. Configure your devices

Use antivirus software, keep the OS updated, create separate user accounts.

2. Secure connections

Protect your Wi-Fi with a strong password. Avoid public networks for sensitive tasks.

3. Protect your information

Set privacy settings on social media. Back up your data regularly.

4. Strong passwords

Use a different password for each service. Make it long and include symbols.

5. Use common sense

Don't share personal data with strangers. Be suspicious of offers that seem too good to be true.

☠️ The most common online threats

Threat What does it do? How to prevent it?
Virus / Malware Installs itself without permission and damages the system or steals data. Updated antivirus, don't download from suspicious sources.
Phishing A fake email or website pretending to be a real company to steal your credentials. Always verify the sender and URL. Never give passwords by email.
Ransomware Encrypts your files and demands a ransom payment to get them back. Regular backups, don't open unknown files or attachments.
Keylogger Records everything you type on the keyboard, including passwords. Antivirus software, avoid public computers for sensitive data.
Botnet Uses your computer as a "zombie" to attack other networks. Keep your OS updated and use a reliable antivirus.
🚨 If you are a victim of a cyberattack You can report it or seek help from your country's cybersecurity agency. In Spain: OSI (osi.es) and INCIBE (incibe.es), or call 017 — the helpline for cybersecurity issues involving minors.

🌐 Practical Activities · Unit 8

🔐

Create a strong password
Think of a password of at least 12 characters with uppercase letters, numbers and symbols. Test it at howsecureismypassword.net. How long would it take to crack?

🔍

Advanced Google search
Search for information on "renewable energy" using Google Advanced Search. Try all four filters: "all words", "exact phrase", "any of the words" and "none of the words". Compare the results.

📰

Spot a fake news story
Find a striking headline online. Check it against at least 2 reliable sources. Is it true or false? Present your findings to the class.

🌐

Create a blog post
Using Blogger or WordPress, write a blog entry about a technology topic you find interesting. Add text, a free-licence image and at least one external link.

🛡️

Design a cybersecurity poster
Using Canva or Google Slides, create a poster with the 5 rules for staying safe online. Use icons and make it eye-catching. It will be displayed in the school corridor!

🕵️

Identify a phishing email
Open the example phishing email your teacher provides. Identify at least 3 clues that reveal it is fake. Write your findings in your notebook.

📝 Quiz · Unit 8 — The Internet & Cybersecurity

1. What is the Internet?

A
An email program.
B
A global network that connects millions of networks together.
C
The same thing as the World Wide Web.
D
A server operating system.

2. What does the 🔒 padlock in the browser bar indicate?

A
The site is an official government website.
B
You need a password to enter.
C
The connection is encrypted (HTTPS).
D
The website uses no cookies.

3. Phishing is...

A
A virus that destroys files on your hard drive.
B
A scam that steals passwords by pretending to be a real company.
C
A harmless type of advertising spam.
D
A password management program.

4. A CMS (Content Management System) allows you to...

A
Protect your computer from viruses.
B
Speed up your internet connection.
C
Create and manage web content without coding.
D
Send encrypted emails.

5. What should you do BEFORE publishing someone else's image on your blog?

A
Nothing — if it's on Google you can use it freely.
B
Only ask permission if the author is famous.
C
Check its licence and credit the author if required.
D
Rename the file so it won't be recognised.

6. Ransomware...

A
Records everything you type on the keyboard.
B
Uses your computer to attack other people.
C
Encrypts your files and demands money to return them.
D
Steals passwords by pretending to be a real company.
🌍

Emerging Technologies · Good practice in cybersecurity

With the rise of cyberattacks, cybersecurity is one of the most in-demand career fields. Here are some essential best practices:

Use a password manager (Bitwarden, 1Password) so you never reuse passwords.

Enable two-factor authentication (2FA) on your most important accounts.

Keep your operating system and apps updated: updates fix security vulnerabilities.

Make regular backups to the cloud or an external drive.

If something online seems too good to be true, it probably is.