Auxiliar de Laboratório - 3 conhecimentos de informatica

Page 1

CONHECIMENTOS DE INFORMÁTICA



CONHECIMENTOS DE INFORMร TICA CONHECIMENTOS DE INFORMร TICA CONCEITOS Bร SICOS DO HARDWARE E PERIFร RICOS DE UM MICROCOMPUTADOR

HISTร RICO Os primeiros computadores construรญdos pelo homem foram idealizados como mรกquinas para processar nรบmeros (o que conhecePRV KRMH FRPR FDOFXODGRUDV SRUpP WXGR HUD IHLWR ยฟVLFDPHQWH Existia ainda um problema, porque as mรกquinas processavam os nรบmeros, faziam operaรงรตes aritmรฉticas, mas depois nรฃo sabiam o que fazer com o resultado, ou seja, eram simplesmente mรกquinas de calcular, nรฃo recebiam instruรงรตes diferentes e nem possuรญam XPD PHPyULD $Wp HQWmR RV FRPSXWDGRUHV HUDP XWLOL]DGRV SDUD SRXTXtVVLPDV IXQo}HV FRPR FDOFXODU LPSRVWRV H RXWUDV RSHUDo}HV 2V FRPSXWDGRUHV GH XVR PDLV DEUDQJHQWH DSDUHFHUDP ORJR GHSRLV GD 6HJXQGD *XHUUD 0XQGLDO 2V (8$ GHVHQYROYHUDP ส VHFUHWDPHQWH GXUDQWH R SHUtRGR ส R SULPHLUR JUDQGH FRPSXWDGRU TXH FDOFXODYD WUDMHWyULDV EDOtVWLFDV $ SDUWLU GDt R FRPSXWDGRU FRPHoRX D HYROXLU QXP ULWPR FDGD YH] PDLV DFHOHUDGR DWp FKHJDU DRV GLDV GH KRMH Cรณdigo Binรกrio, Bit e Byte O sistema binรกrio (ou cรณdigo binรกrio) รฉ uma representaรงรฃo numรฉrica na qual qualquer unidade pode ser demonstrada usando-se DSHQDV GRLV GtJLWRV H (VWD p D ~QLFD OLQJXDJHP TXH RV FRPSXWDGRUHV HQWHQGHP Cada um dos dรญgitos utilizados no sistema binรกrio รฉ chamado de Binary Digit (Bit), em portuguรชs, dรญgito binรกrio e representa a PHQRU XQLGDGH GH LQIRUPDomR GR FRPSXWDGRU 2V FRPSXWDGRUHV JHUDOPHQWH RSHUDP FRP JUXSRV GH ELWV 8P JUXSR GH RLWR ELWV p GHQRPLQDGR %\WH (VWH SRGH VHU XVDGR QD UHSUHVHQWDomR GH FDUDFWHUHV FRPR XPD OHWUD $ = XP Q~PHUR RX RXWUR VtPEROR TXDOTXHU " # HQWUH RXWURV $VVLP FRPR SRGHPRV PHGLU GLVWkQFLDV TXLORV WDPDQKRV HWF WDPEpP SRGHPRV PHGLU R WDPDQKR GDV LQIRUPDo}HV H D YHORFLGDGH GH SURFHVVDPHQWR GRV FRPSXWDGRUHV $ PHGLGD SDGUmR XWLOL]DGD p R E\WH H VHXV P~OWLSORV FRQIRUPH GHPRQVWUDPRV QD WDEHOD abaixo:

MAINFRAMES 2V FRPSXWDGRUHV SRGHP VHU FODVVLยฟFDGRV SHOR SRUWH %DVLFDPHQWH H[LVWHP RV GH JUDQGH SRUWH ส PDLQIUDPHV ส H RV GH SHTXHQR SRUWH ส PLFURFRPSXWDGRUHV ส VHQGR HVWHV ~OWLPRV GLYLGLGRV HP GXDV FDWHJRULDV GHVNWRSV RX WRUUHV H SRUWiWHLV QRWHERRNV ODSWRSV KDQGKHOGV H VPDUWSKRQHV &RQFHLWXDOPHQWH WRGRV HOHV UHDOL]DP IXQo}HV LQWHUQDV LGrQWLFDV PDV HP HVFDODV GLIHUHQWHV Os mainframes se destacam por ter alto poder de processamento, muita capacidade de memรณria e por controlar atividades com JUDQGH YROXPH GH GDGRV 6HX FXVWR p EDVWDQWH HOHYDGR 6mR HQFRQWUDGRV JHUDOPHQWH HP EDQFRV JUDQGHV HPSUHVDV H FHQWURV GH SHVTXLVD

Didatismo e Conhecimento

1


CONHECIMENTOS DE INFORMÁTICA CLASSIFICAÇÃO DOS COMPUTADORES $ FODVVL¿FDomR GH XP FRPSXWDGRU SRGH VHU IHLWD GH GLYHUVDV PDQHLUDV 3RGHP VHU DYDOLDGRV x Capacidade de processamento; x Velocidade de processamento; x Capacidade de armazenamento das informações; x 6R¿VWLFDomR GR VRIWZDUH GLVSRQtYHO H FRPSDWLELOLGDGH x 7DPDQKR GD PHPyULD H WLSR GH &38 &HQWUDO 3URFHVVLQJ 8QL 8QLGDGH &HQWUDO GH 3URFHVVDPHQWR TIPOS DE MICROCOMPUTADORES 2V PLFURFRPSXWDGRUHV DWHQGHP D XPD LQ¿QLGDGH GH DSOLFDo}HV 6mR GLYLGLGRV HP GXDV SODWDIRUPDV 3& FRPSXWDGRUHV SHVVRDLV H 0DFLQWRVK $SSOH 2V GRLV SDGU}HV WrP GLYHUVRV PRGHORV FRQ¿JXUDo}HV H RSFLRQDLV $OpP GLVVR SRGHPRV GLYLGLU RV PLFURFRPSXWDGRUHV HP GHVNWRSV TXH VmR RV FRPSXWDGRUHV GH PHVD FRP XPD WRUUH WHFODGR PRXVH H PRQLWRU H SRUWiWHLV TXH SRGHP VHU OHYDGRV D TXDOTXHU OXJDU DESKTOPS 6mR RV FRPSXWDGRUHV PDLV FRPXQV *HUDOPHQWH GLVS}HP GH WHFODGR PRXVH PRQLWRU H JDELQHWH VHSDUDGRV ¿VLFDPHQWH H QmR VmR PRYLGRV GH OXJDU IUHTXHQWHPHQWH XPD YH] TXH WrP WRGRV RV FRPSRQHQWHV OLJDGRV SRU FDERV São compostos por: x Monitor (vídeo) x Teclado x Mouse x *DELQHWH 3ODFD PmH &38 SURFHVVDGRU PHPyULDV GULYHV GLVFR UtJLGR +' PRGHP SRUWDV 86% HWF PORTÁTEIS 2V FRPSXWDGRUHV SRUWiWHLV SRVVXHP WRGDV DV SDUWHV LQWHJUDGDV QXP Vy FRQMXQWR 0RXVH WHFODGR PRQLWRU H JDELQHWH HP XPD ~QLFD SHoD 2V FRPSXWDGRUHV SRUWiWHLV FRPHoDUDP D DSDUHFHU QR LQtFLR GRV DQRV QRV (VWDGRV 8QLGRV H KRMH SRGHP VHU HQFRQWUDGRV QRV PDLV GLIHUHQWHV IRUPDWRV H WDPDQKRV GHVWLQDGRV D GLIHUHQWHV WLSRV GH RSHUDo}HV LAPTOPS 7DPEpP FKDPDGRV GH QRWHERRNV VmR FRPSXWDGRUHV SRUWiWHLV OHYHV H SURGX]LGRV SDUD VHUHP WUDQVSRUWDGRV IDFLOPHQWH 2V ODStops possuem tela, geralmente de Liquid Crystal Display (LCD), teclado, mouse (touchpad), disco rígido, drive de CD/DVD e portas GH FRQH[mR 6HX QRPH YHP GD MXQomR GDV SDODYUDV HP LQJOrV ODS FROR H WRS HP FLPD VLJQL¿FDQGR ³FRPSXWDGRU TXH FDEH QR FROR GH TXDOTXHU SHVVRD´ NETBOOKS 6mR FRPSXWDGRUHV SRUWiWHLV PXLWR SDUHFLGRV FRP R QRWHERRN SRUpP HP WDPDQKR UHGX]LGR PDLV OHYHV PDLV EDUDWRV H QmR SRVVXHP GULYHV GH &' '9' PDA e D DEUHYLDomR GR LQJOrV 3HUVRQDO 'LJLWDO $VVLVWDQW H WDPEpP VmR FRQKHFLGRV FRPR SDOPWRSV 6mR FRPSXWDGRUHV SHTXHQRV H JHUDOPHQWH QmR SRVVXHP WHFODGR 3DUD D HQWUDGD GH GDGRV VXD WHOD p VHQVtYHO DR WRTXH e XP DVVLVWHQWH SHVVRDO FRP ERD TXDQWLGDGH GH PHPyULD H GLYHUVRV SURJUDPDV SDUD XVR HVSHFt¿FR

Didatismo e Conhecimento

2


CONHECIMENTOS DE INFORMÁTICA SMARTPHONES 6mR WHOHIRQHV FHOXODUHV GH ~OWLPD JHUDomR 3RVVXHP DOWD FDSDFLGDGH GH SURFHVVDPHQWR JUDQGH SRWHQFLDO GH DUPD]HQDPHQWR DFHVVR j ,QWHUQHW UHSURGX]HP P~VLFDV YtGHRV H WrP RXWUDV IXQFLRQDOLGDGHV Sistema de Processamento de Dados 4XDQGR IDODPRV HP ³3URFHVVDPHQWR GH 'DGRV´ WUDWDPRV GH XPD JUDQGH YDULHGDGH GH DWLYLGDGHV TXH RFRUUH WDQWR QDV RUJDQL]Do}HV LQGXVWULDLV H FRPHUFLDLV TXDQWR QD YLGD GLiULD GH FDGD XP GH QyV 3DUD WHQWDUPRV GH¿QLU R TXH VHMD SURFHVVDPHQWR GH GDGRV WHPRV GH YHU R TXH H[LVWH HP FRPXP HP WRGDV HVWDV DWLYLGDGHV $R DQDOLVDUPRV SRGHPRV SHUFHEHU TXH HP WRGDV HODV VmR GDGDV FHUWDV LQIRUPDo}HV LQLFLDLV DV TXDLV FKDPDPRV GH GDGRV ( TXH HVWHV GDGRV IRUDP VXMHLWRV D FHUWDV WUDQVIRUPDo}HV FRP DV TXDLV IRUDP REWLGDV DV LQIRUPDo}HV 2 SURFHVVDPHQWR GH GDGRV VHPSUH HQYROYH WUrV IDVHV HVVHQFLDLV (QWUDGD GH 'DGRV 3URFHVVDPHQWR H 6DtGD GD ,QIRUPDomR 3DUD TXH XP VLVWHPD GH SURFHVVDPHQWR GH GDGRV IXQFLRQH DR FRQWHQWR ID] VH QHFHVViULR TXH WUrV HOHPHQWRV IXQFLRQHP HP SHUfeita harmonia, são eles: Hardware +DUGZDUH p WRGD D SDUWH ItVLFD TXH FRPS}H R VLVWHPD GH SURFHVVDPHQWR GH GDGRV HTXLSDPHQWRV H VXSULPHQWRV WDLV FRPR &38 GLVTXHWHV IRUPXOiULRV LPSUHVVRUDV Software e WRGD D SDUWH OyJLFD GR VLVWHPD GH SURFHVVDPHQWR GH GDGRV 'HVGH RV GDGRV TXH DUPD]HQDPRV QR KDUGZDUH DWp RV SURJUDPDV TXH RV SURFHVVDP Peopleware (VWD p D SDUWH KXPDQD GR VLVWHPD XVXiULRV DTXHOHV TXH XVDP D LQIRUPiWLFD FRPR XP PHLR SDUD D VXD DWLYLGDGH ¿P SURJUDPDGRUHV H DQDOLVWDV GH VLVWHPDV DTXHOHV TXH XVDP D LQIRUPiWLFD FRPR XPD DWLYLGDGH ¿P (PERUD QmR SDUHoD D SDUWH PDLV FRPSOH[D GH XP VLVWHPD GH SURFHVVDPHQWR GH GDGRV p VHP G~YLGD R 3HRSOHZDUH SRLV SRU PDLV PRGHUQD TXH VHMDP RV HTXLSDPHQWRV SRU PDLV IDUWRV TXH VHMDP RV VXSULPHQWRV H SRU PDLV LQWHOLJHQWH TXH VH DSUHVHQWH R VRIWZDUH GH QDGD DGLDQWDUi VH DV SHVVRDV SHRSOHZDUH QmR HVWLYHUHP GHYLGDPHQWH WUHLQDGDV D ID]HU H XVDU D LQIRUPiWLFD 2 DOWR H DFHOHUDGR FUHVFLPHQWR WHFQROyJLFR YHP DSULPRUDQGR R KDUGZDUH VHJXLGR GH SHUWR SHOR VRIWZDUH (TXLSDPHQWRV TXH FDEHP QD SDOPD GD PmR VRIWZDUHV TXH WUDQVIRUPDP IDQWDVLD HP UHDOLGDGH YLUWXDO QmR VmR PDLV QRYLGDGHV (QWUHWDQWR DLQGD WHPRV HP QRVVDV HPSUHVDV SHVVRDV TXH VHTXHU WRFDUDP DOJXP GLD HP XP WHFODGR GH FRPSXWDGRU 0HVPR QDV PDLV DUURMDGDV RUJDQL]Do}HV R UHODFLRQDPHQWR HQWUH DV SHVVRDV GL¿FXOWD R WUkPLWH H FRQVHTXHQWH SURFHVVDPHQWR GD LQIRUPDomR VXFDWHDQGR H VXEXWLOL]DQGR HTXLSDPHQWRV H VRIWZDUHV ,VWR SRGH VHU YLVOXPEUDGR VREUHWXGR QDV LQVWLWXLo}HV S~EOLFDV POR DENTRO DO GABINETE

,GHQWL¿FDUHPRV DV SDUWHV LQWHUQDV GR FRPSXWDGRU ORFDOL]DGDV QR JDELQHWH RX WRUUH

Didatismo e Conhecimento

3


CONHECIMENTOS DE INFORMÁTICA x x x x x x x

Motherboard (placa-mãe) 3URFHVVDGRU Memórias Fonte de Energia Cabos Drivers 3RUWDV GH (QWUDGD 6DtGD

MOTHERBOARD (PLACA-MÃE)

e XPD GDV SDUWHV PDLV LPSRUWDQWHV GR FRPSXWDGRU $ PRWKHUERDUG p XPD SODFD GH FLUFXLWRV LQWHJUDGRV TXH VHUYH GH VXSRUWH SDUD WRGDV DV SDUWHV GR FRPSXWDGRU 3UDWLFDPHQWH WXGR ¿FD FRQHFWDGR j SODFD PmH GH DOJXPD PDQHLUD VHMD SRU FDERV RX SRU PHLR GH EDUUDPHQWRV $ SODFD PmH p GHVHQYROYLGD SDUD DWHQGHU jV FDUDFWHUtVWLFDV HVSHFL¿FDV GH IDPtOLDV GH SURFHVVDGRUHV LQFOXLQGR DWp D SRVVLELOLGDGH GH XVR GH SURFHVVDGRUHV DLQGD QmR ODQoDGRV PDV TXH DSUHVHQWHP DV PHVPDV FDUDFWHUtVWLFDV SUHYLVWDV QD SODFD A placa mãe é determinante quanto aos componentes que podem ser utilizados no micro e sobre as possibilidades de upgrade, LQÀXHQFLDQGR GLUHWDPHQWH QD SHUIRUPDQFH GR PLFUR Diversos componentes integram a placa-mãe, como: &KLSVHW Denomina-se chipset os circuitos de apoio ao microcomputador que gerenciam praticamente todo o funcionamento da placa-mãe FRQWUROH GH PHPyULD FDFKH '5$0 FRQWUROH GR EXIIHU GH GDGRV LQWHUIDFH FRP D &38 HWF 2 FKLSVHW p FRPSRVWR LQWHUQDPHQWH GH YiULRV RXWURV SHTXHQRV FKLSV XP SDUD FDGD IXQomR TXH HOH H[HFXWD +i XP FKLS FRQWURODGRU GDV LQWHUIDFHV ,'( RXWUR FRQWURODGRU GDV PHPyULDV HWF ([LVWHP GLYHUVRV PRGHORV GH FKLSVHWV FDGD XP FRP UHFXUVRV EHP GLIHUHQWHV 'HYLGR j FRPSOH[LGDGH GDV PRWKHUERDUGV GD VR¿VWLFDomR GRV VLVWHPDV RSHUDFLRQDLV H GR FUHVFHQWH DXPHQWR GR FORFN R FKLSVHW p R FRQMXQWR GH &,V FLUFXLWRV LQWHJUDGRV PDLV LPSRUWDQWH GR PLFURFRPSXWDGRU )D]HQGR XPD DQDORJLD FRP XPD RUTXHVWUD HQTXDQWR o processador é o maestro, o chipset seria o resto! %,26 2 %,26 %DVLF ,QSXW 2XWSXW 6\VWHP RX VLVWHPD EiVLFR GH HQWUDGD H VDtGD p D SULPHLUD FDPDGD GH VRIWZDUH GR PLFUR XP SHTXHQR SURJUDPD TXH WHP D IXQomR GH ³LQLFLDU´ R PLFURFRPSXWDGRU 'XUDQWH R SURFHVVR GH LQLFLDOL]DomR R %,26 p R UHVSRQViYHO SHOR UHFRQKHFLPHQWR GRV FRPSRQHQWHV GH KDUGZDUH LQVWDODGRV GDU R ERRW H SURYHU LQIRUPDo}HV EiVLFDV SDUD R IXQFLRQDPHQWR GR VLVWHPD 2 %,26 p D FDPDGD YLGH GLDJUDPD TXH YLDELOL]D D XWLOL]DomR GH 6LVWHPDV 2SHUDFLRQDLV GLIHUHQWHV /LQX[ 8QL[ +XUG %6' :LQGRZV HWF QR PLFURFRPSXWDGRU e QR %,26 TXH HVWmR GHVFULWRV RV HOHPHQWRV QHFHVViULRV SDUD RSHUDFLRQDOL]DU R +DUGZDUH SRVVLELOLWDQGR DRV GLYHUVRV 6 2 DFHVVR DRV UHFXUVRV LQGHSHQGH GH VXDV FDUDFWHUtVWLFDV HVSHFt¿FDV

Didatismo e Conhecimento

4


CONHECIMENTOS DE INFORMÁTICA 2 %,26 p JUDYDGR HP XP FKLS GH PHPyULD GR WLSR (3520 (UDVHG 3URJUDPPDEOH 5HDG 2QO\ 0HPRU\ e XP WLSR GH PHPyULD ³QmR YROiWLO´ LVWR p GHVOLJDQGR R FRPSXWDGRU QmR Ki D SHUGD GDV LQIRUPDo}HV SURJUDPDV QHOD FRQWLGD 2 %,26 p FRQWHP SURJUDPDV 3267 3RZHU 2Q 6HOI 7HVW H 6(783 SDUD WHVWH GR VLVWHPD H FRQ¿JXUDomR GRV SDUkPHWURV GH LQLFLDOL]DomR UHVSHFWLYDPHQWH H GH IXQo}HV EiVLFDV SDUD PDQLSXODomR GR KDUGZDUH XWLOL]DGDV SHOR 6LVWHPD 2SHUDFLRQDO 4XDQGR LQLFLDOL]DPRV R VLVWHPD XP SURJUDPD FKDPDGR 3267 FRQWD D PHPyULD GLVSRQtYHO LGHQWL¿FD GLVSRVLWLYRV SOXJ DQG SOD\ H UHDOL]D XPD FKHFDJHP JHUDO GRV FRPSRQHQWHV LQVWDODGRV YHUL¿FDQGR VH H[LVWH DOJR GH HUUDGR FRP DOJXP FRPSRQHQWH $SyV R WpUPLQR GHVVHV WHVWHV p HPLWLGR XP UHODWyULR FRP YiULDV LQIRUPDo}HV VREUH R KDUGZDUH LQVWDODGR QR PLFUR (VWH UHODWyULR p XPD PDQHLUD IiFLO H UiSLGD GH YHUL¿FDU D FRQ¿JXUDomR GH XP FRPSXWDGRU 3DUD SDUDOLVDU D LPDJHP WHPSR VX¿FLHQWH SDUD FRQVHJXLU OHU DV LQIRUPDo}HV EDVWD SUHVVLRQDU D WHFOD ³SDXVH EUHDN´ GR WHFODGR &DVR VHMD FRQVWDWDGR DOJXP SUREOHPD GXUDQWH R 3267 VHUmR HPLWLGRV VLQDLV VRQRURV LQGLFDQGR R WLSR GH HUUR HQFRQWUDGR 3RU LVVR p IXQGDPHQWDO D H[LVWrQFLD GH XP DOWR IDODQWH FRQHFWDGR j SODFD PmH $WXDOPHQWH DOJXPDV PRWKHUERDUGV Mi XWLOL]DP FKLSV GH PHPyULD FRP WHFQRORJLD ÀDVK 0HPyULDV TXH SRGHP VHU DWXDOL]DGDV SRU VRIWZDUH H WDPEpP QmR SHUGHP VHXV GDGRV TXDQGR R FRPSXWDGRU p GHVOLJDGR VHP QHFHVVLGDGH GH DOLPHQWDomR SHUPDQHQWH $V %,26 PDLV FRQKHFLGDV VmR $0, $ZDUG H 3KRHQL[ GRV PLFURV XWLOL]DP %,26 $0, 0HPyULD &026 CMOS (Complementary Metal-Oxide Semicondutor) é uma memória formada por circuitos integrados de baixíssimo consumo GH HQHUJLD RQGH ¿FDP DUPD]HQDGDV DV LQIRUPDo}HV GR VLVWHPD VHWXS DFHVVDGRV QR PRPHQWR GR %227 (VWHV GDGRV VmR DWULEXtGRV QD PRQWDJHP GR PLFURFRPSXWDGRU UHÀHWLQGR VXD FRQ¿JXUDomR WLSR GH ZLQFKHVWHU Q~PHURV H WLSR GH GULYHV GDWD H KRUD FRQ¿JXUDo}HV JHUDLV YHORFLGDGH GH PHPyULD HWF SHUPDQHFHQGR DUPD]HQDGRV QD &026 HQTXDQWR KRXYHU DOLPHQWDomR GD EDWHULD LQWHUQD $OJXPDV DOWHUDo}HV QR KDUGZDUH WURFD H RX LQFOXVmR GH QRYRV FRPSRQHQWHV SRGHP LPSOLFDU QD DOWHUDomR GH DOJXQV GHVVHV SDUkPHWURV Muitos desses itens estão diretamente relacionados com o processador e seu chipset e portanto é recomendável usar os valores GHIDXOW VXJHULGR SHOR IDEULFDQWH GD %,26 0XGDQoDV QHVVHV SDUkPHWURV SRGH RFDVLRQDU R WUDYDPHQWR GD PiTXLQD LQWHUPLWrQFLD QD RSHUDomR PDX IXQFLRQDPHQWR GRV GULYHV H DWp SHUGD GH GDGRV GR +' 6ORWV SDUD PyGXORV GH PHPyULD 1D pSRFD GRV PLFURV ;7 H RV FKLSV GH PHPyULD HUDP HQFDL[DGRV RX DWp VROGDGRV GLUHWDPHQWH QD SODFD PmH XP D XP 2 DJUXSDPHQWR GRV FKLSV GH PHPyULD HP PyGXORV SHQWHV LQLFLDOPHQWH GH YLDV H GHSRLV FRP H YLDV SHUPLWLX PDLRU YHUVDWLOLGDGH QD FRPSRVLomR GRV EDQFRV GH PHPyULD GH DFRUGR FRP DV QHFHVVLGDGHV GDV DSOLFDo}HV H GRV UHFXUVRV ¿QDQFHLURV GLVSRQtYHLV 'XUDQWH R SHUtRGR GH WUDQVLomR SDUD XPD QRYD WHFQRORJLD p FRPXP HQFRQWUDU SODFDV PmH FRP VORWV SDUD PDLV GH XP PRGHOR $WXDOPHQWH DV SODFDV HVWmR VHQGR SURGX]LGDV DSHQDV FRP PyGXORV GH YLDV PDV DOJXPDV FRPSRUWDP PHPyULDV GH PDLV GH XP WLSR QmR VLPXOWDQHDPHQWH 6'5$0 5DPEXV RX ''5 6'5$0 &ORFN 5HOyJLR LQWHUQR EDVHDGR QXP FULVWDO GH 4XDUW]R TXH JHUD XP SXOVR HOpWULFR $ IXQomR GR FORFN p VLQFURQL]DU WRGRV RV FLUFXLWRV GD SODFD PmH H WDPEpP RV FLUFXLWRV LQWHUQRV GR SURFHVVDGRU SDUD TXH R VLVWHPD WUDEDOKH KDUPRQLFDPHQWH (VWHV SXOVRV HOpWULFRV HP LQWHUYDORV UHJXODUHV VmR PHGLGRV SHOD VXD IUHTXrQFLD FXMD XQLGDGH p GDGD HP KHUW] +] 0+] p LJXDO D PLOKmR GH FLFORV SRU VHJXQGR 1RUPDOPHQWH RV SURFHVVDGRUHV VmR UHIHUHQFLDGRV SHOR FORFN RX IUHTXrQFLD GH RSHUDomR 3HQWLXP ,9 0+] PROCESSADOR

Didatismo e Conhecimento

5


CONHECIMENTOS DE INFORMÁTICA O microprocessador, também conhecido como processador, consiste num circuito integrado construído para realizar cálculos e RSHUDo}HV (OH p D SDUWH SULQFLSDO GR FRPSXWDGRU PDV HVWi ORQJH GH VHU XPD PiTXLQD FRPSOHWD SRU VL Vy SDUD LQWHUDJLU FRP R XVXiULR p QHFHVViULR PHPyULD GLVSRVLWLYRV GH HQWUDGD H VDtGD FRQYHUVRUHV GH VLQDLV HQWUH RXWURV e R SURFHVVDGRU TXHP GHWHUPLQD D YHORFLGDGH GH SURFHVVDPHQWR GRV GDGRV QD PiTXLQD 2V SULPHLURV PRGHORV FRPHUFLDLV FRPHoDUDP D VXUJLU QR LQtFLR GRV DQRV &ORFN 6SHHG RX &ORFN 5DWH e D YHORFLGDGH SHOD TXDO XP PLFURSURFHVVDGRU H[HFXWD LQVWUXo}HV 4XDQWR PDLV UiSLGR R FORFN PDLV LQVWUXo}HV XPD &38 SRGH H[HFXWDU SRU VHJXQGR 8VXDOPHQWH D WD[D GH FORFN p XPD FDUDFWHUtVWLFD ¿[D GR SURFHVVDGRU 3RUpP DOJXQV FRPSXWDGRUHV WrP XPD ³FKDYH´ TXH SHUPLWH RX PDLV GLIHUHQWHV YHORFLGDGHV GH FORFN ,VWR p ~WLO SRUTXH SURJUDPDV GHVHQYROYLGRV SDUD WUDEDOKDU HP XPD PiTXLQD FRP DOWD YHORFLGDGH GH FORFN SRGHP QmR WUDEDOKDU FRUUHWDPHQWH HP XPD PiTXLQD FRP YHORFLGDGH GH FORFN PDLV OHQWD H YLFH YHUVD $OpP GLVVR DOJXQV FRPSRQHQWHV GH H[SDQVmR SRGHP QmR VHU FDSD]HV GH WUDEDOKDU D DOWD YHORFLGDGH GH FORFN $VVLP FRPR D YHORFLGDGH GH FORFN D DUTXLWHWXUD LQWHUQD GH XP PLFURSURFHVVDGRU WHP LQÀXrQFLD QD VXD SHUIRUPDQFH 'HVVD IRUPD &38V FRP D PHVPD YHORFLGDGH GH FORFN QmR QHFHVVDULDPHQWH WUDEDOKDP LJXDOPHQWH (QTXDQWR XP SURFHVVDGRU ,QWHO UHTXHU FLFORV SDUD PXOWLSOLFDU Q~PHURV XP ,QWHO RX VXSHULRU SRGH ID]HU R PHVPR FiOFXOR HP XP VLPSOHV FLFOR 3RU HVVD UD]mR HVWHV QRYRV SURFHVVDGRUHV SRGHULDP VHU YH]HV PDLV UiSLGR TXH RV DQWLJRV PHVPR VH D YHORFLGDGH GH FORFN IRVVH D PHVPD $OpP GLVVR DOJXQV PLFURSURFHVVDGRUHV VmR VXSHUHVFDODU R TXH VLJQL¿FD TXH HOHV SRGHP H[HFXWDU PDLV GH XPD LQVWUXomR SRU FLFOR &RPR DV &38V RV EDUUDPHQWRV GH H[SDQVmR WDPEpP WrP D VXD YHORFLGDGH GH FORFN 6HULD LGHDO TXH DV YHORFLGDGHV GH FORFN GD &38 H GRV EDUUDPHQWRV IRVVHP D PHVPD SDUD TXH XP FRPSRQHQWH QmR GHL[H R RXWUR PDLV OHQWR 1D SUiWLFD D YHORFLGDGH GH FORFN GRV EDUUDPHQWRV p PDLV OHQWD TXH D YHORFLGDGH GD &38 2YHUFORFN 2YHUFORFN p R DXPHQWR GD IUHTXrQFLD GR SURFHVVDGRU SDUD TXH HOH WUDEDOKH PDLV UDSLGDPHQWH A frequência de operação dos computadores domésticos é determinada por dois fatores: $ YHORFLGDGH GH RSHUDomR GD SODFD PmH FRQKHFLGD WDPEpP FRPR YHORFLGDGH GH EDUUDPHQWR TXH QRV FRPSXWDGRUHV 3HQWLXP SRGH VHU GH H 0+] 8P PXOWLSOLFDGRU GH FORFN FULDGR D SDUWLU GRV TXH SHUPLWH DR SURFHVVDGRU WUDEDOKDU LQWHUQDPHQWH D XPD YHORFLGDGH PDLRU TXH D GD SODFD PmH 9DOH OHPEUDU TXH RV RXWURV SHULIpULFRV GR FRPSXWDGRU PHPyULD 5$0 FDFKH / SODFD GH YtGHR HWF FRQWLQXDP WUDEDOKDQGR QD YHORFLGDGH GH EDUUDPHQWR &RPR H[HPSOR XP FRPSXWDGRU 3HQWLXP WUDEDOKD FRP YHORFLGDGH GH EDUUDPHQWR GH 0+] H PXOWLSOLFDGRU GH [ )D]HQGR R FiOFXOR [ RX VHMD R SURFHVVDGRU WUDEDOKD D 0+] PDV VH FRPXQLFD FRP RV GHPDLV FRPSRQHQWHV GR PLFUR D 0+] 7HQGR XP SURFHVVDGRU 3HQWLXP FRPR R GR H[HPSOR DFLPD SRGH VH ID]r OR WUDEDOKDU D 0+] VLPSOHVPHQWH DXPHQWDQGR R PXOWLSOLFDGRU GH FORFN GH [ SDUD [ &DVR D SODFD PmH SHUPLWD SRGH VH XVDU XP EDUUDPHQWR GH RX DWp PHVPR 0+] DOJXPDV SODFDV PDLV PRGHUQDV VXSRUWDP HVVD YHORFLGDGH GH EDUUDPHQWR 1HVWH FDVR PDQWHQGR R PXOWLSOLFDGRU GH FORFN GH [ R 3HQWLXP SRGHULD WUDEDOKDU D 0+] [ RX D 0+] [ $V IUHTXrQFLDV GH EDUUDPHQWR H GR PXOWLSOLFDGRU SRGHP VHU DOWHUDGDV VLPSOHVPHQWH DWUDYpV GH MXPSHUV GH FRQ¿JXUDomR GD SODFD PmH R TXH WRUQD LQGLVSHQViYHO R PDQXDO GD PHVPD 2 DXPHQWR GD YHORFLGDGH GH EDUUDPHQWR GD SODFD PmH SRGH FULDU SUREOHPDV FDVR DOJXP SHULIpULFR FRPR PHPyULD 5$0 FDFKH / HWF QmR VXSRUWH HVVD YHORFLGDGH 4XDQGR VH ID] XP RYHUFORFN R SURFHVVDGRU SDVVD D WUDEDOKDU D XPD YHORFLGDGH PDLRU GR TXH HOH IRL SURMHWDGR ID]HQGR FRP TXH KDMD XP PDLRU DTXHFLPHQWR GR PHVPR &RP LVWR UHGX] VH D YLGD ~WLO GR SURFHVVDGRU GH FHUFD GH SDUD DQRV R TXH QmR FKHJD D VHU XP SUREOHPD Mi TXH RV SURFHVVDGRUHV UDSLGDPHQWH VH WRUQDP REVROHWRV (VVH DTXHFLPHQWR H[FHVVLYR SRGH FDXVDU WDPEpP IUHTXHQWHV ³FUDVKHV´ WUDYDPHQWR GR VLVWHPD RSHUDFLRQDO GXUDQWH R VHX XVR REULJDQGR R XVXiULR D UHLQLFLDU D PiTXLQD $R ID]HU R RYHUFORFN p LQGLVSHQViYHO D XWLOL]DomR GH XP FRROHU YHQWLODGRU TXH ¿FD VREUH R SURFHVVDGRU SDUD UHGX]LU VHX DTXHFLPHQWR GH TXDOLGDGH H HP DOJXQV FDVRV XPD SDVWD WpUPLFD HVSHFLDO TXH p SDVVDGD GLUHWDPHQWH VREUH D VXSHUItFLH GR SURFHVVDGRU Atualmente fala-se muito em CORE, seja dual, duo ou quad, essa denominação refere-se na verdade ao núcleo do processador, RQGH ¿FD D 8/$ 8QLGDGH $ULWPpWLFD H /yJLFD 1RV PRGHORV '8$/ RX '82 HVVH Q~FOHR p GXSOLFDGR R TXH SURSRUFLRQD XPD H[HFXomR GH GXDV LQVWUXo}HV HIHWLYDPHQWH DR PHVPR WHPSR HPERUD LVWR QmR DFRQWHoD R WHPSR WRGR %DVWD XPD LQVWUXomR SUHFLVDU GH XP GDGR JHUDGR SRU VXD ³FRQFRUUHQWH´ TXH D H[HFXomR SDUDOHOD WRUQD VH LQYLiYHO WHQGR XPD LQVWUXomR TXH HVSHUDU SHOR WpUPLQR GD RXWUD 2V PRGHORV 48$' &25( SRVVXHP R Q~FOHR TXDGUXSOLFDGR (VVHV VmR RV SURFHVVDGRUHV IDEULFDGRV SHOD ,17(/ HPSUHVD TXH IRL SLRQHLUD QHVVH WLSR GH SURGXWR 7HPRV WDPEpP DOJXQV FRQcorrentes famosos dessa marca, tais como NEC, Cyrix e AMD; sendo que atualmente apenas essa última marca mantém-se fazendo IUHQWH DRV ODQoDPHQWRV GD ,17(/ QR PHUFDGR 3RU H[HPSOR XP PRGHOR PXLWR SRSXODU GH IRL R GH 0+] TXH QXQFD IRL IHLWR SHOD ,17(/ FXMR PDLV YHOR] HUD GH 0+] HVVH SURFHVVDGRU IRL REUD GD $0' 'HVGH R ODQoDPHQWR GD OLQKD 3HQWLXP D $0' IRL REULJDGD D FULDU WDPEpP QRYDV GHQRPLQDo}HV SDUD VHXV SURFHVVDGRUHV VHQGR ODQoDGRV PRGHORV FRPR . . . 'XURQ IDzendo concorrência direta à ideia do CeOHURQ H RV PDLV DWXDLV FRPR $WKORQ 7XULRQ 2SWHURQ H 3KHQRP Didatismo e Conhecimento

6


CONHECIMENTOS DE INFORMร TICA MEMร RIAS

Vamos chamar de memรณria o que muitos autores denominam memรณria primรกria, que รฉ a memรณria interna do computador, sem a TXDO HOH QmR IXQFLRQD A memรณria รฉ formada, geralmente, por chips e รฉ utilizada para guardar a informaรงรฃo para o processador num determinado moPHQWR SRU H[HPSOR TXDQGR XP SURJUDPD HVWi VHQGR H[HFXWDGR As memรณrias ROM (Read Only Memory - Memรณria Somente de Leitura) e RAM (Random Access Memory - Memรณria de Acesso 5DQG{PLFR ยฟFDP ORFDOL]DGDV MXQWR j SODFD PmH $ 520 VmR FKLSV VROGDGRV j SODFD PmH HQTXDQWR D 5$0 VmR ยณSHQWHVยด GH PHPyULD FONTE DE ENERGIA

ร um aparelho que transforma a corrente de eletricidade alternada (que vem da rua), em corrente contรญnua, para ser usada nos FRPSXWDGRUHV 6XD IXQomR p DOLPHQWDU WRGDV DV SDUWHV GR FRPSXWDGRU FRP HQHUJLD HOpWULFD DSURSULDGD SDUD VHX IXQFLRQDPHQWR )LFD OLJDGD j SODFD PmH H DRV RXWURV GLVSRVLWLYRV SRU PHLR GH FDERV FRORULGRV FRP FRQHFWRUHV QDV SRQWDV CABOS

Didatismo e Conhecimento

7


CONHECIMENTOS DE INFORMร TICA 3RGHPRV HQFRQWUDU GLIHUHQWHV WLSRV GH FDERV GHQWUR GR JDELQHWH SRGHP VHU GH HQHUJLD RX GH GDGRV H FRQHFWDP GLVSRVLWLYRV FRPR GLVFRV UtJLGRV GULYHV GH &'V H '9'V /('V OX]HV ERWmR OLJD GHVOLJD HQWUH RXWURV j SODFD PmH 2V WLSRV GH FDERV HQFRQWUDGRV GHQWUR GR 3& VmR ,'( 6$7$ 6$7$ HQHUJLD H VRP DRIVERS

6mR GLVSRVLWLYRV GH VXSRUWH SDUD PtGLDV ยฟ[DV RX UHPRYtYHLV GH DUPD]HQDPHQWR GH GDGRV QRV TXDLV D LQIRUPDomR p JUDYDGD SRU PHLR GLJLWDO yWLFR PDJQpWLFR RX PHFkQLFR +RMH RV WLSRV PDLV FRPXQV VmR R GLVFR UtJLGR RX +' RV GULYHV GH &' '9' H R SHQ GULYH 2V FRPSXWDGRUHV PDLV DQWLJRV DLQGD DSUHVHQWDP GULYHV GH GLVTXHWHV TXH VmR EHP SRXFR XVDGRV GHYLGR j EDL[D FDSDFLGDGH GH DUPD]HQDPHQWR 7RGRV RV GULYHV VmR OLJDGRV DR FRPSXWDGRU SRU PHLR GH FDERV PORTAS DE ENTRADA/SAร DA

6mR DV SRUWDV GR FRPSXWDGRU QDV TXDLV VH FRQHFWDP WRGRV RV SHULIpULFRV 6mR XWLOL]DGDV SDUD HQWUDGD H VDtGD GH GDGRV 2V FRPSXWDGRUHV GH KRMH DSUHVHQWDP QRUPDOPHQWH DV SRUWDV 86% 9*$ )LUH:LUH +'0, (WKHUQHW H 0RGHP 9HMD DOJXQV H[HPSORV GH GLVSRVLWLYRV OLJDGRV DR FRPSXWDGRU SRU PHLR GHVVDV 3RUWDV PRGHP PRQLWRU SHQ GULYH +' H[WHUQR VFDQQHU LPSUHVVRUD PLFURIRQH &DL[DV GH VRP PRXVH WHFODGR HWF Obs.: sรฃo dignas de citaรงรฃo portas ainda bastante usadas, como as portas paralelas (impressoras e scanners) e as portas PS/2(mouses e teclados).

Didatismo e Conhecimento

8


CONHECIMENTOS DE INFORMร TICA MEMร RIAS E DISPOSITIVOS DE ARMAZENAMENTO 0HPyULDV Memรณria ROM

1R PLFURFRPSXWDGRU WDPEpP VH HQFRQWUDP DV PHPyULDV GHยฟQLGDV FRPR GLVSRVLWLYRV HOHWU{QLFRV UHVSRQViYHLV SHOR DUPD]HQDPHQWR GH LQIRUPDo}HV H LQVWUXo}HV XWLOL]DGDV SHOR FRPSXWDGRU 5HDG 2QO\ 0HPRU\ 520 p XP WLSR GH PHPyULD HP TXH RV GDGRV QmR VH SHUGHP TXDQGR R FRPSXWDGRU p GHVOLJDGR (VWH WLSR de memรณria รฉ ideal para guardar dados da BIOS (Basic Input/Output System - Sistema Bรกsico de Entrada/Saรญda) da placa-mรฃe e RXWURV GLVSRVLWLYRV Os tipos de ROM usados atualmente sรฃo: x (OHFWULFDOO\ (UDVDEOH 3URJUDPPDEOH 5HDG 2QO\ 0HPRU\ (HSURP e XP WLSR GH 3520 TXH SRGH VHU DSDJDGD VLPSOHVPHQWH FRP XPD FDUJD HOpWULFD SRGHQGR VHU SRVWHULRUPHQWH JUDYDGD FRP QRYRV GDGRV 'HSRLV GD 195$0 p R WLSR GH PHPyULD 520 PDLV XWLOL]DGR DWXDOPHQWH x Non-Volatile Random Access Memory (Nvram) 7DPEpP FRQKHFLGD FRPR ร DVK 5$0 RX PHPyULD ร DVK D 195$0 p XP WLSR GH PHPyULD 5$0 TXH QmR SHUGH RV GDGRV TXDQGR GHVOLJDGD (VWH WLSR GH PHPyULD p R PDLV XVDGR DWXDOPHQWH SDUD DUPD]HQDU RV GDGRV GD %,26 QmR Vy GD SODFD PmH PDV GH YiULRV RXWURV GLVSRVLWLYRV FRPR PRGHPV JUDYDGRUHV GH &' 520 HWF e MXVWDPHQWH R IDWR GR %,26 GD SODFD PmH VHU JUDYDGR HP PHPyULD ร DVK TXH SHUPLWH UHDOL]DUPRV XSJUDGHV GH %,26 1D YHUGDGH HVVD QmR p H[DWDPHQWH XPD PHPyULD 520 Mi TXH SRGH VHU UHHVFULWD PDV D VXEVWLWXL FRP YDQWDJHQV x

3URJUDPPDEOH 5HDG 2QO\ 0HPRU\ 3URP

e XP WLSR GH PHPyULD 520 IDEULFDGD HP EUDQFR VHQGR SURJUDPDGD SRVWHULRUPHQWH 8PD YH] JUDYDGRV RV GDGRV HOHV QmR SRGHP VHU DOWHUDGRV (VWH WLSR GH PHPyULD p XVDGR HP YiULRV GLVSRVLWLYRV DVVLP FRPR HP SODFDV PmH DQWLJDV Memoria RAM

Didatismo e Conhecimento

9


CONHECIMENTOS DE INFORMร TICA Random Access Memory (RAM) - Memรณria de acesso aleatรณrio onde sรฃo armazenados dados em tempo de processamento, isto รฉ, enquanto o computador estรก ligado e, tambรฉm, todas as informaรงรตes que estiverem sendo executadas, pois essa memรณria รฉ mantida SRU SXOVRV HOpWULFRV 7RGR FRQWH~GR GHOD p DSDJDGR DR GHVOLJDU VH D PiTXLQD SRU LVVR p FKDPDGD WDPEpP GH YROiWLO 2 PyGXOR GH PHPyULD p XP FRPSRQHQWH DGLFLRQDGR j SODFD PmH e FRPSRVWR GH XPD VpULH GH SHTXHQRV FLUFXLWRV LQWHJUDGRV FKDPDGRV FKLS GH 5$0 $ PHPyULD SRGH VHU DXPHQWDGD GH DFRUGR FRP R WLSR GH HTXLSDPHQWR RX GDV QHFHVVLGDGHV GR XVXiULR 2 ORFDO RQGH RV FKLSV GH PHPyULD VmR LQVWDODGRV FKDPD VH 6/27 GH PHPyULD A memรณria ganhou melhor desempenho com versรตes mais poderosas, como DRAM (Dynamic RAM - RAM dinรขmica), EDO (Extended Data Out - Saรญda Estendida Dados), entre outras, que proporcionam um aumento no desempenho de 10% a 30% em comSDUDomR j 5$0 WUDGLFLRQDO +RMH DV PHPyULDV PDLV XWLOL]DGDV VmR GR WLSR ''5 H ''5 Memรณria Cache

A memรณria cache รฉ um tipo de memรณria de acesso rรกpido utilizada, exclusivamente, para armazenamento de dados que provaYHOPHQWH VHUmR XVDGRV QRYDPHQWH 4XDQGR H[HFXWDPRV DOJXP SURJUDPD SRU H[HPSOR SDUWH GDV LQVWUXo}HV ยฟFD JXDUGDGD QHVWD PHPyULD SDUD TXH FDVR SRVWHULRUPHQWH VHMD QHFHVViULR DEULU R SURJUDPD QRYDPHQWH VXD H[HFXomR VHMD PDLV UiSLGD $WXDOPHQWH D PHPyULD FDFKH Mi p HVWHQGLGD D RXWURV GLVSRVLWLYRV D ยฟP GH DFHOHUDU R SURFHVVR GH DFHVVR DRV GDGRV 2V SURFHVVDGRUHV H RV +'V SRU H[HPSOR Mi XWLOL]DP HVWH WLSR GH DUPD]HQDPHQWR DISPOSITIVOS DE ARMAZENAMENTO Disco Rรญgido (HD)

Didatismo e Conhecimento

10


CONHECIMENTOS DE INFORMà TICA 2 GLVFR UtJLGR p SRSXODUPHQWH FRQKHFLGR FRPR +' +DUG 'LVN 'ULYH +'' H p FRPXP VHU FKDPDGR WDPEpP GH PHPyULD PDV DR FRQWUiULR GD PHPyULD 5$0 TXDQGR R FRPSXWDGRU p GHVOLJDGR QmR SHUGH DV LQIRUPDo}HV O disco rígido Ê, na verdade, o único dispositivo para armazenamento de informaçþes indispensåvel ao funcionamento do comSXWDGRU e QHOH TXH ¿FDP JXDUGDGRV WRGRV RV GDGRV H DUTXLYRV LQFOXLQGR R VLVWHPD RSHUDFLRQDO *HUDOPHQWH p OLJDGR j SODFD PmH SRU PHLR GH XP FDER TXH SRGH VHU SDGUmR ,'( 6$7$ RX 6$7$ HD Externo

2V +'V H[WHUQRV VmR GLVFRV UtJLGRV SRUWiWHLV FRP DOWD FDSDFLGDGH GH DUPD]HQDPHQWR FKHJDQGR IDFLOPHQWH j FDVD GRV 7HUDE\WHV (OHV QRUPDOPHQWH IXQFLRQDP D SDUWLU GH TXDOTXHU HQWUDGD 86% GR FRPSXWDGRU As grandes vantagens destes dispositivos sĂŁo: x Alta capacidade de armazenamento; x Facilidade de instalação; x 0RELOLGDGH RX VHMD SRGH VH OHYi OR SDUD TXDOTXHU OXJDU VHP QHFHVVLGDGH GH DEULU R FRPSXWDGRU CD, CD-R e CD-RW 2 &RPSDFW 'LVF &' IRL FULDGR QR FRPHoR GD GpFDGD GH H p KRMH XP GRV PHLRV PDLV SRSXODUHV GH DUPD]HQDU GDGRV GLJLWDOPHQWH Sua composição ĂŠ geralmente formada por quatro camadas: x 8PD FDPDGD GH SROLFDUERQDWR HVSpFLH GH SOiVWLFR RQGH ÂżFDP DUPD]HQDGRV RV GDGRV x 8PD FDPDGD UHĂ€HWLYD PHWiOLFD FRP D ÂżQDOLGDGH GH UHĂ€HWLU R ODVHU x 8PD FDPDGD GH DFUtOLFR SDUD SURWHJHU RV GDGRV x 8PD FDPDGD VXSHUÂżFLDO RQGH VmR LPSUHVVRV RV UyWXORV 1D FDPDGD GH JUDYDomR H[LVWH XPD JUDQGH HVSLUDO TXH WHP XP UHOHYR GH SDUWHV SODQDV H SDUWHV EDL[DV TXH UHSUHVHQWDP RV ELWV 8P IHL[H GH ODVHU ÂłOr´ R UHOHYR H FRQYHUWH D LQIRUPDomR 7HPRV KRMH QR PHUFDGR WUrV WLSRV SULQFLSDLV GH &'V &' FRPHUFLDO (que jĂĄ vem gravado com mĂşsica ou dados) &' 5 (que vem vazio e pode ser gravado uma Ăşnica vez) &' 5: (que pode ter seus dados apagados e regravados) $WXDOPHQWH D FDSDFLGDGH GRV &'V p DUPD]HQDU FHUFD GH 0% RX PLQXWRV GH P~VLFD DVD, DVD-R e DVD-RW 2 'LJLWDO 9tGHR 'LVF RX 'LJLWDO 9HUVDWLOOH 'LVF '9' p KRMH R IRUPDWR PDLV FRPXP SDUD DUPD]HQDPHQWR GH YtGHR GLJLWDO )RL LQYHQWDGR QR ÂżQDO GRV DQRV PDV Vy VH SRSXODUL]RX GHSRLV GR DQR $VVLP FRPR R &' p FRPSRVWR SRU TXDWUR FDPDGDV FRP D diferença de que o feixe de laser que lĂŞ e grava as informaçþes ĂŠ menor, possibilitando uma espiral maior no disco, o que proporciona PDLRU FDSDFLGDGH GH DUPD]HQDPHQWR

Didatismo e Conhecimento

11


CONHECIMENTOS DE INFORMÁTICA 7DPEpP SRVVXL DV YHUV}HV '9' 5 H '9' 5: VHQGR 5 GH JUDYDomR ~QLFD H 5: TXH SRVVLELOLWD D UHJUDYDomR GH GDGRV $ FDSDFLGDGH GRV '9'V p GH PLQXWRV GH YtGHR RX *% GH GDGRV H[LVWLQGR DLQGD XP WLSR GH '9' FKDPDGR 'XDO /D\HU TXH FRQWpP GXDV FDPDGDV GH JUDYDomR FXMD FDSDFLGDGH GH DUPD]HQDPHQWR FKHJD D *% Blu-Ray 2 %OX 5D\ p R VXFHVVRU GR '9' 6XD FDSDFLGDGH YDULD HQWUH H *% 2 GH PDLRU FDSDFLGDGH FRQWpP GXDV FDPDGDV GH JUDYDomR Seu processo de fabricação segue os padrões do CD e DVD comuns, com a diferença de que o feixe de laser usado para leitura p DLQGD PHQRU TXH R GR '9' R TXH SRVVLELOLWD DUPD]HQDJHP PDLRU GH GDGRV QR GLVFR O nome do disco refere-se à cor do feixe de luz do leitor ótico que, na verdade, para o olho humano, apresenta uma cor violeta D]XODGD 2 ³H´ GD SDODYUD EOXH D]XO IRL UHWLUDGR GR QRPH SRU ¿QV MXUtGLFRV Mi TXH PXLWRV SDtVHV QmR SHUPLWHP TXH VH UHJLVWUH FRPHUFLDOPHQWH XPD SDODYUD FRPXP 2 %OX 5D\ IRL LQWURGX]LGR QR PHUFDGR QR DQR GH Pen Drive

e XP GLVSRVLWLYR GH DUPD]HQDPHQWR GH GDGRV HP PHPyULD ÀDVK H FRQHFWD VH DR FRPSXWDGRU SRU XPD SRUWD 86% (OH FRPELQD diversas tecnologias antigas com baixo custo, baixo consumo de energia e tamanho reduzido, graças aos avanços nos microprocesVDGRUHV )XQFLRQD EDVLFDPHQWH FRPR XP +' H[WHUQR H TXDQGR FRQHFWDGR DR FRPSXWDGRU SRGH VHU YLVXDOL]DGR FRPR XP GULYH 2 SHQ GULYH WDPEpP p FRQKHFLGR FRPR WKXPEGULYH SRU WHU R WDPDQKR DSUR[LPDGR GH XP GHGR SROHJDU WKXPE ÀDVKGULYH SRU XVDU XPD PHPyULD ÀDVK RX DLQGD GLVFR UHPRYtYHO Ele tem a mesma função dos antigos disquetes e dos CDs, ou seja, armazenar dados para serem transportados, porém, com uma FDSDFLGDGH PDLRU FKHJDQGR D *% Cartão de Memória

$VVLP FRPR R SHQ GULYH R FDUWmR GH PHPyULD p XP WLSR GH GLVSRVLWLYR GH DUPD]HQDPHQWR GH GDGRV FRP PHPyULD ÀDVK PXLWR HQFRQWUDGR HP PiTXLQDV IRWRJUi¿FDV GLJLWDLV H DSDUHOKRV FHOXODUHV VPDUWSKRQHV Nas máquinas digitais registra as imagens capturadas e nos telefones é utilizado para armazenar vídeos, fotos, ringtones, endeUHoRV Q~PHURV GH WHOHIRQH HWF 2 FDUWmR GH PHPyULD IXQFLRQD EDVLFDPHQWH FRPR R SHQ GULYH PDV DR FRQWUiULR GHOH QHP VHPSUH ¿FD DSDUHQWH QR GLVSRVLWLYR H p EHP PDLV FRPSDFWR Os formatos mais conhecidos são: x 0HPRU\ 6WLFN 'XR x SD (Secure Digital Card) x Mini SD x Micro SD

Didatismo e Conhecimento

12


CONHECIMENTOS DE INFORMร TICA OS PERIFร RICOS 2V SHULIpULFRV VmR SDUWHV H[WUHPDPHQWH LPSRUWDQWHV GRV FRPSXWDGRUHV 6mR HOHV TXH PXLWDV YH]HV GHยฟQHP VXD DSOLFDomR Entrada Sรฃo dispositivos que possuem a funรงรฃo de inserir dados ao computador, por exemplo: teclado, scanner, caneta รณptica, leitor de FyGLJR GH EDUUDV PHVD GLJLWDOL]DGRUD PRXVH PLFURIRQH MR\VWLFN &' 520 '9' 520 FkPHUD IRWRJUiยฟFD GLJLWDO FkPHUD GH YtGHR ZHEFDP HWF Mouse

e XWLOL]DGR SDUD VHOHFLRQDU RSHUDo}HV GHQWUR GH XPD WHOD DSUHVHQWDGD 6HX PRYLPHQWR FRQWUROD D SRVLomR GR FXUVRU QD WHOD H DSHQDV FOLFDQGR SUHVVLRQDQGR XP GRV ERW}HV VREUH R TXH YRFr SUHFLVD UDSLGDPHQWH D RSHUDomR HVWDUi GHยฟQLGD 2 PRXVH VXUJLX FRP R DPELHQWH JUiยฟFR GDV IDPtOLDV 0DFLQWRVK H :LQGRZV WRUQDQGR VH LQGLVSHQViYHO SDUD D XWLOL]DomR GR PLFURFRPSXWDGRU Touchpad

([LVWHP DOJXQV PRGHORV GLIHUHQWHV GH PRXVH SDUD QRWHERRNV FRPR R WRXFKSDG TXH p XP LWHP GH IiEULFD QD PDLRULD GHOHV e XPD SHTXHQD VXSHUItFLH VHQVtYHO DR WRTXH H WHP D PHVPD IXQFLRQDOLGDGH GR PRXVH 3DUD PRYLPHQWDU R FXUVRU QD WHOD SDVVD VH R GHGR OHYHPHQWH VREUH D iUHD GR WRXFKSDG Teclado

e R SHULIpULFR PDLV FRQKHFLGR H XWLOL]DGR SDUD HQWUDGD GH GDGRV QR FRPSXWDGRU $FRPSDQKD R 3& GHVGH VXDV SULPHLUDV YHUV}HV H IRL SRXFR DOWHUDGR 3RVVXL WHFODV UHSUHVHQWDQGR OHWUDV Q~PHURV H VtPERORV EHP FRPR WHFODV FRP IXQo}HV HVSHFtยฟFDV ) ) (6& HWF

Didatismo e Conhecimento

13


CONHECIMENTOS DE INFORMà TICA Câmera Digital

&kPHUD IRWRJUi¿FD PRGHUQD TXH QmR XVD PDLV ¿OPHV IRWRJUi¿FRV $V LPDJHQV VmR FDSWXUDGDV H JUDYDGDV QXPD PHPyULD LQWHUQD RX DLQGD PDLV FRPXPHQWH HP FDUW}HV GH PHPyULD 2 IRUPDWR GH DUTXLYR SDGUmR SDUD DUPD]HQDU DV IRWRV p R -3(* MSJ H HODV SRGHP VHU WUDQVIHULGDV DR FRPSXWDGRU SRU PHLR GH XP FDER RX QRV FRPSXWDGRUHV PDLV PRGHUQRV FRORFDQGR VH R FDUWmR GH PHPyULD GLUHWDPHQWH QR OHLWRU Câmeras de Vídeo

$V FkPHUDV GH YtGHR DOpP GH XWLOL]DGDV QR OD]HU VmR WDPEpP DSOLFDGDV QR WUDEDOKR GH PXOWLPtGLD $V FkPHUDV GH YtGHR GLJLWDLV ligam-se ao microcomputador por meio de cabos de conexĂŁo e permitem levar a ele as imagens em movimento e alterĂĄ-las utilizando XP SURJUDPD GH HGLomR GH LPDJHQV ([LVWH DLQGD D SRVVLELOLGDGH GH WUDQVPLWLU DV LPDJHQV SRU PHLR GH SODFDV GH FDSWXUD GH YtGHR TXH SRGHP IXQFLRQDU LQWHUQD RX H[WHUQDPHQWH QR FRPSXWDGRU

Didatismo e Conhecimento

14


CONHECIMENTOS DE INFORMÁTICA Scanner

e XP GLVSRVLWLYR XWLOL]DGR SDUD LQWHUSUHWDU H HQYLDU j PHPyULD GR FRPSXWDGRU XPD LPDJHP GHVHQKDGD SLQWDGD RX IRWRJUDIDGD (OH p IRUPDGR SRU PLQ~VFXORV VHQVRUHV IRWRHOpWULFRV JHUDOPHQWH GLVWULEXtGRV GH IRUPD OLQHDU &DGD OLQKD GD LPDJHP p SHUFRUULGD SRU XP IHL[H GH OX] $R PHVPR WHPSR RV VHQVRUHV YDUUHP SHUFRUUHP HVVH HVSDoR H DUPD]HQDP D TXDQWLGDGH GH OX] UHÀHWLGD SRU FDGD XP GRV SRQWRV GD OLQKD A princípio, essas informações são convertidas em cargas elétricas que, depois, ainda no scanner, são transformadas em valores QXPpULFRV 2 FRPSXWDGRU GHFRGL¿FD HVVHV Q~PHURV DUPD]HQD RV H SRGH WUDQVIRUPi ORV QRYDPHQWH HP LPDJHP $SyV D LPDJHP VHU FRQYHUWLGD SDUD D WHOD SRGH VHU JUDYDGD H LPSUHVVD FRPR TXDOTXHU RXWUR DUTXLYR ([LVWHP VFDQQHUV TXH IXQFLRQDP DSHQDV HP SUHWR H EUDQFR H RXWURV TXH UHSURGX]HP FRUHV 1R SULPHLUR FDVR RV VHQVRUHV SDVVDP DSHQDV XPD YH] SRU FDGD SRQWR GD LPDJHP 2V DSDUHOKRV GH ID[ SRVVXHP XP VFDQQHU GHVVH WLSR SDUD FDSWDU R GRFXPHQWR 3DUD FDSWXUDU DV FRUHV p SUHFLVR YDUUHU D LPDJHP WUrV YH]HV XPD UHJLVWUD R YHUGH RXWUD R YHUPHOKR H RXWUD R D]XO +i DSDUHOKRV TXH SURGX]HP LPDJHQV FRP PDLRU RX PHQRU GH¿QLomR ,VVR p GHWHUPLQDGR SHOR Q~PHUR GH SRQWRV SRU SROHJDGD SSS TXH RV VHQVRUHV IRWRHOpWULFRV SRGHP OHU $V FDSDFLGDGHV YDULDP GH D SSS $OJXQV PRGHORV FRQWDP DLQGD FRP VRIWZDUHV GH UHFRQKHFLPHQWR GH HVFULWD GHQRPLQDGRV 2&5 Hoje em dia, existem diversos tipos de utilização para os scanners, que podem ser encontrados até nos caixas de supermercados, SDUD OHU RV FyGLJRV GH EDUUDV GRV SURGXWRV YHQGLGRV Webcam

e XPD FkPHUD GH YtGHR TXH FDSWD LPDJHQV H DV WUDQVIHUH LQVWDQWDQHDPHQWH SDUD R FRPSXWDGRU $ PDLRULD GHODV QmR WHP DOWD UHVROXomR Mi TXH DV LPDJHQV WrP D ¿QDOLGDGH GH VHUHP WUDQVPLWLGDV D RXWUR FRPSXWDGRU YLD ,QWHUQHW RX VHMD QmR SRGHP JHUDU XP DUTXLYR PXLWR JUDQGH SDUD TXH SRVVDP VHU WUDQVPLWLGDV PDLV UDSLGDPHQWH +RMH PXLWRV VLWHV H SURJUDPDV SRVVXHP FKDWV EDWH SDSR FRP VXSRUWH SDUD ZHEFDP 2V SDUWLFLSDQWHV SRGHP FRQYHUVDU H YLVXDOL]DU D LPDJHP XP GR RXWUR HQTXDQWR FRQYHUVDP 1RV ODSWRSV H QRWHERRNV PDLV PRGHUQRV D FkPHUD Mi YHP LQWHJUDGD DR FRPSXWDGRU Saída 6mR GLVSRVLWLYRV XWLOL]DGRV SDUD VDtGD GH GDGRV GR FRPSXWDGRU SRU H[HPSOR PRQLWRU LPSUHVVRUD SURMHWRU FDL[D GH VRP HWF

Didatismo e Conhecimento

15


CONHECIMENTOS DE INFORMร TICA Monitor e XP GLVSRVLWLYR ItVLFR VHPHOKDQWH D XPD WHOHYLVmR TXH WHP D IXQomR GH H[LELU D VDtGD GH GDGRV $ TXDOLGDGH GR TXH p PRVWUDGR QD WHOD GHSHQGH GD UHVROXomR GR PRQLWRU GHVLJQDGD SHORV SRQWRV SL[HOV 3LFWXUH (OHPHQWV TXH SRGHP VHU UHSUHVHQWDGRV QD VXD VXSHUItFLH 7RGDV DV LPDJHQV TXH YRFr Yr QD WHOD VmR FRPSRVWDV GH FHQWHQDV RX PLOKDUHV GH SRQWRV JUiยฟFRV RX SL[HOV 4XDQWR PDLV SL[HOV PDLRU D UHVROXomR H PDLV GHWDOKDGD VHUi D LPDJHP QD WHOD 8PD UHVROXomR GH [ VLJQLยฟFD SL[HOV SRU OLQKD H OLQKDV QD WHOD UHVXOWDQGR HP SL[HOV $ SODFD JUiยฟFD SHUPLWH TXH DV LQIRUPDo}HV VDLDP GR FRPSXWDGRU H VHMDP DSUHVHQWDGDV QR PRQLWRU $ SODFD GHWHUPLQD TXDQWDV FRUHV YRFr YHUi H TXDO D TXDOLGDGH GRV JUiยฟFRV H LPDJHQV DSUHVHQWDGDV Os primeiros monitores eram monocromรกticos, ou seja, apresentavam apenas uma cor e suas tonalidades, mostrando os textos HP EUDQFR RX YHUGH VREUH XP IXQGR SUHWR 'HSRLV VXUJLUDP RV SROLFURPiWLFRV WUDEDOKDQGR FRP YiULDV FRUHV H VXDV WRQDOLGDGHV $ WHFQRORJLD XWLOL]DGD QRV PRQLWRUHV WDPEpP WHP DFRPSDQKDGR R PHUFDGR GH LQIRUPiWLFD 3URFXURX VH UHGX]LU R FRQVXPR GH HQHUJLD H D HPLVVmR GH UDGLDomR HOHWURPDJQpWLFD 2XWUDV LQRYDo}HV FRPR FRQWUROHV GLJLWDLV WHOD SODQD H UHFXUVRV PXOWLPtGLD FRQWULEXtUDP QDV PXGDQoDV 1RV GHVNWRSV PDLV DQWLJRV XWLOL]DYD VH D &DWRGLF 5D\V 7XEH &57 TXH XVDYD R WXER GH FLQHVFySLR R PHVPR SULQFtSLR GD 79 HP TXH XP FDQKmR GLVSDUD SRU WUiV R IHL[H GH OX] H D LPDJHP p PRVWUDGD QR YtGHR 8PD JUDQGH HYROXomR IRL R VXUJLPHQWR GH XPD WHOD HVSHFLDO D /LTXLG &U\VWDO 'LVSOD\ /&' 7HOD GH &ULVWDO /tTXLGR A tecnologia LCD troca o tubo de cinescรณpio por minรบsculos cristais lรญquidos na formaรงรฃo dos feixes de luz atรฉ a montagem dos SL[HOV &RP HVWH UHFXUVR SRGH VH DXPHQWDU D iUHD ~WLO GD WHOD 2V PRQLWRUHV /&' SHUPLWHP TXDOLGDGH QD YLVLELOLGDGH GD LPDJHP GHSHQGHQGR GR WLSR GH WHOD ส TXH SRGH VHU x Matriz ativa: maior contraste, nitidez e amplo campo de visรฃo x Matriz passiva: menor tempo de resposta nos movimentos de vรญdeo $OpP GR &57 H GR /&' XPD QRYD WHFQRORJLD HVWD JDQKDQGR IRUoD QR PHUFDGR R /(' $ SULQFLSDO GLIHUHQoD HQWUH /(' [ /&' HVWi GLUHWDPHQWH OLJDGR j WHOD (P YH] GH FpOXODV GH FULVWDO OtTXLGR RV /(' SRVVXHP GLRGRV HPLVVRUHV GH OX] /LJKW (PLWWLQJ 'LRGH TXH IRUQHFHP R FRQMXQWR GH OX]HV EiVLFDV YHUGH YHUPHOKR H D]XO (OHV QmR DTXHFHP SDUD HPLWLU OX] H QmR SUHFLVDP GH XPD OX] EUDQFD SRU WUiV R TXH SHUPLWH LOXPLQDU DSHQDV RV SRQWRV QHFHVViULRV QD WHOD &RPR UHVXOWDGR HOH FRQVXPH DWp PHQRV HQHUJLD $ GHยฟQLomR GH FRUHV WDPEpP p VXSHULRU SULQFLSDOPHQWH GR SUHWR TXH SRVVXL ยฟGHOLGDGH QmR HQFRQWUDGD HP QHQKXPD GDV GHPDLV WHFQRORJLDV GLVSRQtYHLV QR PHUFDGR 6HP WRGR R DSDUDWR TXH R /&' SUHFLVD SRU WUiV R /(' WDPEpP SRGH VHU PDLV ยฟQD SRGHQGR FKHJDU D DSHQDV XPD SROHJDGD GH HVSHVVXUD ,VVR UHVXOWDGR QXP PRQLWRU GH GHVLJQ PDLV DJUDGiYHO H EHP PDLV OHYH Ainda รฉ possรญvel encontrar monitores CRT (que usavam o tubo de cinescรณpio), mas os fabricantes, no entanto, nรฃo deram contiQXLGDGH j SURGXomR GRV HTXLSDPHQWRV FRP WXER GH LPDJHP 2V SULPHLURV PRQLWRUHV WLQKDP XP WDPDQKR GH JHUDOPHQWH RX SROHJDGDV &RP SURยฟVVLRQDLV WUDEDOKDQGR FRP LPDJHQV FRUHV PRYLPHQWRV H DQLPDo}HV PXOWLPtGLD VHQWLX VH D QHFHVVLGDGH GH SURGX]LU WHODV PDLRUHV +RMH RV PRQLWRUHV VmR YHQGLGRV QRV PDLV GLIHUHQWHV IRUPDWRV H WDPDQKRV $V WHOHYLV}HV PDLV PRGHUQDV DSUHVHQWDP XPD HQWUDGD 9*$ RX +'0, SDUD TXH FRPSXWDGRUHV VHMDP FRQHFWDGRV D HODV Impressora Jato de Tinta

$WXDOPHQWH DV LPSUHVVRUDV D MDWR GH WLQWD RX LQNMHW FRPR WDPEpP VmR FKDPDGDV VmR DV PDLV SRSXODUHV GR PHUFDGR 6LOHQFLRVDV HODV RIHUHFHP TXDOLGDGH GH LPSUHVVmR H HยฟFLrQFLD A impressora jato de tinta forma imagens lanรงando a tinta diretamente sobre o papel, produzindo os caracteres como se fossem FRQWtQXRV ,PSULPH VREUH SDSpLV HVSHFLDLV H WUDQVSDUrQFLDV H VmR EDVWDQWH YHUViWHLV 3RVVXHP IRQWHV WLSRV GH OHWUDV LQWHUQDV H DFHLWDP IRQWHV YLD VRIWZDUH 7DPEpP SUHSDUDP GRFXPHQWRV HP SUHWR H EUDQFR H SRVVXHP FDUWXFKRV GH WLQWD LQGHSHQGHQWHV XP SUHWR H RXWUR FRORULGR Didatismo e Conhecimento

16


CONHECIMENTOS DE INFORMĂ TICA Impressora Laser

$V LPSUHVVRUDV D ODVHU DSUHVHQWDP HOHYDGD TXDOLGDGH GH LPSUHVVmR DOLDGD D XPD YHORFLGDGH PXLWR VXSHULRU 8WLOL]DP IROKDV DYXOVDV H VmR EDVWDQWH VLOHQFLRVDV 3RVVXHP IRQWHV LQWHUQDV H WDPEpP DFHLWDP IRQWHV YLD VRIWZDUH GHSHQGHQGR GD TXDQWLGDGH GH PHPyULD $OJXPDV SRVVXHP XP UHFXUVR TXH DMXVWD DXWRPDWLFDPHQWH DV FRQ¿JXUDo}HV GH FRU HOLPLQDQGR D IDOWD GH SUHFLVmR QD LPSUHVVmR FRORULGD SRGHQGR DWLQJLU XPD UHVROXomR GH GSL GRWV SHU LQFK SRQWRV SRU SROHJDGD Impressora a Cera Categoria de impressora criada para ter cor no impresso com qualidade de laser, porÊm o custo elevado de manutenção aliado ao VXUJLPHQWR GD ODVHU FRORULGD ¿]HUDP HVVD WHFQRORJLD VHU HVTXHFLGD $ LGHLD DTXL p XVDU XPD VXEOLPDomR GH FHUD DTXHOD GR OiSLV GH FHUD SDUD ID]HU LPSUHVVmR Plotters

Outro dispositivo utilizado para impressão Ê a plotter, que Ê uma impressora destinada a imprimir desenhos em grandes dimenV}HV FRP HOHYDGD TXDOLGDGH H ULJRU FRPR SODQWDV DUTXLWHW{QLFDV PDSDV FDUWRJUi¿FRV SURMHWRV GH HQJHQKDULD H JUD¿VPR RX VHMD D LPSUHVVRUD SORWWHU p GHVWLQDGD jV DUWHV JUi¿FDV HGLWRUDomR HOHWU{QLFD H iUHDV GH &$' &$0 9iULRV PRGHORV GH LPSUHVVRUD SORWWHU WrP UHVROXomR GH GSL PDV DOJXQV SRGHP FKHJDU D SRQWRV SRU SROHJDGD SHUPLWLQGR LPSULPLU DSUR[LPDGDPHQWH SiJLQDV SRU PLQXWR QR SDGUmR GH SDSHO XWLOL]DGR HP LPSUHVVRUDV D ODVHU Existe a plotter que imprime materiais coloridos com largura de atÊ três metros (são usadas em empresas que imprimem grandes YROXPHV H XWLOL]DP YiULRV IRUPDWRV GH SDSHO Projetor e XP HTXLSDPHQWR PXLWR XWLOL]DGR HP DSUHVHQWDo}HV PXOWLPtGLD Antigamente, as informaçþes de uma apresentação eram impressas em transparências e ampliadas num retroprojetor, mas, com R DYDQoR WHFQROyJLFR RV SURMHWRUHV WrP DX[LOLDGR PXLWR QHVWD iUHD Quando conectados ao computador, esses equipamentos reproduzem o que estå na tela do computador em dimensþes ampliadas, SDUD TXH YiULDV SHVVRDV YHMDP DR PHVPR WHPSR Didatismo e Conhecimento

17


CONHECIMENTOS DE INFORMÁTICA Entrada/Saída 6mR GLVSRVLWLYRV TXH SRVVXHP WDQWR D IXQomR GH LQVHULU GDGRV TXDQWR VHUYLU GH VDtGD GH GDGRV ([HPSORV SHQ GULYH PRGHP &' 5: '9' 5: WHOD VHQVtYHO DR WRTXH LPSUHVVRUD PXOWLIXQFLRQDO HWF IMPORTANTE: A impressora multifuncional SRGH VHU FODVVL¿FDGD FRPR SHULIpULFR GH (QWUDGD 6DtGD SRLV VXD SULQFLSDO FDUDFWHUtVWLFD p D GH UHDOL]DU RV SDSHLV GH LPSUHVVRUD 6DtGD H VFDQQHU (QWUDGD QR PHVPR GLVSRVLWLYR BARRAMENTOS – CONCEITOS GERAIS 2V EDUUDPHQWRV FRQKHFLGRV FRPR %86 HP LQJOrV VmR FRQMXQWRV GH ¿RV TXH QRUPDOPHQWH HVWmR SUHVHQWHV HP WRGDV DV SODFDV GR FRPSXWDGRU Na verdade existe barramento em todas as placas de produtos eletrônicos, porém em outros aparelhos os técnicos referem-se aos EDUUDPHQWRV VLPSOHVPHQWH FRPR R ³LPSUHVVR GD SODFD´ %DUUDPHQWR p XP FRQMXQWR GH D ¿RV TXH ID]HP D FRPXQLFDomR HQWUH WRGRV RV GLVSRVLWLYRV GR FRPSXWDGRU 8&3 PHPyULD GLVSRVLWLYRV GH HQWUDGD H VDtGD H RXWURV 2V VLQDLV WtSLFRV HQFRQWUDGRV QR EDUUDPHQWR VmR GDGRV FORFN HQGHUHoRV H FRQWUROH 2V GDGRV WUDIHJDP SRU PRWLYRV FODURV GH QHFHVVLGDGH GH VHUHP OHYDGRV jV PDLV GLYHUVDV SRUo}HV GR FRPSXWDGRU 2V HQGHUHoRV HVWmR SUHVHQWHV SDUD LQGLFDU D ORFDOL]DomR SDUD RQGH RV GDGRV YmR RX YrP 2 FORFN WUDIHJD QRV EDUUDPHQWRV FRQKHFLGRV FRPR VtQFURQRV SRLV RV GLVSRVLWLYRV VmR REULJDGRV D VHJXLU XPD VLQFURQLD GH WHPSR SDUD VH FRPXQLFDUHP O controle existe para informar aos dispositivos envolvidos na transmissão do barramento se a operação em curso é de escrita, OHLWXUD UHVHW RX RXWUD TXDOTXHU $OJXQV VLQDLV GH FRQWUROH VmR EDVWDQWH FRPXQV 0HPRU\ :ULWH &DXVD D HVFULWD GH GDGRV GR EDUUDPHQWR GH GDGRV QR HQGHUHoR HVSHFL¿FDGR QR EDUUDPHQWR GH HQGHUHoRV 0HPRU\ 5HDG &DXVD GDGRV GH XP GDGR HQGHUHoR HVSHFL¿FDGR SHOR EDUUDPHQWR GH HQGHUHoR D VHU SRVWR QR EDUUDPHQWR GH GDGRV , 2 :ULWH &DXVD GDGRV QR EDUUDPHQWR GH GDGRV VHUHP HQYLDGRV SDUD XPD SRUWD GH VDtGD GLVSRVLWLYR GH , 2 , 2 5HDG &DXVD D OHLWXUD GH GDGRV GH XP GLVSRVLWLYR GH , 2 RV TXDLV VHUmR FRORFDGRV QR EDUUDPHQWR GH GDGRV %XV UHTXHVW ,QGLFD TXH XP PyGXOR SHGH FRQWUROH GR EDUUDPHQWR GR VLVWHPD 5HVHW ,QLFLDOL]D WRGRV RV PyGXORV 7RGR EDUUDPHQWR p LPSOHPHQWDGR VHJXLQGR XP FRQMXQWR GH UHJUDV GH FRPXQLFDomR HQWUH GLVSRVLWLYRV FRQKHFLGR FRPR %86 67$1'$5' RX VLPSOHVPHQWH 35272&2/2 '( %$55$0(172 TXH YHP D VHU XP SDGUmR TXH TXDOTXHU GLVSRVLWLYR TXH TXHLUD VHU FRPSDWtYHO FRP HVWH EDUUDPHQWR GHYD FRPSUHHQGHU H UHVSHLWDU 0DV XP SRQWR VHPSUH p FHUWH]D WRGR GLVSRVLWLYR GHYH VHU ~QLFR no acesso ao barramento, porque os dados trafegam por toda a extensão da placa-mãe ou de qualquer outra placa e uma mistura de GDGRV VHULD R FDRV SDUD R IXQFLRQDPHQWR GR FRPSXWDGRU 2V EDUUDPHQWRV WrP FRPR SULQFLSDLV YDQWDJHQV R IDWR GH VHU R PHVPR FRQMXQWR GH ¿RV TXH p XVDGR SDUD WRGRV RV SHULIpULFRV R TXH EDUDWHLD R SURMHWR GR FRPSXWDGRU 2XWUR SRQWR SRVLWLYR p D YHUVDWLOLGDGH WHQGR HP YLVWD TXH WRGD SODFD VHPSUH WHP DOJXQV VORWV OLYUHV SDUD D FRQH[mR GH QRYDV SODFDV TXH H[SDQGHP DV SRVVLELOLGDGHV GR VLVWHPD A grande desvantagem dessa idéia é o surgimento de engarrafamentos pelo uso da mesma via por muitos periféricos, o que vem D SUHMXGLFDU D YD]mR GH GDGRV WURXJKSXW Dispositivos conectados ao barramento $WLYRV RX 0HVWUHV GLVSRVLWLYRV TXH FRPDQGDP R DFHVVR DR EDUUDPHQWR SDUD OHLWXUD RX HVFULWD GH GDGRV 3DVVLYRV RX (VFUDYRV GLVSRVLWLYRV TXH VLPSOHVPHQWH REHGHFHP j UHTXLVLomR GR PHVWUH Exemplo: &38 RUGHQD TXH R FRQWURODGRU GH GLVFR OHLD RX HVFUHYD XP EORFR GH GDGRV $ &38 p R PHVWUH H R FRQWURODGRU GH GLVFR p R HVFUDYR Barramentos Comerciais 6HUmR OLVWDGRV DTXL DOJXQV EDUUDPHQWRV TXH IRUDP H DOJXQV TXH DLQGD VmR EDVWDQWH XVDGRV FRPHUFLDOPHQWH ISA – Industry Standard Architeture )RL ODQoDGR HP SHOD ,%0 SDUD VXSRUWDU R QRYR 3& $7 7RUQRX VH GH LPHGLDWR R SDGUmR GH WRGRV RV 3& FRPSDWtYHLV (UD XP EDUUDPHQWR ~QLFR SDUD WRGRV RV FRPSRQHQWHV GR FRPSXWDGRU RSHUDQGR FRP ODUJXUD GH ELWV H FRP FORFN GH 0+]

Didatismo e Conhecimento

18


CONHECIMENTOS DE INFORMÁTICA PCI – Peripheral Components Interconnect 3&, p XP EDUUDPHQWR VtQFURQR GH DOWD SHUIRUPDQFH LQGLFDGR FRPR PHFDQLVPR HQWUH FRQWURODGRUHV DOWDPHQWH LQWHJUDGRV SOXJ LQ SODFDV VLVWHPDV GH SURFHVVDGRUHV PHPyULD )RL R SULPHLUR EDUUDPHQWR D LQFRUSRUDU R FRQFHLWR SOXJ DQG SOD\ 6HX ODQoDPHQWR IRL HP HP FRQMXQWR FRP R SURFHVVDGRU 3(17,80 GD ,QWHO $VVLP R QRYR SURFHVVDGRU UHDOPHQWH IRL UHYROXFLRQiULR SRLV FKHJRX FRP XPD VpULH GH LQRYDo}HV H XP QRYR EDUUDPHQWR 2 3&, IRL GH¿QLGR FRP R REMHWLYR SULPiULR GH HVWDEHOHFHU XP SDGUmR GD LQG~VWULD H XPD DUTXLWHWXUD GH EDUUDPHQWR TXH RIHUHoD EDL[R FXVWR H SHUPLWD GLIHUHQFLDo}HV QD LPSOHPHQWDomR Componente PCI ou PCI master )XQFLRQD FRPR XPD SRQWH HQWUH SURFHVVDGRU H EDUUDPHQWR 3&, QR TXDO GLVSRVLWLYRV DGG LQ FRP LQWHUIDFH 3&, HVWmR FRQHFWDGRV - Add-in cards interface 3RVVXHP GLVSRVLWLYRV TXH XVDP R SURWRFROR 3&, 6mR JHUHQFLDGRV SHOR 3&, PDVWHU H VmR WRWDOPHQWH SURJUDPiYHLV AGP – Advanced Graphics Port (VVH EDUUDPHQWR SHUPLWH TXH XPD SODFD FRQWURODGRUD JUi¿FD $*3 VXEVWLWXD D SODFD JUi¿FD QR EDUUDPHQWR 3&, 2 &KLS FRQWURODGRU $*3 VXEVWLWXL R FRQWURODGRU GH ( 6 GR EDUUDPHQWR 3&, 2 QRYR FRQMXQWR $*3 FRQWLQXD FRP IXQo}HV KHUGDGDV GR 3&, 2 FRQMXQWR faz a transferência de GDGRV HQWUH PHPyULD R SURFHVVDGRU H R FRQWURODGRU ,6$ WXGR VLPXOWDQHDPHQWH 3HUPLWH DFHVVR GLUHWR PDLV UiSLGR j PHPyULD 3HOD SRUWD JUi¿FD DFHOHUDGRUD D SODFD WHP DFHVVR GLUHWR j 5$0 HOLPLQDQGR D QHFHVVLGDGH GH XPD 95$0 YtGHR 5$0 QD SUySULD SODFD SDUD DUPD]HQDU JUDQGHV DUTXLYRV GH ELWV FRPR PDSDV H WH[WXUD 2 XVR GHVVH EDUUDPHQWR LQLFLRX VH DWUDYpV GH SODFDV PmH TXH XVDYDP R FKLSVHW L /; GD ,QWHO Mi TXH HVVH FKLSVHW IRL R SULPHLUR D WHU VXSRUWH DR $*3 $ SULQFLSDO YDQWDJHP GHVVH EDUUDPHQWR p R XVR GH XPD PDLRU TXDQWLGDGH GH PHPyULD SDUD DUPD]HQDPHQWR GH WH[WXUDV SDUD REMHWRV WULGLPHQVLRQDLV DOpP GD DOWD YHORFLGDGH QR DFHVVR D HVVDV WH[WXUDV SDUD DSOLFDomR QD WHOD 2 SULPHLUR $*3 ; WUDEDOKDYD D 0+] R TXH SURSRUFLRQD XPD YHORFLGDGH YH]HV PDLRU TXH R 3&, $OpP GLVVR VXD WD[D GH WUDQVIHUrQFLD FKHJDYD D 0% SRU VHJXQGR TXDQGR RSHUDQGR QR HVTXHPD GH YHORFLGDGH ; H D 0% TXDQGR QR HVTXHPD GH YHORFLGDGH ; ([LVWHP WDPEpP DV YHUV}HV ; ; H ; *HUDOPHQWH Vy VH HQFRQWUD XP ~QLFR VORW QDV SODFDV PmH YLVWR TXH R $*3 Vy LQWHUHVVD jV SODFDV GH YtGHR PCI Express 1D EXVFD GH XPD VROXomR SDUD DOJXPDV OLPLWDo}HV GRV EDUUDPHQWRV $*3 H 3&, D LQG~VWULD GH WHFQRORJLD WUDEDOKD QR EDUUDPHQWR 3&, ([SUHVV FXMR QRPH LQLFLDO HUD *,2 7UDWD VH GH XP SDGUmR TXH SURSRUFLRQD DOWDV WD[DV GH WUDQVIHUrQFLD GH GDGRV HQWUH R FRPSXWDGRU HP VL H XP GLVSRVLWLYR SRU H[HPSOR HQWUH D SODFD PmH H XPD SODFD GH YtGHR ' $ WHFQRORJLD 3&, ([SUHVV FRQWD FRP XP UHFXUVR TXH SHUPLWH R XVR GH XPD RX PDLV FRQH[}HV VHULDLV WDPEpP FKDPDGRV GH ODQHV SDUD WUDQVIHUrQFLD GH GDGRV 6H XP GHWHUPLQDGR GLVSRVLWLYR XVD XP FDPLQKR HQWmR GL] VH TXH HVVH XWLOL]D R EDUUDPHQWR 3&, ([SUHVV ; VH XWLOL]D ODQHV VXD GHQRPLQDomR p 3&, ([SUHVV ; H DVVLP SRU GLDQWH &DGD ODQH SRGH VHU ELGLUHFLRQDO RX VHMD UHFHEH H HQYLD GDGRV &DGD FRQH[mR XVDGD QR 3&, ([SUHVV WUDEDOKD FRP ELWV SRU YH] VHQGR HP FDGD GLUHomR $ IUHT rQFLD XVDGD p GH *+] PDV HVVH YDORU SRGH YDULDU $VVLP VHQGR R 3&, ([SUHVV ; FRQVHJXH WUDEDOKDU FRP WD[DV GH 0% SRU VHJXQGR XP YDORU EHP PDLRU TXH RV 0% GR SDGUmR 3&, (VVH EDUUDPHQWR WUDEDOKD FRP DWp ; R HTXLYDOHQWH D 0% SRU VHJXQGR $ WDEHOD DEDL[R PRVWUD RV YDORUHV GDV WD[DV GR 3&, ([SUHVV FRPSDUDGDV jV WD[DV GR SDGUmR $*3 e LPSRUWDQWH IULVDU TXH R SDGUmR ; IRL SRXFR XWLOL]DGR H GHYLGR D LVVR Ki HPSUHVDV TXH FKDPDP R 3& , ([SUHVV ; GH 3&, ([SUHVV ; $VVLP VHQGR R SDGUmR 3&, ([SUHVV ; SRGH UHSUHVHQWDU WDPEpP WD[DV GH WUDQVIHUrQFLD GH GDGRV GH 0% SRU VHJXQGR $ ,QWHO p XPD GDV JUDQGHV SUHFXUVRUDV GH LQRYDo}HV WHFQROyJLFDV 1R LQtFLR GH HP XP HYHQWR SUySULR D HPSUHVD PRVWURX D QHFHVVLGDGH GH FULDomR GH XPD WHFQRORJLD FDSD] GH VXEVWLWXLU R SDGUmR 3&, WUDWDYD VH GR *,2 7KLUG *HQHUDWLRQ , 2 ± JHUDomR GH (QWUDGD H 6DtGD (P DJRVWR GHVVH PHVPR DQR XP JUXSR GH empresas chamado de 3&, 6,* FRPSRVWR SRU FRPSDQKLDV FRPR ,%0 $0' H 0LFURVRIW DSURYRX DV SULPHLUDV HVSHFL¿FDo}HV GR *,2

Didatismo e Conhecimento

19


CONHECIMENTOS DE INFORMÁTICA (QWUH RV TXHVLWRV OHYDQWDGRV QHVVDV HVSHFL¿FDo}HV HVWmR RV TXH VH VHJXHP VXSRUWH DR EDUUDPHQWR 3&, SRVVLELOLGDGH GH XVR GH PDLV GH XPD ODQH VXSRUWH D RXWURV WLSRV GH FRQH[mR GH SODWDIRUPDV PHOKRU JHUHQFLDPHQWR GH HQHUJLD PHOKRU SURWHomR FRQWUD HUURV HQWUH RXWURV (VVH EDUUDPHQWR p IRUWHPHQWH YROWDGR SDUD XVR HP VXEVLVWHPDV GH YtGHR Interfaces – Barramentos Externos Os barramentos circulam dentro do computador, cobrem toda a extensão da placa-mãe e servem para conectar as placas menores HVSHFLDOL]DGDV HP GHWHUPLQDGDV WDUHIDV GR FRPSXWDGRU 0DV RV GLVSRVLWLYRV SHULIpULFRV SUHFLVDP FRPXQLFDUHP VH FRP D 8&3 SDUD LVVR KLVWRULFDPHQWH IRUDP GHVHQYROYLGDV DOJXPDV VROXo}HV GH FRQH[mR WDLV FRPR VHULDO SDUDOHOD 86% H )LUHZLUH 3DVVDQGR DLQGD SRU DOJXPDV VROXo}HV SURSULHWiULDV RX VHMD TXH VRPHQWH IXQFLRQDYDP FRP GHWHUPLQDGR SHULIpULFR H GH GHWHUPLQDGR IDEULFDQWH Interface Serial &RQKHFLGD SRU VHX XVR HP PRXVH H PRGHPV HVWD LQWHUIDFH QR SDVVDGR Mi FRQHFWRX DWp LPSUHVVRUDV 6XD FDUDFWHUtVWLFD IXQGDPHQWDO p TXH RV ELWV WUDIHJDP HP ¿OD XP SRU YH] LVVR WRUQD D FRPXQLFDomR PDLV OHQWD SRUpP R FDER GR GLVSRVLWLYR SRGH VHU PDLV ORQJR DOJXQV FKHJDP DWp D PHWURV GH FRPSULPHQWR ,VVR p ~WLO SDUD XVDU XPD EDUXOKHQWD LPSUHVVRUD PDWULFLDO HP XPD VDOD VHSDUDGD GDTXHOD RQGH R WUDEDOKR DFRQWHFH $V YHORFLGDGHV GH FRPXQLFDomR GHVVD LQWHUIDFH YDULDP GH ESV DWp ESV PRGHPV PDLV UHFHQWHV 1D SDUWH H[WHUQD GR JDELQHWH HVVDV LQWHUIDFHV VmR UHSUHVHQWDGDV SRU FRQHFWRUHV '% RX '% PDFKRV FRQIRUPH D ¿JXUD D VHJXLU Interface Paralela &ULDGD SDUD VHU XPD RSomR iJLO HP UHODomR j VHULDO HVVD LQWHUIDFH WUDQVPLWH XP E\WH GH FDGD YH] 'HYLGR DRV ELWV HP SDUDOHOR H[LVWH XP 5,6&R GH LQWHUIHUrQFLD QD FRUUHQWH HOpWULFD GRV FRQGXWRUHV TXH IRUPDP R FDER 3RU HVVH PRWLYR RV FDERV GH FRPXQLFDomR GHVWD LQWHUIDFH VmR PDLV FXUWRV QRUPDOPHQWH IXQFLRQDP PXLWR EHP DWp D GLVWkQFLD GH PHWUR HPERUD H[LVWD QR PHUFDGR FDERV SDUDOHORV GH DWp PHWURV GH FRPSULPHQWR $ YHORFLGDGH GH WUDQVPLVVmR GHVWD SRUWD FKHJD DWp D 0% SRU VHJXQGR 1RV JDELQHWHV GRV FRPSXWDGRUHV HVVD SRUWD p HQFRQWUDGD QD IRUPD GH FRQHFWRUHV '% IrPHDV 1DV LPSUHVVRUDV QRUPDOPHQWH RV FRQHFWRUHV SDUDOHORV VmR FRQKHFLGRV FRPR LQWHUIDFH FHQWURQLFV 9HMD DV LOXVWUDo}HV USB – Universal Serial Bus 2 86% ,PSOHPHQWHUV )RUXP KWWS ZZZ XVE RUJ TXH p R JUXSR GH IDEULFDQWHV TXH GHVHQYROYHX R EDUUDPHQWR 86% Mi GHVHQYROYHX D VHJXQGD YHUVmR GR 86% FKDPDGD 86% RX +LJK VSHHG 86% (VVD QRYD YHUVmR GR 86% SRVVXL XPD WD[D Pi[LPD GH WUDQVIHUrQFLD GH 0ESV DSUR[LPDGDPHQWH 0% V RX VHMD XPD WD[D PDLRU TXH D GR )LUHZLUH H PXLWR PDLRU GR TXH D YHUVmR DQWHULRU GR 86% FKDPDGD TXH SHUPLWH D FRQH[mR GH SHULIpULFRV XVDQGR WD[DV GH WUDQVIHUrQFLD GH 0ESV DSUR[LPDGDPHQWH 0% V RX 0ESV DSUR[LPDGDPHQWH .% V GHSHQGHQGR GR SHULIpULFR $ SRUWD 86% FRQWLQXD FRPSDWtYHO FRP SHULIpULFRV 86% $R LQLFLDU D FRPXQLFDomR FRP XP SHULIpULFR D SRUWD WHQWD FRPXQLFDU VH D 0ESV &DVR QmR WHQKD r[LWR HOD DEDL[D D VXD YHORFLGDGH SDUD 0ESV &DVR D FRPXQLFDomR WDPEpP QmR FRQVLJD VHU HIHWXDGD D YHORFLGDGH p HQWmR DEDL[DGD SDUD 0ESV &RP LVVR RV XVXiULRV QmR GHYHP VH SUHRFXSDU FRP RV SHULIpULFRV 86% TXH Mi SRVVXHP HOHV FRQWLQXDUmR FRPSDWtYHLV FRP R QRYR SDGUmR 2V FRPSXWDGRUHV FRP LQWHUIDFHV 86% DFHLWDP DWp GLVSRVLWLYRV FRQHFWDGRV ¬V YH]HV DV SODFDV WrP GH D FRQHFWRUHV 86% 3DUD UHVROYHU LVVR VmR YHQGLGRV RV KXEV 86% 8P GHWDOKH LPSRUWDQWtVVLPR p TXH KXEV 86% QmR FRQVHJXHP HVWDEHOHFHU FRQH[}HV D 0ESV SDUD SHULIpULFRV FRQHFWDGRV D HOHV 1HVVH FDVR HVWHV KXEV DWXDP FRPR JDUJDORV GH FRQH[mR 6HPSUH TXH SXGHU HVFROKHU Gr SUHIHUrQFLD D GLVSRVLWLYRV 86% 2XWUR IDWR LQWHUHVVDQWH WDPEpP p R SDGUmR GR FDER 86% PDLV SUHFLVDPHQWH GH VHXV FRQHFWRUHV e IDWR TXH DOJXQV IDEULFDQWHV GH câmeras e outros dispositivos podem tentar criar conectores proprietários SDUD VXDV LQWHUIDFHV 86% VHPSUH UHVSHLWDQGR D SRQWD TXH VH OLJD QR FRPSXWDGRU FRQHFWRU $ 0DV D JUDQGH PDLRULD GRV IDEULFDQWHV GH GLVSRVLWLYRV HOHWU{QLFRV HP JHUDO VH XVD 86% UHVSHLWD R SDGUmR GH FRQHFWRUHV DSUHVHQWDGR QD ¿JXUD DEDL[R 3RUWDQWR R FDER GDTXHOD FkPHUD TXH IRL HVTXHFLGR HP XPD YLDJHP SRGH IDFLOPHQWH VHU VXEVWLWXtGR DJRUD EDVWD UHVSHLWDU R WLSR GH FRQHFWRU XVDGR QR SURGXWR

Didatismo e Conhecimento

20


CONHECIMENTOS DE INFORMĂ TICA Firewire 2 EDUUDPHQWR ÂżUHZLUH WDPEpP FRQKHFLGR FRPR ,((( RX FRPR L /LQN p XP EDUUDPHQWR GH JUDQGH YROXPH GH WUDQVIHUrQFLD GH GDGRV HQWUH FRPSXWDGRUHV SHULIpULFRV H DOJXQV SURGXWRV HOHWU{QLFRV GH FRQVXPR Foi desenvolvido inicialmente pela Apple como um barramento serial de alta velocidade, mas eles estavam muito Ă frente da UHDOLGDGH DLQGD PDLV FRP QD pSRFD D DOWHUQDWLYD GR EDUUDPHQWR 86% TXH Mi SRVVXtD ERD YHORFLGDGH HUD EDUDWR H UDSLGDPHQWH LQWHJUDGR QR PHUFDGR &RP LVVR D $SSOH PHVPR LQFOXLQGR HVVH WLSR GH FRQH[mR SRUWDV QR 0DF SRU DOJXP WHPSR D UHDOLGDGH ÂłGH IDWR´ HUD D QmR H[LVWrQFLD GH XWLOLGDGH SDUD HODV GHYLGR j IDOWD GH SHULIpULFRV SDUD VHX XVR 3RUpP R GHVHQYROYLPHQWR FRQWLQXRX VHQGR IRFDGR SULQFLSDOPHQWH SHOD iUHD GH YtGHR TXH SRGHULD WLUDU JUDQGHV SURYHLWRV GD PDLRU YHORFLGDGH TXH HOH RIHUHFLD Suas principais vantagens: ‡ 6mR VLPLODUHV DR SDGUmR 86% ‡ &RQH[}HV VHP QHFHVVLGDGH GH GHVOLJDPHQWR ERRW GR PLFUR KRW SOXJDEOH ‡ &DSDFLGDGH GH FRQHFWDU PXLWRV GLVSRVLWLYRV DWp SRU SRUWD ‡ 3HUPLWH DWp EDUUDPHQWRV FRQHFWDGRV HQWUH VL ‡ 7UDQVPLWH GLIHUHQWHV WLSRV GH VLQDLV GLJLWDLV vĂ­deo, ĂĄudio, MIDI, comandos de controle de dispositivo, etc; ‡ 7RWDOPHQWH 'LJLWDO VHP D QHFHVVLGDGH GH FRQYHUVRUHV DQDOyJLFR GLJLWDO H SRUWDQWR PDLV VHJXUR H UiSLGR ‡ 'HYLGR D VHU GLJLWDO ÂżVLFDPHQWH p XP FDER ÂżQR Ă€H[tYHO EDUDWR H VLPSOHV ‡ &RPR p XP EDUUDPHQWR VHULDO SHUPLWH FRQH[mR EHP IDFLOLWDGD OLJDQGR XP GLVSRVLWLYR DR RXWUR VHP D QHFHVVLGDGH GH FRQH[mR DR PLFUR VRPHQWH XPD SRQWD p FRQHFWDGD QR PLFUR $ GLVWkQFLD GR FDER p OLPLWDGD D PHWURV DQWHV GH KDYHU GLVWRUo}HV QR VLQDO SRUpP UHVWULQJLQGR D YHORFLGDGH GR EDUUDPHQWR SRGHP VH DOFDQoDU PDLRUHV GLVWkQFLDV GH FDER DWp PHWURV /HPEUDQGR TXH HVVHV YDORUHV VmR SDUD GLVWkQFLDV Âł(175( 3(5,)e5,&26´ H 6(0 $ 87,/,=$d­2 '( 75$16&(,9(56 FRP WUDQVFHLYHUV D SUHYLVmR p FKHJDU D DWp PHWURV XVDQGR ÂżEUD yWLFD 2 EDUUDPHQWR ÂżUHZLUH SHUPLWH D XWLOL]DomR GH GLVSRVLWLYRV GH GLIHUHQWHV YHORFLGDGHV 0E V QR PHVPR EDUUDPHQWR 2 VXSRUWH D HVVH EDUUDPHQWR HVWi QDWLYDPHQWH HP 0DFV H HP 3&V DWUDYpV GH SODFDV GH H[SDQVmR HVSHFtÂżFDV RX LQWHJUDGDV FRP SODFDV GH FDSWXUD GH YtGHR RX GH VRP Os principais usos que estĂŁo sendo direcionados a essa interface, devido Ă s caracterĂ­sticas listadas, sĂŁo na ĂĄrea de multimĂ­dia, HVSHFLDOPHQWH QD FRQH[mR GH GLVSRVLWLYRV GH YtGHR SODFDV GH FDSWXUD FkPHUDV 79V GLJLWDLV VHWXS ER[HV KRPH WKHDWKHU HWF PROCESSADORES 2V SURFHVVDGRUHV RX &38 GH &HQWUDO 3URFHVVLQJ 8QLW 8QLGDGH &HQWUDO GH 3URFHVVDPHQWR VmR FKLSV UHVSRQViYHLV SHOD H[HFXomR GH FiOFXORV GHFLV}HV OyJLFDV H LQVWUXo}HV TXH UHVXOWDP HP WRGDV DV WDUHIDV TXH XP FRPSXWDGRU SRGH ID]HU 3RU HVWH PRWLYR VmR WDPEpP UHIHUHQFLDGRV FRPR ÂłFpUHEURV´ GHVWDV PiTXLQDV Apesar de nĂŁo haver um nĂşmero muito grande de fabricantes - a maior parte do mercado estĂĄ concentrada nas mĂŁos da Intel e da AMD, com companhias como Samsung e Qualcomm se destacando no segmento mĂłvel -, existe uma grande variedade de procesVDGRUHV SDUD RV PDLV YDULDGRV ÂżQV DISPOSITIVOS DE ARMAZENAMENTO 'LVSRVLWLYR GH DUPD]HQDPHQWR p XP GLVSRVLWLYR FDSD] GH DUPD]HQDU LQIRUPDo}HV GDGRV SDUD SRVWHULRU FRQVXOWD RX XVR (VVD JUDvação de dados pode ser feita praticamente usando qualquer forma de energia, desde força manual humana como na escrita, passando SRU YLEUDo}HV DF~VWLFDV HP JUDYDo}HV IRQRJUiÂżFDV DWp PRGXODomR GH HQHUJLD HOHWURPDJQpWLFD HP ÂżWDV PDJQpWLFDV H GLVFRV ySWLFRV 8P GLVSRVLWLYR GH DUPD]HQDPHQWR SRGH JXDUGDU LQIRUPDomR SURFHVVDU LQIRUPDomR RX DPERV 8P GLVSRVLWLYR TXH VRPHQWH JXDUGD LQIRUPDomR p FKDPDGR PtGLD GH DUPD]HQDPHQWR 'LVSRVLWLYRV TXH SURFHVVDP LQIRUPDo}HV HTXLSDPHQWR GH DUPD]HQDPHQWR GH GDGRV SRGHP WDQWR DFHVVDU XPD PtGLD GH JUDYDomR SRUWiWLO RX SRGHP WHU XP FRPSRQHQWH SHUPDQHQWH TXH DUPD]HQD H UHFXSHUD GDGRV Didatismo e Conhecimento

21


CONHECIMENTOS DE INFORMÁTICA $UPD]HQDPHQWR HOHWU{QLFR GH GDGRV p R DUPD]HQDPHQWR TXH UHTXHU HQHUJLD HOpWULFD SDUD DUPD]HQDU H UHFXSHUDU GDGRV $ PDLRULD GRV GLVSRVLWLYRV GH DUPD]HQDPHQWR TXH QmR UHTXHUHP YLVmR H XP FpUHEUR SDUD OHU RV GDGRV VH HQTXDGUDP QHVWD FDWHJRULD 'DGRV HOHWURPDJQpWLFRV SRGHP VHU DUPD]HQDGRV HP IRUPDWR DQDOyJLFR RX GLJLWDO HP XPD YDULHGDGH GH PtGLDV (VWH WLSR GH GDGRV p FRQVLGHUDGR HOHWURQLFDPHQWH FRGL¿FDGR VHQGR RX QmR DUPD]HQDGR HOHWURQLFDPHQWH HP XP GLVSRVLWLYR VHPLFRQGXWRU FKLS XPD YH] TXH FHUWDPHQWH XP GLVSRVLWLYR VHPLFRQGXWRU IRL XWLOL]DGR SDUD JUDYi OD HP VHX PHLR $ PDLRULD GDV PtGLDV GH DUPD]HQDPHQWR SURFHVVDGDV HOHWURQLFDmente (incluindo algumas formas de armazenamento de dados de computador) são considerados de armazenamento permanente (não YROiWLO RX VHMD RV GDGRV SHUPDQHFHP DUPD]HQDGRV TXDQGR D HQHUJLD HOpWULFD p UHPRYLGD GR GLVSRVLWLYR (P FRQWUDVWH D PDLRULD GDV informações armazenadas eletronicamente na maioria dos tipos de semicondutores são microcircuitos memória volátil, pois desapareFHP FRP D UHPRomR GD HQHUJLD HOpWULFD Com exceção de Códigos de barras e OCR, o armazenamento eletrônico de dados é mais fácil de se revisar e pode ser mais econômico do que métodos alternativos, devido à exigência menor de espaço físico e à facilidade na troca (re-gravação) de dados na mesma PtGLD (QWUHWDQWR D GXUDELOLGDGH GH PpWRGRV FRPR LPSUHVVmR HP SDSHO p DLQGD VXSHULRU j PXLWDV PtGLDV HOHWU{QLFDV $V OLPLWDo}HV relacionadas à durabilidade podem ser superadas ao se utilizar o método de duplicação dos dados eletrônicos, comumente chamados de FySLD GH VHJXUDQoD RX EDFN XS Tipos de dispositivos de armazenamento: 3RU PHLRV PDJQpWLFRV ([HPSORV 'LVFR 5tJLGR GLVTXHWH 3RU PHLRV ySWLFRV ([HPSORV &' '9' 3RU PHLRV HOHWU{QLFRV 66'V FKLS ([HPSORV FDUWmR GH PHPyULD SHQ GULYH )ULVDQGR TXH 0HPyULD 5$0 p XP GLVSRVLWLYR GH DUPD]HQDPHQWR WHPSRUiULR GH LQIRUPDo}HV Dispositivos de armazenamento por meio magnético Os dispositivos de armazenamento por meio magnético são os mais antigos e mais utilizados atualmente, por permitir uma grande GHQVLGDGH GH LQIRUPDomR RX VHMD DUPD]HQDU JUDQGH TXDQWLGDGH GH GDGRV HP XP SHTXHQR HVSDoR ItVLFR 6mR PDLV DQWLJRV SRUpP IRUDP VH DSHUIHLoRDQGR QR GHFRUUHU GR WHPSR 3DUD D JUDYDomR D FDEHoD GH OHLWXUD H JUDYDomR GR GLVSRVLWLYR JHUD XP FDPSR PDJQpWLFR TXH PDJQHWL]D RV GLSRORV PDJQpWLFRV UHSUHVHQWDQGR DVVLP GtJLWRV ELQiULRV ELWV GH DFRUGR FRP D SRODULGDGH XWLOL]DGD 3DUD D OHLWXUD XP FDPSR PDJQpWLFR p JHUDGR SHOD FDEHoD GH OHLWXUD H JUDYDomR H TXDQGR HP FRQWDWR FRP RV GLSRORV PDJQpWLFRV GD PtGLD YHUL¿FD VH HVWD DWUDL RX UHSHOH R FDPSR PDJQpWLFR VDEHQGR DVVLP VH R SROR HQFRQWUDGR QD PROpFXOD p QRUWH RX VXO &RPR H[HPSOR GH GLVSRVLWLYRV GH DUPD]HQDPHQWR SRU PHLR PDJQpWLFR SRGHPRV FLWDU RV 'LVFRV 5tJLGRV 2V GLVSRVLWLYRV GH DUPD]HQDPHQWR PDJQpWLFRV TXH SRVVXHP PtGLDV UHPRYtYHLV QRUPDOPHQWH QmR SRVVXHP FDSDFLGDGH H FRQ¿DELOLGDGH HTXLYDOHQWH DRV GLVSRVLWLYRV ¿[RV SRLV VXD PtGLD p IUiJLO H SRVVXL FDSDFLGDGH GH DUPD]HQDPHQWR PXLWR SHTXHQD VH FRPSDUDGD D RXWURV WLSRV GH GLVSRVLWLYRV GH DUPD]HQDPHQWR PDJQpWLFRV 'LVSRVLWLYRV GH DUPD]HQDPHQWR SRU PHLR ySWLFR Os dispositivos de armazenamento por meio óptico são os mais utilizados para o armazenamento de informações multimídia, sendo DPSODPHQWH DSOLFDGRV QR DUPD]HQDPHQWR GH ¿OPHV P~VLFD HWF $SHVDU GLVVR WDPEpP VmR PXLWR XWLOL]DGRV SDUD R DUPD]HQDPHQWR GH LQIRUPDo}HV H SURJUDPDV VHQGR HVSHFLDOPHQWH XWLOL]DGRV SDUD D LQVWDODomR GH SURJUDPDV QR FRPSXWDGRU ([HPSORV GH GLVSRVLWLYRV GH DUPD]HQDPHQWR SRU PHLR ySWLFR VmR RV &' 520V &' 5:V '9' 520V '9' 5:V HWF A leitura das informações em uma mídia óptica se dá por meio de um feixe laser de alta precisão, que é projetado na superfície da PtGLD $ VXSHUItFLH GD PtGLD p JUDYDGD FRP VXOFRV PLFURVFySLFRV FDSD]HV GH GHVYLDU R ODVHU HP GLIHUHQWHV GLUHo}HV UHSUHVHQWDQGR DVVLP GLIHUHQWHV LQIRUPDo}HV QD IRUPD GH GtJLWRV ELQiULRV ELWV $ JUDYDomR GDV LQIRUPDo}HV HP XPD PtGLD ySWLFD QHFHVVLWD GH XPD PtGLD HVSHFLDO FXMD VXSHUItFLH p IHLWD GH XP PDWHULDO TXH SRGH VHU ³TXHLPDGR´ SHOR IHL[H ODVHU GR GLVSRVLWLYR GH DUPD]HQDPHQWR FULDQGR DVVLP RV VXOFRV TXH UHSUHVHQWDP RV GtJLWRV ELQiULRV ELWV Dispositivos de armazenamento por meio eletrônico (SSDs) Este tipo de dispositivos de armazenamento é o mais recente e é o que mais oferece perspectivas para a evolução do desempenho QD WDUHID GH DUPD]HQDPHQWR GH LQIRUPDomR (VWD WHFQRORJLD WDPEpP p FRQKHFLGD FRPR PHPyULDV GH HVWDGR VyOLGR RX 66'V VROLG VWDWH GULYH SRU QmR SRVVXtUHP SDUWHV PyYHLV DSHQDV FLUFXLWRV HOHWU{QLFRV TXH QmR SUHFLVDP VH PRYLPHQWDU SDUD OHU RX JUDYDU LQIRUPDo}HV 2V GLVSRVLWLYRV GH DUPD]HQDPHQWR SRU PHLR HOHWU{QLFR SRGHP VHU HQFRQWUDGRV FRP DV PDLV GLYHUVDV DSOLFDo}HV GHVGH 3HQ 'ULYHV até cartões de memória para câmeras digitais, e, mesmo os discos rígidos possuem uma certa quantidade desse tipo de memória funcioQDQGR FRPR EXIIHU A gravação das informações em um dispositivo de armazenamento por meio eletrônico se dá através dos materiais utilizados na IDEULFDomR GRV FKLSV TXH DUPD]HQDP DV LQIRUPDo}HV 3DUD FDGD GtJLWR ELQiULR ELW D VHU DUPD]HQDGR QHVVH WLSR GH GLVSRVLWLYR H[LVWHP GXDV SRUWDV IHLWDV GH PDWHULDO VHPLFRQGXWRU D SRUWD ÀXWXDQWH H D SRUWD GH FRQWUROH (QWUH HVWDV GXDV SRUWDV H[LVWH XPD SHTXHQD FDPDGD de óxido, que quando carregada coP HOpWURQV UHSUHVHQWD XP ELW H TXDQGR GHVFDUUHJDGD UHSUHVHQWD XP ELW Didatismo e Conhecimento

22


CONHECIMENTOS DE INFORMÁTICA Esta tecnologia é semelhante à tecnologia utilizada nas memórias RAM do tipo dinâmica, mas pode reter informação por longos SHUtRGRV GH WHPSR SRU LVVR QmR p FRQVLGHUDGD XPD PHPyULD 5$0 SURSULDPHQWH GLWD Os dispositivos de armazenamento por meio eletrônico tem a vantagem de possuir um tempo de acesso muito menor que os disSRVLWLYRV SRU PHLR PDJQpWLFR SRU QmR FRQWHUHP SDUWHV PyYHLV 2 SULQFLSDO SRQWR QHJDWLYR GHVWD WHFQRORJLD p R VHX FXVWR DLQGD PXLWR alto, portanto dispositivos de armazenamento por meio eletrônico ainda são encontrados com pequenas capacidades de armazenamento H FXVWR PXLWR HOHYDGR VH FRPSDUDGRV DRV GLVSRVLWLYRV PDJQpWLFRV

BROWSERS INTERNET EXPLORER, FIREFOX. FERRAMENTAS E APLICAÇÕES DE INFORMÁTICA. AMBIENTES WINDOWS. CORREIO ELETRÔNICO

PRINCIPAIS NAVEGADORES INTERNET EXPLORER 2 :LQGRZV ,QWHUQHW ([SORUHU SRVVXL XPD DSDUrQFLD VLPSOL¿FDGD H PXLWRV UHFXUVRV QRYRV TXH DFHOHUDP D VXD H[SHULrQFLD GH QDYHJDomR QD :HE 2V QRYRV UHFXUVRV JUi¿FRV H R PHOKRU GHVHPSHQKR GR ,QWHUQHW ([SORUHU SRVVLELOLWDP H[SHULrQFLDV ULFDV H LQWHQVDV 7H[WR YtGHR H HOHPHQWRV JUi¿FRV DFHOHUDGRV SRU KDUGZDUH VLJQL¿FDP TXH VHXV VLWHV WrP XP GHVHPSHQKR VHPHOKDQWH DR GRV SURJUDPDV LQVWDODGRV QR VHX FRPSXWDGRU 2V YtGHRV GH DOWD GH¿QLomR VmR SHUIHLWRV RV HOHPHQWRV JUi¿FRV VmR QtWLGRV H UHVSRQGHP SRVLWLYDPHQWH DV FRUHV VmR ¿HLV H RV VLWHV VmR LQWHUDWLYRV FRPR MDPDLV IRUDP &RP RV DSHUIHLoRDPHQWRV FRPR &KDNUD R QRYR PHFDQLVPR -DYD6FULSW RV VLWHV H DSOLFDWLYRV VmR FDUUHJDGRV PDLV UDSLGDPHQWH H UHVSRQGHP PHOKRU &RPELQH R ,QWHUQHW ([SORUHU FRP RV H¿FLHQWHV UHFXUVRV JUi¿FRV TXH R :LQGRZV WHP D RIHUHFHU H YRFr WHUi D PHOKRU H[SHULrQFLD GD :HE QR :LQGRZV DWp R PRPHQWR $ LQVWDODomR PDLV FXUWD H VLPSOL¿FDGD GR ,QWHUQHW ([SORUHU p PDLV UiSLGD GR TXH QDV YHUV}HV DQWHULRUHV (OD UHTXHU PHQRV GHFLV}HV GH VXD SDUWH OHYD PHQRV WHPSR SDUD FDUUHJDU SiJLQDV H QmR H[LJH TXH YRFr LQVWDOH DWXDOL]Do}HV VHSDUDGDPHQWH 8PD YH] FRQFOXtGD D LQVWDODomR YRFr Mi SRGH FRPHoDU D QDYHJDU Interface $ SULPHLUD DOWHUDomR TXH YHPRV QR , ( p D DOWXUD GR VHX FDEHoDOKR S[ SHTXHQR H HOHJDQWH R LQWHUQHW ([SORUHU VH FRPSDUDGR FRP VXDV YHUV}HV DQWHULRUHV PHOKRURX PXLWR H VHP VRPEUD GH G~YLGD FRPHoD D WRPDU $ SULPHLUD DOWHUDomR TXH YHPRV QR , ( p D DOWXUD GR VHX FDEHoDOKR S[ SHTXHQR H HOHJDQWH R LQWHUQHW ([SORUHU VH FRPSDUDGR FRP VXDV YHUV}HV DQWHULRUHV PHOKRURX PXLWR H VHP VRPEUD GH G~YLGD FRPHoD D WRPDU XPD IRUPD FRPSHWLWLYD

1-Ícones de Voltar/ Avançar página ËFRQHV GH PDQLSXODomR GD 85/ 3-Abas de conteúdo ËFRQHV GH IXQFLRQDOLGDGHV JHUDLV IDYRULWRV H SiJLQD LQLFLDO ËFRQH SDUD LQVHULU QRYDV DSOLFDo}HV ËFRQH GH DSOLFDomR LQVWDODGD 1-Ícones de Voltar/ Avançar página 8PD GDV PXGDQoDV YLVWDV HP PDLV GH XP QDYHJDGRU p R GHVWDTXH GDGR DR ERWmR GH ³9ROWDU 3iJLQD´ PXLWR PDLV XWLOL]DGR TXH R ³$YDQoDU R GHVWDTXH GDGR IRL PHUHFLGR DVVLP HYLWD VH SRVVtYHLV HUURV H GLVWUDo}HV´ 'HSRLV GH WHU IHLWR DOJXPD WUDQVLomR GH SiJLQD R ERWmR YROWDU DVVXPH XPD FRU D]XO PDULQKR JDQKDQGR DLQGD PDLV GHVWDTXH

Didatismo e Conhecimento

23


CONHECIMENTOS DE INFORMÁTICA

2-Ícones de manipulação da URL 2V tFRQHV GH PDQLSXODomR VmR DTXHOHV TXH SHUPLWHP R XVXiULR ³)DYRULWRV´ ³&DQFHODU´ RX ³$WXDOL]DU´ XPD SiJLQD 1R FDVR GR , ( HOHV IRUDP VHSDUDGRV R ³)DYRULWRV´ HVWi MXQWR GRV tFRQHV GH IXQFLRQDOLGDGH JHUDO SiJLQD LQLFLDO H RSo}HV HQTXDQWR R ³$WXDOL]DU´ H ³)HFKDU´ IRUDP SRVLFLRQDGRV GHQWUR GD EDUUD GH 85/ R TXH SRGH GL¿FXOWDU R VHX XVR R ³$WXDOL]DU´ HVSHFLDOPHQWH p EDVWDQWH XWLOL]DGR DSHVDU GD WHFOD GH DWDOKR ) H QHVWD QRYD YHUVmR HOH SHUGHX VHX GHVWDTXH H VXD IDFLOLGDGH GH FOLTXH ¿FDQGR SRVLFLRQDGR HQWUH GRLV tFRQHV )RL LQVHULGR QHVVD PHVPD iUHD R tFRQH GH ³&RPSDWLELOLGDGH´ SHUPLWLQGR TXH GHWHUPLQDGDV SiJLQDV VHMDP YLVXDOL]DGDV FRP D WHFQRORJLD GDV YHUV}HV DQWHULRUHV GR , (

3-Abas de conteúdo 2 SRVLFLRQDPHQWR GDV DEDV GH FRQWH~GR GHQWUR GR FDEHoDOKR GR , ( IRL PDO HVFROKLGR DV DEDV WHP TXH GLVSXWDU HVSDoR FRP R FDPSR GH 85/ &RQVHJXL PDQWHU DEHUWR QR Pi[LPR DEDV VHP TXH SUHMXGLTXH GHPDLV D OHLWXUD GRV WtWXORV GDV DEDV GHSRLV GLVVR D YLVXDOL]DomR H D QDYHJDomR HQWUH DV DEDV ¿FD GLItFLO H GHVDQLPDGRU

DEDV

0~OWLSODV DEDV 4-Ícones de funcionalidades gerais, favoritos e página inicial ³3DJLQD ,QLFLDO´ ³)DYRULWRV´ H ³2So}HV´ IRUDP DJUXSDGRV QR FDQWR GLUHLWR GD WHOD PDV VHP XP REMHWLYR FODUR SRLV RV GRLV SULPHLURV LWHQV FLWDGRV VmR HOHPHQWRV TXH TXDQGR XWLOL]DGRV LQWHUDJHP RX DOWHUDP RV GDGRV LQVHULGRV QR FDPSR GH 85/ ³2So}HV´ SRU VXD YH] VH UHIHUH D RSo}HV GH LQWHUQHW SULYDFLGDGH H HWF «

5-Ícone para inserir novas aplicações 8PD GDV QRYLGDGHV PDLV EDFDQDV GRV QRYRV QDYHJDGRUHV p SRVVLELOLGDGH GH DGTXLULU DSOLFDWLYRV H SOXJ LQV SHUPLWLQGR DR XVXiULR D FXVWRPL]DU R VHX QDYHJDGRU H FULDU XP ÀX[R GH XWLOL]DomR GLIHUHQFLDGR GH QDYHJDGRU SDUD QDYHJDGRU 3RUpP HVWD QRYD SRVVLELOLGDGH IRL PDO FRPXQLFDGD HOD p UHSUHVHQWDGD SRU VtPEROR GH PDLV PXLWR VHPHOKDQWH DR XWLOL]DGR HP QDYHJDGRUHV FRPR )LUHIR[ SDUD DGLFLRQDU QRYDV DEDV )LFD FODUR QR , ( TXH R VtPEROR GH ³ ´ VHUYH SDUD DGLFLRQDU DOJR DR QDYHJDGRU PDV R TXH" ([LVWH HVSDoR VX¿FLHQWH QD iUHD SDUD WUDEDOKDU FRP XPD DQFRUD WH[WXDO DR PHQRV DWp RV XVXiULRV FULDUHP XP KiELWR

Didatismo e Conhecimento

24


CONHECIMENTOS DE INFORMĂ TICA

Ă‹FRQH GH DSOLFDomR SOXJ LQ LQVWDODGR $V DSOLFDo}HV GHSRLV GH LQVWDODGDV VmR DOLQKDGDV GH IRUPD KRUL]RQWDO QR HVSDoR TXH HP YHUV}HV DQWHULRUHV SHUWHQFLD jV DEDV

Usar os novos controles do navegador $ SULPHLUD FRLVD TXH YRFr QRWDUi DR DEULU R ,QWHUQHW ([SORUHU VHUi VHX GHVLJQ VLPSOL¿FDGR A maioria das funçþes da barra de comandos, como Imprimir ou Zoom, pode ser encontrada ao clicar no botão Ferramentas os seus favoritos e os feeds são exibidos ao clicar no botão Centro de Favoritos

,e

As guias são exibidas automaticamente à direita da Barra de endereços, mas Ê possível movê-las para que sejam exibidas abaixo da %DUUD GH HQGHUHoR GD PHVPD PDQHLUD TXH HP YHUV}HV DQWHULRUHV GR ,QWHUQHW ([SORUHU 9RFr SRGH H[LELU DV %DUUDV GH )DYRULWRV &RPDQdos, Status e Menus clicando com o botão direito do mouse no botão Ferramentas H VHOHFLRQDQGR DV HP XP PHQX Mostrar ou ocultar as Barras de Favoritos, Comandos e Status Clique com o botão direito do mouse em um espaço livre à direita do botão Nova Guia e selecione uma barra: x x x

Barra de Favoritos Barra de Comandos Barra de Status

Fixar um site da web na barra de tarefas 3DUD WHU XP DFHVVR UiSLGR YRFr SRGH Âż[DU XP VLWH YLVLWDGR FRP IUHTXrQFLD j EDUUD GH WDUHIDV QD iUHD GH WUDEDOKR GR :LQGRZV GD PHVPD PDQHLUD TXH YRFr IDULD FRP XP SURJUDPD

Didatismo e Conhecimento

25


CONHECIMENTOS DE INFORMร TICA

3DUD ยฟ[DU XP VLWH GD ZHE x &OLTXH QD JXLD GD SiJLQD GD :HE H DUUDVWH D DWp D EDUUD GH WDUHIDV $R ODGR GR HQGHUHoR GD SiJLQD Ki XP SHTXHQR tFRQH FRP R VtPEROR GR VLWH $R DUUDVWi OR HOH DXWRPDWLFDPHQWH VH WUDQVIRUPD HP XPD HVSpFLH GH ERWmR (QWmR Vy p SUHFLVR TXH YRFr R HQYLH SDUD D %DUUD GH WDUHIDV GR :LQGRZV SDUD TXH HOH YLUH XP UiSLGR DWDOKR 3DUD UHPRYHU XP VLWH ยฟ[R GD EDUUD GH WDUHIDV x &OLTXH FRP R ERWmR GLUHLWR GR PRXVH QR tFRQH GR VLWH QD EDUUD GH WDUHIDV H FOLTXH HP 'HVDยฟ[DU HVVH SURJUDPD GD EDUUD GH WDUHIDV Pesquisar na Barra de endereรงos $JRUD YRFr SRGH ID]HU EXVFDV GLUHWDPHQWH QD %DUUD GH HQGHUHoRV 6H YRFr LQVHULU R HQGHUHoR GH XP VLWH YRFr LUi GLUHWDPHQWH D XP VLWH GD ZHE 6H YRFr LQVHULU XP WHUPR GH SHVTXLVD RX XP HQGHUHoR LQFRPSOHWR DSDUHFHUi XPD SHVTXLVD XVDQGR R PHFDQLVPR GH SHVTXLVD VHOHFLRQDGR &OLTXH QD EDUUD GH HQGHUHoRV SDUD VHOHFLRQDU R PHFDQLVPR GH SHVTXLVD D SDUWLU GRV tFRQHV OLVWDGRV RX SDUD DGLFLRQDU QRYRV PHFDQLVPRV

Ao fazer pesquisas na Barra de endereรงos, vocรช tem a opรงรฃo de abrir uma pรกgina de resultados da pesquisa ou o principal resultado GD SHVTXLVD VH R SURYHGRU GH SHVTXLVD VHOHFLRQDGR RIHUHFHU VXSRUWH D HVVH UHFXUVR 9RFr WDPEpP SRGH DWLYDU VXJHVW}HV GH SHVTXLVD RSFLRQDLV QD %DUUD GH HQGHUHoRV Usar o Gerenciador de Download 2 *HUHQFLDGRU GH 'RZQORDG PDQWpP XPD OLVWD GRV DUTXLYRV EDL[DGRV SRU YRFr H R QRWLยฟFD TXDQGR XP DUTXLYR SRGH VHU XP PDOZDUH VRIWZDUH PDO LQWHQFLRQDGR (OH WDPEpP SHUPLWH TXH YRFr SDXVH H UHLQLFLH XP GRZQORDG DOpP GH OKH PRVWUDU RQGH HQFRQWUDU RV DUTXLYRV EDL[DGRV HP VHX FRPSXWDGRU

Didatismo e Conhecimento

26


CONHECIMENTOS DE INFORMÁTICA

Abrir o Gerenciador de Downloads 1. 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU 2. Clique no botão Ferramentas H HP ([LELU GRZQORDGV Trabalhar com guias 9RFr SRGH DEULU XPD JXLD FOLFDQGR QR ERWmR 1RYD *XLD j GLUHLWD GD JXLD DEHUWD PDLV UHFHQWHPHQWH 8VH D QDYHJDomR FRP JXLDV SDUD DEULU YiULDV SiJLQDV GD :HE HP XPD ~QLFD MDQHOD 3DUD YLVXDOL]DU GXDV SiJLQDV FRP JXLDV DR PHVPR WHPSR FOLTXH HP XP JXLD H HP VHJXLGD DUUDVWH D SDUD IRUD GD MDQHOD GR ,QWHUQHW ([SORUHU SDUD DEULU D SiJLQD GD :HE GD JXLD HP XPD QRYD MDQHOD

$R DEULU XPD QRYD JXLD QR :LQGRZV ,QWHUQHW ([SORUHU YRFr SRGH x 3DUD DEULU XPD QRYD SiJLQD GD :HE GLJLWH RX FROH XP HQGHUHoR QD %DUUD GH HQGHUHoRV x 3DUD LU SDUD XP GRV GH] VLWHV PDLV XWLOL]DGRV SRU YRFr FOLTXH HP XP OLQN QD SiJLQD x 3DUD RFXOWDU LQIRUPDo}HV VREUH RV GH] VLWHV PDLV XWLOL]DGRV SRU YRFr FOLTXH 2FXOWDU VLWHV 3DUD UHVWDXUDU DV LQIRUPDo}HV FOLTXH HP 0RVWUDU VLWHV x 3DUD DWLYDU D 1DYHJDomR ,Q3ULYDWH FOLTXH HP 1DYHJDomR ,Q3ULYDWH x 3DUD DEULU QRYDPHQWH DV JXLDV TXH DFDERX GH IHFKDU FOLTXH HP 5HDEULU JXLDV IHFKDGDV x 3DUD UHDEULU DV JXLDV GH VXD ~OWLPD VHVVmR GH QDYHJDomR FOLTXH HP 5HDEULU ~OWLPD VHVVmR x 3DUD DEULU 6LWHV 6XJHULGRV HP XPD SiJLQD GD :HE FOLTXH HP 'HVFREULU RXWURV VLWHV GRV TXDLV YRFr SRGH JRVWDU

Didatismo e Conhecimento

27


CONHECIMENTOS DE INFORMÁTICA Guias avançadas 3RU SDGUmR DV JXLDV VmR PRVWUDGDV j GLUHLWD GD %DUUD GH HQGHUHoRV 3DUD ID]HU FRP TXH DV JXLDV VHMDP PRVWUDGDV HP VXD SUySULD linha abaixo da Barra de endereços, clique com o botão direito do mouse na área aberta à direita do botão Nova guia e clique em Mostrar JXLDV DEDL[R GD %DUUD GH HQGHUHoRV Guias destacáveis

$V JXLDV GHVWDFiYHLV WRUQDP D LQWHUDomR FRP YiULRV VLWHV UiSLGD H LQWXLWLYD e SRVVtYHO UHRUJDQL]DU DV JXLDV QR ,QWHUQHW ([SORUHU ² GD PHVPD IRUPD TXH YRFr UHRUJDQL]D tFRQHV QD EDUUD GH WDUHIDV QR :LQGRZV ² RX DEULU TXDOTXHU JXLD HP XPD QRYD MDQHOD GR QDYHJDGRU DUUDVWDQGR D JXLD SDUD D iUHD GH WUDEDOKR 6H SUHFLVDU H[LELU PDLV GH XPD SiJLQD GD :HE DR PHVPR WHPSR SDUD UHDOL]DU XPD WDUHID XVH DV JXLDV GHVWDFiYHLV MXQWR FRP R $MXVWH e XPD yWLPD IRUPD GH PRVWUDU YiULDV SiJLQDV GD :HE ODGR D ODGR QD WHOD )DFLOLWH R DFHVVR DRV VHXV VLWHV IDYRULWRV $UUDVWH XPD JXLD H ¿[H D GLUHWDPHQWH QD EDUUD GH WDUHIDV RX QR PHQX ,QLFLDU 2X DUUDVWH XPD JXLD SDUD D EDUUD )DYRULWRV ,QGHSHQGHQWHPHQWH GR TXH HVFROKHU VHXV VLWHV IDYRULWRV HVWDUmR DR VHX DOFDQFH *XLDV FRGL¿FDGDV SRU FRUHV

Ter várias guias abertas ao mesmo tempo pode ser um processo complicado e demorado, principalmente quando você tenta voltar H ORFDOL]DU RV VLWHV TXH DEULX &RP R ,QWHUQHW ([SORUHU DV JXLDV UHODFLRQDGDV VmR FRGL¿FDGDV SRU FRUHV R TXH IDFLOLWD VXD RUJDQL]DomR DR QDYHJDU SRU YiULDV SiJLQDV GD :HE 9RFr FRQVHJXH YHU DV JXLDV UHODFLRQDGDV LQVWDQWDQHDPHQWH 4XDQGR YRFr DEUH XPD QRYD JXLD D SDUWLU GH RXWUD D QRYD JXLD p SRVLFLRQDGD DR ODGR GD SULPHLUD JXLD H p FRGL¿FDGD FRP D FRU FRUUHVSRQGHQWH ( TXDQGR XPD JXLD TXH ID] SDUWH GH XP JUXSR p IHFKDGD RXWUD JXLD GHVVH JUXSR p H[LELGD SDUD TXH YRFr QmR ¿TXH ROKDQGR SDUD XPD JXLD QmR UHODFLRQDGD Se quiser fechar uma guia ou o grupo inteiro de guias, ou remover uma guia de um grupo, clique com o botão direito do mouse na JXLD RX QR JUXSR GH JXLDV H HVFROKD R TXH GHVHMD ID]HU 1HVVH ORFDO WDPEpP p SRVVtYHO DWXDOL]DU XPD RX WRGDV DV JXLDV FULDU XPD JXLD duplicada, abrir uma nova guia, reabrir a última guia fechada ou ver uma lista de todas as guias fechadas recentemente e reabrir qualquer XPD RX WRGDV HODV Como usar os Sites Sugeridos no Internet Explorer 9 2 UHFXUVR 6LWHV 6XJHULGRV p XP VHUYLoR RQOLQH XVDGR SHOR :LQGRZV ,QWHUQHW ([SORUHU TXH UHFRPHQGD VLWHV TXH YRFr WDOYH] JRVWH FRP EDVH QRV VLWHV TXH YRFr YLVLWD FRP IUHTXrQFLD 3DUD DWLYDU RV 6LWHV 6XJHULGRV H H[LEL ORV HP XPD SiJLQD GD :HE

Didatismo e Conhecimento

28


CONHECIMENTOS DE INFORMÁTICA 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU &OLTXH QR ERWmR )DYRULWRV H QD SDUWH LQIHULRU GR &HQWUR GH )DYRULWRV FOLTXH HP $WLYDU 6LWHV 6XJHULGRV 1D FDL[D GH GLiORJR 6LWHV 6XJHULGRV FOLTXH HP 6LP 2EVHUYDomR 3DUD GHVDWLYDU RV 6LWHV 6XJHULGRV FOLTXH QR ERWmR )HUUDPHQWDV DSRQWH SDUD $UTXLYR H GHVPDUTXH D RSomR 6LWHV 6XJHULGRV Para adicionar o Web Slice de Sites Sugeridos 'HSRLV GH DWLYDU RV 6LWHV 6XJHULGRV YRFr SRGH FOLFDU QR :HE 6OLFH GH 6LWHV 6XJHULGRV QD %DUUD GH IDYRULWRV SDUD YHUL¿FDU VXJHVW}HV GH VLWHV FRP EDVH QD SiJLQD GD :HE QD JXLD DWXDO 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU Clique no botão Favoritos H QD SDUWH LQIHULRU GR &HQWUR GH )DYRULWRV FOLTXH HP ([LELU 6LWHV 6XJHULGRV 2EVHUYDomR 6H QmR WLYHU DWLYDGR RV 6LWHV 6XJHULGRV YRFr GHYHUi FOLFDU HP $WLYDU 6LWHV 6XJHULGRV H HP 6LP 1D SiJLQD GD :HE 6LWHV 6XJHULGRV UROH DWp D SDUWH LQIHULRU H FOLTXH HP $GLFLRQDU 6LWHV 6XJHULGRV j VXD %DUUD GH )DYRULWRV 1D FDL[D GH GLiORJR GR ,QWHUQHW ([SORUHU FOLTXH HP $GLFLRQDU j %DUUD GH )DYRULWRV Observação: Quando você habilita o recurso Sites Sugeridos, o seu histórico de navegação na Web é enviado à Microsoft, onde ele é VDOYR H FRPSDUDGR FRP XPD OLVWD GH VLWHV UHODFLRQDGRV DWXDOL]DGD FRP IUHTXrQFLD 9RFr SRGH RSWDU SRU LQWHUURPSHU R HQYLR GH VHX KLVWyULFR GH QDYHJDomR QD :HE SHOR ,QWHUQHW ([SORUHU SDUD D 0LFURVRIW D TXDOTXHU PRPHQWR 7DPEpP p SRVVtYHO H[FOXLU HQWUDGDV LQGLYLGXDLV GR VHX KLVWyULFR D TXDOTXHU PRPHQWR $V HQWUDGDV H[FOXtGDV QmR VHUmR XVDGDV SDUD IRUQHFHU VXJHVW}HV GH RXWURV VLWHV HPERUD HODV VHMDP PDQWLGDV SHOD 0LFURVRIW SRU XP SHUtRGR SDUD DMXGDU D PHOKRUDU QRVVRV SURGXWRV H VHUYLoRV LQFOXLQGR HVWH UHFXUVR Recursos de segurança e privacidade no Internet Explorer 9 O Internet Explorer 9 inclui os seguintes recursos de segurança e privacidade: x Filtragem ActiveX, que bloqueia os controles ActiveX de todos os sites e permite que você posteriormente os ative novamente DSHQDV SDUD RV VLWHV QRV TXDLV FRQ¿D x 5HDOFH GH GRPtQLR TXH PRVWUD FODUDPHQWH D YRFr R YHUGDGHLUR HQGHUHoR :HE GR VLWH TXH HVWi YLVLWDQGR ,VVR DMXGD YRFr D HYLWDU VLWHV TXH XVDP HQGHUHoRV :HE IDOVRV SDUD HQJDQi OR FRPR VLWHV GH SKLVKLQJ 2 YHUGDGHLUR GRPtQLR TXH YRFr HVWi YLVLWDQGR p UHDOoDGR QD EDUUD GH HQGHUHoRV x )LOWUR 6PDUW6FUHHQ TXH SRGH DMXGDU D SURWHJr OR FRQWUD DWDTXHV GH SKLVKLQJ RQOLQH IUDXGHV H VLWHV IDOVRV RX PDO LQWHQFLRQDGRV (OH WDPEpP SRGH YHUL¿FDU GRZQORDGV H DOHUWi OR VREUH SRVVtYHO PDOZDUH VRIWZDUH PDO LQWHQFLRQDGR x Filtro Cross site scripting (XSS), que pode ajudar a evitar ataques de sites fraudulentos que podem tentar roubar suas informao}HV SHVVRDLV H ¿QDQFHLUDV x 8PD FRQH[mR 66/ 6HFXUH 6RFNHWV /D\HU GH ELWV SDUD XVDU VLWHV VHJXURV ,VVR DMXGD R ,QWHUQHW ([SORUHU D FULDU XPD FRQH[mR FULSWRJUDIDGD FRP VLWHV GH EDQFRV ORMDV RQOLQH VLWHV PpGLFRV RX RXWUDV RUJDQL]Do}HV TXH OLGDP FRP DV VXDV LQIRUPDo}HV SHVVRDLV x 1RWL¿FDo}HV TXH R DYLVDP VH DV FRQ¿JXUDo}HV GH VHJXUDQoD HVWLYHUHP DEDL[R GRV QtYHLV UHFRPHQGDGRV x 3URWHomR FRQWUD 5DVWUHDPHQWR TXH OLPLWD D FRPXQLFDomR GR QDYHJDGRU FRP GHWHUPLQDGRV VLWHV GH¿QLGRV SRU XPD /LVWD GH 3URWHomR FRQWUD 5DVWUHDPHQWR D ¿P GH DMXGDU D PDQWHU VXDV LQIRUPDo}HV FRQ¿GHQFLDLV x 1DYHJDomR ,Q3ULYDWH TXH YRFr SRGH XVDU SDUD QDYHJDU QD :HE VHP VDOYDU GDGRV UHODFLRQDGRV FRPR FRRNLHV H DUTXLYRV GH ,QWHUQHW WHPSRUiULRV x &RQ¿JXUDo}HV GH SULYDFLGDGH TXH HVSHFL¿FDP FRPR R FRPSXWDGRU OLGD FRP FRRNLHV Navegação InPrivate $ 1DYHJDomR ,Q3ULYDWH LPSHGH TXH R :LQGRZV ,QWHUQHW ([SORUHU DUPD]HQH GDGRV GH VXD VHVVmR GH QDYHJDomR DOpP GH DMXGDU D LPSHGLU TXH TXDOTXHU SHVVRD TXH XWLOL]H R VHX FRPSXWDGRU YHMD DV SiJLQDV GD :HE TXH YRFr YLVLWRX H R FRQWH~GR TXH YLVXDOL]RX 3DUD DWLYDU D 1DYHJDomR ,Q3ULYDWH 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU Clique no botão Ferramentas DSRQWH SDUD 6HJXUDQoD H FOLTXH HP 1DYHJDomR ,Q3ULYDWH 2 TXH ID] D 1DYHJDomR ,Q3ULYDWH 4XDQGR YRFr LQLFLD D 1DYHJDomR ,Q3ULYDWH R ,QWHUQHW ([SORUHU DEUH XPD QRYD MDQHOD GR QDYHJDGRU $ SURWHomR RIHUHFLGD SHOD 1DYHJDomR ,Q3ULYDWH WHP HIHLWR DSHQDV GXUDQWH R WHPSR TXH YRFr XVDU HVVD MDQHOD 9RFr SRGH DEULU TXDQWDV JXLDV GHVHMDU QHVVD MDQHOD H WRGDV HODV HVWDUmR SURWHJLGDV SHOD 1DYHJDomR ,Q3ULYDWH (QWUHWDQWR VH YRFr DEULU XPD VHJXQGD MDQHOD GR QDYHJDGRU HOD QmR HVWDUi SURWHJLGD SHOD 1DYHJDomR ,Q3ULYDWH 3DUD ¿QDOL]DU D VHVVmR GH 1DYHJDomR ,Q3ULYDWH IHFKH D MDQHOD GR QDYHJDGRU

Didatismo e Conhecimento

29


CONHECIMENTOS DE INFORMÁTICA Quando você naveJD XVDQGR D 1DYHJDomR ,Q3ULYDWH R ,QWHUQHW ([SORUHU DUPD]HQD DOJXPDV LQIRUPDo}HV FRPR FRRNLHV H DUTXLYRV GH ,QWHUQHW WHPSRUiULRV GH IRUPD TXH DV SiJLQDV GD :HE YLVLWDGDV IXQFLRQHP FRUUHWDPHQWH (QWUHWDQWR QR ¿QDO GH VXD VHVVmR GH 1DYHJDomR ,Q3ULYDWH HVVDV LQIRUPDo}HV VmR GHVFDUWDGDV 2 TXH D 1DYHJDomR ,Q3ULYDWH QmR ID] x (OD QmR LPSHGH TXH DOJXpP HP VXD UHGH FRPR XP DGPLQLVWUDGRU GH UHGH RX XP KDFNHU YHMD DV SiJLQDV TXH YRFr YLVLWRX x (OD QmR QHFHVVDULDPHQWH SURSRUFLRQD DQRQLPDWR QD ,QWHUQHW 2V VLWHV WDOYH] VHMDP FDSD]HV GH LGHQWL¿Fi OR SRU PHLR GH VHX HQGHUHoR :HE H TXDOTXHU FRLVD TXH YRFr ¿]HU RX LQVHULU HP XP VLWH SRGHUi VHU JUDYDGR SRU HOH x (OD QmR UHPRYH QHQKXP IDYRULWR RX IHHG DGLFLRQDGR SRU YRFr TXDQGR D VHVVmR GH 1DYHJDomR ,Q3ULYDWH p IHFKDGD $V DOWHUDo}HV QDV FRQ¿JXUDo}HV GR ,QWHUQHW ([SORUHU FRPR D DGLomR GH XPD QRYD KRPH SDJH WDPEpP VmR PDQWLGDV DSyV R HQFHUUDPHQWR GD VHVVmR GH 1DYHJDomR ,Q3ULYDWH Como usar a Proteção contra Rastreamento e a Filtragem ActiveX no Internet Explorer 9 9RFr SRGH DWLYDU D 3URWHomR FRQWUD 5DVWUHDPHQWR QR :LQGRZV ,QWHUQHW ([SORUHU SDUD DMXGDU D HYLWDU TXH VLWHV FROHWHP LQIRUPDo}HV VREUH VXD QDYHJDomR QD :HE 9RFr WDPEpP SRGH DWLYDU D )LOWUDJHP $FWLYH; SDUD DMXGDU D HYLWDU TXH SURJUDPDV DFHVVHP R VHX FRPSXWDGRU VHP R VHX FRQVHQWLPHQWR 'HSRLV GH DWLYDU TXDOTXHU XP GHVVHV UHFXUVRV YRFr SRGH GHVDWLYi OR DSHQDV SDUD VLWHV HVSHFt¿FRV Usar a Proteção contra Rastreamento para bloquear conteúdo de sites desconhecidos 4XDQGR YRFr YLVLWD XP VLWH DOJXQV FRQWH~GRV SRGHP VHU IRUQHFLGRV SRU XP VLWH GLIHUHQWH (VVH FRQWH~GR SRGH VHU XVDGR SDUD FROHWDU LQIRUPDo}HV VREUH DV SiJLQDV TXH YRFr YLVLWD QD ,QWHUQHW $ 3URWHomR FRQWUD 5DVWUHDPHQWR EORTXHLD HVVH FRQWH~GR GH VLWHV TXH HVWmR HP /LVWDV GH 3URWHomR FRQWUD 5DVWUHDPHQWR ([LVWH XPD /LVWD GH 3URWHomR FRQWUD 5DVWUHDPHQWR 3HUVRQDOL]DGD LQFOXtGD QR ,QWHUQHW ([SORUHU TXH p JHUDGD DXWRPDWLFDPHQWH FRP EDVH QRV VLWHV YLVLWDGRV SRU YRFr 7DPEpP p SRVVtYHO EDL[DU /LVWDV GH 3URWHomR FRQWUD 5DVWUHDPHQWR H GHVVD PDQHLUD R ,QWHUQHW ([SORUHU YHUL¿FDUi SHULRGLFDPHQWH VH Ki DWXDOL]Do}HV SDUD DV OLVWDV Para ativar a Proteção contra Rastreamento 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU Clique no botão Ferramentas DSRQWH SDUD 6HJXUDQoD H FOLTXH HP 3URWHomR FRQWUD 5DVWUHDPHQWR 1D FDL[D GH GLiORJR *HUHQFLDU &RPSOHPHQWR FOLTXH HP XPD /LVWD GH 3URWHomR FRQWUD 5DVWUHDPHQWR H FOLTXH HP +DELOLWDU Usar a Filtragem ActiveX para bloquear controles ActiveX Controles ActiveX e complementos do navegador da Web são pequenos programas que permitem que os sites forneçam conteúdos FRPR YtGHRV (OHV WDPEpP SRGHP VHU XVDGRV SDUD FROHWDU LQIRUPDo}HV GDQL¿FDU LQIRUPDo}HV H LQVWDODU VRIWZDUH HP VHX FRPSXWDGRU VHP R VHX FRQVHQWLPHQWR RX SHUPLWLU TXH RXWUD SHVVRD FRQWUROH R FRPSXWDGRU UHPRWDPHQWH $ )LOWUDJHP $FWLYH; LPSHGH TXH VLWHV LQVWDOHP H XWLOL]HP HVVHV SURJUDPDV Ativar a Filtragem ActiveX 3DUD DEULU R ,QWHUQHW ([SORUHU FOLTXH QR ERWmR ,QLFLDU 1D FDL[D GH SHVTXLVD GLJLWH ,QWHUQHW ([SORUHU H QD OLVWD GH UHVXOWDGRV FOLTXH HP ,QWHUQHW ([SORUHU Clique no botão Ferramentas DSRQWH SDUD 6HJXUDQoD H FOLTXH HP )LOWUDJHP $FWLYH; 'H¿QLU H[FHo}HV SDUD VLWHV FRQ¿iYHLV 9RFr SRGH GHVDWLYDU D 3URWHomR FRQWUD 5DVWUHDPHQWR RX D )LOWUDJHP $FWLYH; SDUD H[LELU R FRQWH~GR GH VLWHV HVSHFt¿FRV HP TXH YRFr FRQ¿D Informações que não causam lentidão $ QRYD %DUUD GH QRWL¿FDomR H[LELGD QD SDUWH LQIHULRU GR ,QWHUQHW ([SORUHU IRUQHFH LPSRUWDQWHV LQIRUPDo}HV GH VWDWXV TXDQGR YRFr SUHFLVD GHODV PDV HOD QmR R IRUoD D FOLFDU HP XPD VpULH GH PHQVDJHQV SDUD FRQWLQXDU QDYHJDQGR

Didatismo e Conhecimento

30


CONHECIMENTOS DE INFORMĂ TICA

Modo de Exibição de Compatibilidade +i RFDVL}HV HP TXH R VLWH TXH YRFr HVWi YLVLWDQGR QmR WHP D DSDUrQFLD FRUUHWD (OH p PRVWUDGR FRPR XP HPDUDQKDGR GH PHQXV LPDJHQV H FDL[DV GH WH[WR IRUD GH RUGHP 3RU TXH LVVR DFRQWHFH" 8PD H[SOLFDomR SRVVtYHO R VLWH SRGH WHU VLGR GHVHQYROYLGR SDUD XPD YHUVmR DQWHULRU GR ,QWHUQHW ([SORUHU 2 TXH ID]HU" ([SHULPHQWH FOLFDU QR ERWmR 0RGR GH ([LELomR GH &RPSDWLELOLGDGH

O botão do Modo de Exibição de Compatibilidade No Modo de Exibição de Compatibilidade, os sites aparecerão como se fossem exibidos em uma versão anterior do Internet ExploUHU R TXH JHUDOPHQWH FRUULJH RV SUREOHPDV GH H[LELomR 9RFr QmR SUHFLVD FOLFDU QR ERWmR SDUD H[LELU XP VLWH GHSRLV GH Mi WHU IHLWR LVVR ² QD SUy[LPD YH] TXH YRFr YLVLWDU R VLWH R ,QWHUQHW ([SORUHU DXWRPDWLFDPHQWH R PRVWUDUi QR 0RGR GH ([LELomR GH &RPSDWLELOLGDGH 6H você um dia quiser voltar a navegar nesse site usando o Internet Explorer 9, basta clicar no botão Modo de Exibição de Compatibilidade QRYDPHQWH Menu Favoritos Adicionar endereços no Menu Favoritos &OLTXH QR PHQX )DYRULWRV H HP $GLFLRQDU )DYRULWRV &75/ '

Menu Ferramentas Opçþes da Internet 1R PHQX )HUUDPHQWDV QD RSomR RSo}HV GD LQWHUQHW QD DED JHUDO SRGHPRV H[FOXLU RV DUTXLYRV WHPSRUiULRV H R KLVWyULFR $OpP GLVVR SRGHPRV GH¿QLU D SiJLQD LQLFLDO

Didatismo e Conhecimento

31


CONHECIMENTOS DE INFORMÁTICA

FIREFOX O que é o Firefox? )LUHIR[ LQLFLDOPHQWH FRQKHFLGR FRPR 3KRHQL[ H SRVWHULRUPHQWH FRPR 0R]LOOD )LUHELUG p XP QDYHJDGRU GH FyGLJR DEHUWR UiSLGR VHJXUR H H¿FLHQWH 'HVHQYROYLGR SHOD 0R]LOOD )RXQGDWLRQ FRP DMXGD GH FHQWHQDV GH FRODERUDGRUHV HVWi VHQGR XVDGR HP GLYHUVDV SODWDIRUPDV &RPR QmR p VRIWZDUH FRPSOHWDPHQWH OLYUH p GLVWULEXtGR SHOD OLFHQoD 0R]LOOD DOJXQV GRV VHXV FRPSRQHQWHV FRPR tFRQHV H R SUySULR QRPH TXH p PDUFD UHJLVWUDGD VmR SURSULHGDGHV SURWHJLGDV 2 QRPH ³)LUHIR[´ HP LQJOrV UHIHUH VH DR 3DQGD YHUPHOKR )RL HVFROKLGR SRU VHU SDUHFLGR FRP ³)LUHELUG´ H WDPEpP SRU VHU ~QLFR QD LQG~VWULD GD FRPSXWDomR $ ¿P GH HYLWDU XPD IXWXUD PXGDQoD GH QRPH D 0R]LOOD )RXQGDWLRQ GHX LQtFLR DR SURFHVVR GH UHJLVWUR GR QRPH )LUHIR[ FRPR PDUFD UHJLVWUDGD QR *DELQHWH $PHULFDQR GH 0DUFDV H 3DWHQWHV $SHVDU GH ³)LUHIR[´ QmR VH UHIHULU D XPD UDSRVD D LGHQWLGDGH YLVXDO GR )LUHIR[ p XPD UDSRVD HVWLOL]DGD 2 REMHWLYR GR )LUHIR[ p VHU XP QDYHJDGRU TXH LQFOXD DV RSo}HV PDLV XVDGDV SHOD PDLRULD GRV XVXiULRV 2XWUDV IXQo}HV QmR LQFOXtGDV RULJLQDOPHQWH HQFRQWUDP VH GLVSRQtYHLV DWUDYpV GH H[WHQV}HV H SOXJ LQV

Didatismo e Conhecimento

32


CONHECIMENTOS DE INFORMĂ TICA Principais caracterĂ­sticas ¡ Navegação em abas; Ä $ PHVPD MDQHOD SRGH FRQWHU GLYHUVDV SiJLQDV $EULQGR RV OLQNV HP VHJXQGR SODQR Eles jĂĄ estarĂŁo carregados quando vocĂŞ for ler; ¡ Bloqueador de popups: ¡ O Firefox jĂĄ vem com um bloqueador embutido de popups; Ä 3HVTXLVD LQWHOLJHQWH Ä 2 FDPSR GH SHVTXLVD SHOR *RRJOH ÂżFD QD GLUHLWD QD EDUUD GH IHUUDPHQWDV H DEUH GLUHWR D SiJLQD FRP RV UHVXOWDGRV SRXSDQGR R WHPSR GH DFHVVR j SiJLQD GH SHVTXLVD DQWHV GH WHU TXH GLJLWDU DV SDODYUDV FKDYHV 2 QRYR ORFDOL]DGRU GH SDODYUDV QD SiJLQD EXVFD SHOR texto na medida em que vocĂŞ as digita, agilizando a busca; ¡ Favoritos RSS; Ä $ LQWHJUDomR GR 566 QRV IDYRULWRV SHUPLWH TXH YRFr ÂżTXH VDEHQGR GDV DWXDOL]Do}HV H ~OWLPDV QRWtFLDV GRV VHXV VLWHV SUHIHULGRV FDGDVWUDGRV (VVD IXQomR p GLVSRQLELOL]DGD D SDUWLU GR )LUHIR[ Ä 'RZQORDGV VHP SHUWXUEDomR Ä 2V DUTXLYRV UHFHELGRV VmR VDOYRV DXWRPDWLFDPHQWH QD iUHD GH WUDEDOKR RQGH VmR IiFHLV GH DFKDU 0HQRV LQWHUUXSo}HV VLJQLÂżFDP GRZQORDGV PDLV UiSLGRV &ODUR HVVD IXQomR SRGH VHU SHUVRQDOL]DGD VHP SUREOHPDV ¡ VocĂŞ decide como deve ser seu navegador; Ä 2 )LUHIR[ p R QDYHJDGRU PDLV SHUVRQDOL]iYHO TXH H[LVWH &RORTXH QRYRV ERW}HV QDV EDUUDV GH IHUUDPHQWDV LQVWDOH H[WHQV}HV TXH DGLFLRQD QRYDV IXQo}HV DGLFLRQH WHPDV TXH PRGLÂżFDP R YLVXDO GR )LUHIR[ H FRORTXH PDLV PHFDQLVPRV QRV FDPSRV GH SHVTXLVD O Firefox pode se tornar o navegador mais adequado para a sua necessidade: ¡ FĂĄcil utilização; Ä 6LPSOHV H LQWXLWLYR PDV UHSOHWR GH UHFXUVRV 2 )LUHIR[ WHP WRGDV DV IXQo}HV TXH YRFr HVWi DFRVWXPDGR IDYRULWRV KLVWyULFR WHOD inteira, zoom de texto para tornar as pĂĄginas mais fĂĄceis de ler, e diversas outras funcionalidades intuitivas; ¡ Compacto; Ä $ PDLRULD GDV GLVWULEXLo}HV HVWi HP WRUQR GRV 0% 9RFr OHYD DSHQDV DOJXQV PLQXWRV SDUD FRSLDU R )LUHIR[ SDUD R VHX FRPSXWDGRU HP XPD FRQH[mR GLVFDGD H VHJXQGD HP XPD FRQH[mR EDQGD ODUJD $ FRQÂżJXUDomR p VLPSOHV H LQWXLWLYD /RJR YRFr HVWDUi QDYHJDQGR FRP HVVD IHUUDPHQWD Abas 3DUD DEULU XPD QRYD DED FOLTXH QR PHQX Âľ$UTXLYRÂś H GHSRLV HP Âľ1RYD $EDÂś RX VLPSOHVPHQWH &WUO 7! VHJXUH D WHFOD &RQWURO H WHFOH 7 9RFr YHUi TXH DJRUD YRFr WHP GXDV DEDV QD SDUWH GH FLPD GR VHX )LUHIR[ FRPR QD ÂżJXUD DEDL[R

'LJLWH R HQGHUHoR TXH YRFr TXLVHU QR FDPSR GH HQGHUHoR SUHVVLRQH (QWHU H DVVLP D VXD QRYD DED PRVWUDUi HVVD QRYD SiJLQD 3DUD YLVXDOL]DU SiJLQDV TXH HVWmR DEHUWDV HP RXWUDV DEDV DSHQDV FOLTXH QD DED GHVHMDGD TXH D PHVPD ¿FDUi DWLYD Clicando com o botão direito do mouse nas abas, aparece um pequeno menu com vårias opçþes de gerenciamento das abas:

6H YRFr TXLVHU DEULU XP OLQN PDV TXHU TXH HOH DSDUHoD HP XPD QRYD DED FOLTXH QR OLQN FRP R ERWmR GLUHLWR GR PRXVH H HVFROKD D RSomR Âľ$EULU HP XPD QRYD DEDÂś RX VLPSOHVPHQWH VHJXUH D WHFOD Âľ&WUOÂś HQTXDQWR FOLFD QR OLQN

Didatismo e Conhecimento

33


CONHECIMENTOS DE INFORMÁTICA

Gerenciador de Downloads 8P JHUHQFLDGRU GH 'RZQORDG p XPD IHUUDPHQWD TXH FRQWUROD H OLVWD RV GRZQORDGV VROLFLWDGRV SHOR XVXiULR 2 )LUHIR[ FRQWD FRP XP H[FOXVLYR JHUHQFLDGRU GH GRZQORDGV XPD IHUUDPHQWD ~WLO H FRP XPD LQWHUIDFH DPLJiYHO &OLTXH QR PHQX µ)HUUDPHQWDV¶ H GHSRLV HP µ'RZQORDGV¶ RX &WUO <! SDUD DEULU D OLVWD DWXDO GH GRZQORDGV

4XDQGR FOLFDPRV HP XP OLQN GH GRZQORDG GH XP DUTXLYR DSDUHFHUi XPD WHOD SHUJXQWDQGR VH TXHUHPRV VDOYDU R DUTXLYR RX VLPSOHVPHQWH DEUL OR 1R ~OWLPR FDVR GHYHPRV WDPEpP LQIRUPDU FRP TXDO SURJUDPD TXHUHPRV DEULU R DUTXLYR

Didatismo e Conhecimento

34


CONHECIMENTOS DE INFORMÁTICA 3DUD VDOYDU R DUTXLYR QR VHX FRPSXWDGRU PDUTXH D FDL[D µ6DOYDU¶ H FOLTXH QR ERWmR µ2.¶ 2 GRZQORDG LQLFLDUi H D WHOD GR JHUHQFLDGRU GH GRZQORDGV PRVWUDUi R SURJUHVVR LQIRUPDQGR R WDPDQKR GR DUTXLYR TXDQWR Mi IRL EDL[DGR D YHORFLGDGH GR GRZQORDG H R WHPSR UHVWDQWH HVWLPDGR 3RU SDGUmR R )LUHIR[ YHP FRQ¿JXUDGR SDUD DUPD]HQDU RV GRZQORDGV QD iUHD GH WUDEDOKR TXDQGR VROLFLWDGR SDUD VDOYDU R DUTXLYR ,VVR SRGH VHU DOWHUDGR QD FRQ¿JXUDomR GH ³'RZQORDGV´ HP ³(GLWDU !! 3UHIHUrQFLDV´ 9RFr SRGH ID]HU YiULRV GRZQORDGV DR PHVPR WHPSR VH FOLFDU HP YiULRV OLQNV GH GRZQORDG $VVLP R JHUHQFLDGRU GH GRZQORDG LUi PRVWUDU R SURJUHVVR LQGLYLGXDO GH FDGD GRZQORDG H QR WtWXOR GR JHUHQFLDGRU ¿FDUi D SRUFHQWDJHP WRWDO GR TXH Mi IRL FRQFOXtGR GH WRGRV RV GRZQORDGV 4XDQGR YRFr WLYHU WHUPLQDGR DOJXP GRZQORDG RV PHVPRV VHUmR OLVWDGRV

3RGHPRV YHU DOJXPDV GDV IXQo}HV TXH HVVH JHUHQFLDGRU RIHUHFH 6H FOLFDUPRV QD SDVWD TXH DSDUHFH GHSRLV GH µ%DL[DU DUTXLYRV HP µ D PHVPD VHUi DEHUWD 6H FOLFDUPRV HP µ/LPSDU /LVWD¶ WRGD D OLVWD GRV GRZQORDGV VHUi DSDJDGD SHUFHED TXH Vy D OLVWD VHUi DSDJDGD RV DUTXLYRV FRQWLQXDUmR H[LVWLQGR 3DUD H[FOXLU DSHQDV FHUWR DUTXLYR GD OLVWD FOLTXH QR OLQN µ([FOXLU GD OLVWD¶ FRUUHVSRQGHQWH DR DUTXLYR TXH VH GHVHMD H[FOXLU 3DUD DEULU XP DUTXLYR FXMR GRZQORDG Mi IRL FRQFOXtGR FOLTXH QR OLQN µ$EULU¶ 7RPH FXLGDGR DR VDLU GR )LUHIR[ 3RU SDGUmR RV GRZQORDGV QmR WHUPLQDGRV VHUmR FDQFHODGRV Histórico 2 +LVWyULFR QRV SHUPLWH YHU TXDLV SiJLQDV DFHVVDPRV QRV ~OWLPRV GLDV e XPD IHUUDPHQWD TXH IDFLOLWD PXLWR D YLGD GR XVXiULR 3DUD DEULU R +LVWyULFR FOLTXH QR PHQX µ,U¶ H GHSRLV HP µ+LVWyULFR¶ RX WHFOH &WUO +! 8PD MDQHOD VHPHOKDQWH D HVVD LUi DSDUHFH do lado esquerdo do seu Firefox:

ANOTAÇÕES

———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ————————————————————————————————————————————————————

Didatismo e Conhecimento

35


CONHECIMENTOS DE INFORMÁTICA

Todas as páginas que acessamos desde a última vez que limpamos o Histórico estão divididas de acordo com o dia em que foram DFHVVDGDV 3DUD YHU DV SiJLQDV TXH DFHVVDPRV HP FHUWR GLD FOLTXH QD FDL[D FRP XP VLQDO GH µ ¶ GR ODGR HVTXHUGR GHVVH GLD 3RU SDGUmR DV SiJLQDV ¿FDP RUGHQDGDV SHOD GDWD 6H YRFr TXLVHU RUGHQi ODV GH RXWUR MHLWR FOLTXH HP µ2UGHQDU¶ H HVFROKD XPD GDV RSo}HV TXH DSDUHFHP 3DUD SURFXUDU SRU FHUWD SiJLQD GLJLWH XPD SDODYUD QR FDPSR µ/RFDOL]DU¶ H VRPHQWH VHUmR PRVWUDGDV DV SiJLQDV TXH FRQWpP HVVD SDODYUD QR VHX WtWXOR Favoritos 2 )DYRULWRV p XPD IXQFLRQDOLGDGH TXH QRV DMXGD D HQWUDU HP SiJLQDV TXH DFHVVDPRV FRP PXLWD IUHTXrQFLD HFRQRPL]DQGR WHPSR &OLTXH QR PHQX µ)DYRULWRV¶ H XPD OLVWD FRP DV QRVVDV SiJLQDV IDYRULWDV VHUi PRVWUDGD 6H YRFr QmR WLYHU DGLFLRQDGR QHQKXPD SiJLQD aos Favoritos, você verá algo como:

$GLFLRQH XPD SiJLQD DRV )DYRULWRV SDUD YHU R TXH DFRQWHFH 3ULPHLUDPHQWH HQWUH QXPD SiJLQD TXH YRFr DFHVVD FRP PXLWD IUHTXrQFLD &OLTXH QR PHQX µ)DYRULWRV¶ H GHSRLV HP µ$GLFLRQDU SiJLQD¶ RX VLPSOHVPHQWH &WUO '! $ VHJXLQWH WHOD OKH VHUi PRVWUDGD

Didatismo e Conhecimento

36


CONHECIMENTOS DE INFORMÁTICA

'LJLWH XP QRPH TXH GH¿QH HVVD SiJLQD HVFROKD XPD SDVWD SDUD HVVD SiJLQD D SDVWD µ)DYRULWRV GR )LUHIR[¶ p D SDVWD SDGUmR H FOLTXH HP µ$GLFLRQDU¶ $JRUD FOLTXH QRYDPHQWH QR PHQX µ)DYRULWRV¶ SDUD YHU R TXH PXGRX $JRUD DSDUHFH D SiJLQD TXH YRFr DFDERX GH adicionar aparecerá na área de Favoritos! 3DUD RUJDQL]DU PHOKRU RV )DYRULWRV SRGHPRV XVDU SDVWDV 'LJDPRV TXH YRFr SRVVXD RV VHJXLQWHV IDYRULWRV ā KWWS FXUVRV FGWF RUJ EU ā KWWS FRPXQLGDGH FGWF RUJ EU ā KWWS ZZZ JRRJOH FRP ā KWWS ZZZ PR]LOOD RUJ &OLTXH QR PHQX µ)DYRULWRV¶ H GHSRLV HP µ2UJDQL]DU ¶ $ VHJXLQWH WHOD GH JHUHQFLDPHQWR GH )DYRULWRV DSDUHFHUi

&OLTXH QR ERWmR µ1RYD SDVWD ¶ HVFROKD XP QRPH H XPD GHVFULomR SDUD HVVD SDVWD H FOLTXH HP µ2.¶ $JRUD D QRYD SDVWD WDPEpP DSDUHFH MXQWR GRV )DYRULWRV H GDV RXWUDV SDVWDV 0RYD DV SiJLQDV FXUVRV FGWF RUJ EU H ZZZ FGWF RUJ EU SDUD HVVD SDVWD 3DUD LVVR FOLTXH QHVVDV SiJLQDV GHSRLV QR ERWmR µ0RYHU¶ H HVFROKD D SDVWD TXH YRFr FULRX 2SFLRQDOPHQWH YRFr SRGH VLPSOHVPHQWH DUUDVWDU DV SiJLQDV SDUD DV UHVSHFWLYDV SDVWDV QD WHOD GH JHUHQFLDPHQWR GH )DYRULWRV $VVLP TXDQGR YRFr FOLFDU QR PHQX µ)DYRULWRV¶ H FRORFDU R FXUVRU GR PRXVH HP FLPD GD SDVWD FULDGD DSDUHFHP DV GXDV SiJLQDV TXH YRFr PRYHX SDUD Oi 6H YRFr FOLFDU HP µ$EULU WXGR HP DEDV¶ FDGD SiJLQD VHUi DEHUWD HP XPD DED Localizar 8VDPRV D IHUUDPHQWD /RFDOL]DU SDUD DFKDU WRGDV DV YH]HV TXH XP GHWHUPLQDGR WH[WR DSDUHFH QD WHOD e XPD IHUUDPHQWD TXH QRV DMXGD PXLWR HP YiULDV WDUHIDV FRPR ID]HU SHVTXLVDV QD ,QWHUQHW &OLTXH QR PHQX µ(GLWDU¶ H GHSRLV HP µ/RFDOL]DU QHVVD SiJLQD¶ 2 DWDOKR GR WHFODGR SDUD LVVR p &WUO )! Note a barra que apareceu na parte inferior do Firefox:

Didatismo e Conhecimento

37


CONHECIMENTOS DE INFORMÁTICA Imprimindo páginas 0XLWDV YH]HV TXHUHPRV LPSULPLU XPD SiJLQD ZHE 3DUD LVVR R )LUHIR[ FRQWD DV RSo}HV µ&RQ¿JXUDU SiJLQD¶ µ9LVXDOL]DU ,PSUHVVmR¶ H µ,PSULPLU ¶ &OLTXH HP µ&RQ¿JXUDU SiJLQD¶ $ VHJXLQWH WHOD LUi DSDUHFHU SDUD YRFr

1D DED µ*HUDO¶ p SRVVtYHO DOWHUDU DOJXPDV RSo}HV GH LPSUHVVmR FRPR D RULHQWDomR UHWUDWR RX SDLVDJHP D SRUFHQWDJHP TXH D SiJLQD YDL RFXSDU QR SDSHO H VH GHVHMD LPSULPLU R SODQR GH IXQGR 1D DED µ0DUJHQV¶ SRGH VH PRGL¿FDU R WDPDQKR GDV PDUJHQV H FRORFDU FDEHoDOKRV RX URGDSpV SRGHPRV FRQ¿JXUDU SDUD TXH QR FDEHoDOKR DSDUHoD R Q~PHUR GD SiJLQD H QR URGDSp DSDUHoD D GDWD H D KRUD SRU H[HPSOR 4XDQGR YRFr FOLFD HP µ9LVXDOL]DU LPSUHVVmR¶ YHUi FRPR YDL ¿FDU D QRVVD LPSUHVVmR 1D SDUWH GH FLPD SRGHPRV YHU XPD EDUUD GH QDYHJDomR SHODV SiJLQDV &OLFDQGR HP µ,PSULPLU ¶ XPD WHOD VHPHOKDQWH D VHJXLQWH DSDUHFH

Didatismo e Conhecimento

38


CONHECIMENTOS DE INFORMร TICA Temas 7HPDV VmR FRQMXQWRV GH SDGU}HV FRPR tFRQHV FRUHV H IRQWHV (OHV FRQWURODP R YLVXDO GR VHX QDYHJDGRU 9RFr SRGH PXGDU R WHPD GR )LUHIR[ DMXVWDQGR R DR VHX JRVWR 7HPDV VmR FRQVLGHUDGRV FRPR $GG RQV TXH VmR IXQFLRQDOLGDGHV H[WUDV TXH SRGHP VHU DGLFLRQDGDV DR )LUHIR[ 0DLV LQIRUPDo}HV VREUH $GG RQV VHUmR WUDWDGDV PDLV DGLDQWH &OLTXH QR PHQX ยต)HUUDPHQWDVยถ H GHSRLV HP ยต7HPDVยถ 8PD WHOD VHPHOKDQWH D VHJXLU LUi DSDUHFHU

3RGH VH YHU TXH VRPHQWH R WHPD SDGUmR TXH YHP FRP R )LUHIR[ HVWi LQVWDODGR &OLFDQGR QR OLQN ยต%DL[DU PDLV WHPDVยถ XPD QRYD DED VHUi FULDGD FRP D VHomR GH GRZQORDGV GH WHPDV GR VLWH KWWSV DGGRQV PR]LOOD RUJ ยฟUHIR[ CORREIO ELETRร NICO 8P 3RXFR GH +LVWyULD Foi em 1971 que tudo comeรงou (na realidade comeรงou antes, com pesquisas), com um engenheiro de computaรงรฃo da BBN (Bolt %HUDQHN H 1HZPDQ FKDPDGR 5D\ 7RPOLQVRQ 8WLOL]DQGR XP SURJUDPD FKDPDGR 61'06* DEUHYLDomR GR LQJOrV ยณ6HQG 0HVVDJHยด H R 5HDG0DLO 5D\ FRQVHJXLX HQYLDU PHQVDJHP GH XP FRPSXWDGRU SDUD RXWUR 'HSRLV GH DOJXQV WHVWHV PDQGDQGR PHQVDJHQV SDUD HOH PHVPR 5D\ WLQKD FULDGR R PDLRU H PDLV XWLOL]DGR PHLR GH FRPXQLFDomR GD ,QWHUQHW R FRUUHLR HOHWU{QLFR GR LQJOrV ยณHOHWURQLF PDLOยด RX VLPSOHVPHQWH FRPR WRGRV FRQKHFHP H PDLO O sรญmbolo @ foi utilizado por Tomlinson para separar o nome do computador do nome do usuรกrio, esta convenรงรฃo รฉ utilizada atรฉ KRMH &RPR QmR SRGHULD GHL[DU GH VHU R SULPHLUR HQGHUHoR GH H PDLO IRL FULDGR SRU 7RPOLQVRQ WRPOLQVRQ#EEQ WHQH[D 2 VtPEROR # DUURED p OLGR QR LQJOrV FRP ยณDWยด TXH VLJQLยฟFD HP DOJR FRPR R HQGHUHoR WRPOLQVRQ HVWi QR FRPSXWDGRU EEQ WHQH[D 'XUDQWH XP ERP WHPSR R H PDLO IRL XVDGR TXDVH TXH H[FOXVLYDPHQWH SRU SHVTXLVDGRUHV GD iUHD GH FRPSXWDomR H PLOLWDUHV )RL com o desenvolvimento e o aumento de usuรกrios da Internet, que o e-mail se popularizou e passou a ser a aplicaรงรฃo mais utilizada na LQWHUQHW +RMH DWp PHVPR SHVVRDV TXH XVDP D ,QWHUQHW PXLWR SRXFR WHP XP H PDLO 2 FRUUHLR HOHWU{QLFR VH SDUHFH PXLWR FRP R FRUUHLR WUDGLFLRQDO 7RGR XVXiULR WHP XP HQGHUHoR SUySULR H XPD FDL[D SRVWDO R FDUWHLUR p D ,QWHUQHW 9RFr HVFUHYH VXD PHQVDJHP GL] SUD TXHP TXH PDQGDU H D ,QWHUQHW FXLGD GR UHVWR 0DV SRU TXH R H PDLO VH SRSXODUL]RX WmR GHSUHVVD" $ SULPHLUD FRLVD p SHOR FXVWR 9RFr QmR SDJD QDGD SRU XPD FRPXQLFDomR YLD H PDLO DSHQDV RV FXVWRV GH FRQH[mR FRP D ,QWHUQHW 2XWUR IDWRU p D UDSLGH] HQTXDQWR R FRUUHLR WUDGLFLRQDO OHYDULD GLDV SDUD HQWUHJDU XPD PHQVDJHP R HOHWU{QLFR ID] LVVR TXDVH TXH LQVWDQWDQHDPHQWH H QmR XWLOL]D SDSHO 3RU XOWLPR D PHQVDJHP YDL GLUHWR DR GHVWLQDWiULR QmR SUHFLVD SDVVD GH PmR HP PmR IXQFLRQiULR GR FRUUHLR FDUWHLUR HWF ยฟFD QD VXD FDL[D SRVWDO RQGH VRPHQWH R GRQR WHP DFHVVR H DSHVDU GH FDGD SHVVRD WHU VHX HQGHUHoR SUySULR YRFr SRGH DFHVVDU VHX H PDLO GH TXDOTXHU FRPSXWDGRU FRQHFWDGR j ,QWHUQHW Bem, o e-mail mesclou a facilidade de uso do correio convencional com a velocidade do telefone, se tornando um dos melhores e PDLV XWLOL]DGR PHLR GH FRPXQLFDomR

Didatismo e Conhecimento

39


CONHECIMENTOS DE INFORMÁTICA Estrutura e Funcionalidade do e-mail &RPR QR SULPHLUR H PDLO FULDGR SRU 7RPOLQVRQ WRGRV RV HQGHUHoRV HOHWU{QLFRV VHJXHP XPD HVWUXWXUD SDGUmR QRPH GR XVXiULR # KRVW RQGH ª 1RPH GR 8VXiULR ± p R QRPH GH ORJLQ HVFROKLGR SHOR XVXiULR QD KRUD GH ID]HU VHX H PDLO ([HPSOR VHUJLRGHFDVWUR ª # p R VtPEROR GH¿QLGR SRU 7RPOLQVRQ TXH VHSDUD R QRPH GR XVXiULR GR VHX SURYHGRU ª +RVW ± p R QRPH GR SURYHGRU RQGH IRL FULDGR R HQGHUHoR HOHWU{QLFR ([HPSOR FOLFN FRP EU ª 3URYHGRU ± p R KRVW XP FRPSXWDGRU GHGLFDGR DR VHUYLoR KRUDV SRU GLD 9HMDPRV XP H[HPSOR UHDO VHUJLRGHFDVWUR#FOLFN FRP EU A caixa postal é composta pelos seguintes itens: ª &DL[D GH (QWUDGD ± 2QGH ¿FDP DUPD]HQDGDV DV PHQVDJHQV UHFHELGDV ª &DL[D GH 6DtGD ± $UPD]HQD DV PHQVDJHQV DLQGD QmR HQYLDGDV ª ( PDLOV (QYLDGRV ± &RPR R QRPH GL] ¿FDP RV H PDLOV TXH IRUDP HQYLDGRV ª 5DVFXQKR ± *XDUGD DV PHQVDJHQV TXH YRFr DLQGD QmR WHUPLQRX GH UHGLJLU ª /L[HLUD ± $UPD]HQD DV PHQVDJHQV H[FOXtGDV Ao redigir mensagem, os seguintes campos estão presentes: ª 3DUD ± p R FDPSR RQGH VHUi LQVHULGR R HQGHUHoR GR GHVWLQDWiULR ª &F ± HVWH FDPSR p XWLOL]DGR SDUD PDQGDU FySLDV GD PHVPD PHQVDJHP DR XVDU HVWH FDPSR RV HQGHUHoRV DSDUHFHUmR SDUD WRGRV RV GHVWLQDWiULRV ª &FR ± VXD IXQFLRQDOLGDGH p LJXDO DR FDPSR DQWHULRU QR HQWDQWR RV HQGHUHoRV Vy DSDUHFHUmR SDUD RV UHVSHFWLYRV GRQRV ª $VVXQWR ± FDPSR GHVWLQDGR DR DVVXQWR GD PHQVDJHP ª $QH[RV ± VmR GDGRV TXH VmR DQH[DGRV j PHQVDJHP LPDJHQV SURJUDPDV P~VLFD DUTXLYRV GH WH[WR HWF ª &RUSR GD 0HQVDJHP ± HVSDoR RQGH VHUi UHGLJLGD D PHQVDJHP $OJXQV QRPHV SRGHP PXGDU GH VHUYLGRU SDUD VHUYLGRU SRUpP UHSUHVHQWDQGR DV PHVPDV IXQo}HV $OpP GRV GHVWHV FDPSRV WHP DLQGD RV ERW}HV SDUD (9,$5 (1&$0,1+$5 H (;&/8,5 DV PHQVDJHQV HVWH ERW}HV EHP FRPR VXDV IXQFLRQDOLGDGHV YHUHPRV HP GHWDOKHV PDLV D IUHQWH 3DUD UHFHEHU VHXV H PDLOV YRFr QmR SUHFLVD HVWi FRQHFWDGR j ,QWHUQHW SRLV R H PDLO IXQFLRQD FRP SURYHGRUHV 0HVPR YRFr QmR HVWDGR FRP VHX FRPSXWDGRU OLJDGR VHXV H PDLO VmR UHFHELGRV H DUPD]HQDGRV QD VXD FDL[D SRVWDO ORFDOL]DGD QR VHX SURYHGRU 4XDQGR você acessa sua caixa postal, pode ler seus e-mail on-line (diretamente na Internet, pelo WebMail) ou baixar todos para seu computador DWUDYpV GH SURJUDPDV GH FRUUHLR HOHWU{QLFR 8P SURJUDPD PXLWR FRQKHFLGR p R 2XWORRN ([SUHVV R TXDO GHWDOKDU PDLV D IUHQWH $ VXD FDL[D SRVWDO p LGHQWL¿FDGD SHOR VHX HQGHUHoR GH H PDLO H TXDOTXHU SHVVRD TXH VRXEHU HVVH HQGHUHoR SRGH HQYLDU PHQVDJHQV SDUD YRFr 7DPEpP p SRVVtYHO HQYLDU PHQVDJHQV SDUD YiULDV SHVVRDV DR PHVPR WHPSR SDUD LVWR EDVWD XVDU RV FDPSRV ³&F´ H ³&FR´ GHVFULWRV DFLPD Atualmente, devido a grande facilidade de uso, a maioria das pessoas acessa seu e-mail diretamente na Internet através do navegaGRU (VWH WLSR GH FRUUHLR p FKDPDGR GH :HE0DLO 2 :HE0DLO p UHVSRQViYHO SHOD JUDQGH SRSXODUL]DomR GR H PDLO SRLV PHVPR DV SHVVRDV TXH QmR WHP FRPSXWDGRU SRGHP DFHVVDU VXD FDL[D SRVWDO GH TXDOTXHU OXJDU XP F\EHU FDVD GH XP DPLJR HWF 3DUD WHU XP HQGHUHoR HOHWU{QLFR EDVWD TXHUHU H DFHVVDU D ,QWHUQHW p FODUR ([LVWH TXDVH TXH XPD JXHUUD SRU XVXiULRV 2V SURYHGRUHV WDPEpP GLVSXWDP TXHP RIHUHFH PDLRU HVSDoR HP VXDV FDL[DV SRVWDLV +i SRXFR WHPSR HQFRQWUDU XP H PDLO FRP PDLV GH 0E JUiWLV QmR HUD IiFLO /HPEUR TXH TXDQGR D (PEUDWHO RIHUHFHX R &OLFN FRP 0E DFKHL TXH HUD PXLWR HVSDoR PDV ORJR R L%HVW RIHUHFHX 0E H QmR SDURX SRU DL D ³JXHUUD´ FRQWLQXR FXOPLQDQGR FRP R DQ~QFLR GH TXH R *RRJOH LULD RIHUHFHU *E 0E $ XOWLPD FDPSDQKD GR *0DLO H PDLO GR *RRJOH p GH DXPHQWDU VXD FDL[D SRVWDO FRQVWDQWHPHQWH D XOWLPD YH] TXH DFHVVHL HVWDYD HP 0E WebMail O WebMail, como descrito acima, é uma aplicação acessada diretamente na Internet, sem a necessidade de usar programa de corUHLR HOHWU{QLFR 3UDWLFDPHQWH WRGRV RV H PDLOV SRVVXHP DSOLFDo}HV SDUD DFHVVR GLUHWR QD ,QWHUQHW e JUDQGH R Q~PHUR GH SURYHGRUHV TXH RIHUHFHP FRUUHLR HOHWU{QLFR JUDWXLWDPHQWH ORJR DEDL[R VHJXH XPD OLVWD GRV PDLV SRSXODUHV ª +RWPDLO ± KWWS ZZZ KRWPDLO FRP ª *0DLO ± KWWS ZZZ JPDLO FRP ª L* 0DLO ± KWWS ZZZ LJ FRP EU ª <DKRR ± KWWS ZZZ \DKRR FRP EU Didatismo e Conhecimento

40


CONHECIMENTOS DE INFORMÁTICA 3DUD FULDU VHX H PDLO EDVWD YLVLWDU R HQGHUHoR DFLPD H VHJXLU DV LQVWUXo}HV GR VLWH 2XWUR LPSRUWDQWH IDWRU D VHU REVHUYDGR p R WDPDQKR máximo permitido por anexo, este foi outro fator que aumentou muito de tamanho, há pouco tempo a maioria dos provedores permitiam HP WRUQR GH 0E PDV DWXDOPHQWH D PDLRULD Mi RIHUHFHP HP PpGLD 0E 3RUpP WHP DOJXQV PDLV JHQHURVRV TXH FKHJDP D RIHUHFHU PDLV TXH LVVR p R FDVR GR &OLFN TXH RIHUHFH 0E FODUR TXH HVVDV OLPLWDo}HV VmR SUHRFXSDQWHV TXDQGR VH WUDWD GH H PDLO JUiWLV SRLV D ¿QDO GH FRQWDV TXDQGR SDJDPRV R EROVR p TXHP PDQGD $OpP GH FDL[D SRVWDO RV SURYHGRUHV FRVWXPDP RIHUHFHU VHUYLoRV GH DJHQGD H FRQWDWRV 7RGRV RV :HE0DLO DFLPD VmR yWLPRV HQWmR ¿FD D FULWpULR GH FDGD XP HVFROKHU R VHX RX DWp PHVPR RV VHXV HX SRU H[HPSOR SURFXUR DTXHOHV TXH RIHUHFHP XPD LQWHUIDFH FRP R PHQRU SURSDJDQGD SRVVtYHO » Criando seu e-mail Fazer sua conta de e-mail é uma tarefa extremamente simples, eu escolhi o iBestMail, pois a interface deste WebMail não tem propagandas e isso ajudar muito os entendimentos, no entanto você pode acessar qualquer dos endereços informados acima ou ainda qualquer RXWUR TXH YRFr FRQKHoD 2 SURFHVVR GH FDGDVWUR p PXLWR VLPSOHV EDVWD SUHHQFKHU XP IRUPXOiULR H GHSRLV YRFr WHUi VXD FRQWD GH H PDLO SURQWD SDUD VHU XVDGD $OJXQV SURYHGRUHV H[LJHP &3) SDUD R FDGDVWUR R L%HVW H R L* VmR H[HPSORV Mi RXWURV YRFr LQIRUPD DSHQDV GDGRV SHVVRDLV R <DKRR H R *PDLO VmR H[HPSORV HVWH ~OWLPR p SUHFLVR WHU XP FRQYLWH Vamos aos passos: $FHVVH D SDJLQD GR SURYHGRU ZZZ LEHVWPDLO FRP EU RX TXDOTXHU RXWUR GH VXD SUHIHUrQFLD &OLTXH QR ERWmR ³&$'$675( 6( -È´ VHUi DEHUWR XP IRUPXOiULR SUHHQFKD R REVHUYDQGR WRGRV RV FDPSRV 2V FDPSRV GR IRUPXOiULR WrP VXDV SDUWLFXODULGDGHV GH SURYHGRU SDUD SURYHGRU QR HQWDQWR WRGRV WUD]HP D PHVPD LGHLD FROKHU LQIRUPDo}HV GR XVXiULR (VWH VHUi D SULPHLUD SDUWH GR VHX H PDLO H p LJXDO D HVWH HP TXDOTXHU FDGDVWUR QR H[HPSOR WHPRV ³#LEHVW FRP EU´ $ MXQomR GR QRPH GH XVXiULR FRP R QRPH GR SURYHGRU p TXH VHUi VHX HQGHUHoR HOHWU{QLFR 1R H[HPSOR ¿FDULD R VHJXLQWH VHXQRPH#LEHVW FRP EU $SyV SUHHQFKHU WRGR R IRUPXOiULR FOLTXH QR ERWmR ³$FHLWR´ SURQWR VHX FDGDVWUR HVWDUi HIHWLYDGR 3HOR IDWR GH VHU JUDWXLWR H WHU PXLWRV XVXiULRV p FRPXP TXH PXLWRV QRPHV Mi WHQKDP VLGR FDGDVWUDGRV SRU RXWURV XVXiULRV QHVWH FDVR VHUi H[LELGD XPD PHQVDJHP OKH LQIRUPDQGR GR SUREOHPD ,VVR DFRQWHFH SRUTXH GHQWUR GH XP PHVPR SURYHGRU QmR SRGH WHU GRLV QRPHV GH XVXiULRV LJXDLV $ VROXomR p SURFXUDU RXWUR QRPH TXH DLQGD HVWHMD OLYUH DOJXQV SURYHGRUHV PRVWUDP VXJHVW}HV FRPR VHXQRPH VHXQRPH HWF 6H RFRUUHU LVVR FRP YRFr R TXH p EHP SURYiYHO TXH DFRQWHFHUi HVFROKD XPD GDV VXJHVW}HV RX LQIRUPH RXWUR QRPH QmR GHVLVWD YRFr YDL FRQVHJXLU ¿QDOL]H VHX FDGDVWUR TXH VHX H PDLO YDL HVWi SURQWR SDUD VHU XVDGR » Entendendo a Interface do WebMail $ LQWHUIDFH p D SDUWH JUi¿FD GR DSOLFDWLYR GH H PDLO TXH QRV OLJD GR PXQGR H[WHUQR DRV FRPDQGRV GR SURJUDPD (VWHV FRQKHFLPHQWRV YmR OKH VHUYLU SDUD TXDOTXHU :HE0DLO TXH YRFr WLYHU H WDPEpP SDUD R 2XWORRN ([SUHVV TXH p XP SURJUDPD GH JHUHQFLDPHQWR GH H PDLOV YDPRV YHU HVWH SURJUDPD PDLV DGLDQWH &KHJRX H PDLO" ± (VWH ERWmR VHUYH SDUD DWXDOL]DU VXD FDL[D GH HQWUDU YHUL¿FDQGR VH Ki QRYDV PHQVDJHQV QR VHUYLGRU (VFUHYHU ± $R FOLFDU QHVWH ERWmR D MDQHOD GH HGLomR GH H PDLO VHUi DEHUWD $ MDQHOD GH HGLomR p R HVSDoR QR TXDO YRFr YDL UHGLJLU UHVSRQGHU H HQFDPLQKDU PHQVDJHQV 6HPHOKDQWH j IXQomR QRYR H PDLO GR 2XWORRN &RQWDWRV ± $EUH D VHomR GH FRQWDWRV $TXL RV VHXV HQGHUHoRV GH H PDLO VmR SUHYLDPHQWH JXDUGDGRV SDUD XWLOL]DomR IXWXUD QHVWD VHomR WDPEpP p SRVVtYHO FULDU JUXSRV SDUD IDFLOLWDU R JHUHQFLDPHQWR GRV VHXV FRQWDWRV &RQ¿JXUDo}HV ± (VWH ERWmR DEUH FRPR R SUySULR QRPH Mi GL] D MDQHOD GH FRQ¿JXUDo}HV 1HVWD MDQHOD SRGHP VHU IHLWDV GLYHUVDV FRQ¿JXUDo}HV WDLV FRPR PXGDU VHQKD GH¿QLU Q~PHUR GH H PDLO SRU SiJLQD DVVLQDWXUD UHVSRVWD DXWRPiWLFD HWF $MXGD ± $EUH HP RXWUD MDQHOD GR QDYHJDGRU XPD VHomR FRP YiULRV WySLFRV GH DMXGD 6DLU ± (VWH ERWmR p PXLWR LPSRUWDQWH SRLV p DWUDYpV GHOH TXH YRFr YDL IHFKDU VXD FDL[D SRVWDO PXLWR UHFRPHQGDGR TXDQGR R XVR GH VHX H PDLO RFRUUHU HP FRPSXWDGRUHV GH WHUFHLURV (VSDoR ± (VWD VHomR p DSHQDV LQIRUPDWLYD H[LEH VHX HQGHUHoR GH H PDLO TXDQWLGDGH WRWDO GH VXD FDL[D SRVWD SDUWH XWLOL]DGD HP SRUFHQWDJHP H XP SHTXHQR JUi¿FR 6HomR DWXDO ± 0RVWUD R QRPH GD VHomR QD TXDO YRFr HVWi QR H[HPSOR D &DL[D GH (QWUDGD 1~PHUR GH 0HQVDJHQV ± ([LEH R LQWHUYDOR GH PHQVDJHQV TXH HVWmR QD WHOD H WDPEpP R WRWDO GD VHomR VHOHFLRQDGD &DL[D GH &RPDQGRV ± 1HVWH PHQX VXVSHQVR HVWmR WRGRV RV FRPDQGRV UHODFLRQDGRV FRP DV PHQVDJHQV H[LELGDV 3DUD XVDU HVWHV FRPDQGRV VHOHFLRQH XPD RX PDLV PHQVDJHQV R FRPDQGR GHVHMDGR H FOLTXH QR ERWmR ³2.´ 2 ERWmR ³%ORTXHDU´ EORTXHLD R HQGHUHoR GH H PDLO GD PHQVDJHP ~WLO SDUD EORTXHDU H PDLOV LQGHVHMDGRV -i R ERWmR ³&RQWDV H[WHUQDV´ DEUH XPD VHomR SDUD FRQ¿JXUDU RXWUDV FRQWDV GH H PDLOV TXH HQYLDUmR DV PHQVDJHQV D VXD FDL[D SRVWDO 3DUD R FRUUHWR IXQFLRQDPHQWR GHVWD RSomR p SUHFLVR TXH D FRQWD D VHU DFHVVDGD WHQKD VHUYLoR 323 H 6073 /LVWD GH 3iJLQDV ± (VWH PHQX VXVSHQVR H[LEH D OLVWD GH SiJLQD TXH DXPHQWD FRQIRUPH D TXDQWLGDGH GH H PDLOV QD VHomR 3DUD DFHVVDU VHOHFLRQH D SiJLQD GHVHMDGD H FOLTXH QR ERWmR ³2.´ 9HMD TXH WRGRV RV FRPDQGRV HVWmR GLVSRQtYHLV WDPEpP QD SDUWH LQIHULRU LVWR SDUD IDFLOLWDU R XVR GH VXD FDL[D SRVWDO

Didatismo e Conhecimento

41


CONHECIMENTOS DE INFORMÁTICA 3DVWDV GR 6LVWHPD ± ([LEH DV SDVWDV SDGU}HV GH XP FRUUHLR HOHWU{QLFR &DL[D GH (QWUDGD 0HQVDJHQV (QYLDGDV 5DVFXQKR H /L[HLUD 8P GHWDOKH LPSRUWDQWH p R HVWLOR GR QRPH TXDQGR HVWi QRUPDO VLJQL¿FD TXH WRGDV DV PHQVDJHQV IRUDP DEHUWDV SRUpP TXDQGR HVWmR HP QHJULWR DFXVDP TXH Ki XPD RX PDLV PHQVDJHQV TXH QmR IRUDP OLGDV R Q~PHUR HQWUH SDUrQWHVH LQGLFD D TXDQWLGDGH (VWH GHWDOKH IXQFLRQD SDUD WRGDV DV SDVWDV H PHQVDJHQV GR FRUUHLR 3DLQHO GH 9LVXDOL]DomR ± (VSDoR GHVWLQDGR D H[LELU DV PHQVDJHQV 3RU SDGUmR DR DEULU VXD FDL[D SRVWDO p H[LELGR R FRQWH~GR GD &DL[D GH (QWUDGD PDV HVWH SDLQHO H[LEH WDPEpP DV PHQVDJHQV GDV GLYHUVDV SDVWDV H[LVWHQWHV QD VXD FDL[D SRVWDO $ REVHUYDomR IHLWD QR LWHP DQWHULRU VREUH QHJULWR WDPEpP p YiOLGD SDUD HVWD VHomR 2EVHUYH DV FDL[DV GH VHOHomR ORFDOL]DGDV GR ODGR HVTXHUGR GH FDGD PHQVDJHP p DWUDYpV GHODV TXH DV PHQVDJHQV VmR VHOHFLRQDGDV A seleção de todos os itens ao mesmo tempo, também pode ser feito pela caixa de seleção do lado esquerdo do título da coluna ³5HPHWHQWH´ 2 WtWXOR GDV FROXQDV DOpP GH QRPHi ODV WDPEpP VHUYH SDUD FODVVL¿FDU DV PHQVDJHQV TXH SRU SDGUmR HVWmR FODVVL¿FDGDV DWUDYpV GD FROXQD ³'DWD´ SDUD XVDU RXWUD FROXQD QD FODVVL¿FDomR EDVWD FOLFDU VREUH QRPH GHOD *HUHQFLDGRU GH 3DVWDV ± 1HVWD VHomR p SRVVtYHO DGLFLRQDU UHQRPHDU H DSDJDU DV VXDV SDVWDV $V SDVWDV VmR XP PRGR GH RUJDQL]DU VHX FRQWH~GR DUPD]HQDQGR VXDV PHQVDJHQV SRU WHPDV 4XDQGR VHX H PDLO p FULDGR QmR H[LVWHP SDVWDV QHVWD VHomR LVVR GHYH VHU IHLWR SHOR XVXiULR GH DFRUGR FRP VXDV QHFHVVLGDGHV &RQWDV ([WHUQDV ± (VWH LWHP p XP OLQN TXH DEULUi D VHomR RQGH SRGH VHU IHLWD XPD FRQ¿JXUDomR TXH SHUPLWLUi YRFr DFHVVDU RXWUDV FDL[DV SRVWDLV GLUHWDPHQWH GD VXD 2 SUy[LPR OLQN FRPR R QRPH Mi GL] DEUH D MDQHOD GH FRQ¿JXUDomR GRV H PDLOV EORTXHDGRV H PDLV DEDL[R R OLQN SDUD EDL[DU XP SOXJ LQ TXH OKH SHUPLWH ID]HU XPD FRQ¿JXUDomR DXWRPiWLFD GR 2XWORRN ([SUHVV (VWHV GRLV SULPHLURV OLQNV VmR RV PHVPRV DSUHVHQWDGRV QR LWHP

PROCEDIMENTO PARA A REALIZAÇÃO DE CÓPIA DE SEGURANÇA (BACKUP) ([LVWHP PXLWDV PDQHLUDV GH SHUGHU LQIRUPDo}HV HP XP FRPSXWDGRU LQYROXQWDULDPHQWH 8PD FULDQoD XVDQGR R WHFODGR FRPR VH IRVVH XP SLDQR XPD TXHGD GH HQHUJLD XP UHOkPSDJR LQXQGDo}HV ( DOJXPDV YH]HV R HTXLSDPHQWR VLPSOHVPHQWH IDOKD (P PRGRV JHUDLV R EDFNXS p XPD WDUHID HVVHQFLDO SDUD WRGRV RV TXH XVDP FRPSXWDGRUHV H RX RXWURV GLVSRVLWLYRV WDLV FRPR PiTXLQDV GLJLWDLV GH IRWRJUD¿D OHLWRUHV GH 03 HWF 2 WHUPR EDFNXS WDPEpP SRGH VHU XWLOL]DGR SDUD KDUGZDUH VLJQL¿FDQGR XP HTXLSDPHQWR SDUD VRFRUUR IXQFLRQD FRPR XP SQHX VRFRUUR GR YHtFXOR SRGH VHU XPD LPSUHVVRUD FSX RX PRQLWRU HWF TXH VHUYLUi SDUD VXEVWLWXLU WHPSRUDULDPHQWH XP GHVVHV HTXLSDPHQWRV TXH HVWHMDP FRP SUREOHPDV $WXDOPHQWH RV PDLV FRQKHFLGRV PHLRV GH EDFNXSV VmR &' 520 '9' H 'LVFR 5tJLGR ([WHUQR SHQGULYHV H ¿WDV PDJQpWLFDV 1D SUiWLFD H[LVWHP LQ~PHURV VRIWZDUHV SDUD FULDomR GH EDFNXSV H D SRVWHULRU UHSRVLomR &RPR SRU H[HPSOR R 1RUWRQ *KRVW GD 6\PDQWHF 6H YRFr FRVWXPD ID]HU FySLDV GH EDFNXS GRV VHXV DUTXLYRV UHJXODUPHQWH H RV PDQWrP HP XP ORFDO VHSDUDGR YRFr SRGH REWHU XPD SDUWH RX DWp WRGDV DV LQIRUPDo}HV GH YROWD FDVR DOJR DFRQWHoD DRV RULJLQDLV QR FRPSXWDGRU $ GHFLVmR VREUH TXDLV DUTXLYRV LQFOXLU QR EDFNXS p PXLWR SHVVRDO 7XGR DTXLOR TXH QmR SRGH VHU VXEVWLWXtGR IDFLOPHQWH GHYH HVWDU QR WRSR GD VXD OLVWD $QWHV GH FRPHoDU IDoD XPD OLVWD GH YHUL¿FDomR GH WRGRV RV DUTXLYRV D VHUHP LQFOXtGRV QR EDFNXS ,VVR R DMXGDUi D GHWHUPLQDU R TXH SUHFLVD GH EDFNXS DOpP GH VHUYLU GH OLVWD GH UHIHUrQFLD SDUD UHFXSHUDU XP DUTXLYR GH EDFNXS Eis algumas sugestões para ajudá-lo a começar: 'DGRV EDQFiULRV H RXWUDV LQIRUPDo}HV ¿QDQFHLUDV )RWRJUD¿DV GLJLWDLV 6RIWZDUH FRPSUDGR H EDL[DGR DWUDYpV GD ,QWHUQHW 3URMHWRV SHVVRDLV 6HX FDWiORJR GH HQGHUHoRV GH H PDLO 6HX FDOHQGiULR GR 0LFURVRIW 2XWORRN 6HXV IDYRULWRV GR ,QWHUQHW ([SORUHU 2 GHWDOKH PDLV LPSRUWDQWH DQWHV GH ID]HU XP EDFNXS p IRUPDWDU R GLVSRVLWLYR ,VVR SRGH VHU IHLWR FOLFDQGR FRP R ERWmR GLUHLWR GR PRXVH VREUH R tFRQH GR GLVSRVLWLYR GHQWUR GR tFRQH ³0HX &RPSXWDGRU´ H VHOHFLRQDU D RSomR IRUPDWDU 3DUD WHU FHUWH]D TXH R GLVSRVLWLYR QmR HVWi GDQL¿FDGR HVFROKD D IRUPDWDomR FRPSOHWD TXH YHUL¿FDUi FDGD VHWRU GR GLVTXHWH H PRVWUDUi SDUD YRFr VH R GLVTXHWH WHP DOJXP GDQR 6HPSUH TXH XP GLVTXHWH WLYHU SUREOHPDV QmR FRSLH DUTXLYRV GH EDFNXSV SDUD HOH Bem, agora que você já sabe fazer cópias de segurança, conheça os dois erros mais banais que você pode cometer e tornar o seu EDFNXS LQ~WLO )D]HU XPD FySLD GR DUTXLYR QR PHVPR GLVFR ,VVR QmR p EDFNXS SRLV VH DFRQWHFHU DOJXP SUREOHPD QR GLVFR YRFr YDL SHUGHU RV GRLV DUTXLYRV )D]HU XPD FySLD H DSDJDU R RULJLQDO ,VVR WDPEpP QmR p EDFNXS SRU PRWLYRV yEYLRV 3URFXUH XWLOL]DU DUTXLYRV FRPSDFWDGRV DSHQDV FRPR EDFNXSV VHFXQGiULRV FRPR LPDJHQV TXH JHUDOPHQWH RFXSDP XP HVSDoR PXLWR JUDQGH Didatismo e Conhecimento

42


CONHECIMENTOS DE INFORMÁTICA Copiando Arquivos de um Disco Rígido (H.D.) para um Dispositivo (Fazendo Backup) &OLTXH QR ERWmR ³,QLFLDU´ FDQWR LQIHULRU HVTXHUGR (VFROKD ³3URJUDPDV´ H QR PHQX TXH DEUH HVFROKD ³:LQGRZV ([SORUHU´ 2 :LQGRZV ([SORUHU p GLYLGLGR HP GXDV SDUWHV 'R ODGR HVTXHUGR VmR H[LELGDV DV SDVWDV GLUHWyULRV H GR ODGR GLUHLWR R FRQWH~GR GDV SDVWDV 3DUD YHU R FRQWH~GR GH XPD SDVWD FOLTXH XPD YH] VREUH D SDVWD GHVHMDGD QR ODGR HVTXHUGR H HOH VHUi H[LELGR GR ODGR GLUHLWR 3DUD YHU R FRQWH~GR GH XPD VXESDVWD XPD SDVWD GHQWUR GH RXWUD SDVWD FOLTXH GXDV YH]HV VREUH D SDVWD GHVHMDGD GR ODGR GLUHLWR GR ³:LQGRZV ([SORUHU´ 'HSRLV GH YLVXDOL]DU RV DUTXLYRV RX SDVWDV TXH VH GHVHMD FRSLDU QR ODGR GLUHLWR GR ³:LQGRZV ([SORUHU´ VHOHFLRQH RV FOLFDQGR VREUH R DUTXLYR RX SDVWD HVWH ¿FDUi GHVWDFDGR &OLTXH FRP R ERWmR GLUHLWR GR PRXVH VREUH R DUTXLYR ³&RSLDU´ &OLTXH QD XQLGDGH FRUUHVSRQGHQWH DR GLVSRVLWLYR QR ODGR HVTXHUGR GR ³:LQGRZV ([SORUHU´ &OLTXH FRP R ERWmR GLUHLWR GR PRXVH QR HVSDoR HP EUDQFR GR ODGR GLUHLWR H HVFROKD ³&RODU´ Selecionando Vários Arquivos 3DUD VHOHFLRQDU YiULRV DUTXLYRV RX SDVWDV DSyV VHOHFLRQDU R SULPHLUR VHJXUH D WHFOD ³&WUO´ H FOLTXH QRV RXWURV DUTXLYRV RX SDVWDV GHVHMDGDV 7RGRV RV DUTXLYRV RX SDVWDV VHOHFLRQDGRV ¿FDUmR GHVWDFDGRV Fazendo Backup do seu Outlook 7RGRV VDEHP GR ULVFR TXH p QmR WHUPRV EDFNXS GRV QRVVRV GDGRV H GHQWUH HOHV VH LQFOXL DV LQIRUPDo}HV TXH JXDUGDPRV QR 287/22. -i LPDJLQRX WHU TXH HQWUDU FRP WRGRV RV FRQWDWRV QRYDPHQWH" ( VHXV FRPSURPLVVRV QR FDOHQGiULR" 3LRU FRPR p TXH YDL UHFXSHUDU as mensagens de e-mail que você tinha guardado? &RPR ID]HU R EDFNXS GDV LQIRUPDo}HV GR 2XWORRN QmR p XPD DWLYLGDGH PXLWR VLPSOHV SHOR PHQRV QmR Ki QHOH QDGD DXWRPDWL]DGR OLVWDPRV DTXL DOJXPDV PDQHLUDV GH H[HFXWDU HVWH EDFNXS H VH JDUDQWLU FRQWUD TXDOTXHU SUREOHPD ([HPSOR SDUD 2XWORRN &RSLH WRGDV DV PHQVDJHQV SDUD XPD SDVWD VHSDUDGD FRP LVVR YRFr WHUi IHLWR R EDFNXS GDV PHQVDJHQV

9i HP )HUUDPHQWDV ! &RQWDV Oi VHOHFLRQH WRGDV DV FRQWDV TXH GHVHMD VDOYDU H VHOHFLRQH ([SRUWDU &DGD FRQWD VHUi VDOYD FRP D H[WHQVmR ,$) QD SDVWD TXH YRFr TXLVHU 3DUD H[SRUWDU WRGRV RV VHXV FRQWDWRV DEUD R VHX FDWiORJR GH HQGHUHoRV GR VHX 2XWORRN HQWmR FOLTXH HP $UTXLYR ! ([SRUWDU ! &DWiORJR GH HQGHUHoRV :$% &RP HVVH SURFHGLPHQWR WRGRV RV VHXV FRQWDWRV VHUmR DUPD]HQDGRV QXP DUTXLYR GH H[WHQVmR :$% FRP R QRPH TXH YRFr TXLVHU H QD SDVWD TXH YRFr TXLVHU 3DUD DV DVVLQDWXUDV p VLPSOHV EDVWD FRSLDU R FRQWH~GR GH FDGD DVVLQDWXUD TXH YRFr XWLOL]D HP DUTXLYRV GH WH[WR 7;7 VHSDUDGRV 'HSRLV YRFr SRGHUi XWLOL]DU DV VXDV DVVLQDWXUDV D SDUWLU GRV DUTXLYRV TXH FULRX 3DUD DV UHJUDV RX ¿OWURV YRFr GHYHUi LU HP )HUUDPHQWDV ! $VVLVWHQWH GH 5HJUDV ! &OLFDU HP 23d®(6 ! &OLFDU HP ([SRUWDU 5HJUDV 6HUi VDOYR XP DUTXLYR FRP D H[WHQVmR 5:= )D]HU WRGRV HVVHV SURFHGLPHQWRV p PDLV WUDEDOKRVR SRUpP PXLWR PDLV VHJXUR 2XWUD VROXomR p XWLOL]DU SURJUDPDV HVSHFt¿FRV SDUD EDFNXS GR 2XWORRN MEIOS DISPONÍVEIS PARA BACKUPS EM ARMAZENAMENTO EXTERNO (QWHQGH VH SRU DUPD]HQDPHQWR H[WHUQR TXDOTXHU PHFDQLVPR TXH QmR VH HQFRQWUH GHQWUR GR VHX 3& ([LVWHP YiULDV RSo}HV H DSUHsentamos uma tabela com os mais comuns, vantagens e desvantagens: CD-RW e XP &' HP TXH SRGH JXDUGDU JUDYDU VXDV LQIRUPDo}HV $UTXLYRV UHDOPHQWH SUHFLRVRV TXH SUHFLVDP VHU JXDUGDGRV FRP GH FHUWH]D GH TXH QmR VRIUHUmR GDQRV FRP R SDVVDU GR WHPSR GHYHP VHU EHFDSHDGRV HP &'V $ PDLRULD GRV FRPSXWDGRUHV DWXDLV LQFOXL XPD XQLGDGH SDUD JUDYDU HP &' 5: 2 &' 520 p D IRUPD PDLV VHJXUD GH ID]HU JUDQGHV EDFNXSV &DGD &' DUPD]HQD DWp 0E H SRU VHU XPD PtGLD yWLFD RQGH RV GDGRV VmR JUDYDGRV GH PDQHLUD ItVLFD p PXLWR PDLV FRQ¿iYHO TXH PtGLDV PDJQpWLFDV VXMHLWDV D LQWHUIHUrQFLDV HOpWULFDV Didatismo e Conhecimento

43


CONHECIMENTOS DE INFORMÁTICA DVD-RW $ FDSDFLGDGH GH DUPD]HQDPHQWR p PXLWR PDLRU QRUPDOPHQWH HQWUH H JLEDE\WHV Pen Drive 6mR GLVSRVLWLYRV EDVWDQWH SHTXHQRV TXH VH FRQHFWDP D XPD SRUWD 86% GR VHX HTXLSDPHQWR 6mR PXLWR SRUWiWHLV IUHTXHQWHPHQWH VmR GR WLSR ³FKDYHLUR´ LGHDLV SDUD EDFNXSV UiSLGRV H SDUD PRYHU DUTXLYRV HQWUH PiTXLQDV 9RFr GHYH HVFROKHU XP PRGHOR TXH QmR VHMD PXLWR IUiJLO HD Externo 2 +' H[WHUQR IXQFLRQD FRPR XP SHULIpULFR FRPR VH IRVVH XP 3HQ 'ULYH Vy TXH FRP XPD FDSDFLGDGH LQ¿QLWDPHQWH PDLRU Backups utilizando o Windows )D]HU EDFNXSV GH VXD LQIRUPDomR QmR WHP TXH VHU XP WUDEDOKR FRPSOLFDGR 9RFr SRGH VLPSOHVPHQWH UHFRUUHU DR PpWRGR &RSLDU H &RODU RX VHMD DSURYHLWDU DV IHUUDPHQWDV GHSHQGHQGR GD YHUVmR GR 6LVWHPD 2SHUDFLRQDO :LQGRZV /LQX[ HWF TXH YRFr XWLOL]D Cópias Manuais 9RFr SRGH ID]HU EDFNXSV GD VXD LQIRUPDomR FRP HVWHV SDVVRV VLPSOHV &OLTXH FRP R ERWmR GLUHLWR VREUH R DUTXLYR RX SDVWD GH TXH VHMD ID]HU EDFNXS H GHSRLV FOLTXH QD RSomR ³&RSLDU´ QR PHQX H[LELGR $JRUD PDUTXH D XQLGDGH GH EDFNXS FOLTXH FRP R ERWmR GLUHLWR VREUH HOD H HVFROKD ³&RODU´ QR PHQX H[LELGR 9RFr SRGH PDUFDU D XQLGDGH GH EDFNXS DR ORFDOL]i OD QR tFRQH ³0HX &RPSXWDGRU´ RX VHMD FRPR XPD GDV XQLGDGHV GR :LQGRZV ([SORUHU ,VVR p WXGR 1mR VH HVTXHoD GH YHUL¿FDU R EDFNXS SDUD VH FHUWL¿FDU TXH HOH FRXEH QD XQLGDGH GH EDFNXS H R PDQWHQKD SURWHJLGR Utilizando a ferramenta inclusa no Windows XP Professional. 6H YRFr WUDEDOKD FRP R :LQGRZV ;3 3URIHVVLRQDO YRFr GLVS}H GH XPD IHUUDPHQWD PXLWR ~WLO TXH VH HQFDUUHJD GH ID]HU RV EDFNXSV TXH YRFr PDUFDU 6LJD HVWHV SDVVRV SDUD XWLOL]i OD &OLTXH HP ³,QLFLDU´ H GHSRLV HP ³7RGRV RV 3URJUDPDV´ 'HQWUR GH ³$FHVVyULRV´ DSRQWH SDUD ³)HUUDPHQWDV GH 6LVWHPD´ (VFROKD D RSomR ³%DFNXS´ 6H IRU D SULPHLUD YH] TXH YRFr XWLOL]D HVVD IHUUDPHQWD DSDUHFHUi R ³$VVLVWHQWH GH EDFNXS RX UHVWDXUDomR´ &OLTXH HP $YDQoDU H VLJD DV LQVWUXo}HV QD WHOD 6H YRFr GHVHMD XP JXLD SDVVR D SDVVR GH FRPR XVDU HVVD IHUUDPHQWD SRGH REWr OR HP %DFNXS GR :LQGRZV ;3 )DFLOLWDGR HP LQJOrV 6XJHVWmR 6H YRFr QmR VDEH TXDO YHUVmR GH VLVWHPD RSHUDFLRQDO XWLOL]D Gr XP FOLTXH FRP R ERWmR GLUHLWR VREUH R tFRQH ³0HX &RPSXWDGRU´ H HVFROKD ³3URSULHGDGHV´ 'HQWUR GD JXLD ³6LVWHPD´ YRFr HQFRQWUDUi D YHUVmR GR VHX VLVWHPD RSHUDFLRQDO Para utilizar a ferramenta de backups no Windows XP Home Edition 6H VHX 3& WHP R :LQGRZV ;3 +RPH (GLWLRQ YRFr SUHFLVD DGLFLRQDU D IHUUDPHQWD GH EDFNXSV TXH YHP QR VHX &' RULJLQDO VHJXLQGR estes passos: ,QVLUD R &' GR :LQGRZV ;3 RX R TXH YHLR FRP VHX HTXLSDPHQWR VH HOH IRL SUp FDUUHJDGR QD XQLGDGH GH &' 6H D WHOD GH DSUHVHQWDomR QmR DSDUHFHU Gr XP FOLTXH GXSOR VREUH R tFRQH GD XQLGDGH GH &' GHQWUR GH ³0HX &RPSXWDGRU´ 1D WHOD GH DSUHVHQWDomR HVFROKD D RSomR ³([HFXWDU WDUHIDV DGLFLRQDLV´ &OLTXH HP ³([SORUDU HVWH &'´ 2 :LQGRZV ([SORUHU VH DEULUi /RFDOL]H D SDVWD ³9DOXH$GG´ H Gr XP FOLTXH GXSOR VREUH HOD GHSRLV HP 0VIW H GHSRLV HP 1W%DFNXS $JRUD Gr XP FOLTXH GXSOR VREUH R DUTXLYR 1W%DFNXS PVL SDUD LQVWDODU D IHUUDPHQWD GH EDFNXS 1RWD $R WHUPLQDU D LQVWDODomR p SURYiYHO TXH VHMD VROLFLWDGR TXH YRFr UHLQLFLH VHX HTXLSDPHQWR 3DUD XWLOL]DU D IHUUDPHQWD VLJD HVWHV SDVVRV &OLTXH HP ³,QLFLDU´ H GHSRLV HP ³7RGRV RV 3URJUDPDV´ 'HQWUR GH ³$FHVVyULRV´ DSRQWH SDUD ³)HUUDPHQWDV GH 6LVWHPD´ (VFROKD D RSomR ³EDFNXS´ 6H IRU D SULPHLUD YH] TXH YRFr XWLOL]D HVVD IHUUDPHQWD DSDUHFHUi R ³$VVLVWHQWH GH EDFNXS RX UHVWDXUDomR´ &OLTXH HP $YDQoDU H VLJD DV LQVWUXo}HV QD WHOD 6H YRFr GHVHMD XP JXLD SDVVR D SDVVR GH FRPR XVDU HVVD IHUUDPHQWD SRGH REWr OR HP %DFNXS GR :LQGRZV ;3 )DFLOLWDGR HP LQJOrV 6XJHVWmR 6H YRFr QmR VDEH TXDO YHUVmR GH VLVWHPD RSHUDFLRQDO XWLOL]D Gr XP FOLTXH FRP R ERWmR GLUHLWR VREUH R tFRQH ³0HX &RPSXWDGRU´ H HVFROKD ³3URSULHGDGHV´ 'HQWUR GD JXLD ³6LVWHPD´ YRFr HQFRQWUDUi D YHUVmR GR VHX VLVWHPD RSHUDFLRQDO Didatismo e Conhecimento

44


CONHECIMENTOS DE INFORMÁTICA Recomendações para proteger seus backups )D]HU EDFNXSV p XPD H[FHOHQWH SUiWLFD GH VHJXUDQoD EiVLFD $JRUD OKH GDPRV FRQVHOKRV VLPSOHV SDUD TXH YRFr HVWHMD D VDOYR QR GLD em que precisar deles: 7HQKD VHXV EDFNXSV IRUD GR 3& HP RXWUR HVFULWyULR H VH IRU SRVVtYHO HP DOJXP UHFLSLHQWH j SURYD GH LQFrQGLRV FRPR RV FRIUHV RQGH YRFr JXDUGD VHXV GRFXPHQWRV H YDORUHV LPSRUWDQWHV )DoD PDLV GH XPD FySLD GD VXD LQIRUPDomR H DV PDQWHQKD HP OXJDUHV VHSDUDGRV (VWDEHOHoD XPD LGDGH Pi[LPD SDUD VHXV EDFNXSV p PHOKRU FRPSULPLU RV DUTXLYRV TXH Mi VHMDP PXLWR DQWLJRV TXDVH WRGRV RV SURJUDPDV GH EDFNXS FRQWDP FRP HVVD RSomR DVVLP YRFr QmR GHVSHUGLoD HVSDoR ~WLO 3URWHMD VHXV EDFNXSV FRP XPD VHQKD GH PDQHLUD TXH VXD LQIRUPDomR ¿TXH FULSWRJUDIDGD R VX¿FLHQWH SDUD TXH QLQJXpP PDLV SRVVD DFHVVi OD 6H VXD LQIRUPDomR p LPSRUWDQWH SDUD VHXV HQWHV TXHULGRV LPSOHPHQWH DOJXPD IRUPD SDUD TXH HOHV SRVVDP VDEHU D VHQKD VH YRFr QmR HVWLYHU SUHVHQWH OBS.: Conceitos de ambiente de Redes de Computadores ver:” Protocolos, serviços, tecnologias, ferramentas e aplicativos associados à Internet...” PROCEDIMENTOS, APLICATIVOS E DISPOSITIVOS PARA ARMAZENAMENTO DE DADOS E PARA REALIZAÇÃO DE CÓPIA DE SEGURANÇA (BACKUP). ([LVWHP PXLWDV PDQHLUDV GH SHUGHU LQIRUPDo}HV HP XP FRPSXWDGRU LQYROXQWDULDPHQWH 8PD FULDQoD XVDQGR R WHFODGR FRPR VH IRVVH XP SLDQR XPD TXHGD GH HQHUJLD XP UHOkPSDJR LQXQGDo}HV ( DOJXPDV YH]HV R HTXLSDPHQWR VLPSOHVPHQWH IDOKD (P PRGRV JHUDLV R EDFNXS p XPD WDUHID HVVHQFLDO SDUD WRGRV RV TXH XVDP FRPSXWDGRUHV H RX RXWURV GLVSRVLWLYRV WDLV FRPR PiTXLQDV GLJLWDLV GH IRWRJUD¿D OHLWRUHV GH 03 HWF 2 WHUPR EDFNXS WDPEpP SRGH VHU XWLOL]DGR SDUD KDUGZDUH VLJQL¿FDQGR XP HTXLSDPHQWR SDUD VRFRUUR IXQFLRQD FRPR XP SQHX VRFRUUR GR YHtFXOR SRGH VHU XPD LPSUHVVRUD FSX RX PRQLWRU HWF TXH VHUYLUi SDUD VXEVWLWXLU WHPSRUDULDPHQWH XP GHVVHV HTXLSDPHQWRV TXH HVWHMDP FRP SUREOHPDV $WXDOPHQWH RV PDLV FRQKHFLGRV PHLRV GH EDFNXSV VmR &' 520 '9' H 'LVFR 5tJLGR ([WHUQR SHQGULYHV H ¿WDV PDJQpWLFDV 1D SUiWLFD H[LVWHP LQ~PHURV VRIWZDUHV SDUD FULDomR GH EDFNXSV H D SRVWHULRU UHSRVLomR &RPR SRU H[HPSOR R 1RUWRQ *KRVW GD 6\PDQWHF 6H YRFr FRVWXPD ID]HU FySLDV GH EDFNXS GRV VHXV DUTXLYRV UHJXODUPHQWH H RV PDQWrP HP XP ORFDO VHSDUDGR YRFr SRGH REWHU XPD SDUWH RX DWp WRGDV DV LQIRUPDo}HV GH YROWD FDVR DOJR DFRQWHoD DRV RULJLQDLV QR FRPSXWDGRU $ GHFLVmR VREUH TXDLV DUTXLYRV LQFOXLU QR EDFNXS p PXLWR SHVVRDO 7XGR DTXLOR TXH QmR SRGH VHU VXEVWLWXtGR IDFLOPHQWH GHYH HVWDU QR WRSR GD VXD OLVWD $QWHV GH FRPHoDU IDoD XPD OLVWD GH YHUL¿FDomR GH WRGRV RV DUTXLYRV D VHUHP LQFOXtGRV QR EDFNXS ,VVR R DMXGDUi D GHWHUPLQDU R TXH SUHFLVD GH EDFNXS DOpP GH VHUYLU GH OLVWD GH UHIHUrQFLD SDUD UHFXSHUDU XP DUTXLYR GH EDFNXS Eis algumas sugestões para ajudá-lo a começar: 'DGRV EDQFiULRV H RXWUDV LQIRUPDo}HV ¿QDQFHLUDV )RWRJUD¿DV GLJLWDLV 6RIWZDUH FRPSUDGR H EDL[DGR DWUDYpV GD ,QWHUQHW 3URMHWRV SHVVRDLV 6HX FDWiORJR GH HQGHUHoRV GH H PDLO 6HX FDOHQGiULR GR 0LFURVRIW 2XWORRN 6HXV IDYRULWRV GR ,QWHUQHW ([SORUHU 2 GHWDOKH PDLV LPSRUWDQWH DQWHV GH ID]HU XP EDFNXS p IRUPDWDU R GLVSRVLWLYR ,VVR SRGH VHU IHLWR FOLFDQGR FRP R ERWmR GLUHLWR GR PRXVH VREUH R tFRQH GR GLVSRVLWLYR GHQWUR GR tFRQH ³0HX &RPSXWDGRU´ H VHOHFLRQDU D RSomR IRUPDWDU 3DUD WHU FHUWH]D TXH R GLVSRVLWLYR QmR HVWi GDQL¿FDGR HVFROKD D IRUPDWDomR FRPSOHWD TXH YHUL¿FDUi FDGD VHWRU GR GLVTXHWH H PRVWUDUi SDUD YRFr VH R GLVTXHWH WHP DOJXP GDQR 6HPSUH TXH XP GLVTXHWH WLYHU SUREOHPDV QmR FRSLH DUTXLYRV GH EDFNXSV SDUD HOH Bem, agora que você já sabe fazer cópias de segurança, conheça os dois erros mais banais que você pode cometer e tornar o seu EDFNXS LQ~WLO )D]HU XPD FySLD GR DUTXLYR QR PHVPR GLVFR ,VVR QmR p EDFNXS SRLV VH DFRQWHFHU DOJXP SUREOHPD QR GLVFR YRFr YDL SHUGHU RV GRLV DUTXLYRV )D]HU XPD FySLD H DSDJDU R RULJLQDO ,VVR WDPEpP QmR p EDFNXS SRU PRWLYRV yEYLRV 3URFXUH XWLOL]DU DUTXLYRV FRPSDFWDGRV DSHQDV FRPR EDFNXSV VHFXQGiULRV FRPR LPDJHQV TXH JHUDOPHQWH RFXSDP XP HVSDoR PXLWR JUDQGH

Didatismo e Conhecimento

45


CONHECIMENTOS DE INFORMÁTICA Copiando Arquivos de um Disco Rígido (H.D.) para um Dispositivo (Fazendo Backup) &OLTXH QR ERWmR ³,QLFLDU´ FDQWR LQIHULRU HVTXHUGR (VFROKD ³3URJUDPDV´ H QR PHQX TXH DEUH HVFROKD ³:LQGRZV ([SORUHU´ 2 :LQGRZV ([SORUHU p GLYLGLGR HP GXDV SDUWHV 'R ODGR HVTXHUGR VmR H[LELGDV DV SDVWDV GLUHWyULRV H GR ODGR GLUHLWR R FRQWH~GR das pastas; 3DUD YHU R FRQWH~GR GH XPD SDVWD FOLTXH XPD YH] VREUH D SDVWD GHVHMDGD QR ODGR HVTXHUGR H HOH VHUi H[LELGR GR ODGR GLUHLWR 3DUD YHU R FRQWH~GR GH XPD VXESDVWD XPD SDVWD GHQWUR GH RXWUD SDVWD FOLTXH GXDV YH]HV VREUH D SDVWD GHVHMDGD GR ODGR GLUHLWR GR ³:LQGRZV ([SORUHU´ 'HSRLV GH YLVXDOL]DU RV DUTXLYRV RX SDVWDV TXH VH GHVHMD FRSLDU QR ODGR GLUHLWR GR ³:LQGRZV ([SORUHU´ VHOHFLRQH RV FOLFDQGR VREUH R DUTXLYR RX SDVWD HVWH ¿FDUi GHVWDFDGR &OLTXH FRP R ERWmR GLUHLWR GR PRXVH VREUH R DUTXLYR ³&RSLDU´ &OLTXH QD XQLGDGH FRUUHVSRQGHQWH DR GLVSRVLWLYR QR ODGR HVTXHUGR GR ³:LQGRZV ([SORUHU´ &OLTXH FRP R ERWmR GLUHLWR GR PRXVH QR HVSDoR HP EUDQFR GR ODGR GLUHLWR H HVFROKD ³&RODU´ Selecionando Vários Arquivos 3DUD VHOHFLRQDU YiULRV DUTXLYRV RX SDVWDV DSyV VHOHFLRQDU R SULPHLUR VHJXUH D WHFOD ³&WUO´ H FOLTXH QRV RXWURV DUTXLYRV RX SDVWDV GHVHMDGDV 7RGRV RV DUTXLYRV RX SDVWDV VHOHFLRQDGRV ¿FDUmR GHVWDFDGRV Fazendo Backup do seu Outlook 7RGRV VDEHP GR ULVFR TXH p QmR WHUPRV EDFNXS GRV QRVVRV GDGRV H GHQWUH HOHV VH LQFOXL DV LQIRUPDo}HV TXH JXDUGDPRV QR 287/22. -i LPDJLQRX WHU TXH HQWUDU FRP WRGRV RV FRQWDWRV QRYDPHQWH" ( VHXV FRPSURPLVVRV QR FDOHQGiULR" 3LRU FRPR p TXH YDL UHFXSHUDU as mensagens de e-mail que você tinha guardado? &RPR ID]HU R EDFNXS GDV LQIRUPDo}HV GR 2XWORRN QmR p XPD DWLYLGDGH PXLWR VLPSOHV SHOR PHQRV QmR Ki QHOH QDGD DXWRPDWL]DGR OLVWDPRV DTXL DOJXPDV PDQHLUDV GH H[HFXWDU HVWH EDFNXS H VH JDUDQWLU FRQWUD TXDOTXHU SUREOHPD ([HPSOR SDUD 2XWORRN &RSLH WRGDV DV PHQVDJHQV SDUD XPD SDVWD VHSDUDGD FRP LVVR YRFr WHUi IHLWR R EDFNXS GDV PHQVDJHQV

9i HP )HUUDPHQWDV ! &RQWDV Oi VHOHFLRQH WRGDV DV FRQWDV TXH GHVHMD VDOYDU H VHOHFLRQH ([SRUWDU &DGD FRQWD VHUi VDOYD FRP D H[WHQVmR ,$) QD SDVWD TXH YRFr TXLVHU 3DUD H[SRUWDU WRGRV RV VHXV FRQWDWRV DEUD R VHX FDWiORJR GH HQGHUHoRV GR VHX 2XWORRN HQWmR FOLTXH HP $UTXLYR ! ([SRUWDU ! &DWiORJR GH HQGHUHoRV :$% &RP HVVH SURFHGLPHQWR WRGRV RV VHXV FRQWDWRV VHUmR DUPD]HQDGRV QXP DUTXLYR GH H[WHQVmR :$% FRP R QRPH TXH YRFr TXLVHU H QD SDVWD TXH YRFr TXLVHU 3DUD DV DVVLQDWXUDV p VLPSOHV EDVWD FRSLDU R FRQWH~GR GH FDGD DVVLQDWXUD TXH YRFr XWLOL]D HP DUTXLYRV GH WH[WR 7;7 VHSDUDGRV 'HSRLV YRFr SRGHUi XWLOL]DU DV VXDV DVVLQDWXUDV D SDUWLU GRV DUTXLYRV TXH FULRX 3DUD DV UHJUDV RX ¿OWURV YRFr GHYHUi LU HP )HUUDPHQWDV ! $VVLVWHQWH GH 5HJUDV ! &OLFDU HP 23d®(6 ! &OLFDU HP ([SRUWDU 5HJUDV 6HUi VDOYR XP DUTXLYR FRP D H[WHQVmR 5:= )D]HU WRGRV HVVHV SURFHGLPHQWRV p PDLV WUDEDOKRVR SRUpP PXLWR PDLV VHJXUR 2XWUD VROXomR p XWLOL]DU SURJUDPDV HVSHFt¿FRV SDUD EDFNXS GR 2XWORRN MEIOS DISPONÍVEIS PARA BACKUPS EM ARMAZENAMENTO EXTERNO (QWHQGH VH SRU DUPD]HQDPHQWR H[WHUQR TXDOTXHU PHFDQLVPR TXH QmR VH HQFRQWUH GHQWUR GR VHX 3& ([LVWHP YiULDV RSo}HV H DSUHsentamos uma tabela com os mais comuns, vantagens e desvantagens: CD-RW e XP &' HP TXH SRGH JXDUGDU JUDYDU VXDV LQIRUPDo}HV $UTXLYRV UHDOPHQWH SUHFLRVRV TXH SUHFLVDP VHU JXDUGDGRV FRP GH FHUWH]D GH TXH QmR VRIUHUmR GDQRV FRP R SDVVDU GR WHPSR GHYHP VHU EHFDSHDGRV HP &'V $ PDLRULD GRV FRPSXWDGRUHV DWXDLV LQFOXL XPD XQLGDGH SDUD JUDYDU HP &' 5: 2 &' 520 p D IRUPD PDLV VHJXUD GH ID]HU JUDQGHV EDFNXSV &DGD &' DUPD]HQD DWp 0E H SRU VHU XPD PtGLD yWLFD RQGH RV GDGRV VmR JUDYDGRV GH PDQHLUD ItVLFD p PXLWR PDLV FRQ¿iYHO TXH PtGLDV PDJQpWLFDV VXMHLWDV D LQWHUIHUrQFLDV HOpWULFDV

Didatismo e Conhecimento

46


CONHECIMENTOS DE INFORMÁTICA DVD-RW $ FDSDFLGDGH GH DUPD]HQDPHQWR p PXLWR PDLRU QRUPDOPHQWH HQWUH H JLEDE\WHV Pen Drive 6mR GLVSRVLWLYRV EDVWDQWH SHTXHQRV TXH VH FRQHFWDP D XPD SRUWD 86% GR VHX HTXLSDPHQWR 6mR PXLWR SRUWiWHLV IUHTXHQWHPHQWH VmR GR WLSR ³FKDYHLUR´ LGHDLV SDUD EDFNXSV UiSLGRV H SDUD PRYHU DUTXLYRV HQWUH PiTXLQDV 9RFr GHYH HVFROKHU XP PRGHOR TXH QmR VHMD PXLWR IUiJLO HD Externo 2 +' H[WHUQR IXQFLRQD FRPR XP SHULIpULFR FRPR VH IRVVH XP 3HQ 'ULYH Vy TXH FRP XPD FDSDFLGDGH LQ¿QLWDPHQWH PDLRU Backups utilizando o Windows )D]HU EDFNXSV GH VXD LQIRUPDomR QmR WHP TXH VHU XP WUDEDOKR FRPSOLFDGR 9RFr SRGH VLPSOHVPHQWH UHFRUUHU DR PpWRGR &RSLDU H &RODU RX VHMD DSURYHLWDU DV IHUUDPHQWDV GHSHQGHQGR GD YHUVmR GR 6LVWHPD 2SHUDFLRQDO :LQGRZV /LQX[ HWF TXH YRFr XWLOL]D Cópias Manuais 9RFr SRGH ID]HU EDFNXSV GD VXD LQIRUPDomR FRP HVWHV SDVVRV VLPSOHV &OLTXH FRP R ERWmR GLUHLWR VREUH R DUTXLYR RX SDVWD GH TXH VHMD ID]HU EDFNXS H GHSRLV FOLTXH QD RSomR ³&RSLDU´ QR PHQX H[LELGR $JRUD PDUTXH D XQLGDGH GH EDFNXS FOLTXH FRP R ERWmR GLUHLWR VREUH HOD H HVFROKD ³&RODU´ QR PHQX H[LELGR 9RFr SRGH PDUFDU D XQLGDGH GH EDFNXS DR ORFDOL]i OD QR tFRQH ³0HX &RPSXWDGRU´ RX VHMD FRPR XPD GDV XQLGDGHV GR :LQGRZV ([SORUHU ,VVR p WXGR 1mR VH HVTXHoD GH YHUL¿FDU R EDFNXS SDUD VH FHUWL¿FDU TXH HOH FRXEH QD XQLGDGH GH EDFNXS H R PDQWHQKD SURWHJLGR Utilizando a ferramenta inclusa no Windows XP Professional. 6H YRFr WUDEDOKD FRP R :LQGRZV ;3 3URIHVVLRQDO YRFr GLVS}H GH XPD IHUUDPHQWD PXLWR ~WLO TXH VH HQFDUUHJD GH ID]HU RV EDFNXSV TXH YRFr PDUFDU 6LJD HVWHV SDVVRV SDUD XWLOL]i OD &OLTXH HP ³,QLFLDU´ H GHSRLV HP ³7RGRV RV 3URJUDPDV´ 'HQWUR GH ³$FHVVyULRV´ DSRQWH SDUD ³)HUUDPHQWDV GH 6LVWHPD´ (VFROKD D RSomR ³%DFNXS´ 6H IRU D SULPHLUD YH] TXH YRFr XWLOL]D HVVD IHUUDPHQWD DSDUHFHUi R ³$VVLVWHQWH GH EDFNXS RX UHVWDXUDomR´ &OLTXH HP $YDQoDU H VLJD DV LQVWUXo}HV QD WHOD 6H YRFr GHVHMD XP JXLD SDVVR D SDVVR GH FRPR XVDU HVVD IHUUDPHQWD SRGH REWr OR HP %DFNXS GR :LQGRZV ;3 )DFLOLWDGR HP LQJOrV 6XJHVWmR 6H YRFr QmR VDEH TXDO YHUVmR GH VLVWHPD RSHUDFLRQDO XWLOL]D Gr XP FOLTXH FRP R ERWmR GLUHLWR VREUH R tFRQH ³0HX &RPSXWDGRU´ H HVFROKD ³3URSULHGDGHV´ 'HQWUR GD JXLD ³6LVWHPD´ YRFr HQFRQWUDUi D YHUVmR GR VHX VLVWHPD RSHUDFLRQDO Para utilizar a ferramenta de backups no Windows XP Home Edition 6H VHX 3& WHP R :LQGRZV ;3 +RPH (GLWLRQ YRFr SUHFLVD DGLFLRQDU D IHUUDPHQWD GH EDFNXSV TXH YHP QR VHX &' RULJLQDO VHJXLQGR estes passos: ,QVLUD R &' GR :LQGRZV ;3 RX R TXH YHLR FRP VHX HTXLSDPHQWR VH HOH IRL SUp FDUUHJDGR QD XQLGDGH GH &' 6H D WHOD GH DSUHVHQWDomR QmR DSDUHFHU Gr XP FOLTXH GXSOR VREUH R tFRQH GD XQLGDGH GH &' GHQWUR GH ³0HX &RPSXWDGRU´ 1D WHOD GH DSUHVHQWDomR HVFROKD D RSomR ³([HFXWDU WDUHIDV DGLFLRQDLV´ &OLTXH HP ³([SORUDU HVWH &'´ 2 :LQGRZV ([SORUHU VH DEULUi /RFDOL]H D SDVWD ³9DOXH$GG´ H Gr XP FOLTXH GXSOR VREUH HOD GHSRLV HP 0VIW H GHSRLV HP 1W%DFNXS $JRUD Gr XP FOLTXH GXSOR VREUH R DUTXLYR 1W%DFNXS PVL SDUD LQVWDODU D IHUUDPHQWD GH EDFNXS 1RWD $R WHUPLQDU D LQVWDODomR p SURYiYHO TXH VHMD VROLFLWDGR TXH YRFr UHLQLFLH VHX HTXLSDPHQWR 3DUD XWLOL]DU D IHUUDPHQWD VLJD HVWHV SDVVRV &OLTXH HP ³,QLFLDU´ H GHSRLV HP ³7RGRV RV 3URJUDPDV´ 'HQWUR GH ³$FHVVyULRV´ DSRQWH SDUD ³)HUUDPHQWDV GH 6LVWHPD´ (VFROKD D RSomR ³EDFNXS´

Didatismo e Conhecimento

47


CONHECIMENTOS DE INFORMÁTICA 6H IRU D SULPHLUD YH] TXH YRFr XWLOL]D HVVD IHUUDPHQWD DSDUHFHUi R ³$VVLVWHQWH GH EDFNXS RX UHVWDXUDomR´ &OLTXH HP $YDQoDU H VLJD DV LQVWUXo}HV QD WHOD 6H YRFr GHVHMD XP JXLD SDVVR D SDVVR GH FRPR XVDU HVVD IHUUDPHQWD SRGH REWr OR HP %DFNXS GR :LQGRZV ;3 )DFLOLWDGR HP LQJOrV 6XJHVWmR 6H YRFr QmR VDEH TXDO YHUVmR GH VLVWHPD RSHUDFLRQDO XWLOL]D Gr XP FOLTXH FRP R ERWmR GLUHLWR VREUH R tFRQH ³0HX &RPSXWDGRU´ H HVFROKD ³3URSULHGDGHV´ 'HQWUR GD JXLD ³6LVWHPD´ YRFr HQFRQWUDUi D YHUVmR GR VHX VLVWHPD RSHUDFLRQDO Recomendações para proteger seus backups )D]HU EDFNXSV p XPD H[FHOHQWH SUiWLFD GH VHJXUDQoD EiVLFD $JRUD OKH GDPRV FRQVHOKRV VLPSOHV SDUD TXH YRFr HVWHMD D VDOYR QR GLD em que precisar deles: 7HQKD VHXV EDFNXSV IRUD GR 3& HP RXWUR HVFULWyULR H VH IRU SRVVtYHO HP DOJXP UHFLSLHQWH j SURYD GH LQFrQGLRV FRPR RV FRIUHV RQGH YRFr JXDUGD VHXV GRFXPHQWRV H YDORUHV LPSRUWDQWHV )DoD PDLV GH XPD FySLD GD VXD LQIRUPDomR H DV PDQWHQKD HP OXJDUHV VHSDUDGRV (VWDEHOHoD XPD LGDGH Pi[LPD SDUD VHXV EDFNXSV p PHOKRU FRPSULPLU RV DUTXLYRV TXH Mi VHMDP PXLWR DQWLJRV TXDVH WRGRV RV SURJUDPDV GH EDFNXS FRQWDP FRP HVVD RSomR DVVLP YRFr QmR GHVSHUGLoD HVSDoR ~WLO 3URWHMD VHXV EDFNXSV FRP XPD VHQKD GH PDQHLUD TXH VXD LQIRUPDomR ¿TXH FULSWRJUDIDGD R VX¿FLHQWH SDUD TXH QLQJXpP PDLV SRVVD DFHVVi OD 6H VXD LQIRUPDomR p LPSRUWDQWH SDUD VHXV HQWHV TXHULGRV LPSOHPHQWH DOJXPD IRUPD SDUD TXH HOHV SRVVDP VDEHU D VHQKD VH YRFr QmR HVWLYHU SUHVHQWH

MICROSOFT OFFICE - WORD E EXCEL. CONCEITOS DE ORGANIZAÇÃO DE ARQUIVOS E MÉTODOS DE ACESSO $WHQomR YHU HVWH WySLFR HP MICROSOFT OFFICE: WORD 2007, EXCEL 2007, POWER POINT 2007 E MICROSOFT OUTLOOK 2007 NA PÁGINA 47

CONCEITOS E TECNOLOGIAS. NOÇÕES DE INFORMÁTICA: SISTEMA OPERACIONAL WINDOWS XP E WINDOWS 7

SISTEMA OPERACIONAL WINDOWS XP 2 :LQGRZV ;3 R ;3 XWLOL]DGR QR QRPH YrP GD SDODYUD H;3HULHQFH TXH LQLFLDOPHQWH IRL FKDPDGR GH :LQGRZV :KLVWOHU H TXH VXFHGH R :LQGRZV 0H H WDPEpP R :LQGRZV 2 :LQ;3 SRVVXL GXDV YHUV}HV R :LQGRZV ;3 +RPH (GLWLRQ TXH VXEVWLWXL R :LQGRZV 0H H R :LQGRZV ;3 3URIHVVLRQDO (GLWLRQ TXH VXEVWLWXL R :LQGRZV 3URIHVVLRQDO Iniciando o Windows $R LQLFLDU R :LQGRZV ;3 D SULPHLUD WHOD TXH WHPRV p WHOD GH ORJRQ QHOD VHOHFLRQDPRV R XVXiULR TXH LUi XWLOL]DU R FRPSXWDGRU $R HQWUDUPRV FRP R QRPH GR XVXiULR R :LQGRZV HIHWXDUi R /RJRQ HQWUDGD QR VLVWHPD H QRV DSUHVHQWDUi D iUHD GH WUDEDOKR

Didatismo e Conhecimento

48


CONHECIMENTOS DE INFORMĂ TICA

1D ĂˆUHD GH WUDEDOKR HQFRQWUDPRV RV VHJXLQWHV LWHQV x x x

Ă?cones; Barra de tarefas; 2 %RWmR LQLFLDU

Ă?cones )LJXUDV TXH UHSUHVHQWDP UHFXUVRV GR FRPSXWDGRU XP tFRQH SRGH UHSUHVHQWDU XP WH[WR P~VLFD SURJUDPD IRWRV H HWF YRFr SRGH DGLFLRQDU tFRQHV QD iUHD GH WUDEDOKR DVVLP FRPR SRGH H[FOXLU $OJXQV tFRQHV VmR SDGUmR GR :LQGRZV x x x x x x x

Meu Computador; Meus Documentos; Meus locais de Rede; ,QWHUQHW ([SORUHU

Barra de tarefas A barra de tarefas mostra quais as janelas estĂŁo abertas neste momento, mesmo que algumas estejam minimizadas ou ocultas sob RXWUD MDQHOD SHUPLWLQGR DVVLP DOWHUQDU HQWUH HVWDV MDQHODV RX HQWUH SURJUDPDV FRP UDSLGH] H IDFLOLGDGH $ EDUUD GH WDUHIDV p PXLWR ~WLO QR GLD D GLD ,PDJLQH TXH YRFr HVWHMD FULDQGR XP WH[WR HP XP HGLWRU GH WH[WR H XP GH VHXV FROHJDV OKH SHGH SDUD YRFr LPSULPLU XPD GHWHUPLQDGD SODQLOKD TXH HVWi HP VHX PLFUR 9RFr QmR SUHFLVD IHFKDU R HGLWRU GH WH[WRV Apenas salve o arquivo que estĂĄ trabalhando, abra a planilha e mande imprimir, enquanto imprime vocĂŞ nĂŁo precisa esperar que a planilha seja totalmente impressa, deixe a impressora trabalhando e volte para o editor de textos, dando um clique no botĂŁo corresSRQGHQWH QD %DUUD GH WDUHIDV H YROWH D WUDEDOKDU A barra de TarefaV QD YLVmR GD 0LFURVRIW p XPD GDV PDLRUHV IHUUDPHQWDV GH SURGXWLYLGDGH GR :LQGRZV 9DPRV DEULU DOJXQV DSOLFDWLYRV H YHU FRPR HOD VH FRPSRUWD Didatismo e Conhecimento

49


CONHECIMENTOS DE INFORMร TICA O Botรฃo Iniciar 2 ERWmR ,QLFLDU p R SULQFLSDO HOHPHQWR GD %DUUD GH 7DUHIDV (OH Gi DFHVVR DR 0HQX ,QLFLDU GH RQGH VH SRGH DFHVVDU RXWURV PHQXV TXH SRU VXD YH] DFLRQDP SURJUDPDV GR :LQGRZV $R VHU DFLRQDGR R ERWmR ,QLFLDU PRVWUD XP PHQX YHUWLFDO FRP YiULDV RSo}HV $OJXQV FRPDQGRV GR PHQX ,QLFLDU WrP XPD VHWD SDUD D GLUHLWD VLJQLยฟFDQGR TXH Ki RSo}HV DGLFLRQDLV GLVSRQtYHLV HP XP PHQX VHFXQGiULR 6H YRFr SRVLFLRQDU R SRQWHLUR VREUH XP LWHP FRP XPD VHWD VHUi H[LELGR RXWUR PHQX O botรฃo Iniciar รฉ a maneira mais fรกcil de iniciar um programa que estiver instalado no computador, ou fazer alteraรงรตes nas conยฟJXUDo}HV GR FRPSXWDGRU ORFDOL]DU XP DUTXLYR DEULU XP GRFXPHQWR

Menu Iniciar 2 ERWmR LQLFLDU SRGH VHU FRQยฟJXUDGR 1R :LQGRZV ;3 YRFr SRGH RSWDU SRU WUDEDOKDU FRP R QRYR PHQX ,QLFLDU RX VH SUHIHULU FRQยฟJXUDU R PHQX ,QLFLDU SDUD TXH WHQKD D DSDUrQFLD GDV YHUV}HV DQWHULRUHV GR :LQGRZV 0H &OLTXH QD EDUUD GH WDUHIDV FRP R ERWmR GLUHLWR GR PRXVH H VHOHFLRQH SURSULHGDGHV H HQWmR FOLTXH QD JXLD PHQX ,QLFLDU Esta guia tem duas opรงรตes: - Menu iniciar: Oferece a vocรช acesso mais rรกpido a e-mail e Internet, seus documentos, imagens e mรบsica e aos programas usaGRV UHFHQWHPHQWH SRLV HVWDV RSo}HV VmR H[LELGDV DR VH FOLFDU QR ERWmR ,QLFLDU (VWD FRQยฟJXUDomR p XPD QRYLGDGH GR :LQGRZV ;3 0HQX ,QLFLDU &OiVVLFR 'HL[D R PHQX ,QLFLDU FRP D DSDUrQFLD GDV YHUV}HV DQWLJDV GR :LQGRZV FRPR R :LQGRZV 0( H Propriedades do menu Iniciar Todos os programas 2 PHQX 7RGRV RV 3URJUDPDV DWLYD DXWRPDWLFDPHQWH RXWUR VXEPHQX QR TXDO DSDUHFHP WRGDV DV RSo}HV GH SURJUDPDV 3DUD HQWUDU QHVWH VXEPHQX DUUDVWH R PRXVH HP OLQKD UHWD SDUD D GLUHomR HP TXH R VXEPHQX IRL DEHUWR $VVLP YRFr SRGHUi VHOHFLRQDU R DSOLFDWLYR GHVHMDGR 3DUD H[HFXWDU SRU H[HPSOR R 3DLQW EDVWD SRVLFLRQDU R SRQWHLUR GR PRXVH VREUH D RSomR $FHVVyULRV 2 VXEPHQX $FHVVyULRV VHUi DEHUWR (QWmR DSRQWH SDUD 3DLQW H Gr XP FOLTXH FRP R ERWmR HVTXHUGR GR PRXVH

Didatismo e Conhecimento

50


CONHECIMENTOS DE INFORMร TICA Logon e Logoff $EUH XPD MDQHOD RQGH YRFr SRGHUi RSWDU SRU ID]HU ORJRII RX PXGDU GH XVXiULR 9HMD D IXQomR GH FDGD XP x Trocar usuรกrio: Clicando nesta opรงรฃo, os programas que o usuรกrio atual estรก usando nรฃo serรฃo fechados, e uma janela com RV QRPHV GRV XVXiULRV GR FRPSXWDGRU VHUi H[LELGD SDUD TXH D WURFD GH XVXiULR VHMD IHLWD x 8VH HVWD RSomR QD VHJXLQWH VLWXDomR 2XWUR XVXiULR YDL XVDU R FRPSXWDGRU PDV GHSRLV YRFr LUi FRQWLQXDU D XVi OR (QWmR R :LQGRZV QmR IHFKDUi VHXV DUTXLYRV H SURJUDPDV H TXDQGR YRFr YROWDU DR VHX XVXiULR D iUHD GH WUDEDOKR HVWDUi H[DWDPHQWH FRPR YRFr GHL[RX x )D]HU ORJRII HVWH FDVR p WDPEpP SDUD D WURFD GH XVXiULR $ JUDQGH GLIHUHQoD p TXH DR HIHWXDU R ORJRII WRGRV RV SURJUDPDV GR XVXiULR DWXDO VHUmR IHFKDGRV H Vy GHSRLV DSDUHFH D MDQHOD SDUD HVFROKD GR XVXiULR

Desligando o Windows XP Clicando-se em Iniciar, desligar, teremos uma janela onde รฉ possรญvel escolher entre trรชs opรงรตes: x +LEHUQDU &OLFDQGR QHVWH ERWmR R :LQGRZV VDOYDUi R HVWDGR GD iUHD GH WUDEDOKR QR GLVFR UtJLGR H GHSRLV GHVOLJDUi R FRPSXWDGRU 'HVWD IRUPD TXDQGR HOH IRU OLJDGR QRYDPHQWH D iUHD GH WUDEDOKR VH DSUHVHQWDUi H[DWDPHQWH FRPR YRFr GHL[RX FRP RV SURJUDPDV H DUTXLYRV TXH YRFr HVWDYD XVDQGR DEHUWRV x 'HVDWLYDU 'HVOLJD R :LQGRZV IHFKDQGR WRGRV RV SURJUDPDV DEHUWRV SDUD TXH YRFr SRVVD GHVOLJDU R FRPSXWDGRU FRP VHJXUDQoD x 5HLQLFLDU (QFHUUD R :LQGRZV H R UHLQLFLD

$FHVVyULRV GR :LQGRZV 2 :LQGRZV ;3 LQFOXL PXLWRV SURJUDPDV H DFHVVyULRV ~WHLV 6mR IHUUDPHQWDV SDUD HGLomR GH WH[WR FULDomR GH LPDJHQV MRJRV IHUUDPHQWDV SDUD PHOKRUDU D SHUIRUPDQFH GR FRPSXWDGRU FDOFXODGRUD H HWF 6H I{VVHPRV DQDOLVDU FDGD DFHVVyULR TXH WHPRV HQFRQWUDUtDPRV YiULDV DSOLFDo}HV PDV YDPRV FLWDU DV PDLV XVDGDV H LPSRUWDQWHV ,PDJLQH TXH YRFr HVWi PRQWDQGR XP PDQXDO SDUD DMXGDU DV SHVVRDV D WUDEDOKDUHP FRP XP GHWHUPLQDGR SURJUDPD GR FRPSXWDGRU 1HVWH PDQXDO FRP FHUWH]D YRFr DFUHVFHQWDULD D LPDJHP GDV MDQHODV GR SURJUDPD 3DUD FRSLDU DV MDQHODV H UHWLUDU Vy D SDUWH GHVHMDGD XWLOL]DUHPRV R 3DLQW TXH p XP SURJUDPD SDUD WUDEDOKDUPRV FRP LPDJHQV $V SHVVRDV TXH WUDEDOKDP FRP FULDomR GH SiJLQDV SDUD D ,QWHUQHW XWLOL]DP R DFHVVyULR %ORFR GH 1RWDV TXH p XP HGLWRU GH WH[WR PXLWR VLPSOHV $VVLP YLPRV GXDV DSOLFDo}HV SDUD GRLV DFHVVyULRV GLIHUHQWHV

Didatismo e Conhecimento

51


CONHECIMENTOS DE INFORMÁTICA $ SDVWD DFHVVyULD p DFHVVtYHO GDQGR VH XP FOLTXH QR ERWmR ,QLFLDU QD %DUUD GH WDUHIDV HVFROKHQGR D RSomR 7RGRV RV 3URJUDPDV H QR VXEPHQX TXH DSDUHFH HVFROKD $FHVVyULRV

Meu Computador 1R :LQGRZV ;3 WXGR R TXH YRFr WHP GHQWUR GR FRPSXWDGRU SURJUDPDV GRFXPHQWRV DUTXLYRV GH GDGRV H XQLGDGHV GH GLVFR SRU H[HPSOR WRUQD VH DFHVVtYHO HP XP Vy ORFDO FKDPDGR 0HX &RPSXWDGRU 4XDQGR YRFr LQLFLD R :LQGRZV ;3 R 0HX FRPSXWDGRU DSDUHFH FRPR XP tFRQH QD SDUWH HVTXHUGD GD WHOD RX ÈUHD GH 7UDEDOKR RSFLRQDO 2 0HX FRPSXWDGRU p D SRUWD GH HQWUDGD SDUD R XVXiULR QDYHJDU SHODV XQLGDGHV GH GLVFR UtJLGR ÀH[tYHLV H &' 520 1RUPDOPHQWH QDV HPSUHVDV H[LVWHP YiULRV GHSDUWDPHQWRV FRPR DGPLQLVWUDomR FRPSUDV HVWRTXH H RXWURV 3DUD TXH RV DUTXLYRV GH FDGD departamento não se misturem, utilizamos o Meu computador para dividirmos o Disco em pastas que organizam os arquivos de cada XP GRV GHSDUWDPHQWRV (P FDVD VH PDLV GH XPD SHVVRD XWLOL]D R FRPSXWDGRU WDPEpP FULDUHPRV SDVWDV SDUD RUJDQL]DU RV DUTXLYRV TXH FDGD XP FULD Exibir o conteúdo de uma pasta 3DUD YRFr WHU XPD LGHLD SUiWLFD GH FRPR H[LELU R FRQWH~GR GH XPD SDVWD HVWDV VmR XWLOL]DGDV SDUD RUJDQL]DU R GLVFR UtJLGR FRPR VH IRVVHP JDYHWDV GH XP DUPiULR YDPRV SRU H[HPSOR YLVXDOL]DU R FRQWH~GR GH SDVWD :LQGRZV 6LJD RV VHJXLQWHV SDVVRV 'r XP FOLTXH VREUH D SDVWD FRUUHVSRQGHQWH DR GLVFR UtJLGR &

VHUi DEHUWD XPD MDQHOD FRP WtWXOR FRUUHVSRQGHQWH DR UyWXOR GD XQLGDGH GH GLVFR UtJLGR & 1HVWD MDQHOD DSDUHFHP DV SDVWDV FRUUHVSRQGHQWHV jV ³JDYHWDV´ H[LVWHQWHV QR GLVFR UtJLGR & EHP FRPR RV tFRQHV UHIHUHQWHV DRV DUTXLYRV JUDYDGRV QR ³UDL]´ SDVWD SULQFLSDO GD XQLGDGH &

Didatismo e Conhecimento

52


CONHECIMENTOS DE INFORMÁTICA 'r XP FOLTXH VREUH D SDVWD :LQGRZV (OD VHUi DEHUWD FRPR XPD MDQHOD FXMR WtWXOR p :LQGRZV PRVWUDQGR WRGDV DV SDVWDV ³JDYHWDV´ H tFRQHV GH DUTXLYRV H[LVWHQWHV QD SDVWD :LQGRZV Criando pastas &RPR Mi PHQFLRQDGR DQWHULRUPHQWH DV SDVWDV VHUYHP SDUD RUJDQL]DU R GLVFR UtJLGR 3DUD FRQVHJXLUPRV HVWD RUJDQL]DomR p QHFHVViULR FULDUPRV PDLV SDVWDV H DWp PHVPR VXESDVWDV GHVWDV 3DUD FULDU XPD SDVWD VLJD HVWHV SDVVRV $EUD D SDVWD RX XQLGDGH GH GLVFR TXH GHYHUi FRQWHU D QRYD SDVWD TXH VHUi FULDGD FOLTXH QR PHQX $UTXLYR 1RYR 3DVWD $SDUHFHUi QD WHOD XPD 1RYD 3DVWD VHOHFLRQDGD SDUD TXH YRFr GLJLWH XP QRPH 'LJLWH R QRPH H WHFOH (17(5 3URQWR $ 3DVWD HVWi FULDGD

Windows Explorer 2 :LQGRZV ([SORUHU WHP D PHVPD IXQomR GR 0HX &RPSXWDGRU 2UJDQL]DU R GLVFR H SRVVLELOLWDU WUDEDOKDU FRP RV DUTXLYRV ID]HQGR SRU H[HPSOR FySLD H[FOXVmR H PXGDQoD QR ORFDO GRV DUTXLYRV (QTXDQWR R 0HX &RPSXWDGRU WUD] FRPR SDGUmR D MDQHOD VHP GLYLVmR YRFr REVHUYDUi TXH R :LQGRZV ([SORUHU WUD] D MDQHOD GLYLGLGD HP GXDV SDUWHV 0DV WDQWR QR SULPHLUR FRPR QR VHJXQGR HVWD FRQ¿JXUDomR SRGH VHU PXGDGD 3RGHPRV FULDU SDVWDV SDUD RUJDQL]DU R GLVFR GH XPD HPSUHVD RX FDVD FRSLDU DUTXLYRV SDUD GLVTXHWH DSDJDU DUTXLYRV LQGHVHMiYHLV H PXLWR PDLV Janela do Windows Explorer 1R :LQGRZV ([SORUHU YRFr SRGH YHU D KLHUDUTXLD GDV SDVWDV HP VHX FRPSXWDGRU H WRGRV RV DUTXLYRV H SDVWDV ORFDOL]DGRV HP FDGD SDVWD VHOHFLRQDGD (OH p HVSHFLDOPHQWH ~WLO SDUD FRSLDU H PRYHU DUTXLYRV Ele é composto de uma janela dividida em dois painéis: O painel da esquerda é uma árvore de pastas hierarquizada que mostra WRGDV DV XQLGDGHV GH GLVFR D /L[HLUD D iUHD GH WUDEDOKR RX 'HVNWRS WDPEpP WUDWDGD FRPR XPD SDVWD 2 SDLQHO GD GLUHLWD H[LEH R conteúdo do item selecionado à esquerda e funciona de maneira idêntica às janelas do Meu Computador (no Meu Computador, como SDGUmR HOH WUD] D MDQHOD VHP GLYLVmR DV p SRVVtYHO GLYLGL OD WDPEpP FOLFDQGR QR tFRQH 3DVWDV QD %DUUD GH )HUUDPHQWDV 3DUD DEULU R :LQGRZV ([SORUHU FOLTXH QR ERWmR ,QLFLDU Yi D RSomR 7RGRV RV 3URJUDPDV DFHVVyULRV H FOLTXH VREUH :LQGRZV ([SORUHU RX FOLTXH VRE R ERWmR LQLFLDU FRP R ERWmR GLUHLWR GR PRXVH H VHOHFLRQH D RSomR ([SORUDU 3UHVWH DWHQomR QD )LJXUD GD SiJLQD DQWHULRU TXH R SDLQHO GD HVTXHUGD QD ¿JXUD DFLPD WRGDV DV SDVWDV FRP XP VLQDO GH PDLV LQGLFDP TXH FRQWrP RXWUDV SDVWDV $V SDVWDV TXH FRQWrP XP VLQDO GH PHQRV LQGLFDP TXH Mi IRUDP H[SDQGLGDV RX Mi HVWDPRV YLVXDOL]DQGR DV VXESDVWDV

Quando você aprendeu a usar o Meu Computador, você viu que, apesar da janela não aparecer dividida, você pode dividi-la FOLFDQGR QR tFRQH TXH ¿FD QD EDUUD GH IHUUDPHQWDV 2XWUD IRUPDWDomR TXH VHUYH WDQWR SDUD R 0HX &RPSXWDGRU TXDQWR SDUD R :LQGRZV ([SORUHU p TXH YRFr SRGH HVFROKHU VH GHVHMD RX QmR H[LELU GR ODGR HVTXHUGR GD MDQHOD XP SDLQHO TXH PRVWUD DV WDUHIDV PDLV FRPXQV SDUD DV SDVWDV H OLQNV TXH PRVWUDP RXWUDV SDUWHV GR FRPSXWDGRU &OLFDQGR QR PHQX )HUUDPHQWDV H GHSRLV FOLFDQGR HP 2So}HV GH SDVWD D MDQHOD VHJXLQWH p DSUHVHQWDGD

Didatismo e Conhecimento

53


CONHECIMENTOS DE INFORMร TICA

Lixeira do Windows $ /L[HLUD p XPD SDVWD HVSHFLDO GR :LQGRZV H HOD VH HQFRQWUD QD ร UHD GH WUDEDOKR FRPR Mi PHQFLRQDGR PDV SRGH VHU DFHVVDGD DWUDYpV GR :LQGRZV ([SORUHU 6H YRFr HVWLYHU WUDEDOKDQGR FRP MDQHODV PD[LPL]DGDV QmR FRQVHJXLUi YHU D OL[HLUD 8VH R ERWmR GLUHLWR GR PRXVH SDUD FOLFDU HP XPD iUHD YD]LD GD %DUUD GH 7DUHIDV (P VHJXLGD FOLTXH HP 0LQLPL]DU WRGDV DV -DQHODV 3DUD YHULยฟFDU R FRQWH~GR GD OL[HLUD Gr XP FOLTXH VREUH R tFRQH H VXUJLUi D VHJXLQWH ยฟJXUD

9DPRV DSDJDU XP DUTXLYR SDUD SRGHU FRPSURYDU TXH R PHVPR VHUi FRORFDGR QD OL[HLUD 3DUD LVVR YDPRV FULDU XP DUTXLYR GH texto vazio com o bloco de notas e salvรก-lo em Meus documentos, apรณs isto, abra a pasta, e selecione o arquivo recรฉm-criado, e entรฃo SUHVVLRQH D WHFOD '(/(7( 6XUJLUi XPD FDL[D GH GLDORJR FRPR D ยฟJXUD D VHJXLU

&OLTXH HP 6,0 H HQWmR R DUTXLYR VHUi HQYLDGR SDUD /L[HLUD

Didatismo e Conhecimento

54


CONHECIMENTOS DE INFORMÁTICA Esvaziando a Lixeira $R (VYD]LDU D /L[HLUD YRFr HVWi H[FOXLQGR GH¿QLWLYDPHQWH RV DUTXLYRV GR VHX 'LVFR 5tJLGR (VWHV QmR SRGHUmR PDLV VHU PDLV UHFXSHUDGRV SHOR :LQGRZV (QWmR HVYD]LH D /L[HLUD VRPHQWH TXDQGR WLYHU FHUWH]D GH TXH QmR SUHFLVD PDLV GRV DUTXLYRV DOL HQFRQWUDGRV $EUD D /L[HLUD 1R PHQX $548,92 FOLTXH HP (VYD]LDU /L[HLUD Você pode também esvaziar a Lixeira sem precisar abri-la, para tanto, basta clicar com o botão DIREITO do mouse sobre o ícone GD /L[HLUD H VHOHFLRQDU QR PHQX GH FRQWH[WR (VYD]LDU /L[HLUD

WordPad 2 :LQGRZV WUD] MXQWR GHOH XP SURJUDPD SDUD HGLomR GH WH[WRV 2 :RUG3DG &RP R :RUG3DG p SRVVtYHO GLJLWDU WH[WRV GHL[DQGR RV FRP XPD ERD DSDUrQFLD &RPR PHQFLRQDGR QR SDUiJUDIR DQWHULRU R :RUG3DG p XP HGLWRU GH WH[WRV TXH QRV DX[LOLDUi QD FULDomR GH YiULRV WLSRV GH GRFXPHQWRV 0DV SRGHUtDPRV GL]HU TXH R :RUGSDG p XPD YHUVmR PXLWR VLPSOL¿FDGD GR :RUG 2V XVXiULRV GR :RUG YmR VH VHQWLU IDPLOLDUL]DGRV SRLV HOH SRVVXL PHQXV H EDUUDV GH IHUUDPHQWDV VLPLODUHV 3RUpP R :RUG WHP XP Q~PHUR PXLWR PDLRU GH UHFXUVRV $ YDQWDJHP GR :RUG3DG p TXH HOH Mi YHP FRP R :LQGRZV (QWmR VH YRFr QmR WHP HP VHX FRPSXWDGRU R 0LFURVRIW :RUG SRGHUi XVDU R :RUG3DG QD FULDomR GH VHXV WH[WRV 3DUD $EULU R :RUG3DG ORFDOL]H R LWHP $FHVVyULRV QR 0HQX ,QLFLDU Paint 2 3DLQW p XP DFHVVyULR GR :LQGRZV TXH SHUPLWH R WUDWDPHQWR GH LPDJHQV H D FULDomR GH YiULRV WLSRV GH GHVHQKRV SDUD QRVVRV WUDEDOKRV $WUDYpV GHVWH DFHVVyULR SRGHPRV FULDU ORJRPDUFDV SDSHO GH SDUHGH FRSLDU LPDJHQV FDSWXUDU WHODV GR :LQGRZV H XVD ODV HP GRFXPHQWRV GH WH[WRV 8PD JUDQGH YDQWDJHP GR 3DLQW p TXH SDUD DV SHVVRDV TXH HVWmR LQLFLDQGR QR :LQGRZV SRGHP DSHUIHLoRDU VH QDV IXQo}HV EiVLFDV GH RXWURV SURJUDPDV WDLV FRPR $EULU VDOYDU QRYR GHVID]HU $OpP GH GHVHQYROYHU D FRRUGHQDomR PRWRUD QR XVR GR PRXVH Calculadora $ FDOFXODGRUD GR :LQGRZV FRQWpP PXLWR PDLV UHFXUVRV GR TXH XPD FDOFXODGRUD FRPXP SRLV DOpP GH HIHWXDU DV RSHUDo}HV EiVLFDV SRGH DLQGD WUDEDOKDU FRPR XPD FDOFXODGRUD FLHQWt¿FD 3DUD DEUL OD Yi DWp DFHVVyULRV $ &DOFXODGRUD SDGUmR FRQWpP DV IXQo}HV EiVLFDV HQTXDQWR D FDOFXODGRUD FLHQWL¿FD p LQGLFDGD SDUD FiOFXORV PDLV DYDQoDGRV 3DUD alternar entre elas clique no menu Exibir Ferramentas do sistema 2 :LQGRZV ;3 WUiV FRQVLJR XPD VHULH GH SURJUDPDV TXH QRV DMXGDP D PDQWHU R VLVWHPD HP ERP IXQFLRQDPHQWR (VVHV SURJUDPDV VmR FKDPDGRV GH )HUUDPHQWDV GR 6LVWHPD 3RGHPRV DFHVVD ORV DWUDYpV GR 0HQX $FHVVyULRV RX DEULQGR 0HX &RPSXWDGRU H FOLFDQGR FRP R ERWmR GLUHLWR GR PRXVH VREUH D XQLGDGH GH GLVFR D VHU YHUL¿FDGD QR PHQX GH FRQWH[WR VHOHFLRQH D RSomR SURSULHGDGHV

Didatismo e Conhecimento

55


CONHECIMENTOS DE INFORMÁTICA

1D MDQHOD GH 3URSULHGDGHV GR 'LVFR FOLTXH QD JXLD )HUUDPHQWDV Nesta janela, temos as seguintes opções:

9HUL¿FDomR GH HUURV )HUUDPHQWD TXH SURFXUD QR GLVFR HUURV GHIHLWRV RX DUTXLYRV GDQL¿FDGRV 'HVIUDJPHQWDomR 4XDQGR R :LQGRZV JUDYD XP DUTXLYR QR 'LVFR HOH R JUDYD HP SDUWHV VHSDUDGDV TXDQGR SUHFLVDU DEULU HVVH PHVPR DUTXLYR R SUySULR :LQGRZV OHYDUi PDLV WHPSR SRLV SUHFLVD SURFXUDU SRU WRGR R GLVFR 8VDQGR HVWD IHUUDPHQWD HOH DMXVWD R GLVFR H WRUQD R FRPSXWDGRU DWp PDLV UiSLGR %DFNXS )HUUDPHQWD TXH FULD XPD FySLD GRV VHXV DUTXLYRV RX GH WRGR R VLVWHPD SDUD R FDVH GH DOJXP SUREOHPD QDGD VHMD SHUGLGR 5HVWDXUDomR GR VLVWHPD $OpP GD IHUUDPHQWD %DFNXS R :LQGRZV ;3 DSUHVHQWD XPD IHUUDPHQWD PDLV DYDQoDGD H VLPSOHV GH SURWHJHP R VLVWHPD FRQWUD HUURV H IDOKDV HVWD IHUUDPHQWD HQFRQWUD VH HP $FHVVyULRV IHUUDPHQWDV GR VLVWHPD

Didatismo e Conhecimento

56


CONHECIMENTOS DE INFORMร TICA 9RFr SRGH XVDU D UHVWDXUDomR GR VLVWHPD SDUD GHVID]HU DOWHUDo}HV IHLWDV QR FRPSXWDGRU H UHVWDXUDU FRQยฟJXUDo}HV H R GHVHPSHQKR A restauraรงรฃo do sistema retorna o computador a uma etapa anterior (ponto de restauraรงรฃo) sem que vocรช perca trabalhos recentes, FRPR GRFXPHQWRV VDOYRV H PDLO RX OLVWDV GH KLVWyULFR H GH IDYRULWRV GD LQWHUQHW $V DOWHUDo}HV IHLWDV SHOD UHVWDXUDomR GR VLVWHPD VmR WRWDOPHQWH UHYHUVtYHLV 2 &RPSXWDGRU FULD DXWRPDWLFDPHQWH SRQWRV GH UHVWDXUDomR PDV YRFr WDPEpP SRGH XVDU D UHVWDXUDomR GR VLVWHPD SDUD FULDU VHXV SUySULRV SRQWRV GH UHVWDXUDomR ,VVR p ~WLO VH YRFr HVWLYHU SUHVWHV D ID]HU XPD DOWHUDomR LPSRUWDQWH QR VLVWHPD FRPR D LQVWDODomR GH XP QRYR SURJUDPD RX DOWHUDo}HV QR UHJLVWUR OS SEGUINTES ATALHOS PODEM SER USADOS COM O WINDOWS Teclas Gerais do Windows 3DUD ย &RQVXOWDU D $MXGD VREUH R LWHP VHOHFLRQDGR QD FDL[D GH GLiORJR 3UHVVLRQH ) ย )HFKDU XP SURJUDPD 3UHVVLRQH $/7 ) ย ([LELU R PHQX GH DWDOKRV SDUD R LWHP VHOHFLRQDGR 3UHVVLRQH (6+,)7 ) ย ([LELU R PHQX ,QLFLDU 3UHVVLRQH &75/ (6& ย $OWHUQDU SDUD D MDQHOD DQWHULRU 2X DOWHUQDU SDUD D SUy[LPD MDQHOD PDQWHQGR SUHVVLRQDGD D tecla ALT enquanto pressiona TAB repetidamente 3UHVVLRQH $/7 7$% ย 5HFRUWDU 3UHVVLRQH &75/ ; ย &RSLDU 3UHVVLRQH &75/ & ย &RODU 3UHVVLRQH &75/ 9 ย ([FOXLU 3UHVVLRQH '(/ ย 'HVID]HU 3UHVVLRQH &75/ = ย ,JQRUDU D DXWR H[HFXomR DR LQVHULU XP &' 3UHVVLRQH 6+,)7 HQTXDQWR LQVHUH R &' 520 Para a รกrea de trabalho, Meu Computador e Windows Explorer 4XDQGR XP LWHP HVWi VHOHFLRQDGR YRFr SRGH XVDU DV VHJXLQWHV WHFODV GH DWDOKR 3DUD ย 5HQRPHDU XP LWHP 3UHVVLRQH ) ย /RFDOL]DU XPD SDVWD RX DUTXLYR 3UHVVLRQH ) ย ([FOXLU LPHGLDWDPHQWH VHP FRORFDU R LWHP QD /L[HLUD 3UHVVLRQH 6+,)7 '(/ ย ([LELU DV SURSULHGDGHV GR LWHP 3UHVVLRQH $/7 (17(5 28 $/7 FOLTXH GXSOR ย &RSLDU XP DUTXLYR 3UHVVLRQH &75/ HQTXDQWR DUUDVWD R DUTXLYR ย &ULDU DWDOKR 3UHVVLRQH &75/ 6+,)7 HQTXDQWR DUUDVWD XP DUTXLYR

Didatismo e Conhecimento

57


CONHECIMENTOS DE INFORMÁTICA Meu Computador 3DUD 6HOHFLRQDU WXGR 3UHVVLRQH &75/ $ $WXDOL]DU XPD MDQHOD 3UHVVLRQH ) ([LELU D SDVWD XP QtYHO 3UHVVLRQH %$&.63$&( )HFKDU D SDVWD VHOHFLRQDGD H WRGDV DV SDVWDV SDL 3UHVVLRQH 6+,)7 HQTXDQWR FOLFD QR ERWmR ³)HFKDU´ 6RPHQWH SDUD R :LQGRZV ([SORUHU ,U 3DUD 3UHVVLRQH &75/ * $OWHUQDU HQWUH RV SDLQpLV HVTXHUGR H GLUHLWR 3UHVVLRQH ) ([SDQGLU WRGDV DV VXESDVWDV VRE D SDVWD VHOHFLRQDGD 3UHVVLRQH 180/2&. $67(5,6&2 QR WHFODGR QXPpULFR

([SDQGLU D SDVWD VHOHFLRQDGD 3UHVVLRQH 180/2&. 6,1$/ '( $',d­2 QR WHFODGR QXPpULFR

2FXOWDU D SDVWD VHOHFLRQDGD 3UHVVLRQH 180/2&. 6,1$/ '( 68%75$d­2 QR WHFODGR QXPpULFR

([SDQGLU D VHOHomR DWXDO VH HVWLYHU RFXOWD FDVR FRQWUiULR VHOHFLRQDU D SULPHLUD VXESDVWD 3UHVVLRQH 6(7$ ¬ ',5(,7$ ([SDQGLU D VHOHomR DWXDO VH HVWLYHU H[SDQGLGD FDVR FRQWUiULR VHOHFLRQDU D SDVWD SDL 3UHVVLRQH 6(7$ ¬ (648(5'$ Para caixas de diálogo de propriedades 3DUD 0RYHU VH HQWUH DV RSo}HV SDUD IUHQWH 3UHVVLRQH 7$% 0RYHU VH HQWUH DV RSo}HV SDUD WUD] 3UHVVLRQH 6+,)7 7$% 0RYHU VH HQWUH DV JXLDV SDUD IUHQWH 3UHVVLRQH &75/ 7$% 0RYHU VH HQWUH DV JXLDV SDUD WUD] 3UHVVLRQH &75/ 6+,)7 7$% 3DUD FDL[DV GH GLiORJR $EULU H 6DOYDU &RPR 3DUD $EULU D OLVWD ³6DOYDU HP´ RX ³3URFXUDU HP´ 3UHVVLRQH ) $WXDOL]DU 3UHVVLRQH ) $EULU D SDVWD XP QtYHO DFLPD VH KRXYHU XPD SDVWD VHOHFLRQDGD 3UHVVLRQH %$&.63$&( Teclas de Atalho para Opções de Acessibilidade 3DUD XVDU WHFODV GH DWDOKR SDUD 2So}HV $FHVVLELOLGDGH DV WHFODV GH DWDOKR GHYHP HVWDU DWLYDGDV 3DUD PDLRUHV LQIRUPDo}HV FRQVXOWH ³$FHVVLELOLGDGH WHFODV GH DWDOKR´ QR ËQGLFH GD $MXGD Didatismo e Conhecimento

58


CONHECIMENTOS DE INFORMÁTICA 3DUD $WLYDU H GHVDWLYDU DV 7HFODV GH $GHUrQFLD 3UHVVLRQH 6+,)7 YH]HV $WLYDU H GHVDWLYDU DV 7HFODV GH )LOWUDJHP 3UHVVLRQH 6+,)7 ',5(,7$ 'XUDQWH VHJXQGRV $WLYDU H GHVDWLYDU DV 7HFODV GH $OWHUQDomR 3UHVVLRQH 180/2&. 'XUDQWH VHJXQGRV $WLYDU H GHVDWLYDU DV 7HFODV GR 0RXVH 3UHVVLRQH $/7 (648(5'$ 6+,)7 (648(5'$ 180/2&. $WLYDU H GHVDWLYDU R $OWR &RQWUDVWH 3UHVVLRQH $/7 (648(5'$ 6+,)7 (648(5'$ 35,176&5((1 Propriedades 6H FOLFDUPRV R ERWmR GLUHLWR GR PRXVH VREUH TXDOTXHU SDUWH GD ÈUHD GH 7UDEDOKR RX SHOR 3DLQHO GH &RQWUROH $SDUrQFLD H WHPDV 9tGHR DSDUHFHUi XPD MDQHOD H FRP HOD SRGHUHPRV SHUVRQDOL]DU D iUHD GH WUDEDOKR

2SomR 3URSULHGDGH 4XDQGR YRFr HVFROKH D RSomR 35235,('$'(6 YRFr SRGH DOWHUDU R YLVXDO GD iUHD GH WUDEDOKR PXGDQGR DV FRUHV RV WLSRV GH OHWUDV H RXWUDV FRLVDV $ WHOD DEDL[R LUi DSDUHFHU

3ODQR GH )XQGR e RQGH YRFr SRGH PXGDU R 3DSHO GH 3DUHGH DTXHOD LPDJHP TXH HQIHLWD D QRVVD iUHD GH WUDEDOKR

Didatismo e Conhecimento

59


CONHECIMENTOS DE INFORMÁTICA 3URWHomR GH WHOD 7DPEpP SRGH VHU FKDPDGD SHOR WHUPR HP LQJOrV ³6FUHHQ 6DYHU´ $ SURWHomR GH WHOD p XP WLSR GH DQLPDomR TXH DSDUHFH QD WHOD GR FRPSXWDGRU TXDQGR YRFr R GHL[D OLJDGR VHP PH[HU QHOH SRU DOJXQV PLQXWRV ([LVWHP YiULRV WLSRV GH SURWHWRUHV GH WHODV DOJXQV Mi YrP FRP R :LQGRZV H RXWURV VmR SURJUDPDV DGLFLRQDLV TXH YRFr LQVWDOD QR VHX FRPSXWDGRU 4XDQGR R 3URWHWRU GH WHOD HVWLYHU IXQFLRQDQGR H YRFr TXLVHU YROWDU D XVDU R FRPSXWDGRU DVWD PH[HU QR PRXVH RX DSHUWDU XPD WHFOD SDUD TXH HOH GHVDSDUHoD GD WHOD

Aparência: 0RGL¿FD D DSDUrQFLD GD WHOD PXGDQGR DV FRUHV IRQWHV WDPDQKRV GDV MDQHODV GRV tFRQHV iUHD GH WUDEDOKR HWF

CONCEITOS BASICOS DO WINDOWS 7 2 :LQGRZV p D PDLV UHFHQWH YHUVmR GR 0LFURVRIW :LQGRZV p XP VLVWHPD RSHUDFLRQDO SURGX]LGRV SHOD 0LFURVRIW SDUD XVR HP FRPSXWDGRUHV 2 :LQGRZV IRL ODQoDGR SDUD HPSUHVDV QR GLD GH MXOKR GH H FRPHoRX D VHU YHQGLGR OLYUHPHQWH SDUD XVXiULRV FRPXQV GLD GH RXWXEUR GH 'LIHUHQWH GR :LQGRZV 9LVWD TXH LQWURGX]LX PXLWDV QRYLGDGHV R :LQGRZV p XPD DWXDOL]DomR PDLV PRGHVWD H GLUHFLRQDGD SDUD D OLQKD :LQGRZV WHP D LQWHQomR GH WRUQi OR WRWDOPHQWH FRPSDWtYHO FRP DSOLFDo}HV H KDUGZDUHV FRP RV TXDLV R :LQGRZV 9LVWD Mi HUD FRPSDWtYHO $SUHVHQWDo}HV GDGDV SHOD FRPSDQKLD QR FRPHoR GH PRVWUDUDP TXH R :LQGRZV DSUHVHQWD DOJXPDV YDULDo}HV FRPR XPD EDUUD GH WDUHIDV GLIHUHQWH XP VLVWHPD GH ³QHWZRUN´ FKDPDGD GH ³+RPH*URXS´ H DXPHQWR QD SHUIRUPDQFH ā ,QWHUIDFH JUi¿FD DSULPRUDGD FRP QRYD EDUUD GH WDUHIDV H VXSRUWH SDUD telas touch screen e multi-táctil (multi-touch) ā ,QWHUQHW ([SORUHU · Novo menu Iniciar; · Nova barra de ferramentas totalmente reformulada; · Comando de voz (inglês); ā *DGJHWV VREUH R GHVNWRS ā 1RYRV SDSpLV GH SDUHGH tFRQHV WHPDV HWF ā &RQFHLWR GH %LEOLRWHFDV /LEUDULHV FRPR QR :LQGRZV 0HGLD 3OD\HU LQWHJUDGR DR :LQGRZV ([SORUHU

Didatismo e Conhecimento

60


CONHECIMENTOS DE INFORMร TICA ฤ $UTXLWHWXUD PRGXODU FRPR QR :LQGRZV 6HUYHU ฤ )DL[DV ULEERQV QRV SURJUDPDV LQFOXtGRV FRP R :LQGRZV 3DLQW H :RUG3DG SRU H[HPSOR FRPR QR 2IยฟFH ฤ $FHOHUDGRUHV QR ,QWHUQHW ([SORUHU ยท Aperfeiรงoamento no uso da placa de vรญdeo e memรณria RAM; ยท Home Groups; ยท Melhor desempenho; ฤ :LQGRZV 0HGLD 3OD\HU ฤ 1RYD YHUVmR GR :LQGRZV 0HGLD &HQWHU ยท Gerenciador de Credenciais; ยท Instalaรงรฃo do sistema em VHDs; ยท Nova Calculadora, com interface aprimorada e com mais funรงรตes; ยท Reediรงรฃo de antigos jogos, como Espadas Internet, Gamรฃo Internet e Internet Damas; ฤ :LQGRZV ;3 0RGH ฤ $HUR 6KDNH $SHVDU GR :LQGRZV FRQWHU PXLWRV QRYRV UHFXUVRV R Q~PHUR GH FDSDFLGDGHV H FHUWRV SURJUDPDV TXH ID]LDP SDUWH GR :LQGRZV 9LVWD QmR HVWmR PDLV SUHVHQWHV RX PXGDUDP UHVXOWDQGR QD UHPRomR GH FHUWDV IXQFLRQDOLGDGHV 0HVPR DVVLP GHYLGR DR IDWR GH DLQGD VHU XP VLVWHPD RSHUDFLRQDO HP GHVHQYROYLPHQWR QHP WRGRV RV UHFXUVRV SRGHP VHU GHยฟQLWLYDPHQWH FRQVLGHUDGRV H[FOXtGRV )L[DU QDYHJDGRU GH LQWHUQHW H FOLHQWH GH H PDLO SDGUmR QR PHQX ,QLFLDU H QD iUHD GH WUDEDOKR SURJUDPDV SRGHP VHU ยฟ[DGRV PDQXDOPHQWH :LQGRZV 3KRWR *DOOHU\ :LQGRZV 0RYLH 0DNHU :LQGRZV 0DLO H :LQGRZV &DOHQGDU IRUDP VXEVWLWXtGRV SHODV VXDV UHVSHFWLYDV FRQWUDSDUWHV GR :LQGRZV /LYH FRP D SHUGD GH DOJXPDV IXQFLRQDOLGDGHV 2 :LQGRZV DVVLP FRPR R :LQGRZV 9LVWD HVWDUi GLVSRQtYHO HP FLQFR GLIHUHQWHV HGLo}HV SRUpP DSHQDV R +RPH 3UHPLXP 3URIHVVLRQDO H 8OWLPDWH VHUmR YHQGLGRV QD PDLRULD GRV SDtVHV UHVWDQGR RXWUDV GXDV HGLo}HV TXH VH FRQFHQWUDP HP RXWURV PHUFDGRV FRPR PHUFDGRV GH HPSUHVDV RX Vy SDUD SDtVHV HP GHVHQYROYLPHQWR &DGD HGLomR LQFOXL UHFXUVRV H OLPLWDo}HV VHQGR TXH Vy R 8OWLPDWH QmR WHP OLPLWDo}HV GH XVR 6HJXQGR D 0LFURVRIW RV UHFXUVRV SDUD WRGDV DV HGLo}HV GR :LQGRZV VmR DUPD]HQDGDV QR FRPSXWDGRU 8P GRV SULQFLSDLV REMHWLYRV GD 0LFURVRIW FRP HVWH QRYR :LQGRZV p SURSRUFLRQDU XPD PHOKRU LQWHUDomR H LQWHJUDomR GR VLVWHPD FRP R XVXiULR WHQGR XPD PDLRU RWLPL]DomR GRV UHFXUVRV GR :LQGRZV FRPR PDLRU DXWRQRPLD H PHQRU FRQVXPR GH HQHUJLD YROWDGR D SURยฟVVLRQDLV RX XVXiULRV GH LQWHUQHW TXH SUHFLVDP LQWHUDJLU FRP FOLHQWHV H IDPLOLDUHV FRP IDFLOLGDGH VLQFURQL]DQGR H FRPSDUWLOKDQGR IDFLOPHQWH DUTXLYRV H GLUHWyULRV Comparando as ediรงรตes 2 :LQGRZV WHP WUrV HGLo}HV GLIHUHQWHV GH XP PHVPR VLVWHPD RSHUDFLRQDO TXH VH DGpTXDP DV QHFHVVLGDGHV GLiULDV GH FDGD XVXiULR HVVDV HGLo}HV VmR R +RPH 3UHPLXP R 3URIHVVLRQDO H 8OWLPDWH (VVDV HGLo}HV DSUHVHQWDP YDULDo}HV GH XPD SDUD RXWUD FRPR R +RPH 3UHPLXP TXH p XPD HGLomR EiVLFD PDV GH JUDQGH XVR SDUD XVXiULRV TXH QmR DSUHVHQWDP JUDQGHV QHFHVVLGDGHV Os seus recursos sรฃo a facilidade para suas atividades diรกrias com a nova navegaรงรฃo na รกrea de trabalho, o usuรกrio pode abrir os SURJUDPDV PDLV UiSLGD H IDFLOPHQWH H HQFRQWUDU RV GRFXPHQWRV TXH PDLV XVD HP LQVWDQWHV 7RUQDU VXD H[SHULrQFLD QD :HE PDLV UiSLGD IiFLO H VHJXUD GR TXH QXQFD FRP R ,QWHUQHW ([SORUHU DVVLVWLU D PXLWRV GRV VHXV programas de TV favoritos de graรงa e onde quiser, com a TV na Internet e criar facilmente uma rede domรฉstica e conectar seus comSXWDGRUHV D XPD LPSUHVVRUD FRP R *UXSR 'RPpVWLFR -i R 3URIHVVLRQDO DSUHVHQWD WRGRV HVVHV UHFXUVRV DGLFLRQDGRV GH RXWURV TXH R GHL[DP PDLV FRPSOHWR FRPR R XVXiULR SRGH H[HFXWDU YiULRV SURJUDPDV GH SURGXWLYLGDGH GR :LQGRZV ;3 QR 0RGR :LQGRZV ;3 FRQHFWDU VH D UHGHV FRUSRUDWLYDV IDFLOPHQWH H FRP PDLV VHJXUDQoD FRP R ,QJUHVVR QR 'RPtQLR H DOpP GR %DFNXS H 5HVWDXUDomR GH WRGR R VLVWHPD HQFRQWUDGR HP WRGDV DV HGLo}HV p SRVVtYHO ID]HU EDFNXS HP XPD UHGH GRPpVWLFD RX FRUSRUDWLYD 2 8OWLPDWH WDPEpP DSUHVHQWD WRGRV HVVHV UHFXUVRV DFUHVFLGRV GH RXWURV TXH WRUQDP VXD IXQFLRQDOLGDGH FRPSOHWD FRP WRGRV RV recursos disponรญveis nessa versรฃo do sistema operacional como ajuda para proteger os dados do seu computador e de dispositivos GH DUPD]HQDPHQWR SRUWiWHLV FRQWUD SHUGD RX URXER FRP R %LW/RFNHU H SRGHU WUDEDOKDU QR LGLRPD GH VXD HVFROKD RX DOWHUQDU HQWUH LGLRPDV

Didatismo e Conhecimento

61


CONHECIMENTOS DE INFORMà TICA Recursos 6HJXQGR R VLWH GD SUySULD 0LFURVRIW RV UHFXUVRV HQFRQWUDGRV QR :LQGRZV VmR IUXWR GDV QRYDV QHFHVVLGDGHV HQFRQWUDGDV SHORV XVXiULRV 0XLWRV YrP GH VHX DQWHFHVVRU :LQGRZV 9LVWD PDV H[LVWHP QRYDV IXQFLRQDOLGDGHV H[FOXVLYDV IHLWDV SDUD IDFLOLWDU D XWLOL]DomR H PHOKRUDU R GHVHPSHQKR GR 62 6LVWHPD 2SHUDFLRQDO QR FRPSXWDGRU 9DOH QRWDU TXH VH YRFr WHP FRQKHFLPHQWRV HP RXWUDV YHUV}HV GR :LQGRZV QmR WHUi TXH MRJDU WRGR R FRQKHFLPHQWR IRUD $SHQDV YDL VH DGDSWDU DRV QRYRV FDPLQKRV H DSUHQGHU ³QRYRV WUXTXHV´ HQTXDQWR LVVR Tarefas Cotidianas -i ID] WHPSR TXH XWLOL]DU XP FRPSXWDGRU QR GLD D GLD VH WRUQRX FRPXP 1mR SUHFLVDPRV PDLV HVWDU HP DOJXPD HPSUHVD HQRUPH SDUD SUHFLVDU VHPSUH GH XP FRPSXWDGRU SHUWR GH QyV 2 :LQGRZV YHP FRP IHUUDPHQWDV H IXQo}HV SDUD WH DMXGDU HP WDUHIDV FRPXQV GR FRWLGLDQR Grupo DomÊstico $R LQYpV GH XP GLJDPRV TXH YRFr WHQKD GRLV RX PDLV FRPSXWDGRUHV HP VXD FDVD 3HUPLWLU D FRPXQLFDomR HQWUH YiULDV HVWDo}HV YDL WH SRXSDU GH WHU TXH LU ¿VLFDPHQWH DRQGH D RXWUD PiTXLQD HVWi SDUD UHFXSHUDU XPD IRWR GLJLWDO DUPD]HQDGD DSHQDV QHOH &RP R *UXSR 'RPpVWLFR D WURFD GH DUTXLYRV ¿FD VLPSOL¿FDGD H VHJXUD 9RFr GHFLGH R TXH FRPSDUWLOKDU H TXDO RV SULYLOpJLRV TXH RV RXWURV WHUmR DR DFHVVDU D LQIRUPDomR VH p DSHQDV GH YLVXDOL]DomR GH HGLomR H HWF Tela sensível ao toque 2 :LQGRZV HVWi SUHSDUDGR SDUD D WHFQRORJLD VHQVtYHO DR WRTXH FRP RSomR D PXOWLWRTXH UHFXUVR GLIXQGLGR SHOR L3KRQH O recurso multitoque percebe o toque em diversos pontos da tela ao mesmo tempo, assim tornando possível dimensionar uma LPDJHP DUUDVWDQGR VLPXOWDQHDPHQWH GXDV SRQWDV GD LPDJHP QD WHOD 2 7RXFK 3DFN SDUD :LQGRZV p XP FRQMXQWR GH DSOLFDWLYRV H MRJRV SDUD WHODV VHQVtYHLV DR WRTXH 2 6XUIDFH &ROODJH p XP DSOLFDWLYR SDUD RUJDQL]DU H UHGLPHQVLRQDU IRWRV 1HOH p SRVVtYHO PRQWDU VOLGH VKRZ GH IRWRV H FULDU SDSHLV GH SDUHGH SHUVRQDOL]DGRV (VVDV IXQo}HV QmR VmR QRYLGDGHV PDV SRU VHUHP IHLWDV SDUD XVDU XPD WHOD VHQVtYHO D P~OWLSORV WRTXHV DV WRUQDP QRYLGDGHV

Microsoft Surface Collage, desenvolvido para usar tela sensĂ­vel ao toque. Lista de Atalhos Novidade desta nova versĂŁo, agora vocĂŞ pode abrir diretamente um arquivo recente, sem nem ao menos abrir o programa que YRFr XWLOL]RX 'LJDPRV TXH YRFr HVWDYD HGLWDQGR XP UHODWyULR HP VHX HGLWRU GH WH[WR H SUHFLVRX IHFKi OR SRU DOJXP PRWLYR 4XDQGR TXLVHU YROWDU D WUDEDOKDU QHOH EDVWD FOLFDU FRP R ERWmR GLUHLWR VRE R tFRQH GR HGLWRU H R DUTXLYR HVWDUi HQWUH RV UHFHQWHV Ao invĂŠs de ter que abrir o editor e somente depois se preocupar em procurar o arquivo, vocĂŞ pula uma etapa e vai diretamente SDUD D LQIRUPDomR JDQKDQGR WHPSR

Didatismo e Conhecimento

62


CONHECIMENTOS DE INFORMÁTICA

Exemplo de arquivos recentes no Paint. 3RGH LQFOXVLYH ¿[DU FRQWH~GR TXH YRFr FRQVLGHUH LPSRUWDQWH 6H D HGLomR GH XP GHWHUPLQDGR GRFXPHQWR p FRQVWDQWH YDOH D SHQD GHL[i OR HQWUH RV ³IDYRULWRV´ YLVWR TXH D OLVWD GH UHFHQWHV VH PRGL¿FD FRQIRUPH YRFr DEUH H IHFKD QRYRV GRFXPHQWRV Snap $R VH XWLOL]DU R :LQGRZV SRU PXLWR WHPSR p FRPXP YHU YiULDV MDQHODV DEHUWDV SHOR VHX PRQLWRU &RP R UHFXUVR GH 6QDS YRFr SRGH SRVLFLRQi ODV GH XP MHLWR SUiWLFR H GLYHUWLGR %DVWD DSHQDV FOLFDU H DUUDVWi ODV SHODV ERUGDV GD WHOD SDUD REWHU GLIHUHQWHV SRVLFLRQDPHQWRV 2 6QDS p ~WLO WDQWR SDUD D GLVWULEXLomR FRPR SDUD D FRPSDUDomR GH MDQHODV 3RU H[HPSOR MRJXH XPD SDUD D HVTXHUGD H D RXWUD QD GLUHLWD $PEDV ¿FDUDP DEHUWDV H GLYLGLQGR LJXDOPHQWH R HVSDoR SHOD WHOD SHUPLWLQGR TXH YRFr DV YHMD DR PHVPR WHPSR Windows Search 2 VLVWHPD GH EXVFDV QR :LQGRZV HVWi UH¿QDGR H HVWHQGLGR 3RGHPRV ID]HU EXVFDV PDLV VLPSOHV H HVSHFt¿FDV GLUHWDPHQWH GR PHQX LQLFLDU PDV IRL PDQWLGD H PHOKRUDGD D EXVFD HQTXDQWR YRFr QDYHJD SHODV SDVWDV Menu iniciar $V SHVTXLVDV DJRUD SRGHP VHU IHLWDV GLUHWDPHQWH GR PHQX LQLFLDU e ~WLO TXDQGR YRFr QHFHVVLWD SURFXUDU SRU H[HPSOR SHOR DWDOKR GH LQLFLDOL]DomR GH DOJXP SURJUDPD RX DUTXLYR GH PRGR UiSLGR ³'LIHUHQWH GH EXVFDV FRP DV WHFQRORJLDV DQWHULRUHV GR :LQGRZV 6HDUFK D SHVTXLVD GR PHQX LQtFLR QmR ROKD DSHQDV DRV QRPHV GH SDVWDV H DUTXLYRV &RQVLGHUD VH R FRQWH~GR GR DUTXLYR WDJV H SURSULHGDGHV WDPEpP´ -LP %R\FH :LQGRZV %LEOH SJ 2V UHVXOWDGRV VmR PRVWUDGRV HQTXDQWR YRFr GLJLWD H VmR GLYLGLGRV HP FDWHJRULDV SDUD IDFLOLWDU VXD YLVXDOL]DomR $EDL[R DV FDWHJRULDV QDV TXDLV R UHVXOWDGR GH VXD EXVFD SRGH VHU GLYLGLGR ā 3URJUDPDV ā 3DLQHO GH &RQWUROH · Documentos · Música · Arquivos

Didatismo e Conhecimento

63


CONHECIMENTOS DE INFORMÁTICA

Ao digitar “pai” temos os itens que contêm essas letras em seu nome. Windows Explorer 2 TXH YRFr HQFRQWUD SHOR PHQX LQLFLDU p XPD SHTXHQD SDUWH GR WRWDO GLVSRQtYHO )D]HQGR D EXVFD SHOR :LQGRZV ([SORUHU ± TXH p DFLRQDGR DXWRPDWLFDPHQWH TXDQGR YRFr QDYHJD SHODV SDVWDV GR VHX FRPSXWDGRU ± YRFr HQFRQWUDUi XPD EXVFD PDLV DEUDQJHQWH (P YHUV}HV DQWHULRUHV FRPR QR :LQGRZV ;3 DQWHV GH VH ID]HU XPD EXVFD p QHFHVViULR DEULU D IHUUDPHQWD GH EXVFD 1R 6HYHQ SUHFLVDPRV DSHQDV GLJLWDU RV WHUPRV QD FDL[D GH EXVFD TXH ¿FD QR FDQWR VXSHULRU GLUHLWR

Windows Explorer com a caixa de busca (Jim Boyce; Windows 7 Bible, pg 774). $ EXVFD QmR VH OLPLWD D GLJLWDomR GH SDODYUDV 9RFr SRGH DSOLFDU ¿OWURV SRU H[HPSOR EXVFDU QD SDVWD P~VLFDV WRGDV DV FDQo}HV GR JrQHUR 5RFN ([LVWHP RXWURV FRPR GDWD WDPDQKR H WLSR 'HSHQGHQGR GR DUTXLYR TXH YRFr SURFXUD SRGHP H[LVWLU RXWUDV FODVVL¿FDo}HV GLVSRQtYHLV

Didatismo e Conhecimento

64


CONHECIMENTOS DE INFORMร TICA ,PDJLQH TXH WRGR DUTXLYR GH WH[WR VHP VHX FRPSXWDGRU SRVVXL XP DXWRU 6H YRFr HVWi EXVFDQGR SRU DUTXLYRV GH WH[WR SRGH WHU D RSomR GH ยฟOWUDU SRU DXWRUHV Controle dos pais 1mR p XPD WDUHID IiFLO SURWHJHU RV PDLV QRYRV GR TXH YLVXDOL]DP SRU PHLR GR FRPSXWDGRU 2 :LQGRZV DMXGD D OLPLWDU R TXH SRGH VHU YLVXDOL]DGR RX QmR 3DUD TXH HVVD IXQFLRQDOLGDGH ยฟTXH GLVSRQtYHO p LPSRUWDQWH TXH R FRPSXWDGRU WHQKD XPD FRQWD GH DGPLQLVWUDGRU SURWHJLGD SRU VHQKD UHJLVWUDGD $OpP GLVVR R XVXiULR TXH VH GHVHMD UHVWULQJLU GHYH WHU VXD SUySULD FRQWD As restriรงรตes bรกsicas que o Seven disponibiliza: ฤ /LPLWH GH 7HPSR 3HUPLWH HVSHFLยฟFDU TXDLV KRUDV GR GLD TXH R 3& SRGH VHU XWLOL]DGR ฤ -RJRV %ORTXHLD RX SHUPLWH MRJDU VH EDVHDQGR SHOR KRUiULR H WDPEpP SHOD FODVVLยฟFDomR GR MRJR 9DOH QRWDU TXH D FODVVLยฟFDomR Mi YHP FRP R SUySULR JDPH ฤ %ORTXHDU SURJUDPDV e SRVVtYHO VHOHFLRQDU TXDLV DSOLFDWLYRV HVWmR DXWRUL]DGRV D VHUHP H[HFXWDGRV )D]HQGR GRZQORDG GH DGG RQยถV p SRVVtYHO DXPHQWDU D TXDQWLGDGH GH UHVWULo}HV FRPR FRQWURODU DV SiJLQDV TXH VmR DFHVVDGDV H DWp PHVPR PDQWHU XP KLVWyULFR GDV DWLYLGDGHV RQOLQH GR XVXiULR Central de aรงรตes $ FHQWUDO GH Do}HV FRQVROLGD WRGDV DV PHQVDJHQV GH VHJXUDQoD H PDQXWHQomR GR :LQGRZV (ODV VmR FODVVLยฟFDGDV HP YHUPHOKR LPSRUWDQWH ยฑ GHYH VHU UHVROYLGR UDSLGDPHQWH H DPDUHODV WDUHIDV UHFRPHQGDGDV 2 SDLQHO WDPEpP p ~WLO FDVR YRFr VLQWD DOJR GH HVWUDQKR QR FRPSXWDGRU %DVWD FKHFDU R SDLQHO H YHU VH R :LQGRZV GHWHFWRX DOJR GH HUUDGR

A central de aรงรตes e suas opรงรตes. - Do seu jeito 2 DPELHQWH TXH QRV FHUFD ID] GLIHUHQoD WDQWR SDUD QRVVD TXDOLGDGH GH YLGD TXDQWR SDUD R GHVHPSHQKR QR WUDEDOKR 2 FRPSXWDGRU p XPD H[WHQVmR GHVVH DPELHQWH 2 :LQGRZV SHUPLWH XPD DOWD SHUVRQDOL]DomR GH tFRQHV FRUHV H PXLWDV RXWUDV RSo}HV GHL[DQGR XP ambiente mais confortรกvel, nรฃo importa se utilizado no ambiente prRยฟVVLRQDO RX QR GRPpVWLFR 0XLWDV RSo}HV SDUD SHUVRQDOL]DU R :LQGRZV HVWmR QD SiJLQD GH 3HUVRQDOL]DomR TXH SRGH VHU DFHVVDGD SRU XP FOLTXH FRP R ERWmR GLUHLWR QD iUHD GH WUDEDOKR H HP VHJXLGD XP FOLTXH HP 3HUVRQDOL]DU e LPSRUWDQWH QRWDU TXH DOJXPDV FRQยฟJXUDo}HV SRGHP GHL[DUY VHX FRPSXWDGRU PDLV OHQWR HVSHFLDOPHQWH HIHLWRV GH WUDQVSDUrQFLD $EDL[R HVWmR DOJXPDV GDV RSo}HV GH SHUVRQDOL]DomR PDLV LQWHUHVVDQWHV

Didatismo e Conhecimento

65


CONHECIMENTOS DE INFORMĂ TICA PapĂŠis de Parede Os papĂŠis de parede nĂŁo sĂŁo tamanha novidade, virou praticamente uma rotina entre as pessoas colocarem fotos de Ă­dolos, paiVDJHQV RX TXDOTXHU RXWUD ÂżJXUD TXH DV DJUDGH 8PD GDV QRYLGDGHV ÂżFD SRU FRQWD GDV IRWRV TXH YRFr HQFRQWUD QR SUySULR 62 9DULDP GH XPD IRWR IRFDQGR XPD ~QLFD IROKD QXPD Ă€RUHVWD DWp XPD PRQWDQKD $ RXWUD p D SRVVLELOLGDGH GH FULDU XP VOLGH VKRZ FRP YiULDV IRWRV (ODV ÂżFDUDP PXGDQGR HP VHTXrQFLD GDQGR D LPSUHVVmR TXH VXD iUHD GH WUDEDOKR HVWi PDLV YLYD Gadgets $V ÂłEXJLJDQJDV´ Mi VmR FRQKHFLGDV GR :LQGRZV 9LVWD PDV HUDP WUDYDGDV QR FDQWR GLUHLWR $JRUD HODV SRGHP ÂżFDU HP TXDOTXHU ORFDO GR GHVNWRS Servem para deixar sua ĂĄrea de trabalho com elementos sortidos, desde coisas Ăşteis – como uma pequena agenda – atĂŠ as de gosto PDLV GXYLGRVDV Âą FRPR XPD TXH PRVWUD R VtPEROR GR &RULQWKLDQV )LFD D FULWpULR GR XVXiULR R TXH H FRPR XWLOL]DU 2 SUySULR VLVWHPD Mi YHP FRP DOJXPDV PDV VH VHQWLU QHFHVVLGDGH SRGH EDL[DU DLQGD PDLV RSo}HV GD LQWHUQHW

Gadgets de calendårio e relógio. Temas &RPR QHP VHPSUH Ki WHPSR GH PRGL¿FDU H GHL[DU WRGDV DV FRQ¿JXUDo}HV H[DWDPHQWH GR VHX JRVWR R :LQGRZV GLVSRQLELOL]D WHPDV TXH PXGDP FRQVLGHUDYHOPHQWH RV DVSHFWRV JUi¿FRV FRPR HP SDSpLV GH SDUHGH H FRUHV ClearType ³&OHDU 7\SH p XPD WHFQRORJLD TXH ID] DV IRQWHV SDUHFHUHP PDLV FODUDV H VXDYHV QR PRQLWRU e SDUWLFXODUPHQWH HIHWLYR SDUD PRQLWRUHV /&' PDV WDPEpP WHP DOJXP HIHLWR QRV DQWLJRV PRGHORV &57 PRQLWRUHV GH WXER 2 :LQGRZV Gi VXSRUWH D HVWD WHFQRORJLD´ -LP %R\FH :LQGRZV %LEOH SJ WUDGXomR QRVVD Novas possibilidades 2V QRYRV UHFXUVRV GR :LQGRZV 6HYHQ DEUHP SRU VL Vy QRYDV SRVVLELOLGDGHV GH FRQ¿JXUDomR PDLRU IDFLOLGDGH QD QDYHJD GHQWUH RXWURV SRQWRV 3RU HQTXDQWR HVVDV QRYLGDGHV IRUDP GLUHWDPHQWH DSOLFDGDV QR FRPSXWDGRU HP XVR PDV QR 6HYHQ SRGHPRV WDPEpP LQWHUDJLU FRP RXWURV GLVSRVLWLYRV

Didatismo e Conhecimento

66


CONHECIMENTOS DE INFORMÁTICA Reproduzir em 3HUPLWLQGR DFHVVDQGR GH RXWURV HTXLSDPHQWRV D XP FRPSXWDGRU FRP R :LQGRZV 6HYHQ p SRVVtYHO TXH HOHV VH FRPXQLTXHP H VHMD SRVVtYHO WRFDU SRU H[HPSOR QXP DSDUHOKR GH VRP DV P~VLFDV TXH YRFr WHP QR +' GH VHX FRPSXWDGRU e DSHQDV QHFHVViULR TXH R DSDUHOKR VHMD FRPSDWtYHO FRP R :LQGRZV 6HYHQ ± JHUDOPHQWH LQGLFDGR FRP XP ORJRWLSR ³&RPSDWtYHO FRP R :LQGRZV ª Streaming de mídia remoto &RP R 5HSURGX]LU HP p SRVVtYHO OHYDU R FRQWH~GR GR FRPSXWDGRU SDUD RXWURV OXJDUHV GD FDVD 6H TXLVHU OHYDU SDUD IRUD GHOD XPD RSomR p R 6WUHDPLQJ GH PtGLD UHPRWR &RP HVWH QRYR UHFXUVR GRLV FRPSXWDGRUHV URGDQGR :LQGRZV SRGHP FRPSDUWLOKDU P~VLFDV DWUDYpV GR :LQGRZV 0HGLD 3OD\HU e QHFHVViULR TXH DPERV HVWHMDP DVVRFLDGRV FRP XP ,' RQOLQH FRPR D GR :LQGRZV /LYH Personalização Você pode adicionar recursos ao seu computador alterando o tema, a cor, os sons, o plano de fundo da área de trabalho, a proteção GH WHOD R WDPDQKR GD IRQWH H D LPDJHP GD FRQWD GH XVXiULR 9RFr SRGH WDPEpP VHOHFLRQDU ³JDGJHWV´ HVSHFt¿FRV SDUD VXD iUHD GH WUDEDOKR Ao alterar o tema você inclui um plano de fundo na área de trabalho, uma proteção de tela, a cor da borda da janela sons e, às YH]HV tFRQHV H SRQWHLURV GH PRXVH 9RFr SRGH HVFROKHU HQWUH YiULRV WHPDV GR $HUR TXH p XP YLVXDO SUHPLXP GHVVD YHUVmR GR :LQGRZV DSUHVHQWDQGR XP GHVLJQ como o vidro transparente com animações de janela, um novo menu Iniciar, uma nova barra de tarefas e novas cores de borda de MDQHOD 8VH R WHPD LQWHLUR RX FULH VHX SUySULR WHPD SHUVRQDOL]DGR DOWHUDQGR DV LPDJHQV FRUHV H VRQV LQGLYLGXDOPHQWH 9RFr WDPEpP SRGH ORFDOL]DU PDLV WHPDV RQOLQH QR VLWH GR :LQGRZV 9RFr WDPEpP SRGH DOWHUDU RV VRQV HPLWLGRV SHOR FRPSXWDGRU TXDQGR SRU H[HPSOR YRFr UHFHEH XP H PDLO LQLFLD R :LQGRZV RX GHVOLJD R FRPSXWDGRU O plano de fundo da área de trabalho, chamado de papel de parede, é uma imagem, cor ou design na área de trabalho que cria um IXQGR SDUD DV MDQHODV DEHUWDV 9RFr SRGH HVFROKHU XPD LPDJHP SDUD VHU VHX SODQR GH IXQGR GH iUHD GH WUDEDOKR RX SRGH H[LELU XPD DSUHVHQWDomR GH VOLGHV GH LPDJHQV 7DPEpP SRGH VHU XVDGD XPD SURWHomR GH WHOD RQGH XPD LPDJHP RX DQLPDomR DSDUHFH HP VXD WHOD TXDQGR YRFr QmR XWLOL]D R PRXVH RX R WHFODGR SRU GHWHUPLQDGR SHUtRGR GH WHPSR 9RFr SRGH HVFROKHU XPD YDULHGDGH GH SURWHo}HV GH WHOD GR :LQGRZV $XPHQWDQGR R WDPDQKR GD IRQWH YRFr SRGH WRUQDU R WH[WR RV tFRQHV H RXWURV LWHQV GD WHOD PDLV IiFHLV GH YHU 7DPEpP p SRVVtYHO UHGX]LU D HVFDOD '3, HVFDOD GH SRQWRV SRU SROHJDGD SDUD GLPLQXLU R WDPDQKR GR WH[WR H RXWURV LWHQV QD WHOD SDUD TXH FDLEDP PDLV LQIRUPDo}HV QD WHOD 2XWUR UHFXUVR GH SHUVRQDOL]DomR p FRORFDU LPDJHP GH FRQWD GH XVXiULR TXH DMXGD D LGHQWL¿FDU D VXD FRQWD HP XP FRPSXWDGRU $ LPDJHP p H[LELGD QD WHOD GH ERDV YLQGDV H QR PHQX ,QLFLDU 9RFr SRGH DOWHUDU D LPDJHP GD VXD FRQWD GH XVXiULR SDUD XPD GDV LPDJHQV LQFOXtGDV QR :LQGRZV RX XVDU VXD SUySULD LPDJHP ( SDUD ¿QDOL]DU YRFr SRGH DGLFLRQDU ³JDGJHWV´ GH iUHD GH WUDEDOKR TXH VmR PLQLSURJUDPDV SHUVRQDOL]iYHLV TXH SRGHP H[LELU continuamente informações atualizadas como a apresentação de slides de imagens ou contatos, sem a necessidade de abrir uma nova MDQHOD Aplicativos novos 8PD GDV SULQFLSDLV FDUDFWHUtVWLFDV GR PXQGR /LQX[ p VXDV YHUV}HV YLUHP FRP PXLWRV DSOLFDWLYRV DVVLP R XVXiULR QmR SUHFLVD ¿FDU EDL[DQGR DUTXLYRV DSyV LQVWDODU R VLVWHPD R TXH QmR RFRUUH FRP DV YHUV}HV :LQGRZV 2 :LQGRZV FRPHoD D PXGDU HVVD TXHVWmR DJRUD H[LVWH XPD VHULH GH DSOLFDWLYRV MXQWRV FRP R :LQGRZV SDUD TXH R XVXiULR QmR SUHFLVD EDL[DU SURJUDPDV SDUD DWLYLGDGHV EiVLFDV &RP R 6WLFN\ 1RWHV SRGH VH GHL[DU OHPEUHWHV QR GHVNWRS H WDPEpP VXSRUWDU HQWUDGD SRU FDQHWD H WRTXH No Math Input Center, utilizando recursos multitoque, equações matemáticas escritas na tela são convertidas em texto, para SRGHU DGLFLRQi OD HP XP SURFHVVDGRU GH WH[WR O print screen agora tem um aplicativo que permite capturar de formas diferentes a tela, como por exemplo, a tela inteira, partes RX iUHDV GHVHQKDGDV GD WHOD FRP R PRXVH

Didatismo e Conhecimento

67


CONHECIMENTOS DE INFORMÁTICA

Aplicativo de copiar tela (botão print screen). 2 3DLQW IRL UHIRUPXODGR DJRUD FRQWD FRP QRYDV IHUUDPHQWDV H GHVLJQ PHOKRUDGR JDQKRX PHQXV H IHUUDPHQWDV TXH SDUHFHP GR 2I¿FH

Paint com novos recursos. 2 :RUG3DG WDPEpP IRL UHIRUPXODGR UHFHEHX QRYR YLVXDO PDLV SUy[LPR DR :RUG WDPEpP JDQKRX QRYDV IHUUDPHQWDV DVVLP VH WRUQDQGR XP ERP HGLWRU SDUD TXHP QmR WHP R :RUG $ FDOFXODGRUD WDPEpP VRIUHX PXGDQoDV DJRUD FRQWD FRP QRYRV PRGRV SURJUDPDGRU H HVWDWtVWLFR 1R PRGR SURJUDPDGRU HOD ID] FiOFXORV ELQiULRV H WHP RSomR GH iOJHEUD ERROHDQD $ HVWDWtVWLFD WHP IXQo}HV GH FiOFXORV EiVLFRV 7DPEpP IRL DGLFLRQDGR UHFXUVR GH FRQYHUVmR GH XQLGDGHV FRPR GH SpV SDUD PHWURV

Didatismo e Conhecimento

68


CONHECIMENTOS DE INFORMĂ TICA

Calculadora: 2 novos modos.

WordPad remodelado Requisitos $SHVDU GHVWD QRYD YHUVmR GR :LQGRZV HVWDU PDLV OHYH HP UHODomR DR 9LVWD DLQGD p H[LJLGR XPD FRQÂżJXUDomR GH KDUGZDUH SHoDV UHODWLYDPHQWH ERD SDUD TXH VHMD XWLOL]DGR VHP SUREOHPDV GH GHVHPSHQKR (VWD p D FRQÂżJXUDomR PtQLPD Ä 3URFHVVDGRU GH *+] ELW

¡ MemĂłria (RAM) de 1 GB Ä 3ODFD GH 9tGHR FRPSDWtYHO FRP 'LUHFW; H 0% GH PHPyULD VHP :LQGRZV $HUR

Ä (VSDoR UHTXHULGR GH *% ¡ DVD-ROM Ä 6DtGD GH ĂˆXGLR Se for desejado rodar o sistema sem problemas de lentidĂŁo e ainda usufruir derecursos como o Aero, o recomendado ĂŠ a seguinte FRQÂżJXUDomR

Didatismo e Conhecimento

69


CONHECIMENTOS DE INFORMÁTICA CRQ¿JXUDomR 5HFRPHQGDGD ā 3URFHVVDGRU GH *+] RX ELWV

ā 0HPyULD 5$0 GH *% ā (VSDoR UHTXHULGR GH GLVFR UtJLGR *% ā 3ODFD GH YtGHR FRP VXSRUWH D HOHPHQWRV JUi¿FRV 'LUHFW; FRP 0% GH PHPyULD SDUD KDELOLWDU R WHPD GR :LQGRZV $HUR

ā 8QLGDGH GH '9' 5 : · Conexão com a Internet (para obter atualizações) Atualizar de um SO antigo 2 PHOKRU FHQiULR SRVVtYHO SDUD D LQVWDODomR GR :LQGRZV p FRP XPD PiTXLQD QRYD FRP RV UHTXLVLWRV DSURSULDGRV (QWUHWDQWR p SRVVtYHO XWLOL]i OR QXP FRPSXWDGRU DQWLJR GHVGH TXH DWHQGD DV HVSHFL¿FDo}HV PtQLPDV 6H R DSDUHOKR HP TXHVWmR SRVVXLU R :LQGRZV 9LVWD LQVWDODGR YRFr WHUi D RSomR GH DWXDOL]DU R VLVWHPD RSHUDFLRQDO &DVR VXD PiTXLQD XWLOL]H :LQGRZV ;3 YRFr GHYHUi ID]HU D UH LQVWDODomR GR VLVWHPD RSHUDFLRQDO 8WLOL]DQGR XPD YHUVmR DQWHULRU D GR ;3 PXLWR SURYDYHOPHQWH VHX FRPSXWDGRU QmR DWHQGH DRV UHTXLVLWRV PtQLPRV (QWUHWDQWR QDGD LPSHGH TXH YRFr WHQWH ID]HU D UHLQVWDODomR Atualização ³$WXDOL]DU p D IRUPD PDLV FRQYHQLHQWH GH WHU R :LQGRZV HP VHX FRPSXWDGRU SRLV PDQWpP RV DUTXLYRV DV FRQ¿JXUDo}HV H RV SURJUDPDV GR :LQGRZV 9LVWD QR OXJDU´ 6LWH GD 0LFURVRIW KWWS ZLQGRZV PLFURVRIW FRP SW %5 ZLQGRZV KHOS XSJUDGLQJ IURP ZLQGRZV YLVWD WR ZLQGRZV e R PpWRGR PDLV DGHTXDGR VH R XVXiULR QmR SRVVXL FRQKHFLPHQWR RX WHPSR SDUD ID]HU XPD LQVWDODomR GR PpWRGR WUDGLFLRQDO Optando por essa opção, ainda devesse tomar cuidado com a compatibilidade dos programas, o que funciona no Vista nem sempre IXQFLRQDUi QR Instalação 3RU TXDOTXHU PRWLYR TXH D DWXDOL]DomR QmR SRVVD VHU HIHWXDGD D LQVWDODomR FRPSOHWD VH WRUQD D RSomR PDLV YLiYHO 1HVWH FDVR p QHFHVViULR ID]HU EDFNXS GH GDGRV TXH VH GHVHMD XWLOL]DU FRPR GULYHUV H GRFXPHQWRV GH WH[WR SRLV WRGDV DV LQIRUPDo}HV QR FRPSXWDGRU VHUmR SHUGLGDV 4XDQGR LQLFLDU R :LQGRZV HOH YDL HVWDU VHP RV SURJUDPDV TXH YRFr KDYLD LQVWDODGR H FRP DV FRQ¿JXUDo}HV SDGUmR Desempenho 'H QDGD DGLDQWDULDP RV QRYRV UHFXUVRV GR :LQGRZV VH HOH PDQWLYHVVH D IDPD GH OHQWR H SDUDQyLFR DGTXLULGD SRU VHX DQWHFHVVRU 7HVWHV LQGLFDP TXH D QRYD YHUVmR WHP JDQKRX DOJXQV SRQWRV QD YHORFLGDGH 2 6HYHQ WH DMXGD DXWRPDWLFDPHQWH FRP R GHVHPSHQKR ³6HX VLVWHPD RSHUDFLRQDO WRPD FRQWD GR JHUHQFLDPHQWR GR SURFHVVDGRU H PHPyULD SDUD YRFr´ -LP %R\FH :LQGRZV %LEOH SJ WUDGXomR QRVVD $OpP GLVVR DV WDUHIDV UHFHEHP SULRULGDGHV $SHVDU GH QmR DMXGDU HIHWLYDPHQWH QR GHVHPSHQKR R :LQGRZV SULRUL]D R TXH R XVXiULR HVWi LQWHUDJLQGR WDUHIDV ³IRUHJURXQG´ 2XWUDV FRPR XPD LPSUHVVmR WHP EDL[D SULRULGDGH SRLV VmR QDWXUDOPHQWH OHQWDV H SRGHP VHU H[HFXWDGDV ³ORQJH GD YLVmR´ GR XVXiULR GDQGR D LPSUHVVmR TXH R FRPSXWDGRU QmR HVWi OHQWR (VVD FDUDFWHUtVWLFD SHUPLWH TXH R XVXiULR QmR VLQWD XPD OHQWLGmR GHVQHFHVViULD QR FRPSXWDGRU (QWUHWDQWR QmR VH SRGH LJQRUDU R IDWR TXH FRP FDGD YH] PDLV UHFXUVRV H ³HIHLWRV JUi¿FRV´ D WHQGrQFLD p TXH R VLVWHPD RSHUDFLRQDO VH WRUQH XP IRUWH FRQVXPLGRU GH PHPyULD H SURFHVVDPHQWR 2 6HYHQ GLVSRQLELOL]D YiULRV UHFXUVRV GH SRQWD H PDQWrP XPD SHUIRUPDQFH VDWLVIDWyULD Monitor de desempenho $SHVDU GH QmR VHU XPD H[FOXVLYLGDGH GR 6HYHQ p XPD IHUUDPHQWD SRGHURVD SDUD YHUL¿FDU FRPR R VLVWHPD HVWi VH SRUWDQGR 3RGHP VH DGLFLRQDU FRQWDGRUHV DOpP GR TXH Mi H[LVWH SDUD FROKHU DLQGD PDLV LQIRUPDo}HV H JHUDU UHODWyULRV Monitor de recursos &RP R PRQLWRU GH UHFXUVRV XPD VpULH GH DEDV PRVWUD LQIRUPDo}HV VREUH R XVR GR SURFHVVDGRU GD PHPyULD GLVFR H FRQH[mR j UHGH Didatismo e Conhecimento

70


CONHECIMENTOS DE INFORMÁTICA PRINCIPAIS DIFERENÇAS ENTRE AS VERSÕES Windows 7 Starter &RPR R SUySULR WtWXOR DFLPD VXJHUH HVWD YHUVmR GR :LQGRZV p D PDLV VLPSOHV H EiVLFD GH WRGDV $ %DUUD GH 7DUHIDV IRL FRPSOHWDPHQWH UHGHVHQKDGD H QmR SRVVXL VXSRUWH DR IDPRVR $HUR *ODVV 8PD OLPLWDomR GD YHUVmR p TXH R XVXiULR QmR SRGH DEULU PDLV GR TXH WUrV DSOLFDWLYRV DR PHVPR WHPSR (VWD YHUVmR VHUi LQVWDODGD HP FRPSXWDGRUHV QRYR DSHQDV QRV SDtVHV HP GHVHQYROYLPHQWR FRPR ËQGLD 5~VVLD H %UDVLO 'LVSRQtYHO DSHQDV QD YHUVmR GH ELWV Windows 7 Home Basic (VWD p XPD YHUVmR LQWHUPHGLiULD HQWUH DV HGLo}HV 6WDUWHU H +RPH 3UHPLXP TXH VHUi PRVWUDGD ORJR DEDL[R 7HUi WDPEpP D YHUVmR GH ELWV H SHUPLWLUi D H[HFXomR GH PDLV GH WUrV DSOLFDWLYRV DR PHVPR WHPSR Assim como a anterior, não terá suporte para o Aero Glass nem para as funcionalidades sensíveis ao toque, fugindo um pouco da SULQFLSDO QRYLGDGH GR :LQGRZV &RPSXWDGRUHV QRYRV SRGHUmR FRQWDU WDPEpP FRP D LQVWDODomR GHVWD HGLomR PDV VXD YHQGD VHUi SURLELGD QRV (VWDGRV 8QLGRV Windows 7 Home Premium (GLomR TXH RV XVXiULRV GRPpVWLFRV SRGHP FKDPDU GH ³FRPSOHWD´ D +RPH 3UHPLXP DFXPXOD WRGDV DV IXQFLRQDOLGDGHV GDV HGLo}HV FLWDGDV DQWHULRUPHQWH H VRPD PDLV DOJXPDV DR SDFRWH 'HQWUH DV IXQo}HV DGLFLRQDGDV DV SULQFLSDLV VmR R VXSRUWH j LQWHUIDFH $HUR *ODVV H WDPEpP DRV UHFXUVRV 7RXFK :LQGRZV WHOD VHQVtYHO DR WRTXH H $HUR %DFNJURXQG TXH WURFD VHX SDSHO GH SDUHGH DXWRPDWLFDPHQWH QR LQWHUYDOR GH WHPSR GHWHUPLQDGR +DYHUi DLQGD XP DSOLFDWLYR QDWLYR SDUD DX[LOLDU QR JHUHQFLDPHQWR GH UHGHV ZLUHOHVV FRQKHFLGR FRPR 0RELOLW\ &HQWHU

(VWD HGLomR VHUi FRORFDGD j YHQGD HP ORMDV GH YDUHMR H WDPEpP SRGHUi VHU HQFRQWUDGD HP FRPSXWDGRUHV QRYRV Windows 7 Professional, voltado às pequenas empresas 0DLV YROWDGD SDUD DV SHTXHQDV HPSUHVDV D YHUVmR 3URIHVVLRQDO GR :LQGRZV SRVVXLUi GLYHUVRV UHFXUVRV TXH YLVDP IDFLOLWDU D FRPXQLFDomR HQWUH FRPSXWDGRUHV H DWp PHVPR LPSUHVVRUDV GH XPD UHGH FRUSRUDWLYD 3DUD LVVR IRUDP GHVHQYROYLGRV DSOLFDWLYRV FRPR R 'RPDLQ -RLQ TXH DMXGD RV FRPSXWDGRUHV GH XPD UHGH D ³VH HQ[HUJDUHP´ H FRQVHJXLUHP VH FRPXQLFDU 2 /RFDWLRQ $ZDUH 3ULQWLQJ SRU VXD YH] WHP FRPR REMHWLYR WRUQDU PXLWR PDLV IiFLO R FRPSDUWLOKDPHQWR GH LPSUHVVRUDV &RPR HPSUHVDV VHPSUH HVWmR SURFXUDQGR PDQHLUDV SDUD VH SURWHJHU GH IUDXGHV R :LQGRZV 3URIHVVLRQDO WUD] R (QFU\SWLQJ )LOH 6\VWHP TXH GL¿FXOWD D YLRODomR GH GDGRV (VWD YHUVmR WDPEpP VHUi HQFRQWUDGD HP ORMDV GH YDUHMR RX FRPSXWDGRUHV QRYRV

Didatismo e Conhecimento

71


CONHECIMENTOS DE INFORMร TICA Windows 7 Enterprise, apenas para vรกrios 6LP p ยณDSHQDV SDUD YiULRVยด PHVPR &RPR HVWD p XPD YHUVmR PDLV YROWDGD SDUD HPSUHVDV GH PpGLR H JUDQGH SRUWH Vy SRGHUi VHU DGTXLULGD FRP OLFHQFLDPHQWR SDUD GLYHUVDV PiTXLQDV $FXPXOD WRGDV DV IXQFLRQDOLGDGHV FLWDGDV QD HGLomR 3URIHVVLRQDO H SRVVXL UHFXUVRV PDLV VRยฟVWLFDGRV GH VHJXUDQoD 'HQWUH HVVHV UHFXUVRV HVWmR R %LW/RFNHU UHVSRQViYHO SHOD FULSWRJUDยฟD GH GDGRV H R $SS/RFNHU TXH LPSHGH D H[HFXomR GH SURJUDPDV QmR DXWRUL]DGRV $OpP GLVVR Ki DLQGD R %UDFK&DFKH SDUD WXUELQDU WUDQVIHUrQFLD GH DUTXLYRV JUDQGHV H WDPEpP R 'LUHFW$FFHVV TXH Gi XPD VXSHU DMXGD FRP D FRQยฟJXUDomR GH UHGHV FRUSRUDWLYDV Windows 7 Ultimate, o mais completo e mais caro Esta serรก, provavelmente, a versรฃo mais cara de todas, pois contรฉm todas as funcionalidades jรก citadas neste artigo e mais alguPDV $SHVDU GH VXD YHQGD QmR VHU UHVWULWD jV HPSUHVDV R 0LFURVRIW GLVSRQLELOL]DUi XPD TXDQWLGDGH OLPLWDGD GHVWD YHUVmR GR VLVWHPD ,VVR SRUTXH JUDQGH SDUWH GRV DSOLFDWLYRV H UHFXUVRV SUHVHQWHV QD 8OWLPDWH VmR GHGLFDGRV jV FRUSRUDo}HV QmR LQWHUHVVDQGR PXLWR DRV XVXiULRV FRPXQV

MICROSOFT OFFICE: WORD 2007, EXCEL 2007, POWER POINT 2007 E MICROSOFT OUTLOOK 2007

Microsoft Word 2007 2 :RUG p XP SURFHVVDGRU GH WH[WR FRQVWLWXLQGR XPD SRGHURVD IHUUDPHQWD GH DX[tOLR j HODERUDomR GH GRFXPHQWRV &RP HVWH DSOLFDWLYR YRFr SRGH FULDU XPD JUDQGH GLYHUVLGDGH GH GRFXPHQWRV XWLOL]DQGR UHFXUVRV FRPR WDEHODV JUiยฟFRV tQGLFHV LPDJHQV VRP YtGHR H WH[WR HP FROXQDV HQWUH PXLWRV RXWURV Nesta nova versรฃo, o Word surge com uma nova interface, em que os tradicionais menus de opรงรตes desaparecem e dรฃo lugar a uma faixa de opรงรตes com diversas guias, onde podemos encontrar, mais facilmente, os comandos necessรกrios para executar as tarefas TXH QRV SURSRPRV UHDOL]DU 1. Explorando a janela do Word 1.1 Acessando o Word +i YiULDV IRUPDV GH DFHVVDU R :RUG $ PDLV XWLOL]DGD p FOLFDU QR ERWmR ,QLFLDU 7RGRV RV SURJUDPDV 0LFURVRIW 2IยฟFH 0LFURVRIW 2IยฟFH :RUG 2EVHUYH D ยฟJXUD DEDL[R

Didatismo e Conhecimento

72


CONHECIMENTOS DE INFORMĂ TICA 1.2 Conhecendo a ĂĄrea de trabalho do Word Logo que abrimos o Word, um documento ĂŠ criado automaticamente com o nome de Documento 1, e ĂŠ visualizada uma janela, FRPR D GHPRQVWUDGD QD ÂżJXUD

0HQX ¹ &OLFDQGR VREUH R %RWmR 2I¿FH , no canto superior esquerdo, aparecerão funçþes como Salvar, Imprimir e Fechar HQWUH RXWUDV TXH VmR DV SULQFLSDLV Do}HV GH FRQWUROH GD MDQHOD GR :RUG

'R ODGR GLUHLWR GR %RWmR 2I¿FH , você poderå personalizar a Barra de ferramentas de acesso råpido, clicando na Caixa de listagem (lista de opçþes disponíveis) 3DUD DWLYDU RX GHVDWLYDU XP FRPDQGR EDVWD FOLFDU VREUH HOH

Didatismo e Conhecimento

73


CONHECIMENTOS DE INFORMĂ TICA

%DUUD GH 7tWXOR Âą 0RVWUD R WtWXOR GR SURJUDPD H R QRPH GR GRFXPHQWR DUTXLYR TXH HVWi DEHUWR

Faixa de opçþes – A faixa de opçþes ĂŠ o local onde estĂŁo os principais comandos do Word, separados por guias: InĂ­cio, Inserir, /D\RXW GD 3iJLQD 5HIHUrQFLDV &RUUHVSRQGrQFLDV 5HYLVmR H ([LELomR

Botão ajuda – $FHVVD D DMXGD GR 2I¿FH 2QOLQH RX D ORFDO VDOYD QR FRPSXWDGRU &RQWUROH GD MDQHOD ¹ &RQWUROHV SDUD 0LQLPL]DU 0D[LPL]DU ¿FDU GR WDPDQKR GD WHOD 5HVWDXUDU SRGHU VHU UHGLPHQVLRQDGD FRQIRUPH QHFHVVLGDGH H )HFKDU D MDQHOD

5pJXDV Âą $V UpJXDV KRUL]RQWDLV H YHUWLFDLV VmR XVDGDV SDUD GHÂż QLU H YLVXDOL]DU RV UHFXRV GH SDUiJUDIRV WDEXODomR PDUJHP GDV SiJLQDV H ODUJXUD GDV FROXQDV TXDQGR WUDEDOKDPRV FRP WDEHODV Âż JXUD 3DUD KDELOLWi ODV RX GHVDELOLWi ODV EDVWD FOLFDU QR ERWmR 5pJXD TXH Âż FD QR FDQWR VXSHULRU GLUHLWR DEDL[R GD IDL[D GH RSo}HV

Barra de rolagem – As barras de rolagem permitem que você navegue pelo documento, quando a pågina for maior que a tela, FOLFDQGR VREUH DV VHWDV RX DUUDVWDQGR R ERWmR GH URODJHP

Didatismo e Conhecimento

74


CONHECIMENTOS DE INFORMĂ TICA

Abaixo da barra de rolagem, hå botþes para tornar essa navegação mais råpida: 3iJLQD DQWHULRU H 3Uy[LPD SiJLQD

1R ERWmR 6HOHFLRQDU REMHWR GD SURFXUD p SRVVtYHO SRU H[HPSOR SURFXUDU XPD SDODYUD JUiÂżFR WDEHOD HWF HP WRGR R GRFXPHQWR

%DUUD GH VWDWXV Âą 0RVWUD LQIRUPDo}HV VREUH R GRFXPHQWR DWXDO WDLV FRPR R Q~PHUR GH SiJLQDV H D SiJLQD DWXDO (VWi ORFDOL]DGD QD PDUJHP LQIHULRU GD WHOD

Modos de exibição – Os modos de exibição sĂŁo encontrados Ă direita da barra de status e permitem alterar a visualização do GRFXPHQWR

Didatismo e Conhecimento

75


CONHECIMENTOS DE INFORMÁTICA As opções são as seguintes:

ÈUHD GR GRFXPHQWR ± /RFDO HP TXH RV WH[WRV VmR GLJLWDGRV H HGLWDGRV 1HVVD iUHD REVHUYDPRV XPD EDUUD YHUWLFDO SLVFDQGR FKDPDGD GH FXUVRU RX SRQWR GH LQVHUomR 4XDOTXHU FDUDFWHUH VHUi LQVHULGR j HVTXHUGD GR FXUVRU 1.3 Obtendo ajuda 3DUD REWHU DMXGD p Vy FOLFDU QR ERWmR $MXGD VH i HQWmR XPD MDQHOD FRPR PRVWUD D ¿JXUD

Didatismo e Conhecimento

ORFDOL]DGR QR FDQWR VXSHULRU GLUHLWR GD MDQHOD RX SUHVVLRQDU D WHFOD ) $EULU

76


CONHECIMENTOS DE INFORMĂ TICA

Curiosidade! 4XDQGR YRFr DEULU D MDQHOD GH $MXGD R :RUG WHQWDUi FRQHFWDU VH DXWRPDWLFDPHQWH DR 2IÂżFH 2QOLQH ,VVR DFRQWHFH SRLV R FRQWH~GR RQOLQH p PDLV FRPSOHWR H DWXDOL]DGR PDV VH YRFr TXLVHU XVDU R &RQWH~GR 2IĂ€LQH LQVWDODGR MXQWR FRP R 2IÂżFH VHP D QHFHVVLGDGH GH HVWDU FRQHFWDGR j LQWHUQHW EDVWD FOLFDU QR ERWmR &RQHFWDGR DR 2IÂżFH 2QOLQH H QD RSomR 0RVWUH FRQWH~GR DSHQDV GHVWH FRPSXWDGRU

([LVWHP YiULDV IRUPDV GH HQFHUUDU R :RUG 8PD GHODV p FOLFDU QR %RWmR 2I¿FH H QD RSomR )HFKDU Caso haja alguma alteração em seu documento que não tenha sido salva, aparecerå a seguinte mensagem:

Didatismo e Conhecimento

77


CONHECIMENTOS DE INFORMÁTICA Dica! A forma mais rápida de encerrar o Word é clicar no controle Fechar, em sua janela

1.4 Entendendo melhor o menu do Word 9DPRV DJRUD WUDEDOKDU FRP FDGD XPD GDV RSo}HV GR PHQX GR :RUG YLVXDOL]DGDV DR FOLFDU QR %RWmR 2I¿FH

(VVD RSomR DEUH XPD MDQHOD FRPR D LOXVWUDGD QD ¿JXUD DEDL[R 1HOD YRFr SRGH HVFROKHU XP PRGHOR OD\RXW SDUD R QRYR GRFXPHQWR 2 PRGHOR SDGUmR p 'RFXPHQWR HP EUDQFR

Adicionando texto 1R GRFXPHQWR FULDGR YDPRV LQVHULU XP SHTXHQR WH[WR TXH VHUi XWLOL]DGR SRVWHULRUPHQWH SDUD SUDWLFDUPRV RV GHPDLV FRPDQGRV 2 :RUG DSUHVHQWD XP JUDQGH Q~PHUR GH FRQ¿JXUDo}HV TXH HOLPLQDP D QHFHVVLGDGH GH DWHQWDU SDUD FRPR R WH[WR YDL ¿FDU QD SiJLQD GLIHUHQWHPHQWH GR WHPSR GD PiTXLQD GH HVFUHYHU $R FRPHoDU D GLJLWDU R FXUVRU VH PRYLPHQWD SDUD D GLUHLWD H RV FDUDFWHUHV TXH YRFr GLJLWD YmR DSDUHFHQGR j HVTXHUGD GHOH 'LJLWH R WH[WR DEDL[R H QmR VH SUHRFXSH HP FRPR ID]HU R FXUVRU SDVVDU SDUD D OLQKD VHJXLQWH ,VVR p IHLWR DXWRPDWLFDPHQWH H VH FKDPD UHDUUDQMR GH OLQKDV

Didatismo e Conhecimento

78


CONHECIMENTOS DE INFORMร TICA

Usando a tecla ENTER para criar uma nova linha 2EVHUYH TXH DR FKHJDU DR ยฟQDO GD OLQKD GH WH[WR R FXUVRU YDL DXWRPDWLFDPHQWH SDUD D OLQKD VHJXLQWH 3DUD ID]HU R FXUVRU SDVVDU SDUD D SUy[LPD OLQKD DQWHV TXH HOH DWLQMD D PDUJHP GLUHLWD p QHFHVViULR SUHVVLRQDU D WHFOD (17(5 Vocรช sรณ precisarรก usar a tecla ENTER em duas situaรงรตes: ย 3DUD WHUPLQDU XP SDUiJUDIR ย 3DUD FULDU XPD OLQKD HP EUDQFR HQWUH SDUiJUDIRV ยฟJXUDV JUiยฟFRV HWF

3DUD VDOYDU JUDYDU XP GRFXPHQWR FOLTXH QR %RWmR 2IยฟFH H HP VHJXLGD HP 6DOYDU 9DOH OHPEUDU TXH R GRFXPHQWR p VDOYR FRP DV DOWHUDo}HV IHLWDV DWp R PRPHQWR GD DomR GH VDOYDU LVWR p WXGR R TXH YRFr ยฟ]HU GHSRLV GHOD QmR HVWDUi VDOYR HQTXDQWR QmR FOLFDU QRYDPHQWH HP 6DOYDU 4XDQGR YRFr IHFKDU H DEULU R DUTXLYR QRYDPHQWH HOH HVWDUi GD IRUPD FRPR HVWDYD TXDQGR IRL VDOYR SHOD ~OWLPD YH] 2 DUTXLYR WHUi D H[WHQVmR GRF[ TXH p LQVHULGD DXWRPDWLFDPHQWH SHOR :RUG Dicas ! 3DUD IDFLOLWDU D EXVFD SRU VHXV GRFXPHQWRV Ki DOJXPDV GLFDV TXDQWR j QRPHDomR GH DUTXLYRV TXDQGR IRU VDOYi ORV ย 8VH SDODYUDV FKDYH TXH IDFLOLWHP D PHPRUL]DomR ย 'LJLWH DV LQLFLDLV HP PDL~VFXODV ย (YLWH SUHSRVLo}HV HQWUH DV SDODYUDV ย (YLWH DFHQWRV H FHGLOKDV ย ,QVLUD GDWDV VH QHFHVViULR Exemplo: 3DUD VDOYDU XP UHODWyULR VHPDQDO GH DWLYLGDGHV XP ERP QRPH VHULD 5HO6HP$WLYB B'H] 1HVVH FDVR R B'H] LGHQWLยฟFD D VHPDQD D TXH VH UHIHUH R UHODWyULR VHP VHU QHFHVViULR DEUL OR 9DPRV VDOYDU R GRFXPHQWR TXH DFDEDPRV GH GLJLWDU FRP R QRPH GH 3DUWHB3UDWLFD e LPSRUWDQWtVVLPR R KiELWR GH PDQWHU R GRFXPHQWR VDOYR &RQWXGR FDVR YRFr VH HVTXHoD GH VDOYi OR H SRU DOJXP SUREOHPD R computador se desligue ou trave inesperadamente, ainda hรก possibilidade de recuperar o documento, graรงas ao recurso Recuperaรงรฃo DXWRPiWLFD GH DUTXLYRV Como? Recuperaรงรฃo automรกtica de arquivos? Sim! Sem que vocรช note, de tempo em tempo, automaticamente, o Word salva o arquivo, para que, em ocasiรตes inesperadas, vocรช QmR SHUFD VHX WUDEDOKR Assim, na ocasiรฃo seguinte em que vocรช abrir o Word DSDUHFHUi XPD MDQHOD FRP D OLVWD GH WRGRV RV GRFXPHQWRV UHFXSHUDGRV 3DUD DEULU TXDOTXHU XP GRV DUTXLYRV EDVWD FOLFDU VREUH HOH

Didatismo e Conhecimento

79


CONHECIMENTOS DE INFORMĂ TICA Usando modelos prontos para criar documentos $ VHJXLU YDPRV YHU DOJXQV PRGHORV GH GRFXPHQWRV TXH SRGHP VHU IHLWRV FRP R DX[tOLR GR :RUG 3DUD DFHVVi ORV FOLTXH QR %RWmR 2IÂżFH H HP VHJXLGD QR ERWmR 1RYR $SyV VHOHFLRQDU R PRGHOR GHVHMDGR EDVWD FOLFDU HP %DL[DU

Didatismo e Conhecimento

80


CONHECIMENTOS DE INFORMÁTICA

&RQIRUPH PRVWUD D ¿JXUD DEDL[R QD OLVWD DR ODGR GRV ERW}HV GR PHQX Ki XPD iUHD FKDPDGD 'RFXPHQWRV 5HFHQWHV 1HOD aparecem os últimos documentos acessados com o ícone QR FDQWR GLUHLWR 3DUD ¿[DU XP GRFXPHQWR QD OLVWD GRV PDLV UHFHQWHV EDVWD FOLFDU QHVVH tFRQH TXH ¿FDUi DVVLP

$R FOLFDU QR ERWmR $EULU DSDUHFHUi XPD MDQHOD HP TXH YRFr GHYH SURFXUDU R DUTXLYR TXH GHVHMD DEULU

$R ORFDOL]DU R DUTXLYR GHVHMDGR FOLTXH VREUH HOH H HP $EULU 3DUD VDOYDU XP GRFXPHQWR QR :RUG YRFr GHYH FOLFDU QR %RWmR 2I¿FH H HP VHJXLGD HP 6DOYDU 6H KRXYHU QHFHVVLGDGH GH VDOYDU R DUTXLYR FRP RXWUR QRPH RX HP RXWUR ORFDO FOLTXH QR %RWmR 2I¿FH H HP VHJXLGD HP 6DOYDU FRPR (P VHJXLGD GLJLWH R QRPH GHVHMDGR H RX VHOHFLRQH R ORFDO GHVHMDGR +' &' 3HQGULYH HWF H FOLTXH HP 6DOYDU

Didatismo e Conhecimento

81


CONHECIMENTOS DE INFORMÁTICA

3DUD LPSULPLU R DUTXLYR DEHUWR p QHFHVViULR WHU DOJXPD LPSUHVVRUD FRQHFWDGD DR FRPSXWDGRU RX D XPD UHGH ORFDO &OLTXH QR %RWmR 2I¿FH H SRVLFLRQH R PRXVH QR ERWmR ,PSULPLU DSDUHFHUmR WUrV RSo}HV FRPR YHPRV QD WHOD DEDL[R

,PSULPLU ± $EUH XPD MDQHOD FRP FRQ¿JXUDo}HV TXH SHUPLWHP VHOHFLRQDU D LPSUHVVRUD SiJLQDV D VHUHP LPSUHVVDV Q~PHUR GH FySLDV HWF

,PSUHVVmR 5iSLGD ,PSULPH GLUHWDPHQWH VHP QHQKXPD FRQ¿JXUDomR 9LVXDOL]DomR GH ,PSUHVVmR ± 3RVVLELOLWD FRQIHULU FRPR ¿FDUi LPSUHVVR VHX GRFXPHQWR 3DUD YROWDU j YLVXDOL]DomR OD\RXW GH impressão, clique no botão Fechar Visualização de Impressão

Didatismo e Conhecimento

82


CONHECIMENTOS DE INFORMร TICA

1.5 A faixa de opรงรตes

A faixa de opรงรตes mostra os comandos mais utilizados agrupados por temas, para que vocรช nรฃo precise procurรก-los em vรกrios PHQXV DVVLP IDFLOLWDQGR R WUDEDOKR $ VHJXLU DSUHVHQWDPRV D IDL[D GH RSo}HV H FRPR WUDEDOKDU FRP HOD 1.5.1 Conteรบdo da faixa de opรงรตes +i WUrV FRPSRQHQWHV EiVLFRV QD IDL[D GH RSo}HV e ERP VDEHU FRPR FDGD XP VH FKDPD SDUD FRPSUHHQGHU FRPR XWLOL]i OR

*XLDV ยฑ +i VHWH JXLDV EiVLFDV QD SDUWH VXSHULRU &DGD XPD UHSUHVHQWD XPD iUHD GH DWLYLGDGH H HP FDGD XPD GHODV RV FRPDQGRV VmR UHXQLGRV SRU JUXSRV 3RU H[HPSOR D JXLD ,QtFLR FRQWpP WRGRV RV FRPDQGRV TXH YRFr XWLOL]D FRP PDLV IUHTXrQFLD H RV ERW}HV 5HFRUWDU &RSLDU H &RODU TXH HVWmR QR JUXSR ร UHD GH WUDQVIHUrQFLD *UXSRV ยฑ &DGD JXLD WHP YiULRV JUXSRV TXH PRVWUDP RV LWHQV UHODFLRQDGRV HP FRQMXQWR &RPDQGRV ยฑ 8P FRPDQGR p XP ERWmR XPD FDL[D SDUD LQVHULU LQIRUPDo}HV RX XP PHQX Dica

$ IDL[D GH RSo}HV IDFLOLWD D ORFDOL]DomR GH WRGDV DV IXQo}HV 1R HQWDQWR YRFr SRGH TXHUHU WUDEDOKDU FRP VHX GRFXPHQWR HP XP HVSDoR PDLRU 6H HVVH IRU R FDVR p SRVVtYHO RFXOWi OR GDQGR XP FOLTXH GXSOR QD JXLD DWLYD 3DUD YHU RV FRPDQGRV QRYDPHQWH EDVWD GDU RXWUR FOLTXH GXSOR HP XPD GDV JXLDV

Didatismo e Conhecimento

83


CONHECIMENTOS DE INFORMÁTICA &RQ¿UD DEDL[R RV JUXSRV GH FDGD XPD GDV JXLDV ,QtFLR ± ÈUHD GH WUDQVIHUrQFLD )RQWH 3DUiJUDIR (VWLOR H (GLomR ,QVHULU ± 3iJLQDV 7DEHODV ,OXVWUDo}HV /LQNV &DEHoDOKR H 5RGDSp 7H[WR H 6tPERORV /D\RXW GD 3iJLQD ± 7HPDV &RQ¿ JXUDU 3iJLQD 3ODQR GH )XQGR GD 3iJLQD 3DUiJUDIR H 2UJDQL]DU 5HIHUrQFLDV ± 6XPiULR 1RWDV GH 5RGDSp &LWDo}HV H %LEOLRJUD ¿ D /HJHQGDV ËQGLFH H ËQGLFH GH $XWRULGDGHV &RUUHVSRQGrQFLDV ± &ULDU ,QLFLDU 0DOD 'LUHWD *UDYDU H ,QVHULU &DPSRV 9LVXDOL]DU 5HVXOWDGRV H &RQFOXLU 5HYLVmR ± 5HYLVmR GH 7H[WR &RPHQWiULRV &RQWUROH $OWHUDo}HV &RPSDUDU H 3URWHJHU ([LELomR ± 0RGR GH ([LELomR GH 'RFXPHQWR 0RVWUDU 2FXOWDU =RRP -DQHOD H 0DFURV $OJXQV JUXSRV WrP XPD VHWD GLDJRQDO QR FDQWR LQIHULRU GLUHLWR FKDPDGD GH ,QLFLDGRU GH &DL[D GH 'LiORJR $R FOLFDU QHOD YRFr YHUi PDLV RSo}HV UHODFLRQDGDV D HVVH JUXSR 2. EDITANDO UM DOCUMENTO 2.1 Navegando pelo documento +i YiULDV PDQHLUDV GH QDYHJDU SRU GRFXPHQWRV $OpP GD EDUUD GH URODJHP TXH YLPRV DQWHULRUPHQWH H GR PRXVH SRGHPRV utilizar as seguintes teclas:

Didatismo e Conhecimento

84


CONHECIMENTOS DE INFORMĂ TICA 2.2 Selecionando partes do documento

&DVR YRFr SUHÂżUD DOJXQV FRPDQGRV SRGHP VHU UHDOL]DGRV FRP R PRXVH

2.3 Inserindo texto 3DUD LQVHULU WH[WR QR GRFXPHQWR XPD OHWUD XPD SDODYUD XP SDUiJUDIR XPD SiJLQD HWF EDVWD SRVLFLRQDU R FXUVRU QR ORFDO GHVHMDGR H GLJLWDU RV GDGRV D VHUHP LQVHULGRV 9DOH OHPEUDU TXH D LQVHUomR RFRUUHUi j HVTXHUGD GR FXUVRU

Didatismo e Conhecimento

85


CONHECIMENTOS DE INFORMĂ TICA 2.4 Deletando (apagando) texto

2.5 Formatando caracteres e parågrafos 8WLOL]DUHPRV RV FRPDQGRV GD JXLD ,QtFLR SDUD WUDEDOKDUPRV FRP DV IRUPDWDo}HV PDLV FRPXQV GH FDUDFWHUHV H SDUiJUDIRV TXH LQFOXHP PXGDQoD GH IRQWH FRU WDPDQKR DOLQKDPHQWR GH WH[WR HWF 8P QRYR UHFXUVR GR 2I¿FH TXH IDFLOLWD D IRUPDWDomR GR GRFXPHQWR p R SUHYLHZ RX SUp YLVXDOL]DomR GH XPD DOWHUDomR VHP WHU TXH DSOLFi OD 3RU H[HPSOR SDUD DOWHUDU R WLSR GH IRQWH OHWUD FRQIRUPH YRFr SDVVD R PRXVH SHODV IRQWHV LQVWDODGDV R WH[WR VHOHFLRQDGR p DXWRPDWLFDPHQWH YLVXDOL]DGR FRPR ¿FDUi ( LVVR YDOH SDUD DOJXPDV GDV RSo}HV GH IRUPDWDomR FRU WDPDQKR H HVWLOR GHQWUH RXWUDV 2.5.1 Alterando a fonte, a cor e o tamanho do caractere ou texto 8WLOL]DUHPRV R JUXSR )RQWHV SDUD WUDEDOKDUPRV FRP FDUDFWHUHV H WH[WRV 3DUD ID]HU DV DOWHUDo}HV GHVHMDGDV p QHFHVViULR TXH R WH[WR HVWHMD VHOHFLRQDGR 9HMD RV FRPDQGRV GH VHOHomR QR LWHP $EUD R DUTXLYR 3DUWHB3UDWLFD H VHOHFLRQH D SDODYUD ³PHOKRUHV´ &OLTXH QD FDL[D GH GLiORJR SDUD DEULU DV RSo}HV GH IRQWH H Yi SDVVDQGR R PRXVH VREUH HODV Observe que a palavra selecionada vai sendo visualizada de acordo com o tipo de fonte sobre a qual o ponteiro do mouse Ê GHVORFDGR $SyV HVFROKHU D IRQWH GHVHMDGD FOLTXH VREUH HOD

(P VHJXLGD IDoD R PHVPR FRP D RSomR GH WDPDQKR

Didatismo e Conhecimento

86


CONHECIMENTOS DE INFORMĂ TICA

O mesmo procedimento deverĂĄ ser adotado para alterar a cor do realce do texto, que, por padrĂŁo, ĂŠ sem cor; a cor da fonte, que, SRU SDGUmR p SUHWD H R HVWLOR GH VXEOLQKDGR TXH SRU SDGUmR p GHVDWLYDGR 1R FDVR GRV GHPDLV FRPDQGRV R HIHLWR Vy VHUi YLVXDOL]DGR DSyV VHU DSOLFDGR

Didatismo e Conhecimento

87


CONHECIMENTOS DE INFORMà TICA Dica Quando você seleciona um texto e passa o mouse sobre ele, aparece uma caixa de ferramentas, com algumas opçþes de formatação, SDUD WRUQDU VHX WUDEDOKR PDLV UiSLGR

2.5.2 Alterando o alinhamento de linhas ou parĂĄgrafos $JRUD XWLOL]DUHPRV RV FRPDQGRV GR JUXSR 3DUiJUDIR GD JXLD ,QtFLR O texto da linha em que estiver posicionado o cursor ou o parĂĄgrafo selecionado poderĂŁo ser alinhados de quatro formas:

2.5.3 Alterando o espaçamento entre linhas 3RGHPRV DOWHUDU R HVSDoDPHQWR HQWUH OLQKDV R SDGUmR p ¹ VLPSOHV RX DLQGD RV HVSDoRV DQWHV RX GHSRLV GRV SDUiJUDIRV R SDGUmR p GH HP SRQWRV 2EVHUYH D ¿JXUD

Didatismo e Conhecimento

88


CONHECIMENTOS DE INFORMÁTICA 2 ERWmR 2So}HV GH (VSDoDPHQWR GH /LQKD SHUPLWH HVWDEHOHFHU HVSDoDPHQWRV SHUVRQDOL]DGRV

8WLOL]DQGR D UpJXD SDUD GH¿QLU PDUJHQV H PDUFDo}HV GH SDUiJUDIRV $ UpJXD p D IHUUDPHQWD TXH GH ¿ QH DV PDUJHQV GR GRFXPHQWR GR WH[WR VHOHFLRQDGR H DV PDUFDo}HV GH SDUiJUDIR Margem do documento 1D UpJXD H[LVWHP PDUFDGRUHV TXH GH¿ QHP DV PDUJHQV HVTXHUGD H GLUHLWD GR GRFXPHQWR 9HMD D ¿JXUD 2EVHUYH TXH Ki Q~PHURV DQWHV H GHSRLV GRV PDUFDGRUHV (VVD QXPHUDomR p R YDORU GD PDUJHP HP FHQWtPHWURV 3RU SDGUmR DV PDUJHQV LQLFLDP VH HP FP H WHUPLQDP HP FP $R SDVVDU R PRXVH SRU XP GRV PDUFDGRUHV DSDUHFHUi XPD VHWD 6H YRFr FOLFDU QHOD H DUUDVWi OD DOWHUDUi DV PDUJHQV GR GRFXPHQWR

3RU H[HPSOR DEUD R DUTXLYR 3DUWHB3UDWLFD H DUUDVWH D PDUJHP HVTXHUGD DWp TXH R Q~PHUR VHMD R ~QLFR YLVXDOL]DGR ,VVR LQGLFDUi TXH Ki FP GH PDUJHP HVTXHUGD SDUD WRGR R GRFXPHQWR 3DUD GHWHUPLQDU D PDUJHP GLUHLWD HP FP EDVWD DUUDVWi OD DWp R Q~PHUR 2 WH[WR GHYHUi ¿FDU VHPHOKDQWH DR DSUHVHQWDGR QD ¿JXUD DEDL[R

Margem do parágrafo selecionado $V PDUJHQV HVTXHUGD H GLUHLWD EHP FRPR D PDUFDomR GH SDUiJUDIR GR WH[WR VHOHFLRQDGR VmR GH ¿ QLGDV SHORV PDUFDGRUHV DR FOLFDUPRV VREUH HOHV H DUUDVWi ORV

Didatismo e Conhecimento

89


CONHECIMENTOS DE INFORMĂ TICA

-- Marcação do parågrafo -- Margem esquerda -- Margem direita ¹ 0DUJHP HVTXHUGD HP FP ¹ 3DUiJUDIR HP FP ¹ 0DUJHP GLUHLWD HP FP ¹ $SyV R (17(5 R FXUVRU ¿FD DXWRPDWLFDPHQWH QD SRVLomR FP 7RGRV RV FRPDQGRV YLVWRV DWp DJRUD SRGHP VHU HIHWXDGRV FOLFDQGR VH QR ,QLFLDGRU GH &DL[D GH 'LiORJR GR JUXSR 3DUiJUDIR

2.5.5 Trabalhando com marcadores, numeradores e listas $V OLVWDV GHVHPSHQKDP YiULDV IXQo}HV GHVGH UHVXPLU LQIRUPDo}HV D IDFLOLWDU VXD FRPSUHHQVmR H DVVLPLODomR $V OLVWDV SRGHP VHU QXPHUDGDV RX DSUHVHQWDU PDUFDGRUHV

Didatismo e Conhecimento

90


CONHECIMENTOS DE INFORMÁTICA 6H YRFr WLYHU XPD VHTXrQFLD GH LQIRUPDo}HV XPD OLVWD QXPHUDGD VHUi HVVHQFLDO SDUD LQIRUPDU R Q~PHUR GH LWHQV UDSLGDPHQWH $V OLVWDV SRGHP DSUHVHQWDU XP QtYHO ~QLFR RX YiULRV QtYHLV 1D OLVWD GH QtYHO ~QLFR WRGRV RV LWHQV WrP D PHVPD KLHUDUTXLD H R PHVPR UHFXR -i D OLVWD GH YiULRV QtYHLV VLJQL¿FD TXH Ki XPD OLVWD GHQWUR GH RXWUD 9HMD DEDL[R D GLIHUHQoD HQWUH DPEDV

7DQWR PDUFDGRUHV TXDQWR QXPHUDGRUHV SRGHP VHU LQVHULGRV QRV SDUiJUDIRV VHOHFLRQDGRV +i PDLV GH XPD PDQHLUD GH LQLFLDU XPD OLVWD 8PD GDV PDLV XWLOL]DGDV p FULDU D OLVWD DXWRPDWLFDPHQWH j PHGLGD TXH RV GDGRV VmR GLJLWDGRV Se você precisar de uma lista com marcadores, basta digitar um asterisco (*), seguido de um espaço: o asterisco se transforma HP PDUFDGRU H D OLVWD p LQLFLDGD 4XDQGR WHUPLQDU GH GLJLWDU R SULPHLUR LWHP SUHVVLRQH (17(5 H XP QRYR PDUFDGRU DSDUHFHUi QD OLQKD VHJXLQWH ([LVWHP YiULRV VtPERORV TXH YRFr SRGH XVDU SDUD LQLFLDU XPD OLVWD 2 PDUFDGRU SDGUmR p R EROOHW $R DEULU D FDL[D GH GLiORJR 0DUFDGRUHV YRFr SRGHUi XWLOL]DU XP PDUFDGRU H[LVWHQWH RX 'H¿QLU 1RYR 0DUFDGRU

2V VtPERORV GLVSRQtYHLV GHSHQGHUmR GD IRQWH VHOHFLRQDGD 1D ¿JXUD D IRQWH p :LQJGLQJV 7DPEpP SRGHUmR VHU DGLFLRQDGDV LPDJHQV 3DUD FULDU DXWRPDWLFDPHQWH OLVWDV QXPHUDGDV GLJLWH R Q~PHUR H XP SRQWR VHJXLGR GH XP HVSDoR 2 QXPHUDGRU SDGUmR p 'H PRGR VHPHOKDQWH DR DQWHULRU DR DEULU D FDL[D GH GLiORJR 1XPHUDomR YRFr SRGHUi XWLOL]DU XP IRUPDWR RX 'H¿QLU 1RYR )RUPDWR GH 1~PHUR

Didatismo e Conhecimento

91


CONHECIMENTOS DE INFORMĂ TICA Criando lista de vĂĄrios nĂ­veis 3RGHPRV FULDU DXWRPDWLFDPHQWH OLVWDV GH YiULRV QtYHLV 3DUD LVVR EDVWD SUHVVLRQD R ERWmR

H VHOHFLRQDU R PRGHOR GHVHMDGR

3DUD TXH RV VXEQtYHLV DSDUHoDP EDVWD FOLFDU QR ERWmR $XPHQWDU UHFXR 9HMD R H[HPSOR DEDL[R 9,7$0,1$6 &RPSOH[R % % % % 6$,6 0,1(5$,6 Caso você avance um recuo a mais do que o desejado, basta clicar no botão Diminuir recuo Interrompendo a lista $ PDQHLUD PDLV IiFLO GH LQWHUURPSHU D FULDomR GH XPD OLVWD p SUHVVLRQDU D WHFOD (17(5 GXDV YH]HV $R ID]HU LVVR YRFr HVWDUi SURQWR SDUD LQLFLDU XP QRYR SDUiJUDIR HP XPD QRYD OLQKD Se estiver no meio de uma lista e precisar digitar algum texto abaixo do marcador no mesmo nível do texto acima, use a tecla %$&.63$&( ,VVR UHPRYHUi R PDUFDGRU PDV PDQWHUi R UHFXR GH WH[WR 3DUD DOLQKDU R QRYR WH[WR DEDL[R GR SUySULR PDUFDGRU H QmR GR WH[WR DFLPD SUHVVLRQH %$&.63$&( GXDV YH]HV 3RU ¿ P SDUD HOLPLQDU R UHFXR GH OLVWD SUHVVLRQH %$&.63$&( WUrV YH]HV Marcadores ou números Se você achar que escolheu o tipo inadequado de lista, ou seja, iniciou-a com marcadores, mas entende que números seriam PHOKRUHV RX YLFH YHUVD QmR VH SUHRFXSH e IiFLO ID]HU D WURFD %DVWD FOLFDU HP TXDOTXHU OXJDU QD OLVWD H HP VHJXLGD QR ERWmR 0DUFDGRUHV ou Numeração , na IDL[D GH RSo}HV Curiosidade! (VVHV GRLV ERW}HV ³PHPRUL]DUmR´ R WLSR GH OLVWD XWLOL]DGR SHOD ~OWLPD YH] H IDUmR XVR GHVVH WLSR TXDQGR YRFr FOLFDU QHVVHV ERW}HV QRYDPHQWH Dica! 3DUD FODVVL¿FDU XPD OLVWD DSyV FULi OD HP RUGHP DOIDEpWLFD SRU H[HPSOR XVH R ERWmR &ODVVL¿FDU 7HQKD HP PHQWH TXH DR FODVVL¿FDU XPD OLVWD QXPHUDGD VRPHQWH RV LWHQV VHUmR FODVVL¿FDGRV $ RUGHP QXPpULFD FRQWLQXDUi D PHVPD

Didatismo e Conhecimento

92


CONHECIMENTOS DE INFORMà TICA 2.5.6 Inserindo bordas e sombreamento 3DUD GDU GHVWDTXH D SDODYUDV SDUiJUDIRV SiJLQDV LPDJHQV H FpOXODV WDEHODV HQWUH RXWURV REMHWRV R :RUG GLVS}H GR UHFXUVR GH ERUGD H GH VRPEUHDPHQWR $EUD R DUTXLYR 3DUWHB3UDWLFD H VHOHFLRQH R WUHFKR ³0LFURVRIW 2I¿FH :RUG ´ Dê um clique na seta que abre a caixa de diålogo do botão Bordas e Sombreamento 2EVHUYH TXH DV RSo}HV DSUHVHQWDGDV SHUPLWHP FRORFDU ERUGDV QD SDUWH LQIHULRU VXSHULRU HWF &OLTXH QD RSomR %RUGDV H Sombreamento

Essa opção possibilita trabalhar com o seguinte: ‡ %RUGDV Âą &RORFD ERUGD QR WH[WR VHOHFLRQDGR RX QR SDUiJUDIR ‡ %RUGD GD SiJLQD Âą &RORFD XPD ERUGD HP WRGDV DV SiJLQDV GR GRFXPHQWR ‡ 6RPEUHDPHQWR Âą 3HUPLWH GHÂżQLU FRU GH 3UHHQFKLPHQWR H HVWLOR GRV SDGU}HV GR WH[WR RX SDUiJUDIR VHOHFLRQDGR

Didatismo e Conhecimento

93


CONHECIMENTOS DE INFORMÁTICA

1R H[HPSOR DFLPD R 3UHHQFKLPHQWR p DPDUHOR H QR LWHP SDGU}HV R HVWLOR VHOHFLRQDGR p +RUL]RQWDO FODUD QD FRU YHUGH 4XDQGR WUDEDOKDPRV FRP WDEHODV D XWLOL]DomR GH ERUGDV WRUQD PHOKRU H PDLV DJUDGiYHO D YLVXDOL]DomR 2.5.7 Visualizando marcas de parágrafos e símbolos de formatação ocultos ¬V YH]HV YRFr GHVHMD REWHU XP UHVXOWDGR GH IRUPDWDomR H QmR FRQVHJXH HQWHQGHU SRU TXH HOH QmR DSDUHFH 3RGH VHU TXH H[LVWDP FDUDFWHUHV RFXOWRV HP VHX GRFXPHQWR 3DUD YLVXDOL]i ORV FOLTXH QR ERWmR 0RVWUDU 7XGR 2EVHUYH D ¿JXUD DEDL[R

O que cada símbolo representa: ± )RL SUHVVLRQDGD D WHFOD (17(5 ± )RL XWLOL]DGR PDUFDGRU RX QXPHUDomR SRQWR ± ([LVWrQFLD GH HVSDoR HP EUDQFR 4XHEUD GH SiJLQD ± 4XHEUD GH SiJLQD FULDGD SHOR XVXiULR &75/ (17(5 ± 4XHEUD GH SiJLQD DXWRPiWLFD 2.6 Copiando uma formatação Imagine que você tenha trocado o tipo, a cor e o tamanho da fonte, inserido borda e/ou sombreamento e quer tudo isso em um QRYR SDUiJUDIR RX SDUWH GR GRFXPHQWR 6HULD SUHFLVR ID]HU WXGR QRYDPHQWH" 1mR 2 :RUG GLVS}H GR ERWmR )RUPDWDU 3LQFHO TXH FRSLD D IRUPDWDomR GH XPD iUHD VHOHFLRQDGD H D DSOLFD HP RXWUD $SyV VHOHFLRQDU D IRUPDWDomR GHVHMDGD Gr XP FOLTXH GXSOR QHVVH ERWmR H HP VHJXLGD QR ORFDO RQGH YRFr TXHU UHSHWLU D IRUPDWDomR &DVR VHMD PDLV GH XP YRFr SRGH DUUDVWDU R PRXVH SDUD H[SDQGLU D VHOHomR 3DUD FDQFHODU D FySLD GH IRUPDWDomR Gr XP FOLTXH QR ERWmR SDUD GHVDWLYi OR 9HMD R H[HPSOR DEDL[R HP TXH D IRUPDWDomR GD SDODYUD ³PHOKRUHV´ IRL FRSLDGD SDUD R ~OWLPR WUHFKR GR SDUiJUDIR DUTXLYR 3DUWHB3UDWLFD

Didatismo e Conhecimento

94


CONHECIMENTOS DE INFORMÁTICA

2.7 Movendo partes do documento $LQGD REVHUYDQGR R SDUiJUDIR Mi PHQFLRQDGR YRFr GHFLGH TXH D IUDVH ³$JRUD p KRUD GH VH IDPLOLDUL]DU FRP R 0LFURVRIW 2I¿ FH :RUG ´ GHYH VHU D ~OWLPD H QmR D SULPHLUD 9RFr QmR SUHFLVD H[FOXt OD H GLJLWi OD QRYDPHQWH (P YH] GLVVR PRYD D UHDOL]DQGR XPD RSHUDomR GH UHFRUWDU H FRODU UHFRUWH D IUDVH SDUD H[FOXt OD GR ORFDO DWXDO H HP VHJXLGD FROH D QR QRYR ORFDO 3ULPHLUR VHOHFLRQH D IUDVH LQWHLUD

Em seguida, clique em Recortar

, no grupo ÈUHD GH 7UDQVIHUrQFLD 2EVHUYH TXH D IUDVH GHVDSDUHFH GR WH[WR

(P VHJXLGD PRYD R FXUVRU SDUD R ¿P GR SDUiJUDIR RQGH GHVHMD TXH D IUDVH DSDUHoD H QR JUXSR ÈUHD GH 7UDQVIHUrQFLD FOLTXH HP &RODU

Dica! 8P DWDOKR GH WHFODGR SDUD UHFRUWDU p &75/ ; H SDUD FRODU p &75/ 9 4XDQGR YRFr FRPHoDU D HGLWDU R GRFXPHQWR FRP IUHTXrQFLD YHUi FRPR HVVH DWDOKR p UiSLGR H FRQYHQLHQWH 2V LWHQV UHFRUWDGRV RX FRSLDGRV SHUPDQHFHP QD ÈUHD GH 7UDQVIHUrQFLD DWp TXH YRFr VDLD GH WRGRV RV SURJUDPDV GR 2I¿FH RX RV H[FOXD FOLFDQGR QR LWHP GHVHMDGR H HP VHJXLGD HP ([FOXLU RX HP /LPSDU WXGR

Didatismo e Conhecimento

95


CONHECIMENTOS DE INFORMÁTICA 2.8 Copiando partes do documento 2V SURFHGLPHQWRV SDUD FRSLDU SDUWHV GH XP GRFXPHQWR VmR SUDWLFDPHQWH RV PHVPRV GH UHFRUWDU $ GLIHUHQoD p TXH R FRQWH~GR VHUi PDQWLGR QD SRVLomR RULJLQDO 6HOHFLRQH R WUHFKR ³REWHQKD DMXGD´

Em seguida, clique em Copiar

QR JUXSR ÈUHD GH 7UDQVIHUrQFLD 2EVHUYH TXH R WUHFKR SHUPDQHFH QR ORFDO GH RULJHP

(P VHJXLGD PRYD R FXUVRU SDUD R ¿P GR SDUiJUDIR RQGH GHVHMD TXH D IUDVH DSDUHoD H QR JUXSR ÈUHD GH 7UDQVIHUrQFLD FOLTXH HP &RODU

2EVHUYH TXH R WH[WR IRL GXSOLFDGR Dica! 8P DWDOKR GH WHFODGR SDUD FRSLDU p &75/ & H SDUD FRODU p &75/ 9 2.9 Utilizando estilos rápidos 1R JUXSR (VWLORV WHPRV D *DOHULD GH (VWLORV 5iSLGRV TXH H[LEH HP PLQLDWXUD GLYHUVDV FRPELQDo}HV GH IRUPDWDomR 4XDQGR YRFr SRVLFLRQDU R SRQWHLUR GR PRXVH VREUH XPD GDV PLQLDWXUDV SRGHUi YHU FRPR R HVWLOR UiSLGR DIHWDUi R WH[WR VHOHFLRQDGR

$EUD R DUTXLYR 3DUWHBSUDWLFD H Gr GRLV (17(5 DSyV SDUD TXH D IUDVH ¿TXH FRPR VH IRVVH XP WtWXOR 6HOHFLRQH D IUDVH como no exemplo abaixo:

Didatismo e Conhecimento

96


CONHECIMENTOS DE INFORMร TICA (P VHJXLGD SRVLFLRQH R PRXVH QRV HVWLORV UiSLGRV H[LVWHQWHV H REVHUYH R UHVXOWDGR 2 HVWLOR XWLOL]DGR QD ยฟJXUD IRL 5HIHUrQFLD LQWHQVD

2 ERWmR $OWHUDU (VWLORV SHUPLWH VHOHFLRQDU HVWLORV UiSLGRV SDUD WRGR R GRFXPHQWR H QmR DSHQDV SDUD D iUHD VHOHFLRQDGD

2.10 Localizando e substituindo textos ,PDJLQH VH HP XP UHODWyULR RX WUDEDOKR GH HVFROD YRFr WLYHVVH TXH SURFXUDU RX VXEVWLWXLU XPD SDODYUD TXH DSDUHFH YH]HV HP GLIHUHQWHV SRQWRV GR WH[WR ,VVR OHYDULD EDVWDQWH WHPSR QmR p PHVPR" 8P UHFXUVR PXLWR ~WLO p R GH ORFDOL]DomR H VXEVWLWXLomR UiSLGD GH XPD SDODYUD RX IUDVH 3DUD LVVR XWLOL]DPRV RV FRPDQGRV GR JUXSR (GLomR GD JXLD ,QtFLR 2.10.1 Localizando texto $EUD R DUTXLYR 3DUWHB3UDWLFD H FRSLH R SDUiJUDIR SHOR PHQRV WUrV YH]HV

Clique no grupo Ediรงรฃo e, em seguida, selecione a opรงรฃo Localizar

Didatismo e Conhecimento

97

2EVHUYH D ยฟJXUD


CONHECIMENTOS DE INFORMÁTICA (P VHJXLGD GLJLWH D SDODYUD ZRUG QD FDL[D GH WH[WR /RFDOL]DU 3DUD ORFDOL]DU FDGD RFRUUrQFLD FOLTXH HP /RFDOL]DU SUy[LPD ( SDUD ORFDOL]DU WRGDV DV RFRUUrQFLDV GH XPD YH] FOLTXH HP /RFDOL]DU HP H HP 'RFXPHQWR SULQFLSDO

3DUD FDQFHODU XPD SHVTXLVD HP DQGDPHQWR SUHVVLRQH (6& 2.10.2 Localizando e realçando um texto na tela 3DUD DMXGi OR D YLVXDOL]DU FDGD RFRUUrQFLD GH XPD SDODYUD RX IUDVH QR GRFXPHQWR p SRVVtYHO SHVTXLVDU WRGDV DV RFRUUrQFLDV H UHDOoi ODV QD WHOD $SHVDU GH R WH[WR HVWDU UHDOoDGR QD WHOD HOH QmR ¿ FD UHDOoDGR TXDQGR R GRFXPHQWR p LPSUHVVR Clique em Edição e, em seguida, selecione a opção Localizar 2EVHUYH TXH D SDODYUD ZRUG já está na caixa de texto Localizar, SRLV R :RUG PDQWpP D ~OWLPD SHVTXLVD IHLWD &OLTXH HP 5HDOFH GH /HLWXUD H HP 5HDOoDU 7XGR

3DUD GHVDWLYDU R UHDOFH QD WHOD FOLTXH HP 5HDOFH GH /HLWXUD H HP /LPSDU 5HDOFH 2.10.3 Localizando e substituindo texto e SRVVtYHO VXEVWLWXLU DXWRPDWLFDPHQWH XPD SDODYUD RX IUDVH SRU RXWUD 3RU H[HPSOR p SRVVtYHO VXEVWLWXLU :RUG SRU ([FHO Observação: O texto de substituição usará a mesma capitalização que o texto a ser substituído, ou seja, se você pesquisar por :25' H VXEVWLWXt OR SRU ([FHO R UHVXOWDGR VHUi (;&(/ Clique em Edição e, em seguida, selecione a opção Substituir 2EVHUYH QD ¿JXUD DEDL[R TXH D FDL[D GH GLiORJR apresentada é muito semelhante à anterior:

1D FDL[D GH GLiORJR /RFDOL]DU GLJLWH R WH[WR TXH GHVHMD SHVTXLVDU H QD FDL[D 6XEVWLWXLU SRU GLJLWH R WH[WR GH VXEVWLWXLomR

Didatismo e Conhecimento

98


CONHECIMENTOS DE INFORMÁTICA

3DUD ORFDOL]DU D SUy[LPD RFRUUrQFLD GR WH[WR FOLTXH HP /RFDOL]DU 3Uy[LPD &DVR TXHLUD VXEVWLWXt OD FOLTXH HP 6XEVWLWXLU $R FOLFDU HP 6XEVWLWXLU R FXUVRU LUi SDUD D SUy[LPD RFRUUrQFLD GR WH[WR 3DUD VXEVWLWXLU WRGDV DV RFRUUrQFLDV FOLTXH HP 6XEVWLWXLU 7XGR Dica! 'LJLWH VHPSUH R WH[WR GH VXEVWLWXLomR HP PLQ~VFXOR SRLV HOH DVVXPLUi D FDSLWDOL]DomR GR WH[WR D VHU VXEVWLWXtGR ,QGR SDUD XP SRQWR HVSHFt¿FR GR GRFXPHQWR Ao clicar nas opções Localizar ou Substituir , você terá acesso à guia Ir para, que, como o título sugere, permite a você ir GLUHWDPHQWH D XP SRQWR GR GRFXPHQWR TXH SRGH VHU XPD 3iJLQD 6HomR /LQKD HWF

2.10.5 Selecionando textos, objetos e formatações 1R JUXSR (GLomR DLQGD WHPRV D RSomR 6HOHFLRQDU ¿ JXUD TXH SHUPLWH 6HOHFLRQDU 7XGR VHOHFLRQD WRGR R GRFXPHQWR 6HOHFLRQDU 2EMHWRV LPDJHQV JUi¿FRV HWF H 6HOHFLRQDU WH[WR FRP IRUPDWDomR VHPHOKDQWH PHVPD IRQWH FRU WDPDQKR HWF

3DUD VHOHFLRQDU WH[WR FRP IRUPDWDomR VHPHOKDQWH VHOHFLRQH XPD GDV RFRUUrQFLDV FRP D IRUPDWDomR GHVHMDGD H FOLTXH QD RSomR FRUUHVSRQGHQWH 2.11 Revisando o texto $VVLP TXH XP GRFXPHQWR p ¿QDOL]DGR ID]HU XPD ERD UHYLVmR p HVVHQFLDO 3DUD LVVR SRGH VH XWLOL]DU D JXLD 5HYLVmR FRPSRVWD pelos seguintes grupos:

Didatismo e Conhecimento

99


CONHECIMENTOS DE INFORMĂ TICA ‡ 5HYLVmR GH 7H[WR Âą 3HUPLWH YHUL Âż FDU HUURV RUWRJUi Âż FRV H JUDPDWLFDLV SHVTXLVDU HP GLFLRQiULRV WUDGX]LU R WH[WR SDUD RXWURV LGLRPDV H DLQGD FRQWDU DV SDODYUDV GR GRFXPHQWR ‡ &RPHQWiULRV Âą 3HUPLWH LQVHULU LQIRUPDo}HV LPSUHVVDV RX QmR QR GRFXPHQWR FRP R REMHWLYR GH HVFODUHFHU SRVVtYHLV G~YLGDV TXDQWR DR FRQWH~GR ‡ &RQWUROH H $OWHUDo}HV Âą 3RVVLELOLWDP DR UHYLVRU GR WH[WR VLQDOL]DU GH IRUPD VLPSOHV H SUiWLFD DV iUHDV GR GRFXPHQWR TXH IRUDP DOWHUDGDV ‡ &RPSDUDU Âą &RPSDUD GXDV YHUV}HV GR PHVPR GRFXPHQWR RX FRPELQD YHUV}HV GH YiULRV DXWRUHV HP XP ~QLFR GRFXPHQWR ‡ 3URWHJHU Âą 5HVWULQJH D IRUPDWDomR H D HGLomR GR GRFXPHQWR SRU SDUWH GH RXWURV XVXiULRV R DFHVVR D DOWHUDo}HV QR GRFXPHQWR D SHVVRDV HVSHFtÂżFDV H D DGLomR GH FRPHQWiULRV PDV VHP DOWHUDo}HV VLJQLÂżFDWLYDV 9HULÂżFDQGR H FRUULJLQGR RUWRJUDÂżD H JUDPiWLFD 3RU SDGUmR DXWRPDWLFDPHQWH R :RUG YHULÂżFD D RUWRJUDÂżD H D JUDPiWLFD HQTXDQWR R WH[WR p GLJLWDGR ,VVR HYLWD TXH WHQKDPRV TXH ID]HU XPD UHYLVmR ÂżQDO DQWHV GH HQWUHJDU R GRFXPHQWR D VHX GHVWLQDWiULR 3RUpP QHP VHPSUH R TXH R :RUG LGHQWLÂżFD FRPR HUUR RUWRJUiÂżFR RX JUDPDWLFDO HVWi UHDOPHQWH HUUDGR 3RU HVVD UD]mR YRFr SRGH DFHLWDU RX QmR D PXGDQoD VXJHULGD 'LJLWH R DUTXLYR Âł6RQHWRBGHB)LGHOLGDGH´ De tudo ao meu amor serei atento Antes, e com tal zelo, e sempre, e tanto Que mesmo em face do maior encanto 'HOH VH HQFDQWH PDLV PHX SHQVDPHQWX Quero vivĂŞ-lo em cada vĂŁo momento E em seu louvor hei de espalhar meu canto E rir meu riso e derramar meu pranto Ao seu pesar ou seu contentamento E assim, quando mais tarde me procure Quem sabe a morte, angĂşstia de quem vive 4XHP VDEH D VROLGmR ÂżP GH TXHP DPD Eu possa me dizer do amor (que tive): Que nĂŁo seja imortal, posto que ĂŠ chama 0DV TXH VHMD LQ Âż QLWR HQTXDQWR GXUH Soneto de Fidelidade 9LQLFLXV GH 0RUDHV Âł$QWRORJLD 3RpWLFD´ (GLWRUD GR $XWRU 5LR GH -DQHLUR SiJ 2EVHUYH TXH D SDODYUD SHQVDPHQWR HVWi HVFULWD GH IRUPD HUUDGD H VH HQFRQWUD VXEOLQKDGD HP YHUPHOKR ,VVR LQGLFD SUREOHPD RUWRJUiÂżFR -i D SDODYUD FDGD HVWi VXEOLQKDGD HP YHUGH R TXH LQGLFD SUREOHPD JUDPDWLFDO &OLTXH QR ERWmR 2UWRJUDÂżD H *UDPiWLFD VHUi YLVXDOL]DGD XPD WHOD VHPHOKDQWH j GD ÂżJXUD DEDL[R

A palavra que o Word entende como grafada erroneamente aparecerĂĄ destacada em vermelho e, na caixa SugestĂľes, serĂŁo DSUHVHQWDGDV RSo}HV SDUD FRUULJL OD (VFROKD D TXH PHOKRU VH DMXVWD DR WH[WR H FOLTXH HP $OWHUDU 9RFr DLQGD SRGHUi FOLFDU HP

Didatismo e Conhecimento

100


CONHECIMENTOS DE INFORMร TICA

2 GLFLRQiULR SDGUmR XWLOL]DGR SDUD D YHULยฟFDomR p R 3RUWXJXrV %UDVLO &RQWXGR HOH SRGHUi VHU DOWHUDGR FOLFDQGR VH QD FDL[D GH RSo}HV ,GLRPD GR GLFLRQiULR 2.11.2 Utilizando o dicionรกrio de sinรดnimos 2 :RUG SRVVXL XPD OLVWD GH VLQ{QLPRV SDUD YiULDV SDODYUDV (VVH p XP UHFXUVR PXLWR ~WLO TXDQGR SUHFLVDPRV XWLOL]DU XPD SDODYUD YiULDV YH]HV QR WH[WR Depois de selecionar a palavra, dรช um clique em Dicionรกrio de Sinรดnimos 3RU H[HPSOR YDPRV YHU TXDLV VmR RV VLQ{QLPRV TXH R :RUG DSUHVHQWD SDUD D SDODYUD ยณPXLWRยด

$SyV ORFDOL]DU D SDODYUD PDLV DGHTXDGD DR FRQWH[WR GH VHX GRFXPHQWR FOLTXH QD VHWD TXH DEUH D FDL[D GH GLiORJR DR ODGR GD SDODYUD

Didatismo e Conhecimento

101


CONHECIMENTOS DE INFORMÁTICA As opções são as seguintes:

9RFr SRGH FOLFDU FRP R ERWmR GLUHLWR GR PRXVH VREUH XPD SDODYUD SDUD FRUULJL OD RX SDUD EXVFDU XP VLQ{QLPR SDUD HOD

Didatismo e Conhecimento

102


CONHECIMENTOS DE INFORMร TICA As demais opรงรตes do grupo Revisรฃo de Texto sรฃo as seguintes:

Tabelas $V WDEHODV VmR FRP FHUWH]D XP GRV HOHPHQWRV PDLV LPSRUWDQWHV SDUD FRORFDU GDGRV HP VHX GRFXPHQWR 8VH WDEHODV SDUD RUJDQL]DU LQIRUPDo}HV H FULDU IRUPDV GH SiJLQDV LQWHUHVVDQWHV H GLVSRQLELOL]DU VHXV GDGRV 3DUD LQVHULU XPD WDEHOD QD $%$ ,QVHULU FOLTXH QR ERWmR 7DEHOD

$R FOLFDU QR ERWmR GH 7DEHOD YRFr SRGH GHยฟQLU D TXDQWLGDGH GH OLQKDV H FROXQDV SRGH FOLFDU QR LWHP ,QVHULU 7DEHOD RX 'HVHQKDU a Tabela, Inserir uma planilha do Excel ou usar uma Tabela Rรกpida que nada mais sรฃo do que tabelas prontas onde serรก somente QHFHVViULR DOWHUDU R FRQWH~GR

Didatismo e Conhecimento

103


CONHECIMENTOS DE INFORMÁTICA Você pode criar facilmente uma tabela mais complexa, por exemplo, que contenha células de diferentes alturas ou um número YDULiYHO GH FROXQDV SRU OLQKD VHPHOKDQWH j PDQHLUD FRPR YRFr XVD XPD FDQHWD SDUD GHVHQKDU XPD WDEHOD $R GHVHQKDU D FDL[D TXH fará parte da tabela, você pode utilizar o topo Ferramentas de Tabela.

$WUDYpV GR JUXSR 2So}HV GH (VWLOR GH 7DEHOD p SRVVtYHO GH¿QLU FpOXODV GH FDEHoDOKR 2 JUXSR (VWLORV GH 7DEHOD SHUPLWH DSOLFDU XPD IRUPDWDomR D VXD WDEHOD H R JUXSR 'HVHQKDU %RUGDV SHUPLWH GH¿QLU R HVWLOR HVSHVVXUD H FRU GD OLQKD 2 ERWmR 'HVHQKDU 7DEHOD WUDQVIRUPD VHX FXUVRU HP XP OiSLV SDUD GHVHQKDU DV FpOXODV GH VXD WDEHOD H R ERWmR %RUUDFKD DSDJD DV OLQKDV GD WDEHOD 9RFr SRGH REVHUYDU WDPEpP TXH DR HVWDU FRP DOJXPD FpOXOD GD WDEHOD FRP R FXUVRU R :RUG DFUHVFHQWD PDLV XPD $%$ DR ¿QDO FKDPDGD /D\RXW FOLTXH VREUH HVVD $%$

2 SULPHLUR JUXSR 7DEHOD SHUPLWH VHOHFLRQDU HP VXD WDEHOD DSHQDV XPD FpOXOD XPD OLQKD XPD FROXQD RX WRGD D WDEHOD

$R FOLFDU QD RSomR 3URSULHGDGHV VHUi DEHUWR XPD MDQHOD FRP DV SURSULHGDGHV GD MDQHOD

1HVWD MDQHOD H[LVWHP TXDWUR *XLDV $ SULPHLUD p UHODWLYD j WDEHOD SRGH VH GH¿QLU D ODUJXUD GD WDEHOD R DOLQKDPHQWR H D TXHEUD GR WH[WR QD WDEHOD $R FOLFDU QR ERWmR %RUGDV H 6RPEUHDPHQWR DEUH VH D MDQHOD GH ERUGDV H VRPEUHDPHQWR HVWXGDGD DQWHULRUPHQWH $R FOLFDU HP 2So}HV p SRVVtYHO GH¿QLU DV PDUJHQV GDV FpOXODV H R HVSDoDPHQWR HQWUH DV FpOXODV

Didatismo e Conhecimento

104


CONHECIMENTOS DE INFORMÁTICA

2 VHJXQGR JUXSR p R /LQKDV H &ROXQDV SHUPLWH DGLFLRQDU H UHPRYHU OLQKDV H FROXQDV GH VXD WDEHOD

$R FOLFDU QD )DL[D GHVWH JUXSR HOH DEUH XPD MDQHOD RQGH p SRVVtYHO GHVORFDU FpOXODV LQVHULU OLQKDV H FROXQDV 2 WHUFHLUR JUXSR p UHIHUHQWH j GLYLVmR H PHVFODJHP GH FpOXODV

$ RSomR 0HVFODU &pOXODV VRPHQWH HVWDUi GLVSRQtYHO VH YRFr VHOHFLRQDU GXDV RX PDLV FpOXODV (VVH FRPDQGR SHUPLWH ID]HU FRP TXH DV FpOXODV VHOHFLRQDGDV WRUQHP VH XPD Vy

$ RSomR GLYLGLU FpOXODV SHUPLWH GLYLGLU XPD FpOXOD $R FOLFDU QHVVD RSomR VHUi PRVWUDGD XPD MDQHOD RQGH YRFr GHYH GH¿QLU HP TXDQWDV OLQKDV H FROXQDV D FpOXOD VHUi GLYLGLGD

$ RSomR GLYLGLU WDEHOD LQVHUH XP SDUiJUDIR DFLPD GD FpOXOD TXH R FXUVRU HVWi GLYLGLQGR D WDEHOD 2 JUXSR 7DPDQKR GD &pOXOD SHUPLWH GH¿QLU D ODUJXUD H DOWXUD GD FpOXOD $ RSomR $XWR$MXVWH WHP D IXQomR GH DMXVWDU VXD FpOXOD GH DFRUGR FRP R FRQWH~GR GHQWUR GHOD

Didatismo e Conhecimento

105


CONHECIMENTOS DE INFORMĂ TICA

2 JUXSR $OLQKDPHQWR SHUPLWH GHÂżQLU R DOLQKDPHQWR GR FRQWH~GR GD WDEHOD 2 ERWmR 'LUHomR GR 7H[WR SHUPLWH PXGDU D GLUHomR GH VHX WH[WR $ RSomR 0DUJHQV GD &pOXOD SHUPLWH DOWHUDU DV PDUJHQV GDV FpOXODV FRPR YLPRV DQWHULRUPHQWH

2 JUXSR 'DGRV SHUPLWH FODVVLÂżFDU FULDU FiOFXORV HWF HP VXD WDEHOD

$ RSomR FODVVLÂżFDU FRPR R SUySULR QRPH GL] SHUPLWH FODVVLÂżFDU RV GDGRV GH VXD WDEHOD

Ele abre a seguinte janela e coloca sua primeira linha como a linha de cabeçalho, você pode colocar atÊ três colunas como FULWpULRV GH FODVVL¿FDomR 2 ERWmR &RQYHUWHU HP 7H[WR SHUPLWH WUDQVIRUPDU VXD WDEHOD HP WH[WRV QRUPDO $ RSomR IyUPXOD SHUPLWH ID]HU FiOFXORV QD WDEHOD Cabeçalho e RodapÊ 2 :RUG VHPSUH UHVHUYD XPD SDUWH GDV PDUJHQV SDUD R FDEHoDOKR H URGDSp 3DUD DFHVVDU DV RSo}HV GH FDEHoDOKR H URGDSp FOLTXH QD $%$ ,QVHULU *UXSR &DEHoDOKR H 5RGDSp

(OH p FRPSRVWR GH WUrV RSo}HV &DEHoDOKR 5RGDSp H 1~PHUR GH 3iJLQD

Didatismo e Conhecimento

106


CONHECIMENTOS DE INFORMÁTICA

$R FOLFDU HP &DEHoDOKR R :RUG GLVSRQLELOL]D DOJXPDV RSo}HV GH FDL[DV SDUD TXH YRFr SRVVD GLJLWDU VHX WH[WR $R FOLFDU HP (GLWDU &DEHoDOKR R :RUG HGLWD D iUHD GH FDEHoDOKR H D EDUUD VXSHULRU SDVVD D WHU FRPDQGRV SDUD DOWHUDomR GR FDEHoDOKR

$ iUHD GR FDEHoDOKR p H[LELGD HP XP UHWkQJXOR SRQWLOKDGR R UHVWDQWH GR GRFXPHQWR ¿FD HP VHJXQGR SODQR 7XGR R TXH IRU LQVHULGR QR FDEHoDOKR VHUi PRVWUDGR HP WRGDV DV SiJLQDV FRP H[FHomR VH YRFr GH¿QLX VHo}HV GLIHUHQWHV QDV SiJLQDV

3DUD DSOLFDU Q~PHURV GH SiJLQDV DXWRPDWLFDPHQWH HP VHX FDEHoDOKR EDVWD FOLFDU HP 1~PHURV GH 3iJLQD DSHQDV WRPH R FXLGDGR GH HVFROKHU ,QLFLR GD 3iJLQD VH RSWDU SRU )LP GD 3iJLQD HOH DSOLFDUi R Q~PHUR GD SiJLQD QR URGDSp 3RGHPRV WDPEpP DSOLFDU FDEHoDOKRV H URGDSpV GLIHUHQWHV D XP GRFXPHQWR SDUD LVVR EDVWD TXH DPERV HVWHMDP HP VHo}HV GLIHUHQWHV GR GRFXPHQWR 2 FXLGDGR p DR DSOLFDU R FDEHoDOKR RX R URGDSp GHVPDUFDU D RSomR 9LQFXODU DR DQWHULRU 2 IXQFLRQDPHQWR SDUD R URGDSp p R PHVPR SDUD R FDEHoDOKR DSHQDV GHYH VH FOLFDU QR ERWmR 5RGDSp Didatismo e Conhecimento

107


CONHECIMENTOS DE INFORMÁTICA

Data e Hora 2 :RUG 3HUPLWH TXH YRFr SRVVD DGLFLRQDU XP FDPSR GH 'DWD H +RUD HP VHX WH[WR GHQWUR GD $%$ ,QVHULU QR JUXSR 7H[WR WHPRV R ERWmR 'DWD H +RUD

%DVWD HVFROKHU R IRUPDWR D VHU DSOLFDGR H FOLFDU HP 2. 6H SUHFLVDU TXH HVVH FDPSR VHPSUH DWXDOL]H GDWD PDUTXH D RSomR $WXDOL]DU DXWRPDWLFDPHQWH ,QVHULQGR (OHPHQWRV *Ui¿FRV 2 :RUG SHUPLWH TXH VH LQVLUD HP VHXV GRFXPHQWRV DUTXLYRV JUi¿FRV FRPR ,PDJHP &OLS DUW )RUPDV HWF DV RSo}HV GH LQVHUomR HVWmR GLVSRQtYHLV QD $%$ ,QVHULU

Imagens 2 SULPHLUR HOHPHQWR JUi¿FR TXH WHPRV p R HOHPHQWR ,PDJHP 3DUD LQVHULU XPD LPDJHP FOLTXH QR ERWmR FRP R PHVPR QRPH QR JUXSR ,OXVWUDo}HV QD $%$ ,QVHULU 1D MDQHOD TXH VH DEUH ORFDOL]H R DUTXLYR GH LPDJHP HP VHX FRPSXWDGRU

Didatismo e Conhecimento

108


CONHECIMENTOS DE INFORMĂ TICA $ LPDJHP VHUi LQVHULGD QR ORFDO RQGH HVWDYD VHX FXUVRU 2 TXH VHUi HQVLQDGR DJRUD p SUDWLFDPHQWH LJXDO SDUD WRGR RV HOHPHQWRV JUiÂżFRV TXH p D PDQLSXODomR GRV HOHPHQWRV JUiÂżFRV Ao inserir a imagem ĂŠ possĂ­vel observar que a mesma enquanto selecionada possui uma caixa pontilhadas em sua volta, para mover a imagem de local, basta clicar sobre ela e arrastar para o local desejado, se precisar redimensionar a imagem, basta clicar em XP GRV SHTXHQRV TXDGUDGRV HP VXDV H[WUHPLGDGHV TXH VmR FKDPDGRV SRU $OoDV GH UHGLPHQVLRQDPHQWR 3DUD VDLU GD VHOHomR GD LPDJHP EDVWD DSHQDV FOLFDU HP TXDOTXHU RXWUD SDUWH GR WH[WR $R FOLFDU VREUH D LPDJHP D EDUUD VXSHULRU PRVWUD DV FRQÂżJXUDo}HV GH PDQLSXODomR GD LPDJHP

O primeiro grupo Ê o Ajustar, dentre as opçþes temos Brilho e Contraste, que permite clarear ou escurecer a imagem e adicionar RX UHPRYHU R FRQWUDVWH 3RGHPRV UHFRORULU D LPDJHP

Entre as opçþes de recolorir podemos colocar nossa imagem em tons de cinza, preto e branco, desbotar a imagem e remover uma FRU GD LPDJHP (VWH UHFXUVR SHUPLWH GH¿QLU XPD LPDJHP FRP IXQGR WUDQVSDUHQWH $ RSomR &RPSDFWDU ,PDJHQV SHUPLWH GHL[DU VXD LPDJHP PDLV DGHTXDGD DR HGLWRU GH WH[WRV $R FOLFDU QHVWD RSomR R :RUG PRVWUD D VHJXLQWH MDQHOD

3RGH VH DSOLFDU D FRPSDFWDomR D LPDJHP VHOHFLRQDGD RX D WRGDV DV LPDJHQV GR WH[WR 3RGHPRV DOWHUDU D UHVROXomR GD LPDJHP $ RSomR 5HGHÂżQLU ,PDJHP UHWRUQD D LPDJHP DR VHX HVWDGR LQLFLDO DEDQGRQDQGR WRGDV DV DOWHUDo}HV IHLWDV 2 SUy[LPR JUXSR FKDPD VH 6RPEUD FRPR R SUySULR QRPH GL] SHUPLWH DGLFLRQDU XPD VRPEUD D LPDJHP TXH IRL LQVHULGD

1R ERWmR (IHLWRV GH 6RPEUD YRFr SRGHUi HVFROKHU DOJXPDV SRVLo}HV GH VRPEUD 3URMHWDGD 3HUVSHFWLYD H FRU GD VRPEUD $R ODGR GHVWH ERWmR p SRVVtYHO GHÂżQLU D SRVLomR GD VRPEUD H QR PHLR D RSomR GH DWLYDU H GHVDWLYDU D VRPEUD 1R JUXSR 2UJDQL]DU p SRVVtYHO GHÂżQLU D SRVLomR GD LPDJHP HP UHODomR DR WH[WR

Didatismo e Conhecimento

109


CONHECIMENTOS DE INFORMร TICA

2 SULPHLUR GRV ERW}HV p D 3RVLomR HOD SHUPLWH GHยฟQLU HP TXDO SRVLomR D LPDJHP GHYHUi ยฟFDU HP UHODomR DR WH[WR

Ao clicar na opรงรฃo Mais Opรงรตes de Layout abre-se a janela Layout Avanรงado que permite trabalhar a disposiรงรฃo da imagem em UHODomR DR EORFR GH WH[WR QR TXDO HOD HVWD LQVHULGD (VVDV PHVPDV RSo}HV HVWmR GLVSRQtYHLV QD RSomR 4XHEUD $XWRPiWLFD GH 7H[WR QHVVH PHVPR JUXSR $R FRORFDU D VXD LPDJHP HP XPD GLVSRVLomR FRP R WH[WR รฉ KDELOLWDGR DOJXQV UHFXUVRV GD EDUUD GH LPDJHQV &RPR ERUGDV

Atravรฉs deste grupo รฉ possรญvel acrescentar bordas a sua imagem E no grupo Organizar ele habilita as opรงรตes de Trazer para )UHQWH (QYLDU SDUD 7UiV H $OLQKDU $R FOLFDU QR ERWmR 7UD]HU SDUD )UHQWH HOH DEUH WUrV RSo}HV 7UD]HU SDUD )UHQWH H $YDQoDU VmR XWLOL]DGDV TXDQGR KRXYHU GXDV RX PDLV LPDJHQV H YRFr SUHFLVD PXGDU R HPSLOKDPHQWR GHODV $ RSomR 7UD]HU SDUD )UHQWH GR 7H[WR ID] FRP TXH D LPDJHP ร XWXH VREUH R 7H[WR $R WHU PDLV GH XPD LPDJHP H DR VHOHFLRQDU DV LPDJHQV 8WLOL]H D WHFOD 6+,)7 YRFr SRGHUi DOLQKDU DV VXDV LPDJHQV

Didatismo e Conhecimento

110


CONHECIMENTOS DE INFORMÁTICA

2 ~OWLPR JUXSR p UHIHUHQWH jV GLPHQV}HV GD LPDJHP

1HVWH JUXSR YRFr SRGH FRUWDU D VXD LPDJHP RX UHGLPHQVLRQDU D LPDJHP GH¿QLQGR /DUJXUD H $OWXUD 2V FRPDQGRV YLVWRV DWp R PRPHQWR HVWDYDP GLVSRQtYHLV GD VHJXLQWH IRUPD SRLV QRVVR GRFXPHQWR HVWD VDOYR HP '2& ± YHUVmR FRPSDWtYHO FRP 2I¿FH ;3 H $R VDOYDU R GRFXPHQWR HP '2&; FRPSDWtYHO VRPHQWH FRP D YHUVmR DFRQWHFHP DOJXPDV DOWHUDo}HV QD EDUUD GH LPDJHQV

1R JUXSR $MXVWDU Mi WHPRV DOJXPDV DOWHUDo}HV DR FOLFDU QR LWHP &RU (P HVWLORV GH LPDJHP SRGHPRV GH¿QLU ERUGDV H VRPEUHDPHQWRV SDUD D LPDJHP

Didatismo e Conhecimento

111


CONHECIMENTOS DE INFORMÁTICA 3RGHPRV DSOLFDU WDPEpP RV (IHLWRV GH ,PDJHP

Clip Art &OLS $UW VmR LPDJHQV SRUpP VmR LPDJHQV TXH ID]HP SDUWH GR SDFRWH 2I¿FH 3DUD LQVHULU XP FOLSDUW EDVWD SHOD $%$ ,QVHULU FOLFDU QD RSomR &OLS $UW 1D GLUHLWD GD WHOD DEUH VH D RSomR GH FRQVXOWD DRV FOLS $UW

&OLTXH VREUH D LPDJHP D VHU DGLFLRQDGD DR VHX WH[WR FRP R ERWmR GLUHLWR H HVFROKD &RSLDU &75/ & &OLTXH HP VHX WH[WR RQGH R &OLS $UW GHYH VHU DGLFLRQDGR H FOLTXH HP &RODU &75/ 9 $V FRQ¿JXUDo}HV GH PDQLSXODomR GR FOLS DUW VmR DV PHVPDV GDV LPDJHQV Formas 3RGHPRV WDPEpP DGLFLRQDU IRUPDV DR QRVVR FRQWH~GR GR WH[WR

Didatismo e Conhecimento

112


CONHECIMENTOS DE INFORMÁTICA

3DUD GHVHQKDU XPD IRUPD R SURFHVVR p VLPSOHV EDVWD FOLFDU QD IRUPD GHVHMDGD H DUUDVWDU R PRXVH QD WHOD SDUD GH¿QLU DV VXDV GLPHQV}HV $R GHVHQKDU D VXD IRUPD D EDUUD SDVVD D WHU DV SURSULHGDGH SDUD PRGL¿FDU D IRUPD

2 SULPHLUR JUXSR FKDPD VH ,QVHULU )RUPD HOH SRVVXL D IHUUDPHQWD GH ,QVHULU XPD IRUPD $R ODGR WHPRV D IHUUDPHQWD (GLWDU )RUPD HVVD IHUUDPHQWD SHUPLWH WUDEDOKDU RV QyV GD IRUPD ± $OJXPDV IRUPDV EORTXHLDP D XWLOL]DomR GHVVD IHUUDPHQWD $EDL[R GHOD WHPRV D IHUUDPHQWD GH FDL[D GH WH[WR TXH SHUPLWH DGLFLRQDU XPD FDL[D GH WH[WR DR VHX GRFXPHQWR (VWDQGR FRP XPD IRUPD IHFKDGD SRGHPRV WUDQVIRUPDU HVVD IRUPD HP XPD FDL[D GH WH[WR $R ODGR WHPRV R *UXSR (VWLORV GH )RUPD

2V SULPHLURV ERW}HV SHUPLWHP DSOLFDU XP HVWLOR D VXD IRUPD

Didatismo e Conhecimento

113


CONHECIMENTOS DE INFORMÁTICA

$LQGD QHVVH JUXSR WHPRV D RSomR GH WUDEDOKDUPRV DV FRUHV FRQWRUQR H DOWHUDU D IRUPD

$ RSomR ,PDJHP SUHHQFKH VXD IRUPD FRP DOJXPD LPDJHP $ RSomR *UDGDomR SHUPLWH DSOLFDU WRQV GH JUDGLHQWH HP VXD IRUPD

$R FOLFDU HP 0DLV *UDGDo}HV VHUi SRVVtYHO SHUVRQDOL]DU D IRUPD FRPR VHUi R SUHHQFKLPHQWR GR JUDGLHQWH

Didatismo e Conhecimento

114


CONHECIMENTOS DE INFORMÁTICA

1D JXLD JUDGLHQWH WHPRV DV RSo}HV GH 8PD FRU 'XDV FRUHV H 3Up GH¿QLGDV $R HVFROKHU XPD FRU YRFr SRGH HVFROKHU D FRU D VHU DSOLFDGD VH TXHU HOD PDLV SDUD R FODUR RX HVFXUR SRGH GH¿QLU D WUDQVSDUrQFLD GR JUDGLHQWH H FRPR VHUi R VRPEUHDPHQWR

$R FOLFDU QD RSomR 'XDV &RUHV YRFr SRGH GH¿QLU D FRU H FRU R QtYHO GH WUDQVSDUrQFLD H R VRPEUHDPHQWR

Didatismo e Conhecimento

115


CONHECIMENTOS DE INFORMÁTICA $R FOLFDU HP 3Up GH¿QLGDV R 2I¿FH SRVVXL DOJXPDV FRUHV GH SUHHQFKLPHQWR SURQWDV

$ *XLD 7H[WXUD SHUPLWH DSOLFDU LPDJHQV FRPR WH[WXUDV DR SUHHQFKLPHQWR D JXLD 3DGUmR SHUPLWH DSOLFDU SDGU}HV GH SUHHQFKLPHQWR H LPDJHP SHUPLWH DSOLFDU XPD LPDJHP $SyV R JUXSR (VWLORV GH )RUPD WHPRV R JUXSR VRPEUD H DSyV HOH R JUXSR (IHLWRV '

3RGHPRV DSOLFDU HIHLWRV WULGLPHQVLRQDLV HP QRVVDV IRUPDV $OpP GH DSOLFDU R HIHLWRV SRGHPRV PXGDU D FRU GR ' DOWHUDU D SURIXQGLGDGH D GLUHomR OXPLQRVLGDGH H VXSHUItFLH $V GHPDLV RSo}HV GD )RUPD VmR LGrQWLFDV DV GDV LPDJHQV SmartArt 2 6PDUW$UW SHUPLWH DR YRFr DGLFLRQDU 2UJDQRJUDPDV DR VHX GRFXPHQWR 6H YRFr HVWLYHU XVDQGR R 2I¿FH RX VHX GRFXPHQWR estiver salvo em DOC, ao clicar nesse botão, ele habilita a seguinte janela:

Didatismo e Conhecimento

116


CONHECIMENTOS DE INFORMร TICA

%DVWD VHOHFLRQDU R WLSR GH RUJDQRJUDPD D VHU WUDEDOKDGR H FOLTXH HP 2. 3RUpP VH R IRUPDWR GH VHX GRFXPHQWR IRU '2&; D janela a ser mostrada serรก:

(P KLHUDUTXLD HVFROKD R SULPHLUR GD VHJXQGD OLQKD H FOLTXH HP 2.

$OWHUH RV WH[WRV FRQIRUPH D VXD QHFHVVLGDGH $R FOLFDU QR WRSR HP )HUUDPHQWDV 6PDUW$UW VHUmR PRVWUDGDV DV RSo}HV GH DOWHUDomR GR REMHWR

Didatismo e Conhecimento

117


CONHECIMENTOS DE INFORMĂ TICA 2 SULPHLUR ERWmR p R GH $GLFLRQDU XPD IRUPD %DVWD FOLFDU HP XP ERWmR GR PHVPR QtYHO GR TXH VHUi FULDGR H FOLFDU QHVWH ERWmR 2XWUD IRUPD GH VH FULDU QRYDV FDL[DV GHQWUR GH XP PHVPR QtYHO p DR WHUPLQDU GH GLJLWDU R WH[WR SUHVVLRQDU (17(5 $LQGD QR JUXSR &ULDU *UiÂżFR WHPRV RV ERW}HV GH (OHYDU 5HEDL[DU TXH SHUPLWH PXGDU R QtYHO KLHUiUTXLFR GH QRVVR RUJDQRJUDPD 1R JUXSR /D\RXW SRGHPRV PXGDU D GLVSRVLomR GH QRVVR RUJDQRJUDPD 2 SUy[LPR JUXSR p R (VWLORV GH 6PDUW$UW TXH SHUPLWH PXGDU DV FRUHV H R HVWLOR GR RUJDQRJUDPD

EXCEL 2007 2 ([FHO p XP SURJUDPD SDUD HODERUDomR GH SODQLOKD HOHWU{QLFD FRQVWLWXLQGR SRGHURVD IHUUDPHQWD GH DX[tOLR j H[HFXomR GH WUDEDOKRV TXH HQYROYHP FiOFXORV PDWHPiWLFRV Com esse aplicativo, você pode criar uma grande diversidade de documentos, utilizando recursos como fórmulas, atualização DXWRPiWLFD GH UHVXOWDGRV JUi¿FRV HODERUDGRV HP ' H FODVVL¿FDomR SRU YDORUHV SUHHVWDEHOHFLGRV HQWUH PXLWRV RXWURV Nesta versão, o Excel surge com uma nova interface, em que os tradicionais menus de opçþes desaparecem e dão lugar a uma Faixa de Opçþes com diversas guias, onde podemos encontrar, mais facilmente, os comandos necessårios para executar as tarefas TXH QRV SURSRPRV UHDOL]DU 1. Explorando a janela do Excel 1.1. Acessando o Excel +i YiULDV IRUPDV GH DFHVVDU R ([FHO $ PDLV XWLOL]DGD p FOLFDU QR ERWmR ,QLFLDU 7RGRV RV SURJUDPDV 0LFURVRIW 2I¿FH 0LFURVRIW 2I¿FH ([FHO

Didatismo e Conhecimento

118


CONHECIMENTOS DE INFORMÁTICA 1.2. Área de trabalho do Excel /RJR TXH DEULPRV R ([FHO XP GRFXPHQWR p FULDGR DXWRPDWLFDPHQWH FRP R QRPH GH 3DVWD H p YLVXDOL]DGD XPD MDQHOD FRPR D GHPRQVWUDGD QD ¿JXUD

0HQX ± &OLFDQGR VREUH R %RWmR 2I¿FH QR FDQWR VXSHULRU HVTXHUGR GD MDQHOD GR ([FHO DSDUHFHUmR IXQo}HV FRPR 6DOYDU ,PSULPLU H )HFKDU HQWUH RXWUDV TXH VmR DV SULQFLSDLV Do}HV GHVVH DSOLFDWLYR

'R ODGR GLUHLWR GR %RWmR 2I¿FH YRFr SRGHUi SHUVRQDOL]DU D %DUUD GH )HUUDPHQWDV GH $FHVVR 5iSLGR ¿JXUD FOLFDQGR QD Caixa de listagem (lista de opções disponíveis) 3DUD DWLYDU RX GHVDWLYDU XP FRPDQGR EDVWD FOLFDU VREUH HOH

Didatismo e Conhecimento

119


CONHECIMENTOS DE INFORMÁTICA %DUUD GH 7tWXOR ± 0RVWUD R WtWXOR GR SURJUDPD H R QRPH GD SDVWD GH WUDEDOKR TXH HVWi DEHUWD ¿JXUD

Botão Ajuda ± $FHVVD D DMXGD GR 2I¿FH 2QOLQH RX D ORFDO VDOYD QR FRPSXWDGRU &RQWUROH GD -DQHOD ± &RQWUROHV SDUD 0LQLPL]DU DSDUHFH QD EDUUD GH WDUHIDV 0D[LPL]DU ¿FD GR WDPDQKR GD WHOD 5HVWDXUDU SRGH VHU UHGLPHQVLRQDGD FRQIRUPH D QHFHVVLGDGH H )HFKDU IHFKD D MDQHOD 9RFr SRGHUi XWLOL]i ORV SDUD R ([FHO RX SDUD FDGD SDVWD DEHUWD

Faixa de Opções – A Faixa de Opções é o local onde estão os principais comandos do Excel, separados por guias: Início, Inserir, /D\RXW GD 3iJLQD )yUPXODV 'DGRV 5HYLVmR H ([LELomR

&DL[D GH QRPHV ± ([LEH R QRPH GD FpOXOD DWLYD IRUPDGR SHOD OHWUD GD FROXQD H R Q~PHUR GD OLQKD 3RU H[HPSOR $ &DVR YiULDV FpOXODV HVWHMDP VHOHFLRQDGDV VHUi H[LELGR R QRPH GD SULPHLUD

&pOXOD ± ÈUHD GH GDGRV OLPLWDGD SRU OLQKDV H FROXQDV

&pOXOD DWLYD ± &pOXOD TXH UHFHEHUi R FRQWH~GR D VHU GLJLWDGR

/LQKD ± &RQMXQWR GH FpOXODV QD SRVLomR KRUL]RQWDO

&ROXQD ± &RQMXQWR GH FpOXODV QD SRVLomR YHUWLFDO

Didatismo e Conhecimento

120


CONHECIMENTOS DE INFORMĂ TICA

,QWHUYDOR GH FpOXOD Âą 'XDV RX PDLV FpOXODV VHOHFLRQDGDV

Inserir função ¹ ,QVHUH XPD IyUPXOD SUp GHVHQYROYLGD TXH VLPSOL¿FD H UHGX] DV IyUPXODV QD SODQLOKD %DUUD GH IyUPXODV ¹ /RFDO RQGH RV YDORUHV GLJLWDGRV Q~PHURV IyUPXODV H WH[WRV VHUmR YLVXDOL]DGRV H HGLWDGRV

Expandir barra de fĂłrmulas Âą $XPHQWD D YLVXDOL]DomR GD %DUUD GH IyUPXODV (VWi ORFDOL]DGR j GLUHLWD GHOD Divisores de planilha vertical e horizontal – Dividem a planilha vertical ou horizontalmente para facilitar a visualização dos GDGRV (VWmR ORFDOL]DGRV QDV EDUUDV GH URODJHP YHUWLFDO H KRUL]RQWDO UHVSHFWLYDPHQWH %DUUDV GH URODJHP Âą 3HUPLWHP QDYHJDU SHOD SODQLOKD TXDQGR HOD IRU PDLRU TXH D WHOD

%RW}HV GH PRYLPHQWDomR HQWUH SODQLOKDV Âą 3HUPLWHP PRYLPHQWDr-se entre as planilhas que nĂŁo estĂŁo sendo visualizadas na guia GH SODQLOKDV

Didatismo e Conhecimento

121


CONHECIMENTOS DE INFORMĂ TICA

*XLD GH SODQLOKDV Âą ([LEH RV QRPHV GDV SODQLOKDV TXH ID]HP SDUWH GD SDVWD H SHUPLWH LQVHULU QRYDV SODQLOKDV

Barra de status – Mostra informaçþes sobre a planilha atual, tais como se a cĂŠlula estĂĄ sendo editada, se o conteĂşdo estĂĄ pronto HWF )LFD ORFDOL]DGD QD PDUJHP LQIHULRU GD WHOD Modos de exibição – As opçþes de exibição sĂŁo encontradas Ă direita da Barra de status e permitem alterar a visualização da SODQLOKD 6mR DV VHJXLQWHV

1.3. Ajuda Se precisar de ajuda, ĂŠ sĂł clicar no botĂŁo Ajuda , localizado no canto superior direito da janela do Excel, ou pressionar a WHFOD ) $EULU VH i HQWmR XPD MDQHOD FRPR PRVWUD D ÂżJXUD

Didatismo e Conhecimento

122


CONHECIMENTOS DE INFORMÁTICA

Curiosidade! 4XDQGR YRFr DEULU D MDQHOD GH $MXGD R ([FHO WHQWDUi FRQHFWDU VH DXWRPDWLFDPHQWH DR 2I¿FH 2QOLQH ,VVR DFRQWHFH SRLV R FRQWH~GR RQOLQH p PDLV FRPSOHWR H DWXDOL]DGR &RQWXGR VH YRFr TXLVHU XVDU R &RQWH~GR 2IÀLQH LQVWDODGR MXQWR FRP R 2I¿FH VHP D QHFHVVLGDGH GH HVWDU FRQHFWDGR j ,QWHUQHW EDVWD FOLFDU QR ERWmR &RQHFWDGR DR 2I¿FH 2QOLQH H QD RSomR 0RVWUDU FRQWH~GR DSHQDV GHVWH FRPSXWDGRU

Didatismo e Conhecimento

123


CONHECIMENTOS DE INFORMร TICA

1.4. Entendendo melhor o menu do Excel $R FOLFDU QR %RWmR 2IยฟFH , encontraremos as seguintes funรงรตes:

1RYR ยฑ (VVD RSomR DEUH XPD MDQHOD FRPR D LOXVWUDGD QD ยฟJXUD 1HOD YRFr SRGH HVFROKHU XP PRGHOR OD\RXW SDUD R QRYR GRFXPHQWR 2 PRGHOR SDGUmR p 3DVWD GH WUDEDOKR HP EUDQFR

Atenรงรฃo! 8PD SDVWD GH WUDEDOKR GR ([FHO p XP DUTXLYR TXH FRQWpP XPD RX PDLV SODQLOKDV TXH SRGHP VHU XVDGDV SDUD RUJDQL]DU GLYHUVRV WLSRV GH LQIRUPDo}HV UHODFLRQDGDV

Didatismo e Conhecimento

124


CONHECIMENTOS DE INFORMÁTICA Inserindo dados 3RU SDGUmR D SDVWD GH WUDEDOKR p FULDGD FRP WUrV SODQLOKDV &DGD XPD GHODV WHP XP QRPH QD JXLD GH SODQLOKD 3ODQ 3ODQ H 3ODQ 2V GDGRV VmR LQVHULGRV QD SODQLOKD DWLYD 3DUD QDYHJDU HQWUH HODV EDVWD FOLFDU VREUH VHX QRPH 9DPRV LQVHULU DOJXQV GDGRV QD SDVWD FULDGD D VHU XWLOL]DGD SRVWHULRUPHQWH SDUD SUDWLFDUPRV RV GHPDLV FRPDQGRV $R FRPHoDU D GLJLWDU YRFr YHUi R FRQWH~GR QD FpOXOD H QD %DUUD GH IyUPXODV 'LJLWH RV GDGRV H SUHVVLRQH D WHFOD (17(5 SDUD PRYHU R FXUVRU SDUD D FpOXOD DEDL[R RX D WHFOD 7$% SDUD PRYHU R FXUVRU SDUD D FpOXOD j GLUHLWD 6H YRFr SUHVVLRQDU D WHFOD (6& R FRQWH~GR GLJLWDGR VHUi FDQFHODGR

9RFr GHYH WHU REVHUYDGR TXH R FRQWH~GR GD FpOXOD $ ± 3DVWD SROLRQGD ± p PDLRU TXH D ODUJXUD GD FROXQD H ³LQYDGLX´ D FpOXOD % ,VVR DFRQWHFH SRUTXH D FpOXOD % HVWi YD]LD $VVLP TXH HOD IRU SUHHQFKLGD R FRQWH~GR VHUi YLVXDOL]DGR SDUFLDOPHQWH 0DLV DGLDQWH YHUHPRV FRPR UHVROYHU HVVH SUREOHPD Agora, insira mais estes dados:

6DOYDU ± 3DUD VDOYDU JUDYDU XPD SDVWD GH WUDEDOKR FOLTXH QR %RWmR 2I¿FH H HP VHJXLGD HP 6DOYDU 9DOH OHPEUDU TXH D SDVWD GH WUDEDOKR p VDOYD FRP DV DOWHUDo}HV UHDOL]DGDV DWp R PRPHQWR GD DomR GH VDOYDU LVWR p WXGR R TXH YRFr ¿]HU GHSRLV GLVVR QmR HVWDUi VDOYR HQTXDQWR QmR FOLFDU QRYDPHQWH HP 6DOYDU 2 DUTXLYR WHUi D H[WHQVmR [OV[ TXH p LQVHULGD DXWRPDWLFDPHQWH SHOR ([FHO 9DPRV VDOYDU D SDVWD GH WUDEDOKR TXH DFDEDPRV GH FULDU FRP R QRPH GH 3DUWHB3UDWLFD 1mR VH HVTXHoD GH TXH WRGDV DV SODQLOKDV VHUmR VDOYDV H QmR DSHQDV D DWXDO

Didatismo e Conhecimento

125


CONHECIMENTOS DE INFORMร TICA Dicas! 3DUD IDFLOLWDU D EXVFD SRU VHXV DUTXLYRV Ki DOJXPDV GLFDV VREUH D QRPHDomR GHOHV 8VH SDODYUDV FKDYH TXH IDFLOLWHP D PHPRUL]DomR (VFUHYD DV SDODYUDV XVDQGR LQLFLDLV PDL~VFXODV (YLWH SUHSRVLo}HV HQWUH DV SDODYUDV (YLWH DFHQWRV H FHGLOKDV ,QVLUD GDWDV TXDQGR QHFHVViULR ([HPSOR 6H YRFr IRU VDOYDU XP UHODWyULR VHPDQDO GH FXVWRV XP ERP QRPH VHULD 5HO6HP&XVWRVB B0DU 1HVVH FDVR R ยณ B0DUยด p SDUD LGHQWLยฟFDU D TXH VHPDQD R UHODWyULR VH UHIHUH VHP SUHFLVDU DEUL OR e LPSRUWDQWtVVLPR R KiELWR GH PDQWHU R GRFXPHQWR VDOYR (QWUHWDQWR FDVR YRFr VH HVTXHoD GLVVR H SRU DOJXP SUREOHPD R FRPSXWDGRU VH GHVOLJXH LQHVSHUDGDPHQWH RX WUDYH DLQGD Ki R UHFXUVR GD 5HFXSHUDomR DXWRPiWLFD GH DUTXLYRV Como? Recuperaรงรฃo automรกtica de arquivos? 6LP 6HP TXH YRFr QRWH GH WHPSRV HP WHPSRV R ([FHO VDOYD D SDVWD DXWRPDWLFDPHQWH SDUD TXH YRFr QmR FRUUD R ULVFR GH SHUGHU VHX WUDEDOKR $VVLP QD YH] VHJXLQWH HP TXH YRFr DEUL OR DSDUHFHUi XPD MDQHOD FRP D OLVWD GH WRGDV DV SDVWDV UHFXSHUDGDV %DVWD HQWmR FOLFDU QDTXHOD TXH YRFr GHVHMD DEULU 8VDQGR PRGHORV SURQWRV SDUD FULDU SODQLOKDV $ VHJXLU YDPRV YHU DOJXQV PRGHORV GH SODQLOKDV TXH SRGHP VHU IHLWRV FRP R DX[tOLR GR ([FHO 3DUD DFHVVi ORV FOLTXH QR %RWmR 2IยฟFH H HP VHJXLGD QR ERWmR 1RYR $SyV VHOHFLRQDU R PRGHOR GHVHMDGR EDVWD FOLFDU HP %DL[DU

Abrir โ Ao lado dos botรตes do menu, hรก uma รกrea com o tรญtulo Documentos 5HFHQWHV ยฟJXUD 1HVVD iUHD DSDUHFHUmR RV ~OWLPRV GRFXPHQWRV DFHVVDGRV FRP R รญcone QR FDQWR GLUHLWR 3DUD ยฟ[DU XP GRFXPHQWR QD OLVWD GRV PDLV UHFHQWHV EDVWD FOLFDU QHVWH tFRQH TXH DSUHVHQWDUi D seguinte forma: ฤ

Didatismo e Conhecimento

126


CONHECIMENTOS DE INFORMĂ TICA

$R FOLFDU QR ERWmR $EULU DSDUHFHUi XPD MDQHOD 1HOD YRFr GHYH SURFXUDU R DUTXLYR TXH GHVHMD DEULU

$R ORFDOL]DU R DUTXLYR GHVHMDGR FOLTXH HP $EULU 6DOYDU FRPR Âą 3DUD VDOYDU XPD SDVWD GH WUDEDOKR QR ([FHO YRFr GHYH FOLFDU QR %RWmR 2IÂżFH H HP VHJXLGD HP 6DOYDU Se for preciso salvar a pasta de trabalho com outro nome ou em outro local, clique no botĂŁo Salvar como, digite o nome desejado H RX VHOHFLRQH R ORFDO GHVHMDGR +' &' SHQGULYH HWF H FOLTXH HP 6DOYDU

,PSULPLU Âą 3DUD LPSULPLU XPD SODQLOKD p QHFHVViULR WHU XPD LPSUHVVRUD FRQHFWDGD DR FRPSXWDGRU RX D XPD UHGH ORFDO $R FOLFDU QR ERWmR ,PSULPLU DSDUHFHUmR WUrV RSo}HV FRPR YHPRV QD ÂżJXUD

Didatismo e Conhecimento

127


CONHECIMENTOS DE INFORMĂ TICA

‡ $ RSomR ,PSULPLU DEULUi XPD MDQHOD ¿JXUD FRP FRQ¿JXUDo}HV TXH SHUPLWLUmR VHOHFLRQDU D LPSUHVVRUD SODQLOKDV H SiJLQDV D VHUHP LPSUHVVDV Q~PHUR GH FySLDV HWF

‡ $ RSomR ,PSUHVVmR 5iSLGD LPSULPH GLUHWDPHQWH VHP QHQKXPD FRQ¿JXUDomR ‡ $ RSomR 9LVXDOL]DU ,PSUHVVmR SHUPLWH FRQIHULU FRPR ¿FDUi VHX GRFXPHQWR 3DUD YROWDU j YLVXDOL]DomR QRUPDO FOLTXH QR ERWmR )HFKDU 9LVXDOL]DomR GH ,PSUHVVmR

)HFKDU ¹ ([LVWHP YiULDV IRUPDV GH HQFHUUDU R ([FHO 8PD GHODV p FOLFDU QR %RWmR 2I¿FH H QR ERWmR )HFKDU Caso haja alguma alteração em sua pasta de trabalho que não tenha sido salva, aparecerå a seguinte mensagem:

Didatismo e Conhecimento

128


CONHECIMENTOS DE INFORMÁTICA

Dica! $ IRUPD PDLV UiSLGD GH HQFHUUDU R ([FHO p FOLFDU QR FRQWUROH )HFKDU HP VXD MDQHOD /HPEUH VH GH TXH R SULPHLUR FRQWUROH UHIHUH VH DR SURJUDPD H R VHJXQGR j SDVWD GH WUDEDOKR

$ )DL[D GH 2So}HV A Faixa de Opções mostra os comandos mais utilizados agrupados por temas, para Que você não precise procurá-los em vários PHQXV IDFLOLWDQGR R WUDEDOKR

$ VHJXLU DSUHVHQWDPRV D )DL[D GH 2So}HV H FRPR WUDEDOKDU FRP HOD 2 TXH Ki QD )DL[D GH 2So}HV" +i WUrV FRPSRQHQWHV EiVLFRV QD )DL[D GH 2So}HV 9HMD TXDLV VmR H FRPR XWLOL]i ORV

*XLDV ± +i VHWH JXLDV EiVLFDV QD SDUWH VXSHULRU &DGD XPD UHSUHVHQWD XPD iUHD GH DWLYLGDGH H DSUHVHQWD RV FRPDQGRV UHXQLGRV SRU JUXSRV 3RU H[HPSOR D JXLD ,QtFLR FRQWpP WRGRV RV FRPDQGRV TXH YRFr XWLOL]D FRP PDLV IUHTXrQFLD ( RV ERW}HV 5HFRUWDU &RSLDU H &RODU HVWmR QR JUXSR ÈUHD GH WUDQVIHUrQFLD *UXSRV ± &DGD JXLD WHP YiULRV JUXSRV TXH PRVWUDP RV LWHQV UHODFLRQDGRV HP FRQMXQWR &RPDQGRV ± 8P FRPDQGR p XP ERWmR XPD FDL[D SDUD LQVHULU LQIRUPDo}HV RX XP PHQX Dica! $ )DL[D GH 2So}HV IDFLOLWD D ORFDOL]DomR GH WRGDV DV IXQo}HV 1R HQWDQWR YRFr SRGH TXHUHU WUDEDOKDU FRP VHX GRFXPHQWR HP XP HVSDoR PDLRU e SRVVtYHO RFXOWi OD GDQGR XP FOLTXH GXSOR QD JXLD DWLYD 3DUD YHU RV FRPDQGRV QRYDPHQWH EDVWD GDU RXWUR FOLTXH GXSOR HP XPD GDV JXLDV &RQ¿UD DEDL[R RV JUXSRV GH FDGD XPD GDV JXLDV ,QtFLR ± ÈUHD GH WUDQVIHUrQFLD )RQWH $OLQKDPHQWR (VWLOR &pOXODV H (GLomR ,QVHULU ± 7DEHODV ,OXVWUDo}HV *Ui¿FR /LQN H 7H[WR /D\RXW GD 3iJLQD ± 7HPDV &RQ¿JXUDU 3iJLQD 'LPHQVLRQDU SDUD $MXVWDU 2So}HV GH 3ODQLOKD H 2UJDQL]DU )yUPXODV ± %LEOLRWHFD GH IXQo}HV 1RPHV GH¿QLGRV $XGLWRULD GH IyUPXODV H &iOFXOR 'DGRV ± 2EWHU GDGRV H[WHUQRV &RQH[}HV &ODVVL¿FDU H ¿OWUDU )HUUDPHQWDV GH GDGRV H (VWUXWXUD GH WySLFRV 5HYLVmR ± 5HYLVmR GH WH[WR &RPHQWiULRV H $OWHUDo}HV ([LELomR ± 0RGR GH H[LELomR GH SDVWD GH WUDEDOKR 0RVWUDU 2FXOWDU =RRP -DQHOD H 0DFURV $OJXQV JUXSRV WrP XPD VHWD GLDJRQDO QR FDQWR LQIHULRU GLUHLWR FKDPDGD GH ,QLFLDGRU GH &DL[D GH 'LiORJR $R FOLFDU QHOD YRFr YHUi PDLV RSo}HV UHODFLRQDGDV D HVVH JUXSR Didatismo e Conhecimento

129


CONHECIMENTOS DE INFORMĂ TICA *XLDV GH 3ODQLOKD

8P DUTXLYR GR ([FHO DR LQLFLDU FRP WUrV JXLDV GH SODQLOKD HVWDV JXLDV SHUPLWH TXH VH SRVVD HP XP ~QLFR DUTXLYR DUPD]HQDU PDLV GH XPD SODQLOKD LQLFLDOPHQWH R ([FHO SRVVXL WUrV SODQLOKDV H DR ÂżQDO GD 3ODQ WHPRV R tFRQH GH LQVHULU SODQLOKD TXH FULD XPD QRYD SODQLOKD 9RFr SRGH FOLFDU FRP R ERWmR GLUHLWR GR PRXVH HP XPD SODQLOKD H[LVWHQWH SDUD PDQLSXODU DV SODQLOKDV

Na janela que Ê mostrada Ê possível inserir uma nova planilha, excluir uma planilha existente, renomear uma planilha, mover ou FRSLDU HVVD SODQLOKD HWF Movimentação na planilha 3DUD VHOHFLRQDU XPD FpOXOD RX WRUQi OD DWLYD EDVWD PRYLPHQWDU R UHWkQJXOR FXUVRU GH VHOHomR SDUD D SRVLomR GHVHMDGD $ PRYLPHQWDomR SRGHUi VHU IHLWD DWUDYpV GR PRXVH RX WHFODGR Com o mouse para selecionar uma cÊlula basta dar um clique em cima dela e observe que a cÊlula na qual você clicou Ê mostrada FRPR UHIHUrQFLD QD EDUUD GH IyUPXODV

6H YRFr SUHFLVDU VHOHFLRQDU PDLV GH XPD FpOXOD EDVWD PDQWHU SUHVVLRQDGR R PRXVH H DUUDVWDU VHOHFLRQDQGR DV FpOXODV HP VHTXrQFLD

Didatismo e Conhecimento

130


CONHECIMENTOS DE INFORMĂ TICA

Se precisar selecionar cĂŠlulas alternadamente, clique sobre a primeira cĂŠlula a ser selecionada, pressione CTRL e vĂĄ clicando nas TXH YRFr TXHU VHOHFLRQDU

3RGHPRV WDPEpP QRV PRYLPHQWDU FRP R WHFODGR QHVWH FDVR XVDPRV D FRPELQDomR GDV VHWDV GR WHFODGR FRP D WHFOD 6+,)7

Entrada de textos e nĂşmeros 1D iUHD GH WUDEDOKR GR ([FHO SRGHP VHU GLJLWDGRV FDUDFWHUHV Q~PHURV H IyUPXODV $R ÂżQDOL]DU D GLJLWDomR GH VHXV GDGRV YRFr SRGH SUHVVLRQDU D WHFOD (17(5 RX FRP DV VHWDV PXGDU GH FpOXOD HVVH UHFXUVR VRPHQWH QmR VHUi YiOLGR TXDQGR HVWLYHU HIHWXDQGR XP FiOFXOR &DVR SUHFLVH DOWHUDU R FRQWH~GR GH XPD FpOXOD VHP SUHFLVDU UHGLJLWDU WXGR QRYDPHQWH FOLTXH VREUH HOD H SUHVVLRQH ) IDoD VXD DOWHUDomR H SUHVVLRQH (17(5 HP VHX WHFODGR

Didatismo e Conhecimento

131


CONHECIMENTOS DE INFORMร TICA Operadores e Funรงรตes A funรงรฃo รฉ um mรฉtodo utilizado para tornar mais fรกcil e rรกpido a montagem de fรณrmulas que envolvem cรกlculos mais complexos e YiULRV YDORUHV ([LVWHP IXQo}HV SDUD RV FiOFXORV PDWHPiWLFRV ยฟQDQFHLURV H HVWDWtVWLFRV 3RU H[HPSOR QD IXQomR 620$ $ $ VHULD R PHVPR TXH $ $ $ $ $ $ $ $ $ $ Vy TXH FRP D IXQomR R SURFHVVR SDVVD D VHU PDLV IiFLO $LQGD conforme o exemplo pode-se observar que รฉ QHFHVViULR VHPSUH LQLFLDU XP FiOFXOR FRP VLQDO GH LJXDO H XVD VH QRV FiOFXORV D UHIHUrQFLD GH FpOXODV $ H QmR VRPHQWH YDORUHV $ TXDQWLGDGH GH DUJXPHQWRV HPSUHJDGRV HP XPD IXQomR GHSHQGH GR WLSR GH IXQomR D VHU XWLOL]DGD 2V DUJXPHQWRV SRGHP VHU Q~PHURV WH[WRV YDORUHV OyJLFRV UHIHUrQFLDV HWF Operadores 2SHUDGRUHV VmR VtPERORV PDWHPiWLFRV TXH SHUPLWHP ID]HU FiOFXORV H FRPSDUDo}HV HQWUH DV FpOXODV 2V RSHUDGRUHV VmR

9DPRV PRQWDU XPD SODQLOKD VLPSOHV 2EVHUYH TXH R FRQWH~GR GH DOJXPDV FpOXODV p PDLRU TXH D VXD ODUJXUD SRGHPRV DFHUWDU LVVR GD VHJXLQWH IRUPD 6H SUHFLVDU WUDEDOKDU D ODUJXUD GH XPD FROXQD SRVLFLRQR R PRXVH HQWUH DV FROXQDV R PRXVH ยฟFD FRP R IRUPDWR GH XPD ร HFKD GH GXDV SRQWDV SRVVR DUUDVWDU SDUD GHยฟQLU D QRYD ODUJXUD RX SRVVR GDU XP GXSOR FOLTXH TXH IDUi FRP TXH D ODUJXUD GD FROXQD DFHUWH VH FRP R FRQWH~GR 3RVVR WDPEpP FOLFDU FRP R ERWmR GLUHLWR GR PRXVH H HVFROKHU /DUJXUD GD &ROXQD

Didatismo e Conhecimento

132


CONHECIMENTOS DE INFORMร TICA

O objetivo desta planilha รฉ calcularmos o valor total de cada produto (quantidade multiplicado por valor unitรกrio) e depois o total GH WRGRV RV SURGXWRV 3DUD R WRWDO GH FDGD SURGXWR SUHFLVDPRV XWLOL]DU R RSHUDGRU GH PXOWLSOLFDomR QR FDVR GR 0RXVH WHPRV TXH D TXDQWLGDGH HVWi QD FpOXOD $ H R YDORU XQLWiULR HVWi QD FpOXOD & R QRVVR FDoXOR VHUi IHLWR QD FpOXOD ' 3RGHUtDPRV ID]HU R VHJXLQWH FiOFXOR TXH PH WUDULD R UHVXOWDGR SRUpP EDVWDULD DOWHUDU R YDORU GD TXDQWLGDGH RX R 9 XQLWiULR TXH HX SUHFLVDULD ID]HU QRYDPHQWH R FiOFXOR 2 FRUUHWR p HQWmR p ID]HU $ & FRP LVVR HX PXOWLSOLFR UHIHUHQFLDQGR DV FpOXODV LQGHSHQGHQWH GR FRQWH~GR GHOD HOH IDUi D PXOWLSOLFDomR GHVGH TXH DOL VH WHQKD XP Q~PHUR

Observe que ao fazer o cรกlculo รฉ colocado tambรฉm na barra de fรณrmulas, e mesmo apรณs pressionar ENTER, ao clicar sobre a FpOXOD RQGH HVWi R UHVXOWDGR YRFr SRGHUi YHU FRPR VH FKHJRX DR UHVXOWDGR SHOD EDUUD GH IyUPXODV

Didatismo e Conhecimento

133


CONHECIMENTOS DE INFORMĂ TICA

3DUD R FiOFXOR GR WHFODGR p QHFHVViULR HQWmR ID]HU R FiOFXOR GD VHJXQGD OLQKD $ & H DVVLP VXFHVVLYDPHQWH 2EVHUYDPRV então que a coluna representada pela letra não muda, muda-se somente o número que representa a linha, e se nossa planilha tivesse XPD JUDQGH TXDQWLGDGH GH SURGXWRV UHSHWLU R FiOFXOR VHULD FDQVDWLYR H FRP FHUWH]D VXMHLWD D HUURV 4XDQGR WHPRV XPD VHTXrQFLD GH cålculos como a nossa planilha o Excel permite que se faça um único cålculo e ao posicionar o cursor do mouse no canto inferior direito da cÊlula o cursor se transforma em uma cruz (não confundir com a seta branca que permite mover o conteúdo da cÊlula e ao SUHVVLRQDU R PRXVH H DUUDVWDU HOH FRSLD D IyUPXOD SRXSDQGR WHPSR 3DUD FDOFXODU R WRWDO YRFr SRGHULD XWLOL]DU R VHJXLQWH FiOFXOR ' ' ' ' ' SRUpP LVVR QmR VHULD QDGD SUDWLFR HP SODQLOKDV PDLRUHV 4XDQGR WHQKR VHTXrQFLDV GH FiOFXORV R ([FHO SHUPLWH D XWLOL]DomR GH IXQo}HV 1R FDVR D IXQomR D VHU XWLOL]DGD p D IXQomR 620$ D VXD HVWUXWXUD p 620$ &HO,QL &HO¿P RX VHMD LQLFLD VH FRP R VLQDO GH LJXDO HVFUHYH VH R QRPH GD IXQomR DEUHP VH SDUrQWHVHV FOLFD VH QD FpOXOD LQLFLDO GD VRPD H DUUDVWD VH DWp D ~OWLPD FpOXOD D VHU VRPDGD HVWH LQWHUYDOR p UHSUHVHQWDGR SHOR VLQDO GH GRLV SRQWRV H IHFKDP VH RV SDUrQWHVHV Embora você possa fazer manualmente na cÊlula o Excel possui um assistente de função que facilita e muito a utilização das PHVPDV HP VXD SODQLOKD 1D $%$ ,QLFLR GR ([FHO GHQWUR GR JUXSR (GLomR H[LVWH R ERWmR GH IXQomR

$ SULPHLUD IXQomR p MXVWDPHQWH 6RPD HQWmR FOLTXH QD FpOXOD H FOLTXH QR ERWmR GH IXQomR

Didatismo e Conhecimento

134


CONHECIMENTOS DE INFORMà TICA OEVHUYH FRQIRUPH D LPDJHP TXH R ([FHO DFUHVFHQWD D VRPD H R LQWHUYDOR GH FpOXODV SUHVVLRQH (17(5 H YRFr WHUi VHX FiOFXOR Formatação de cÊlulas A formatação de cÊlulas Ê muito semelhante a que vimos para formatação de fonte no Word, basta apenas que a cÊlula onde serå DSOLFDGD D IRUPDWDomR HVWHMD VHOHFLRQDGD VH SUHFLVDU VHOHFLRQDU PDLV GH XPD FpOXOD EDVWD VHOHFLRQi ODV $V RSo}HV GH IRUPDWDomR GH FpOXOD HVWmR QD $%$ ,QLFLR

Temos o grupo Fonte que permite alterar a fonte a ser utilizada, o tamanho, aplicar negrito, itĂĄlico e sublinhado, linhas de grade, FRU GH SUHHQFKLPHQWR H FRU GH IRQWH $R FOLFDU QD IDL[D GR JUXSR VHUi PRVWUDGD D MDQHOD GH IRQWH

A guia mostrada nesta janela ĂŠ a Fonte nela temos o tipo da letra, estilo, tamanho, sublinhado e cor, observe que existem menos UHFXUVRV GH IRUPDWDomR GR TXH QR :RUG $ JXLD 1~PHUR SHUPLWH TXH VH IRUPDWHP RV Q~PHURV GH VXDV FpOXODV (OH GLYLGLGR HP FDWHJRULDV H GHQWUR GH FDGD FDWHJRULD HOH SRVVXL H[HPSORV GH XWLOL]DomR H DOJXPDV SHUVRQDOL]Do}HV FRPR SRU H[HPSOR QD FDWHJRULD 0RHGD HP TXH p SRVVtYHO GHÂżQLU R VtPEROR D VHU XVDGR H R Q~PHUR GH FDVDV GHFLPDLV

Didatismo e Conhecimento

135


CONHECIMENTOS DE INFORMร TICA

$ JXLD $OLQKDPHQWR SHUPLWH GHยฟQLU R DOLQKDPHQWR GR FRQWH~GR GD FpOXOD QD KRUL]RQWDO H YHUWLFDO DOpP GR FRQWUROH GR WH[WR

A guia Bordas permite adicionar bordas a sua planilha, embora a planilha jรก SRVVXD DV OLQKDV GH JUDGH TXH IDFLOLWDP D LGHQWLยฟFDomR GH VXDV FpOXODV YRFr SRGH DGLFLRQDU ERUGDV SDUD GDU PDLV GHVWDTXH

Didatismo e Conhecimento

136


CONHECIMENTOS DE INFORMÁTICA A JXLD 3UHHQFKLPHQWR SHUPLWH DGLFLRQDU FRUHV GH SUHHQFKLPHQWR jV VXDV FpOXODV

9DPRV HQWmR IRUPDWDU QRVVD SODQLOKD LQLFLDOPHQWH VHOHFLRQH WRGDV DV FpOXODV GH YDORUHV HP PRHGD 9RFr SRGH XWLOL]DU D MDQHOD GH IRUPDWDomR FRPR YLPRV DQWHV FRPR SRGH WDPEpP QR JUXSR 1~PHUR FOLFDU VREUH R ERWmR PRHGD

9DPRV FRORFDU WDPEpP D OLQKD RQGH HVWmR 4XDQW 3URGXWR HWF HP QHJULWR H FHQWUDOL]DGR 2 WtWXOR 5HODomR GH 3URGXWRV ¿FDUi PHOKRU YLVXDOPHQWH VH HVWLYHU FHQWUDOL]DGR HQWUD D ODUJXUD GD SODQLOKD HQWmR VHOHFLRQH GHVGH D FpOXOD $ DWp D FpOXOD ' GHSRLV FOLTXH QR ERWmR 0HVFODU H &HQWUDOL]DU FHQWUDOL]H H DXPHQWH XP SRXFR R WDPDQKR GD IRQWH

3DUD ¿QDOL]DU VHOHFLRQH WRGD D VXD SODQLOKD H QR ERWmR GH ERUGDV VHOHFLRQH XPD ERUGD H[WHUQD

Didatismo e Conhecimento

137


CONHECIMENTOS DE INFORMĂ TICA

Estilos (VWD RSomR p XWLOL]DGD SDU DSOLFDU DXWRPDWLFDPHQWH XP IRUPDWR SUp GHÂżQLGR D XPD SODQLOKD VHOHFLRQDGD

2 ERWmR HVWLOR GH &pOXOD SHUPLWH TXH VH XWLOL]H XP HVWLOR GH FRU SDUD VXD SODQLOKD

A segunda opção Formatar como Tabela permite tambÊm aplicar uma formatação a sua planilha, porÊm ele jå começa a trabalhar FRP 'DGRV

Didatismo e Conhecimento

138


CONHECIMENTOS DE INFORMร TICA

Ele acrescenta uma coluna superior com indicaรงรตes de colunas e abre uma nova ABA chamada Design

1R JUXSR 2So}HV GH (VWLOR GH 7DEHOD GHVPDUTXH D RSomR /LQKDV GH &DEHoDOKR 3DUD SRGHU PDQLSXODU WDPEpP RV GDGRV GH VXD SODQLOKD p QHFHVViULR VHOHFLRQDU DV FpOXODV TXH SUHWHQGH PDQLSXODU FRPR SODQLOKD H QR JUXSR )HUUDPHQWDV FOLTXH QR ERWmR &RQYHUWHU HP ,QWHUYDOR

Auto Preenchimento das Cรฉlulas 9LPRV QR H[HPSOR DQWHULRU TXH p SRVVtYHO FRSLDU XPD IyUPXOD TXH R ([FHO HQWHQGH TXH DOL WHPRV XPD IyUPXOD H ID] D FySLD 3RGHPRV XVDU HVWH UHFXUVR HP RXWUDV VLWXDo}HV VH HX WLYHU XP WH[WR FRPXP RX XP Q~PHUR ~QLFR H DSOLFDU HVWH UHFXUVR HOH FRSLD VHP DOWHUDU R TXH VHUi FRSLDGR PDV SRVVR XWLOL]DU HVWH UHFXUVR SDUD JDQKDU WHPSR 6H HX FULDU XPD VHTXrQFLD QXPpULFD SRU H[HPSOR QD FpOXOD $ R Q~PHUR H QD FpOXOD $ R Q~PHUR DR VHOHFLRQDU DPERV R ([FHO HQWHQGH TXH SUHFLVR FRSLDU XPD VHTXrQFLD 6H HX FRORFDU QD FpOXOD $ R Q~PHUR H QD FpOXOD $ R Q~PHUR HOH HQWHQGH TXH DJRUD D VHTXrQFLD p GH GRLV HP GRLV

(VWD PHVPD VHTXrQFLD SRGH VHU DSOLFDGD D GLDV GD VHPDQD KRUDV HWF Inserรงรฃo de linhas e colunas 3DUD DGLFLRQDU RX UHPRYHU OLQKDV H FROXQDV QR ([FHO p VLPSOHV 3DUD DGLFLRQDU EDVWD FOLFDU FRP R ERWmR GLUHLWR GR PRXVH HP uma linha e depois clicar em Inserir, a linha serรก adicionada acima da selecionada, no caso a coluQD VHUi DGLFLRQDGD j HVTXHUGD 3DUD H[FOXLU XPD OLQKD RX XPD FROXQD EDVWD FOLFDU FRP R ERWmR GLUHLWR QD OLQKD RX FROXQD D VHU H[FOXtGD (VWH SURFHVVR SRGH VHU IHLWR WDPEpP SHOR JUXSR &pOXODV TXH HVWi QD $%$ LQLFLR Didatismo e Conhecimento

139


CONHECIMENTOS DE INFORMĂ TICA

$WUDYpV GD RSomR )RUPDWDU SRGHPRV WDPEpP GHÂżQLU D ODUJXUD GDV OLQKDV H FROXQDV

Congelar PainÊis Algumas planilhas quando muito longas necessitam que sejam mantidos seus cabeçalho e primeiras linhas, evitando-se assim a GLJLWDomR GH YDORUHV HP ORFDLV HUUDGRV (VVH UHFXUVR FKDPD VH FRQJHODU SDLQpLV H HVWi GLVSRQtYHO QD $%$ H[LELomR

1R JUXSR -DQHOD WHPRV R ERWmR &RQJHODU 3DLQpLV FOLTXH QD RSomR FRQJHODU SULPHLUD OLQKD H PHVPR TXH YRFr UROH D WHOD D SULPHLUD OLQKD ÂżFDUi HVWiWLFD

Didatismo e Conhecimento

140


CONHECIMENTOS DE INFORMĂ TICA Ainda dentro desta ABA podemos criar uma nova janela da planilha Ativa clicando no botĂŁo Nova Janela, podemos organizar as janelas abertas clicando no botĂŁo Organizar Tudo,

3HOR JUXSR 0RVWUDU 2FXOWDU SRGHPRV UHWLUDU DV OLQKDV GH JUDGH DV OLQKDV GH FDEHoDOKR GH FROXQD H OLQKD H D EDUUD GH IRUPXODV

Trabalhando com ReferĂŞncias 3HUFHEHPRV TXH DR FRSLDU XPD IyUPXOD DXWRPDWLFDPHQWH VmR DOWHUDGDV DV UHIHUrQFLDV LVVR RFRUUH SRLV WUDEDOKDPRV DWp R PRPHQWR FRP YDORUHV UHODWLYRV 3RUpP YDPRV DGLFLRQDU HP QRVVD SODQLOKD PDLV XPD FROXQD RQGH SUHWHQGR FDOFXODU TXDO D SRUFHQWDJHP FDGD SURGXWR representa no valor total

Didatismo e Conhecimento

141


CONHECIMENTOS DE INFORMÁTICA 2 FiOFXOR ¿FDULD SDUD R SULPHLUR SURGXWR ' ' H GHSRLV EDVWDULD DSOLFDU D IRUPDWDomR GH SRUFHQWDJHP H DFUHVFHQWDU GXDV FDVDV GHFLPDLV

3RUpP VH XWLOL]DUPRV R FRQFHLWR DSUHQGLGR GH FRSLDU D FpOXOD ( SDUD UHVROYHU RV GHPDLV FiOFXORV QD FpOXOD ( j IyUPXOD ¿FDUi ' ' SRUpP VH REVHUYDUPRV R FRUUHWR VHULD ¿FDU ' ' SRLV D FpOXOD ' p D FpOXOD FRP R YDORU WRWDO RX VHMD HVWD p D FpOXOD FRPXP D WRGRV RV FiOFXORV D VHUHP IHLWRV FRP LVVR QmR SRVVR FRSLDU D IyUPXOD SHOR PHQRV QmR FRPR HVWi 8PD VROXomR VHULD ID]HU XPD D XPD PDV D LGHLD GH XPD SODQLOKD p JDQKDU VH WHPSR $ FpOXOD ' HQWmR p XP YDORU DEVROXWR HOH QmR PXGD p WDPEpP FKDPDGR GH YDORU FRQVWDQWH $ VROXomR p HQWmR WUDYDU D FpOXOD GHQWUR GD IRUPXOD SDUD LVVR XVDPRV R VtPEROR GR FLIUmR QD FpOXOD TXH ¿]HPRV R FiOFXOR ( GH FOLTXH VREUH HOD GHSRLV FOLTXH QD EDUUD GH IyUPXODV VREUH D UHIHUrQFLD GD FpOXOD '

Didatismo e Conhecimento

142


CONHECIMENTOS DE INFORMĂ TICA 3UHVVLRQH HP VHX WHFODGR D WHFOD ) 6HUi HQWmR DGLFLRQDGR R VtPEROR GH FLIUmR DQWHV GD OHWUD ' H DQWHV GR Q~PHUR '

3UHVVLRQH (17(5 H DJRUD YRFr SRGHUi FRSLDU D VXD FpOXOD

No exemplo acima foi possível travar toda a cÊlulas, existem casos em que serå necessårio travar somente a linha e casos onde VHUi QHFHVViULR WUDYDU VRPHQWH D FROXQD $V FRPELQDo}HV HQWmR ¿FDULDP WRPDQGR FRPR EDVH D FpOXOD ' ' 5HODWLYD QmR ¿[D OLQKD QHP FROXQD ' 0LVWD ¿[D DSHQDV D FROXQD SHUPLWLQGR D YDULDomR GD OLQKD ' 0LVWD ¿[D DSHQDV D OLQKD SHUPLWLQGR D YDULDomR GD FROXQD ' $EVROXWD ¿[D D OLQKD H D FROXQD Algumas outras funçþes Vamos inicialmente montar a seguinte planilha

(P QRVVR FRQWUROH GH DWOHWDV YDPRV DWUDYpV GH DOJXPDV RXWUDV IXQo}HV VDEHU DOJXPDV RXWUDV LQIRUPDo}HV GH QRVVD SODQLOKD 2 ([FHO SRVVXL PXLWDV IXQo}HV YRFr SRGH FRQKHFHU PDLV VREUH HODV DWUDYpV GR DVVLVWHQWH GH IXQomR

Didatismo e Conhecimento

143


CONHECIMENTOS DE INFORMĂ TICA

Ao clicar na opção Mais Funçþes abre-se a tela de Inserir Função, você pode digitar uma descrição do que gostaria de saber FDOFXODU SRGH EXVFDU SRU FDWHJRULD FRPR )LQDQFHLUD P 'DWD +RUD HWF DR HVFROKHU XPD FDWHJRULD QD FDL[D FHQWUDO VHUmR PRVWUDGDV WRGDV DV IXQo}HV UHODWLYDV D HVVD FDWHJRULD Ao selecionar, por exemplo, a categoria Estatística e dentro do conjunto de funçþes desta categoria a função Måximo abaixo Ê DSUHVHQWDGR XPD EUHYH H[SOLFDomR GD XWLOL]DomR GHVWD IXQomR 6H SUHFLVDU GH PDLV GHWDOKHV GD XWLOL]DomR GD IXQomR FOLTXH VREUH R OLQN $MXGD VREUH HVWD IXQomR

Didatismo e Conhecimento

144


CONHECIMENTOS DE INFORMร TICA Mรกximo 0RVWUD R YDORU 0$,25 GH XPD VHOHomR GH FpOXODV (P QRVVD SODQLOKD YDPRV XWLOL]DU HVVD IXQomR SDUD VDEHU p D PDLRU LGDGH PDLRU SHVR H D PDLRU DOWXUD (P QRVVD SODQLOKD FOLTXH QD FpOXOD DEDL[R GD FROXQD GH LGDGH QD OLQKD GH YDORUHV Pi[LPRV ( H PRQWH D VHJXLQWH IXQomR 0$;,02 ( ( &RP HVVD IXQomR HVWDPRV EXVFDQGR QR LQWHUYDOR GDV FpOXODV ( j ( TXDO p YDORU Pi[LPR HQFRQWUDGR

9DPRV UHSHWLU R SURFHVVR SDUD RV YDORUHV Pi[LPRV GR SHVR H GD DOWXUD MIN 0RVWUD R YDORU PtQLPR GH XPD VHOHomR GH FpOXODV Vamos utilizar essa funรงรฃo em nossa planilha para saber os valores mtQLPRV QDV FDUDFWHUtVWLFDV GH QRVVRV DWOHWDV (P QRVVD SODQLOKD FOLTXH QD FpOXOD DEDL[R GD FROXQD GH LGDGH QD OLQKD GH YDORUHV Pi[LPRV ( H PRQWH D VHJXLQWH IXQomR 0,1 ( ( &RP HVVD IXQomR HVWi EXVFDQGR QR LQWHUYDOR GDV FpOXODV ( j ( TXDO p YDORU Pi[LPR HQFRQWUDGR

3DUD FDOFXODU RV YDORUHV PtQLPRV SDUD R SHVR H D DOWXUD R SURFHVVR p R PHVPR Mรฉdia &DOFXOD D PpGLD DULWPpWLFD GH XPD VHOHomR GH YDORUHV 9DPRV XWLOL]DU HVVD IXQomR HP QRVVD SODQLOKD SDUD VDEHU RV YDORUHV PpGLRV QDV FDUDFWHUtVWLFDV GH QRVVRV DWOHWDV Em nossa planilha clique na cรฉlula abaixo da coluna de idade na linha de valores mรกximos E17 e monte a seguinte funรงรฃo 0(',$ ( ( &RP HVVD IXQomR HVWDPRV EXVFDQGR QR LQWHUYDOR GDV FpOXODV ( j ( TXDO p YDORU Pi[LPR HQFRQWUDGR

Didatismo e Conhecimento

145


CONHECIMENTOS DE INFORMร TICA

3DUD R SHVR H D DOWXUD EDVWD DSHQDV UHSHWLU R SURFHVVR 9DPRV XWLOL]DU HVVD IXQomR HP QRVVD SODQLOKD GH FRQWUROH GH DWOHWDV 9DPRV XWLOL]DU D IXQomR QRV YDORUHV PpGLRV GD SODQLOKD GHL[DUHPRV FRP GXDV FDVDV GHFLPDLV Vamos aproveitar tambรฉm o exemplo para utilizarmos um recurso muito interessante do Excel que รฉ o aninhamento de funรงรตes, RX VHMD XPD IXQomR ID]HQGR SDUWH GH RXWUD $ IXQomR SDUD R FiOFXOR GD PpGLD GD ,GDGH p 0e',$ ( ( FOLTXH QD FpOXOD RQGH HVWi R FiOFXOR H GHSRLV FOLTXH QD EDUUD GH IyUPXODV $OWHUH D IXQomR SDUD $55(' 0e',$ ( ( FRP LVVR ยฟ]HPRV FRP TXH FDVR H[LVWD Q~PHURV DSyV D YtUJXOD R PHVPR VHUi DUUHGRQGD D VRPHQWH XPD FDVD GHFLPDO &DVR YRFr QmR TXHLUD FDVDV GHFLPDLV FRORTXH DSyV R SRQWR H YtUJXOD R Q~PHUR ]HUR Nesta situaรงรฃo deve-se ter uma atenรงรฃo grande em relaรงรฃo aos parรชnteses, observe que foi aberto uma apรณs a funรงรฃo ARRED e XP D SyV D IXQomR 0e',$ HQWmR VH GHYH WHU R FXLGDGR GH IHFKi ORV FRUUHWDPHQWH 2 TXH DX[LOLD QR IHFKDPHQWR FRUUHWR GRV SDUrQWHVHV p TXH R ([FHO YDL FRORULQGR RV PHVPRV HQTXDQWR YRFr ID] R FiOFXOR

Funรงรฃo SE Esta รฉ com certeza uma das funรงรตes mais importantes do Excel e provavelmente uma das mais complexas para quem estรก LQLFLDQGR (VWD IXQomR UHWRUQD XP YDORU GH WHVWHBOyJLFR TXH SHUPLWH DYDOLDU XPD FpOXOD RX XP FiOFXOR H UHWRUQDU XP YDORU YHUGDGHLUR RX XP YDORU IDOVR 6XD VLQWD[H p 6( 7(67(/ร *,&2 9$/25 9(5'$'(,52 9$/25 )$/62 6( $WULEXLomR GH LQLFLR GD IXQomR 7(67(/ร *,&2 7HVWH D VHU IHLWR SDU YDOLGDU D FpOXOD VALOR VERDADEIRO - Valor a ser apresentado na cรฉlula quando o teste lรณgico for verdadeiro, pode ser outra cรฉlula, um FDoXOR XP Q~PHUR RX XP WH[WR DSHQDV OHPEUDQGR TXH VH IRU XP WH[WR GHYHUi HVWDU HQWUH DVSDV VALOR FALSO - Valor a ser apresentado na cรฉlula quando o teste lรณgico for falso, pode ser outra cรฉlula, um caรงulo, um nรบmero RX XP WH[WR DSHQDV OHPEUDQGR TXH VH IRU XP WH[WR GHYHUi HVWDU HQWUH DVSDV 3DUD H[HPSOLยฟFDU R IXQFLRQDPHQWR GD IXQomR YDPRV DFUHVFHQWDU HP QRVVD SODQLOKD GH FRQWUROH GH DWOHWDV XPD FROXQD FKDPDGD FDWHJRULD

Didatismo e Conhecimento

146


CONHECIMENTOS DE INFORMÁTICA 9DPRV DWULEXLU LQLFLDOPHQWH TXH DWOHWDV FRP LGDGH PHQRU TXH DQRV VHUmR GD FDWHJRULD -XYHQLO H DFLPD GLVVR FDWHJRULD 3UR¿VVLRQDO (QWmR D OyJLFD GD IXQomR VHUi TXH TXDQGR D ,GDGH GR DWOHWD IRU PHQRU TXH HOH VHUi -XYHQLO H TXDQGR HOD IRU LJXDO RX PDLRU TXH HOH VHUi 3UR¿VVLRQDO &RQYHUWHQGR LVVR SDUD D IXQomR H EDVHDQGR VH TXH D LGDGH GR SULPHLUR DWOHWD HVWi QD FpOXOD ( j IXQomR ¿FDUi 6( ( ´-XYHQLO´ ´3UR¿VVLRQDO´

([SOLFDQGR D IXQomR 6( ( LQLFLR GD IXQomR H WHVWH OyJLFR DTXL p YHUL¿FDGR VH R FRQWH~GR GD FpOXOD ( p PHQRU TXH ³-XYHQLO´ 9DORU D VHU DSUHVHQWDGR FRPR YHUGDGHLUR ³3UR¿VVLRQDO´ 9DORU D VHU DSUHVHQWDGR FRPR IDOVR ) 9DPRV LQFUHPHQWDU XP SRXFR PDLV QRVVD SODQLOKD YDPRV FULDU XPD WDEHOD HP VHSDUDGR FRP D VHJXLQWH GH¿QLomR $Wp DQRV VHUi MXYHQLO GH DQRV DWp DQRV VHUi FRQVLGHUDGR SUR¿VVLRQDO H DFLPD GRV DQRV VHUi FRQVLGHUDGR 0DVWHU 1RVVD SODQLOKD ¿FDUi GD VHJXLQWH IRUPD

Temos então agora na coluna J a referência de idade, e na coluna K a FDWHJRULD (QWmR DJRUD SUHFLVR YHUL¿FDU D LGDGH GH DFRUGR FRP R YDORU QD FROXQD - H UHWRUQDU FRP YDORUHV YHUGDGHLURV H IDOVRV R FRQWH~GR GD FROXQD . $ IXQomR HQWmR ¿FDUi GD VHJXLQWH IRUPD

6( ( - . 6( ( - . .

Temos então: 6( ( - $TXL WHPRV QRVVR SULPHLUR WHVWH OyJLFR RQGH YHUL¿FDPRV VH D LGDGH TXH FRQVWD QD FpOXOD ( p PHQRU TXH R YDORU TXH FRQVWD QD FpOXOD - . &pOXOD GH¿QLGD D VHU UHWRUQDGD FRPR YHUGDGHLUR GHVWH WHVWH OyJLFR QR FDVR R WH[WR ³-XYHQLO´ 6( ( - VHJXQGR WHVWH OyJLFR RQGH YHUL¿FDPRV VH YDORU GD FpOXOD ( p PHQRU TXH VH IRU UHDO UHWRUQD R VHJXQGR YDORU YHUGDGHLUR p LPSRUWDQWH UHVVDOWDU TXH HVWH WHVWH OyJLFR VRPHQWH VHUi XWLOL]DGR VH R SULPHLUR WHVWH GHU FRPR IDOVR . 6HJXQGR YDORU YHUGDGHLUR VHUi UHWRUQDGR VH R VHJXQGR WHVWH OyJLFR HVWLYHU FRUUHWR

Didatismo e Conhecimento

147


CONHECIMENTOS DE INFORMร TICA . 9DORU IDOVR VHUi UHWRUQDGR VH WRGRV RV WHVWHV OyJLFRV GHUHP FRPR IDOVR 3HUPLWH FRQWDU HP XP LQWHUYDOR GH YDORUHV TXDQWDV YH]HV VH UHSHWH GHWHUPLQDGR LWHP 9DPRV DSOLFDU D IXQomR HP QRVVD SODQLOKD de controle de atletas Adicione as seguintes linhas abaixo de sua planilha

(QWmR YDPRV XWLOL]DU D IXQomR &217 6( SDUD EXVFDU HP QRVVD SODQLOKD TXDQWRV DWOHWDV WHPRV HP FDGD FDWHJRULD

$ IXQomR ยฟFRX GD VHJXLQWH IRUPD &217 6( + + . RQGH VH ID] D FRQWDJHP HP XP LQWHUYDOR GH + + TXH p R resultado calculado pela funรงรฃo 6( H UHWRUQD D FpOXOD . RQGH HVWi D FDWHJRULD MXYHQLO GH DWOHWDV 3DUD DV GHPDLV FDWHJRULDV EDVWD UHSHWLU R FiOFXOR PXGDQGR VH VRPHQWH D FDWHJRULD TXH HVWi VHQGR EXVFDGD Funรงรตes de Data e Hora 3RGHPRV WUDEDOKDU FRP GLYHUVDV IXQo}HV TXH VH EDVHLDP QD GDWD H KRUD GH VHX FRPSXWDGRU $V SULQFLSDLV IXQo}HV GH GDWD H KRUD VmR +2-( 5HWRUQD D GDWD DWXDO 0ร 6 +2-(

5HWRUQD R PrV DWXDO $12 +2-(

5HWRUQD R DQR DWXDO +25$ $*25$

5HWRUQD j KRUD DWXDO 0,1872 $*25$

5HWRUQD R PLQXWR DWXDO 6(*81'2 $*25$

5HWRUQD R VHJXQGR DWXDO $*25$ 5HWRUQD D GDWD H j KRUD ',$ '$ 6(0$1$ +2-(

5HWRUQD R GLD GD VHPDQD HP Q~PHUR ',$6 &DOFXOD R Q~PHUR GH GLDV TXH Ki HQWUH XPD GDWD LQLFLDO H XPD GDWD ยฟQDO 3DUD H[HPSOLยฟFDU PRQWH D VHJXLQWH SODQLOKD

Didatismo e Conhecimento

148


CONHECIMENTOS DE INFORMร TICA

(P 9 'LiULR YDPRV FDOFXODU TXDQWDV KRUDV IRUDP WUDEDOKDGDV GXUDQWH FDGD GLD % % % % SHJDPRV D GDWD GH VDtGD H VXEWUDtPRV SHOD GDWD GH HQWUDGD GH PDQKm FRP LVVR VDEHPRV TXDQWDV KRUDV IRUDP trabalhadas pela manhรฃ na mesma funรงรฃo faรงo a subtraรงรฃo da saรญda no perรญodo da tarde pela entrada do perรญodo da tarde e somo os GRLV SHUtRGRV

Repita o processo para todos os demais dias da semana, somente no sรกbado รฉ preciso apenas calcular a parte da manhรฃ, ou seja, QmR SUHFLVD VHU IHLWR R FiOFXOR GR SHUtRGR GD WDUGH

3DUD FDOFXODU R 9 GD KRUD TXH R IXQFLRQiULR UHFHEH FRORTXH XP YDORU QR FDVR DGLFLRQH H FRORTXHL QR IRUPDWR 0RHGD 9DPRV DJRUD HQWmR FDOFXODU TXDQWR HOH JDQKRX SRU GLD SRLV WHPRV TXDQWDV KRUDV HOH WUDEDOKRX GXUDQWH R GLD H VDEHPRV R YDORU GD KRUD &RPR WHPRV GRLV IRUPDWRV GH Q~PHURV SUHFLVDPRV GXUDQWH R FiOFXOR ID]HU D FRQYHUVmR 3DUD D VHJXQGD IHLUD R FiOFXOR ยฟFD GD VHJXLQWH IRUPD +25$ % % 0,1872 % % ,QLFLDOPHQWH XWLOL]DPRV D IXQomR +25$ H SHJDPRV FRPR UHIHUrQFLD GH KRUD R YDORU GD FpOXOD % PXOWLSOLFDPRV SHOR YDORU TXH HVWi HP % HVVD SDUWH FDOFXOD VRPHQWH j KRUD FKHLD HQWmR SUHFLVDPRV VRPDU RV PLQXWRV TXH SHJD D IXQomR 0,1872 H PXOWLSOLFD D TXDQWLGDGH GH KRUDV SHOR YDORU GD KRUD FRPR R YDORU p SDUD D KRUD R GLYLGLPRV HQWmR SRU $SyV LVVR FRORTXH R YDORU HP IRUPDWR 0RHGD

Didatismo e Conhecimento

149


CONHECIMENTOS DE INFORMÁTICA

3DUD RV GHPDLV FiOFXORV R 9 +RUD VHUi LJXDO Ki WRGRV RV GLDV HQWmR HOH SUHFLVD VHU ¿[R SDUD TXH R FiOFXOR SRVVD VHU FRSLDGR R Q~PHUR SRU VHU XP Q~PHUR QmR p PXGD +25$ % % 0,1872 % % 3DUD VDEHUPRV TXDQWDV KRUDV R IXQFLRQiULR WUDEDOKRX QD VHPDQD IDoD D VRPD GH WRGRV RV GLDV WUDEDOKDGRV

$R REVHUYDU DWHQWDPHQWH R YDORU FDOFXODGR HOH PRVWUD SRUpP QHVVD VHPDQD R IXQFLRQiULR WUDEDOKRX PDLV GH KRUDV LVVR RFRUUH SRLV R FiOFXOR GH KRUDV ]HUD DR FKHJDU HP HQWmR SUHFLVR ID]HU FRP TXH R ([FHO HQWHQGD TXH HOH SUHFLVD FRQWLQXDU D FRQWDJHP &OLTXH QD IDL[D GR JUXSR Q~PHUR QD $%$ ,QLFLR QD MDQHOD TXH VH DEUH FOLTXH QD FDWHJRULD +RUD H HVFROKD R IRUPDWR HVVH IRUPDWR ID] FRP TXH D FRQWDJHP FRQWLQXH

&ULH XP QRYR FDPSR DEDL[R GD 7DEHOD H FRORTXH 9 D UHFHEHU H IDoD D VRPD GRV YDORUHV WRWDLV

Didatismo e Conhecimento

150


CONHECIMENTOS DE INFORMĂ TICA

Planilhas 3D 2 FRQFHLWR GH SODQLOKD ' IRL LPSODQWDGR QR ([FHO QD YHUVmR GR SURJUDPD HOH p FKDPDGR GHVVD IRUPD SRLV SHUPLWH TXH VH IDoDP UHIHUrQFLDV GH XPD SODQLOKD HP RXWUD 3RVVR SRU H[HPSOR ID]HU XPD VRPD GH YDORUHV TXH HVWHMDP HP RXWUD SODQLOKD RX VHMD TXDQGR QD SODQLOKD PDWUL] DOJXP YDORU VHMD DOWHUDGR QD SODQLOKD TXH SRVVXL UHIHUrQFLD FRP HOD WDPEpP PXGD Vamos a um exemplo

Faremos uma planilha para conversĂŁo de valores, entĂŁo na planilha 1 vamos ter um campo para que se coloque o valore em real H DXWRPDWLFDPHQWH HOH IDUi D FRQYHUVmR SDUD RXWUDV PRHGDV PRQWH D VHJXLQWH SODQLOKD 9DPRV UHQRPHDU D SODQLOKD SDUD UHVXOWDGR

3DUD LVVR Gr XP GXSOR FOLTXH QR QRPH GH VXD SODQLOKD 3ODQ H GLJLWH R QRYR QRPH 6DOYH VHX DUTXLYR H FOLTXH QD JXLD 3ODQ H GLJLWH D VHJXLQWH SODQLOKD

Renomeie essa planilha para valores 5HWRUQH D SODQLOKD UHVXOWDGR H FRORTXH XP YDORU TXDOTXHU QR FDPSR RQGH VHUi GLJLWDGR YDORU

Didatismo e Conhecimento

151


CONHECIMENTOS DE INFORMร TICA

&OLTXH DJRUD QR FDPSR RQGH VHUi FRORFDGR R YDORU GH FRPSUD GR GyODU QD FpOXOD % H FOLTXH QD FpOXOD RQGH HVWi R YDORU TXH DFDERX GH GLJLWDU FpOXOD % DGLFLRQH R VLQDO GH GLYLVmR H GHSRLV FOLTXH QD SODQLOKD YDORUHV HOH YDL FRORFDU R QRPH GD SODQLOKD VHJXLGR GH XP SRQWR GH H[FODPDomR H FOLTXH RQGH HVWi R YDORU GH FRPSUD GR GyODU $ IXQomR ยฟFDUi GD VHJXLQWH IRUPD % YDORUHV %

&RP LVVR WRGD YH] TXH HX DOWHUDU QD SODQLOKD YDORUHV R YDORU GR GyODU HOH DWXDOL]D QD SODQLOKD UHVXOWDGR )DoD R FiOFXOR SDUD R YDORU GR GyODU SDUD YHQGD D IXQomR ยฟFDUi GD VHJXLQWH IRUPD % YDORUHV & 3DUD SRGHU FRSLDU D IyUPXOD SDUD DV GHPDLV FpOXODV EORTXHLH D FpOXOD % TXH p UHIHUHQWH DR YDORU HP UHDO O ideal nesta planilha รฉ que a รบnica cรฉlula onde o usuรกrio possa manipular seja a cรฉlula onde serรก digitado valor em real para a FRQYHUVmR HQWmR YDPRV EORTXHDU D SODQLOKD GHL[DQGR HVVD FpOXOD GHVSURWHJLD Clique na cรฉlula onde serรก digitado o valor em real depois na ABA Inicio no grupo Fonte clique na faixa e na janela que se abre FOLTXH QD JXLD 3URWHomR 'HVPDUTXH D RSomR %ORTXHDGDV LVVR p QHFHVViULR SRLV HVWD FpOXOD p D ~QLFD TXH SRGHUi UHFHEHU GDGRV

&OLTXH DJRUD QD $%$ 5HYLVmR H QR JUXSR $OWHUDo}HV FOLTXH QR ERWmR 3URWHJHU 3ODQLOKD Didatismo e Conhecimento

152


CONHECIMENTOS DE INFORMร TICA

Serรก mostrada mais uma janela coloque uma senha (recomendรกvel)

Ao tentar alterar uma cรฉlula protegida serรก mostrado o seguinte aviso

6H SUHFLVDU DOWHUDU DOJXPD FpOXOD SURWHJLGD EDVWD FOLFDU QR ERWmR 'HVSURWHJHU 3ODQLOKD QR JUXSR $OWHUDo}HV

Inserรงรฃo de Objetos $ LQVHUomR GH REMHWRV QR ([FHO p PXLWR VHPHOKDQWH DR TXH DSUHQGHPRV QR :RUG DV RSo}HV GH LQVHUomR GH REMHWRV HVWmR QD $%$ ,QVHULU

Didatismo e Conhecimento

153


CONHECIMENTOS DE INFORMÁTICA 3RGHPRV LQVHULU ,PDJHQV FOLS DUWV IRUPDV 6PDUW$UW FDL[DV GH WH[WR :RUG$UW REMHWRV VtPERORV HWF &RPR D PDLRULD GRV HOHPHQWRV Mi VDEHPRV FRPR LPSOHPHQWDU YDPRV IRFDU HP *Ui¿FRV *Ui¿FRV $ XWLOL]DomR GH XP JUi¿FR HP XPD SODQLOKD DOpP GH GHL[i OD FRP XPD DSDUrQFLD PHOKRU WDPEpP IDFLOLWD QD KRUD GH PRVWUDU UHVXOWDGRV $V RSo}HV GH JUi¿FRV HVWD QR JUXSR *Ui¿FRV QD $%$ ,QVHULU GR ([FHO

3DUD FULDU XP JUi¿FR p LPSRUWDQWH GHFLGLU TXDLV GDGRV VHUmR DYDOLDGRV SDUD R JUi¿FR 9DPRV XWLOL]DU D SODQLOKD $WOHWDV SDUD FULDUPRV QRVVR JUi¿FR YDPRV FULDU XP JUi¿FR TXH PRVWUH RV DWOHWDV [ SHVR 6HOHFLRQH D FROXQD FRP R QRPH GRV DWOHWDV SUHVVLRQH &75/ H VHOHFLRQH RV YDORUHV GR SHVR

$R FOLFDU HP XP GRV PRGHORV GH JUi¿FR QR JUXSR *Ui¿FRV YRFr SRGHUi VHOHFLRQDU XP WLSR GH JUi¿FR GLVSRQtYHO QR H[HPSOR FOLTXHL QR HVWLOR GH JUi¿FR GH FROXQDV

Didatismo e Conhecimento

154


CONHECIMENTOS DE INFORMÁTICA (VFROKD QR VXEJUXSR FROXQD ' D SULPHLUD RSomR H VHX JUi¿FR VHUi FULDGR

3DUD PRYHU R JUi¿FR SDUD TXDOTXHU SDUWH GH VXD SODQLOKD EDVWD FOLFDU HP XPD iUHD HP EUDQFR GH R JUi¿FR PDQWHU R PRXVH SUHVVLRQDGR H DUUDVWDU SDUD RXWUD SDUWH 1D SDUWH VXSHULRU GR ([FHO p PRVWUDGD D $%$ 'HVLJQ $FLPD GHOD )HUUDPHQWDV GH *Ui¿FR

6H YRFr TXLVHU PXGDU R HVWLOR GH VHX JUi¿FR YRFr SRGH FOLFDU QR ERWmR $OWHUDU 7LSR GH *Ui¿FR

3DUD DOWHUDU D H[LELomR HQWUH OLQKDV H FROXQDV EDVWD FOLFDU QR ERWmR $OWHUDU /LQKD &ROXQD

$LQGD HP /D\RXW GR *Ui¿FR SRGHPRV PRGL¿FDU D GLVWULEXLomR GRV HOHPHQWRV GR *Ui¿FR

Didatismo e Conhecimento

155


CONHECIMENTOS DE INFORMÁTICA

3RGHPRV WDPEpP PRGL¿FDU R HVWLOR GH QRVVR JUi¿FR DWUDYpV GR JUXSR (VWLORV GH *Ui¿FR

3RGHPRV WDPEpP GHL[DU QRVVR JUi¿FR LVRODGR HP XPD QRYD SODQLOKD EDVWD FOLFDU QR ERWmR 0RYHU *Ui¿FR

Didatismo e Conhecimento

156


CONHECIMENTOS DE INFORMĂ TICA Dados O Excel possui uma ABA chamada Dados que permite importar dados de outras fontes, ou trabalhar os dados de uma planilha GR ([FHO

&ODVVLÂżFDomR 9DPRV DJRUD WUDEDOKDU FRP R JHUHQFLDPHQWR GH GDGRV FULDGRV QR ([FHO 9DPRV XWLOL]DU SDUD LVVR D SODQLOKD GH $WOHWDV &ODVVLÂżFDU XPD OLVWD GH GDGRV p PXLWR IiFLO H HVWH UHFXUVR SRGH VHU REWLGR SHOR ERWmR &ODVVLÂżFDU H )LOWUDU QD $%$ ,QLFLR RX SHOR JUXSR &ODVVLÂżFDU H )LOWUDU QD $%$ 'DGRV

9DPRV HQWmR VHOHFLRQDU RV GDGRV GH QRVVD SODQLOKD TXH VHUmR FODVVLÂżFDGRV

&OLTXH QR ERWmR &ODVVLÂżFDU

9RFr SUHFLVD GHÂżQLU TXDLV VHUmR RV FULWpULRV GH VXD FODVVLÂżFDomR RQGH GL] &ODVVLÂżFDU SRU FOLTXH H HVFROKD QRPH GHSRLV FOLTXH QR ERWmR $GLFLRQDU 1tYHO H FRORTXH 0RGDOLGDGH

Didatismo e Conhecimento

157


CONHECIMENTOS DE INFORMĂ TICA $QWHV GH FOLFDU HP 2. YHULÂżTXH VH HVWi PDUFDGD D RSomR 0HXV GDGRV FRQWrP FDEHoDOKRV SRLV VHOHFLRQDPRV D OLQKD GH WtWXORV HP QRVVD SODQLOKD H FOLTXH HP 2.

9RFr SRGH PXGDU D RUGHP GH FODVVLÂżFDomR VHPSUH TXH IRU QHFHVViULR EDVWD FOLFDU QR ERWmR GH &ODVVLÂżFDU Auto Filtro (VWH p XP UHFXUVR TXH SHUPLWH OLVWDU VRPHQWH RV GDGRV TXH YRFr SUHFLVD YLVXDOL]DU QR PRPHQWR HP VXD SODQLOKD &RP VHXV GDGRV VHOHFLRQDGRV FOLTXH QR ERWmR )LOWUR H REVHUYH TXH VHUi DGLFLRQDGR MXQWR D FDGD FpOXOD GR FDEHoDOKR GD SODQLOKD XPD VHWD

Estas setas permite visualizar somente os dados que te interessam na planilha, por exemplo caso eu precise da relação de atletas do VH[R IHPLQLQR EDVWD HX FOLFDU QD VHWD GR FDEHoDOKR VH[R H PDUFDU VRPHQWH )HPLQLQR TXH RV GHPDLV GDGRV GD SODQLOKD ¿FDUmR RFXOWRV

3RVVR DLQGD UHÂżQDU PDLV D PLQKD ÂżOWUDJHP FDVR SUHFLVH VDEHU GHQWUR GR VH[R IHPLQLQR TXDQWRV DWOHWDV HVWmR QD FDWHJRULD 3URÂżVVLRQDO HX IDoR XP QRYR ÂżOWUR QD FROXQD &DWHJRULD

Didatismo e Conhecimento

158


CONHECIMENTOS DE INFORMÁTICA

2EVHUYH TXH DV FROXQDV TXH HVWmR FRP ¿OWUR SRVVXHP XP tFRQH HP IRUPD GH IXQLO QR OXJDU GD VHWD 3DUD UHPRYHU RV ¿OWURV EDVWD FOLFDU QRV FDEHoDOKRV FRP ¿OWUR H HVFROKHU D RSomR VHOHFLRQDU WXGR 9RFr WDPEpP SRGH SHUVRQDOL]DU VHXV ¿OWURV DWUDYpV GD RSomR )LOWURV GH 7H[WR H )LOWUR GH Q~PHUR TXDQGR FRQWH~GR GD FpOXOD IRU XP Q~PHUR

Subtotais 3RGHPRV DJUXSDU QRVVRV GDGRV DWUDYpV GH VHXV YDORUHV YDPRV LQLFLDOPHQWH FODVVL¿FDU QRVVD SODQLOKD SHOR VH[R GRV DWOHWDV UHODFLRQDGR FRP D LGDGH

Didatismo e Conhecimento

159


CONHECIMENTOS DE INFORMĂ TICA

'HSRLV FOLTXH QR ERWmR 6XEWRWDO (P $ FDGD DOWHUDomR HP FRORTXH VH[R H HP $GLFLRQDU VXEWRWDO D GHL[H PDUFDGR DSHQDV 3HVR GHSRLV FOLTXH HP 2.

Observe na esquerda que são mostrados os níveis de visualização dos subtotais e que ele faz um total a cada sequência do sexo GRV DWOHWDV 3DUD UHPRYHU RV VXEWRWDLV EDVWD FOLFDU QR ERWmR 6XEWRWDO H QD MDQHOD TXH DSDUHFH FOLTXH HP 5HPRYHU 7RGRV Imprimindo planilhas &RPR YLPRV DQWHULRUPHQWH DR FOLFDU QR %RWmR 2I¿FH H QR ERWmR ,PSULPLU , teremos três opçþes de impressão: Impressão 5iSLGD 9LVXDOL]DomR GH ,PSUHVVmR H ,PSULPLU 9DPRV GHWDOKDU DV RSo}HV 9LVXDOL]DomR GH ,PSUHVVmR H ,PSULPLU Visualização de impressão $QWHV GH LPSULPLU TXDOTXHU GRFXPHQWR p LQWHUHVVDQWH WHU XPD YLVmR GH FRPR HOH ¿FDUi LPSUHVVR $OpP GH SHUPLWLU LVVR D RSomR 9LVXDOL]DomR GH LPSUHVVmR SRVVLELOLWD D H[HFXomR GH YiULRV DMXVWHV 2EVHUYH DV RSo}HV GD JXLD 9LVXDOL]DomR GH ,PSUHVVmR

2V JUXSRV TXH FRPS}HP HVVD JXLD VmR ,PSULPLU =RRP H 9LVXDOL]DU 1R JUXSR ,PSULPLU WHPRV R ERWmR ,PSULPLU TXH WHP D PHVPD IXQomR PRVWUDGD QD ÂżJXUD 7HPRV WDPEpP R ERWmR &RQÂżJXUDU 3iJLQD TXH DEUH XPD FDL[D GH GLiORJR FRP YiULDV JXLDV $ SULPHLUD UHIHUH VH D FRQÂżJXUDo}HV GH SiJLQDV

Didatismo e Conhecimento

160


CONHECIMENTOS DE INFORMĂ TICA

$ VHJXQGD JXLD SHUPLWH DOWHUDU D FRQÂżJXUDomR GDV PDUJHQV

No grupo Zoom, temos o botão Zoom TXH WHP D IXQomR GH DPSOLDU RX UHGX]LU D YLVXDOL]DomR GD SODQLOKD No grupo Visualizar, temos as seguintes opçþes:

Didatismo e Conhecimento

161


CONHECIMENTOS DE INFORMÁTICA MICROSOFT POWER POINT 2007 3URJUDPD XWLOL]DGR SDUD FULDomR H DSUHVHQWDo}HV GH 6OLGHV 3DUD LQLFLi OR EDVWD FOLFDU QR ERWmR ,QLFLDU GD EDUUD GH WDUHIDV GR :LQGRZV DSRQWDU SDUD 7RGRV RV 3URJUDPDV VHOHFLRQDU 0LFURVRIW 2I¿FH H FOLFDU HP 0LFURVRIW 2I¿FH 3RZHU3RLQW TELA DO POWERPOINT

ELEMENTOS DA TELA DO POWERPOINT ± %RWmR GR 0LFURVRIW 2I¿FH (OH VXEVWLWXL R PHQX $UTXLYR YHUV}HV DQWHULRUHV H HVWi ORFDOL]DGR QR FDQWR VXSHULRU HVTXHUGR GR SURJUDPD $R FOLFDU QR %RWmR GR 0LFURVRIW 2I¿FH , serão exibidos comandos básicos: 1RYR $EULU 6DOYDU 6DOYDU &RPR ,PSULPLU 3UHSDUDU (QYLDU 3XEOLFDU H )HFKDU 2 – Barra de Ferramentas de Acesso Rápido

/RFDOL]D VH QR FDQWR VXSHULRU HVTXHUGR DR ODGR GR %RWmR GR 0LFURVRIW 2I¿FH ORFDO SDGUmR p SHUVRQDOL]iYHO H FRQWpP XP FRQMXQWR GH FRPDQGRV LQGHSHQGHQWHV GD JXLD H[LELGD QR PRPHQWR e SRVVtYHO DGLFLRQDU ERW}HV TXH UHSUHVHQWDP FRPDQGRV j EDUUD H PRYHU D EDUUD GH XP GRV GRLV ORFDLV SRVVtYHLV 3 – Barra de Título ([LEH R QRPH GR SURJUDPD 0LFURVRIW 3RZHU3RLQW H WDPEpP H[LEH R QRPH GR GRFXPHQWR DWLYR 4 – Botões de Comando da Janela $FLRQDQGR HVVHV ERW}HV p SRVVtYHO PLQLPL]DU PD[LPL]DU H UHVWDXUDU D MDQHOD GR SURJUDPD 3RZHU3RLQW

Didatismo e Conhecimento

162


CONHECIMENTOS DE INFORMÁTICA 5 – Faixa de Opções $ )DL[D GH 2So}HV p XVDGD SDUD ORFDOL]DU UDSLGDPHQWH RV FRPDQGRV QHFHVViULRV SDUD H[HFXWDU XPD WDUHID 2V FRPDQGRV VmR RUJDQL]DGRV HP JUXSRV OyJLFRV UHXQLGRV HP JXLDV &DGD JXLD HVWi UHODFLRQDGD D XP WLSR GH DWLYLGDGH FRPR JUDYDomR RX GLVSRVLomR GH XPD SiJLQD 3DUD GLPLQXLU D GHVRUJDQL]DomR DOJXPDV JXLDV VmR H[LELGDV VRPHQWH TXDQGR QHFHVViULR 3RU H[HPSOR D JXLD )HUUDPHQWDV GH ,PDJHP VRPHQWH p H[LELGD TXDQGR XPD LPDJHP p VHOHFLRQDGD

1) Guias 2V JUXSRV HP FDGD JXLD GLYLGHP D WDUHID HP VXEWDUHIDV 2V ERW}HV GH FRPDQGR HP FDGD JUXSR H[HFXWDP XP FRPDQGR RX H[LEHP XP PHQX GH FRPDQGRV 6 – Painel de Anotações 1HOH p SRVVtYHO GLJLWDU DV DQRWDo}HV TXH VH GHVHMD LQFOXLU HP XP VOLGH 7 – Barra de Status ([LEH YiULDV LQIRUPDo}HV ~WHLV QD FRQIHFomR GRV VOLGHV HQWUH HODV R Q~PHUR GH VOLGHV WHPD H LGLRPD

8 – Nível de Zoom &OLFDU SDUD DMXVWDU R QtYHO GH ]RRP

&5,$5 $35(6(17$d®(6 &ULDU XPD DSUHVHQWDomR QR 0LFURVRIW 3RZHU3RLQW HQJORED LQLFLDU FRP XP GHVLJQ EiVLFR DGLFLRQDU QRYRV VOLGHV H FRQWH~GR HVFROKHU OD\RXWV PRGL¿FDU R GHVLJQ GR VOLGH VH GHVHMDU DOWHUDQGR R HVTXHPD GH FRUHV RX DSOLFDQGR GLIHUHQWHV PRGHORV GH HVWUXWXUD H FULDU HIHLWRV FRPR WUDQVLo}HV GH VOLGHV DQLPDGRV 3DUD LQLFLDU XPD QRYD DSUHVHQWDomR EDVWD FOLFDU QR %RWmR GR 0LFURVRIW 2I¿FH H HP VHJXLGD FOLFDU HP 1RYR

Então escolher um modelo para a apresentação (Em Branco, Modelos Instalados, Meus modelos, Novo com base em documento H[LVWHQWH RX 0RGHORV GR 0LFURVRIW 2I¿FH 2QOLQH 'HSRLV GH HVFROKLGR R PRGHOR FOLFDU HP &ULDU

Didatismo e Conhecimento

163


CONHECIMENTOS DE INFORMÁTICA

SELECIONAR SLIDE 3DUD VHOHFLRQDU XP VOLGH EDVWD FOLFDU QD JXLD 6OLGH QR SDLQHO j HVTXHUGD

LAYOUT 3DUD DOWHUDU R /D\RXW GR VOLGH VHOHFLRQDGR EDVWD FOLFDU QD *XLD ,QtFLR H GHSRLV QR ERWmR /D\RXW HVFROKD R OD\RXW GHVHMDGR FOLFDQGR VREUH HOH

Didatismo e Conhecimento

164


CONHECIMENTOS DE INFORMร TICA INSERIR TEXTO Antes de inserir o primeiro texto รฉ necessรกrio conhecer a aplicaรงรฃo de algumas teclas:

3DUD ID]HU D DFHQWXDomR GHYH VH GLJLWDU D WHFOD GH DFHQWR H GHSRLV D OHWUD D VHU DFHQWXDGD 4XDQGR D WHFOD FRUUHVSRQGHQWH DR DFHQWR IRU SUHVVLRQDGD QmR VDLUi QDGD QD WHOD Vy GHSRLV TXH IRU GLJLWDGD D OHWUD p TXH HOD DSDUHFHUi DFHQWXDGD

3DUD LQVHULU XP WH[WR QR VOLGH FOLFDU FRP R ERWmR HVTXHUGR GR PRXVH QR UHWkQJXOR &OLTXH SDUD DGLFLRQDU XP WtWXOR DSyV FOLFDU R SRQWR GH LQVHUomR FXUVRU VHUi H[LELGR

Didatismo e Conhecimento

165


CONHECIMENTOS DE INFORMĂ TICA (QWmR EDVWD FRPHoDU D GLJLWDU

FORMATAR TEXTO 3DUD DOWHUDU XP WH[WR p QHFHVViULR SULPHLUR VHOHFLRQi OR 3DUD VHOHFLRQDU XP WH[WR RX SDODYUD EDVWD FOLFDU FRP R ERWmR HVTXHUGR sobre o ponto em que se deseja iniciar a seleção e manter o botão pressionado, arrastar o mouse atÊ o ponto desejado e soltar o botão HVTXHUGR

Com o texto selecionado, basta clicar nos botþes para fazer as alteraçþes desejadas:

1 – Fonte Altera o tipo de fonte

Didatismo e Conhecimento

166


CONHECIMENTOS DE INFORMร TICA

2 โ Tamanho da fonte Altera o tamanho da fonte

3 โ Negrito $SOLFD QHJULWR DR WH[WR VHOHFLRQDGR 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO 1 4 โ Itรกlico $SOLFD ,WiOLFR DR WH[WR VHOHFLRQDGR 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO , 5 โ Sublinhado 6XEOLQKD R WH[WR VHOHFLRQDGR 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO 6 6 โ Tachado 'HVHQKD XPD OLQKD QR PHLR GR WH[WR VHOHFLRQDGR 7 โ Sombra de Texto $GLFLRQD XPD VRPEUD DWUiV GR WH[WR VHOHFLRQDGR SDUD GHVWDFi OR QR VOLGH 8 โ Espaรงamento entre Caracteres $MXVWD R HVSDoDPHQWR HQWUH FDUDFWHUHV

Didatismo e Conhecimento

167


CONHECIMENTOS DE INFORMĂ TICA 9 – MaiĂşsculas e MinĂşsculas $OWHUD WRGR R WH[WR VHOHFLRQDGR SDUD 0$,Ă’6&8/$6 PLQ~VFXODV RX RXWURV XVRV FRPXQV GH PDL~VFXODV PLQ~VFXODV 10 – Cor da Fonte $OWHUD D FRU GD IRQWH 11 – Alinhar Texto Ă Esquerda $OLQKD R WH[WR j HVTXHUGD 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO 4 12 – Centralizar &HQWUDOL]D R WH[WR 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO ( 13 – Alinhar Texto Ă Direita $OLQKD R WH[WR j GLUHLWD 7DPEpP SRGH VHU DFLRQDGR DWUDYpV GR FRPDQGR &WUO * Âą -XVWLÂżFDU Alinha o texto Ă s margens esquerda e direita, adicionando espaço extra entre as palavras conforme o necessĂĄrio, promovendo uma DSDUrQFLD RUJDQL]DGD QDV ODWHUDLV HVTXHUGD H GLUHLWD GD SiJLQD 15 – Colunas 'LYLGH R WH[WR HP GXDV RX PDLV FROXQDV INSERIR SĂ?MBOLOS ESPECIAIS $OpP GRV FDUDFWHUHV TXH DSDUHFHP QR WHFODGR p SRVVtYHO LQVHULU QR VOLGH YiULRV FDUDFWHUHV H VtPERORV HVSHFLDLV 1. 3RVLFLRQDU R FXUVRU QR ORFDO TXH VH GHVHMD LQVHULU R VtPEROR

$FLRQDU D JXLD ,QVHULU

&OLFDU QR ERWmR 6tPEROR

Didatismo e Conhecimento

168


CONHECIMENTOS DE INFORMĂ TICA 6HOHFLRQDU R VtPEROR

&OLFDU HP ,QVHULU H HP VHJXLGD )HFKDU MARCADORES E NUMERĂ‡ĂƒO Com a guia InĂ­cio acionada, clicar no botĂŁo

Com a guia InĂ­cio acionada, clicar no botĂŁo UDomR FOLFDU QD VHWD

Didatismo e Conhecimento

SDUD FULDU SDUiJUDIRV FRP PDUFDGRUHV 3DUD HVFROKHU R WLSR GH PDUFDGRU FOLFDU QD VHWD

SDUD LQLFLDU XPD OLVWD QXPHUDGD 3DUD HVFROKHU GLIHUHQWHV IRUPDWRV GH QXPH-

169


CONHECIMENTOS DE INFORMÁTICA INSERIR NOVO SLIDE 3DUD LQVHULU XP QRYR VOLGH DFLRQDU D JXLD ,QtFLR H FOLFDU QR ERWmR

'HSRLV FOLFDU QR OD\RXW GHVHMDGR

EXCLUIR SLIDE 3DUD H[FOXLU XP VOLGH EDVWD VHOHFLRQi OR H GHSRLV FOLFDU QR ERWmR

ORFDOL]DGR QD JXLD ,QtFLR

LIMPAR FORMATAÇÃO 3DUD OLPSDU WRGD D IRUPDWDomR GH XP WH[WR EDVWD VHOHFLRQi OR H FOLFDU QR ERWmR

ORFDOL]DGR QD JXLD ,QtFLR

SALVAR ARQUIVO $SyV FULDU XPD DSUHVHQWDomR p QHFHVViULR HIHWXDU D JUDYDomR GR DUTXLYR HVVD RSHUDomR p FKDPDGD GH ³6DOYDU´ 6H R DUTXLYR QmR IRU VDOYR FRUUH VH R ULVFR GH SHUGr OR SRU XPD HYHQWXDO IDOWD GH HQHUJLD RX SRU RXWUR PRWLYR TXH FDXVH D VDtGD EUXVFD GR SURJUDPD 3DUD VDOYDU R DUTXLYR DFLRQDU R %RWmR GR 0LFURVRIW 2I¿FH e clicar em Salvar, ou clicar no botão SAIR DO POWERPOINT 3DUD VDLU GR 0LFURVRIW 2I¿FH 3RZHU3RLQW XWLOL]DU DV VHJXLQWHV RSo}HV $FLRQDU R %RWmR GR 0LFURVRIW 2I¿FH &OLFDU QR %RWmR )HFKDU

H FOLFDU HP 6DLU GR 3RZHU3RLQW

3UHVVLRQDU DV WHFODV $/7 )

Didatismo e Conhecimento

170


CONHECIMENTOS DE INFORMÁTICA 6H R DUTXLYR QmR IRL VDOYR DLQGD RX VH DV ~OWLPDV DOWHUDo}HV QmR IRUDP JUDYDGDV R 3RZHU3RLQW HPLWLUi XPD PHQVDJHP DOHUWDQGR R GR IDWR

MS OUTLOOK 2 0LFURVRIW 2XWORRN RIHUHFH H[FHOHQWHV IHUUDPHQWDV GH JHUHQFLDPHQWR GH HPDLOV SUR¿VVLRQDLV H SHVVRDLV SDUD PDLV GH PLOK}HV GH XVXiULRV GR 0LFURVRIW 2I¿FH QR PXQGR WRGR &RP R ODQoDPHQWR GR 2XWORRN YRFr WHUi XPD VpULH GH H[SHULrQFLDV PDLV ULFDV SDUD DWHQGHU jV VXDV QHFHVVLGDGHV GH FRPXQLFDomR QR WUDEDOKR HP FDVD H QD HVFROD 'R YLVXDO UHGHVHQKDGR DRV DYDQoDGRV UHFXUVRV GH RUJDQL]DomR GH HPDLOV SHVTXLVD FRPXQLFDomR H UHGHV VRFLDLV R 2XWORRN SURSRUFLRQD XPD H[SHULrQFLD IDQWiVWLFD SDUD YRFr VH PDQWHU SURGXWLYR H HP FRQWDWR FRP VXDV UHGHV SHVVRDLV H SUR¿VVLRQDLV Adicionar uma conta de email $QWHV GH SRGHU HQYLDU H UHFHEHU HPDLOV QR 2XWORRN YRFr SUHFLVD DGLFLRQDU H FRQ¿JXUDU XPD FRQWD GH HPDLO 6H WLYHU XVDGR XPD YHUVmR DQWHULRU GR 0LFURVRIW 2XWORRN QR PHVPR FRPSXWDGRU HP TXH LQVWDORX R 2XWORRN VXDV FRQ¿JXUDo}HV GH FRQWD VHUmR LPSRUWDGDV DXWRPDWLFDPHQWH 6H YRFr QmR WHP H[SHULrQFLD FRP R 2XWORRN RX VH HVWLYHU LQVWDODQGR R 2XWORRN HP XP FRPSXWDGRU QRYR R UHFXUVR &RQ¿JXUDomR $XWRPiWLFD GH &RQWD VHUi LQLFLDGR DXWRPDWLFDPHQWH H R DMXGDUi D FRQ¿JXUDU DV GH¿QLo}HV GH VXDV FRQWDV GH HPDLO (VVD FRQ¿JXUDomR H[LJH VRPHQWH VHX QRPH HQGHUHoR GH HPDLO H VHQKD 6H QmR IRU SRVVtYHO FRQ¿JXUDU VXD FRQWD GH HPDLO DXWRPDWLFDPHQWH VHUi QHFHVViULR GLJLWDU DV LQIRUPDo}HV DGLFLRQDLV REULJDWyULDV PDQXDOPHQWH &OLTXH QD JXLD $UTXLYR (P 'DGRV GD &RQWD H FOLTXH HP $GLFLRQDU &RQWD

Sobre contas de email 2 2XWORRN Gi VXSRUWH D FRQWDV GR 0LFURVRIW ([FKDQJH 323 H ,0$3 6HX ,63 SURYHGRU GH VHUYLoRV GH ,QWHUQHW RX DGPLQLVWUDGRU GH HPDLOV SRGH OKH IRUQHFHU DV LQIRUPDo}HV QHFHVViULDV SDUD D FRQ¿JXUDomR GD VXD FRQWD GH HPDLO QR 2XWORRN &RQWDV GH HPDLO HVWmR FRQWLGDV HP XP SHU¿O 8P SHU¿O p FRPSRVWR GH FRQWDV DUTXLYRV GH GDGRV H FRQ¿JXUDo}HV TXH HVSHFL¿FDP RQGH DV VXDV PHQVDJHQV GH HPDLO VmR VDOYDV 8P QRYR SHU¿O p FULDGR DXWRPDWLFDPHQWH TXDQGR R 2XWORRN p H[HFXWDQGR SHOD SULPHLUD YH] $GLFLRQDU XPD FRQWD GH HPDLO DR LQLFLDU R 2XWORRN SHOD SULPHLUD YH] 6H YRFr DLQGD QmR WHP H[SHULrQFLD FRP R 2XWORRN RX VH HVWLYHU LQVWDODQGR R 2XWORRN HP XP FRPSXWDGRU QRYR R UHFXUVR &RQ¿JXUDomR $XWRPiWLFD GH &RQWD VHUi LQLFLDGR DXWRPDWLFDPHQWH H R DMXGDUi D GH¿QLU DV FRQ¿JXUDo}HV GDV VXDV FRQWDV GH HPDLO (VVH SURFHVVR H[LJH VRPHQWH VHX QRPH HQGHUHoR GH HPDLO H VHQKD 6H QmR IRU SRVVtYHO FRQ¿JXUDU D VXD FRQWD GH HPDLO DXWRPDWLFDPHQWH YRFr SUHFLVDUi LQVHULU DV LQIRUPDo}HV DGLFLRQDLV REULJDWyULDV PDQXDOPHQWH

Didatismo e Conhecimento

171


CONHECIMENTOS DE INFORMร TICA ,QLFLH R 2XWORRN 4XDQGR VROLFLWDGR D FRQยฟJXUDU XPD FRQWD GH HPDLO FOLTXH HP $YDQoDU

3DUD DGLFLRQDU XPD FRQWD GH HPDLO FOLTXH HP 6LP H GHSRLV HP $YDQoDU ,QVLUD VHX QRPH HQGHUHoR GH HPDLO H VHQKD H FOLTXH HP $YDQoDU

Observaรงรฃo: Quando o seu computador estรก conectado a um domรญnio de rede de uma organizaรงรฃo que usa o Microsoft Exchange 6HUYHU VXDV LQIRUPDo}HV GH HPDLO VmR DXWRPDWLFDPHQWH LQVHULGDV $ VHQKD QmR DSDUHFH SRUTXH D VXD VHQKD GH UHGH p XVDGD 8P LQGLFDGRU GH SURJUHVVR p H[LELGR j PHGLGD TXH D VXD FRQWD HVWi VHQGR FRQยฟJXUDGD 2 SURFHVVR GH FRQยฟJXUDomR SRGH OHYDU YiULRV PLQXWRV

Didatismo e Conhecimento

172


CONHECIMENTOS DE INFORMÁTICA 6H D WHQWDWLYD LQLFLDO GH FRQ¿JXUDU D FRQWD IDOKDU XPD VHJXQGD WHQWDWLYD SRGHUi VHU IHLWD FRP R XVR GH XPD FRQH[mR QmR FULSWRJUDIDGD FRP R VHUYLGRU GH HPDLO 6H YRFr YLU HVVD PHQVDJHP FOLTXH HP $YDQoDU SDUD FRQWLQXDU 6H D FRQH[mR QmR FULSWRJUDIDGD WDPEpP IDOKDU QmR VHUi SRVVtYHO FRQ¿JXUDU D VXD FRQWD GH HPDLO DXWRPDWLFDPHQWH

&OLTXH HP 5HSHWLU RX PDUTXH D FDL[D GH VHOHomR &RQ¿JXUDU VHUYLGRU PDQXDOPHQWH 'HSRLV TXH D FRQWD IRU DGLFLRQDGD FRP r[LWR YRFr SRGHUi DGLFLRQDU PDLV FRQWDV FOLFDQGR HP $GLFLRQDU RXWUD FRQWD

3DUD VDLU GD FDL[D GH GLiORJR $GLFLRQDU 1RYD &RQWD FOLTXH HP &RQFOXLU 6H YRFr WLYHU DGLFLRQDGR XPD FRQWD GR ([FKDQJH 6HUYHU GHYHUi VDLU H UHLQLFLDU R 2XWORRN SDUD TXH HVVD FRQWD DSDUHoD H SRVVD VHU XVDGD QR 2XWORRN 2EVHUYDomR 6H R VHX SHU¿O Mi WLYHU XPD FRQWD GR 0LFURVRIW ([FKDQJH 6HUYHU H YRFr TXLVHU DGLFLRQDU RXWUD VHUi QHFHVViULR XVDU D &RQ¿JXUDomR $XWRPiWLFD GH &RQWD 3DUD FRQ¿JXUDU PDQXDOPHQWH XPD FRQWD DGLFLRQDO GR ([FKDQJH 6HUYHU YRFr GHYH VDLU GR 2XWORRN H GHSRLV XVDU R PyGXOR (PDLO QR 3DLQHO GH &RQWUROH Adicionar uma conta de email manualmente ([LVWHP WUrV PDQHLUDV GH DGLFLRQDU PDQXDOPHQWH VXD FRQWD GH HPDLO $ PDLRULD GDV SHVVRDV Vy SRVVXL XP SHU¿O H GHYHUi XVDU D VHomR $GLFLRQDU DR SHU¿O HP H[HFXomR 2EVHUYDomR $ FRQ¿JXUDomR PDQXDO GH FRQWDV GR 0LFURVRIW ([FKDQJH QmR SRGH VHU IHLWD HQTXDQWR R 2XWORRN HVWLYHU HP H[HFXomR 8VH DV HWDSDV GDV VHo}HV $GLFLRQDU D XP SHU¿O H[LVWHQWH RX $GLFLRQDU D XP QRYR SHU¿O $GLFLRQDU DR SHU¿O HP H[HFXomR &OLTXH QD JXLD $UTXLYR 1D JXLD ,QIR HP ,QIRUPDo}HV GD &RQWD FOLTXH HP &RQ¿JXUDo}HV GH &RQWD &OLTXH HP &RQ¿JXUDo}HV GH &RQWD &OLTXH HP $GLFLRQDU &RQWD

Didatismo e Conhecimento

173


CONHECIMENTOS DE INFORMร TICA $GLFLRQDU D XP SHUยฟO H[LVWHQWH )HFKH R 2XWORRN 1R 3DLQHO GH &RQWUROH FOLTXH RX FOLTXH GXDV YH]HV HP (PDLO $ EDUUD GH WtWXOR GD FDL[D GH GLiORJR &RQยฟJXUDU (PDLO FRQWpP R QRPH GR SHUยฟO DWXDO 3DUD VHOHFLRQDU XP SHUยฟO GLIHUHQWH Mi H[LVWHQWH FOLTXH HP 0RVWUDU 3HUยฟV VHOHFLRQH R QRPH GR SHUยฟO H HP VHJXLGD FOLTXH HP 3URSULHGDGHV &OLTXH HP &RQWDV GH (PDLO $GLFLRQDU D XP QRYR SHUยฟO )HFKH R 2XWORRN 1R 3DLQHO GH &RQWUROH FOLTXH RX FOLTXH GXDV YH]HV QR PyGXOR (PDLO (P 3HUยฟV FOLTXH HP 0RVWUDU 3HUยฟV &OLTXH HP $GLFLRQDU 1D FDL[D GH GLiORJR 1RYR 3HUยฟO GLJLWH XP QRPH SDUD R SHUยฟO H HP VHJXLGD FOLTXH HP 2. 7UDWD VH GR QRPH TXH YRFr Yr DR LQLFLDU R 2XWORRN FDVR FRQยฟJXUH R 2XWORRN SDUD VROLFLWDU R SHUยฟO D VHU XVDGR &OLTXH HP &RQWDV GH (PDLO &RQยฟJXUDU PDQXDOPHQWH XPD FRQWD 323 RX ,0$3 8PD FRQWD 323 p R WLSR PDLV FRPXP GH FRQWD GH HPDLO 8PD FRQWD ,0$3 p XP WLSR DYDQoDGR GH FRQWD GH HPDLO TXH RIHUHFH YiULDV SDVWDV GH HPDLO HP XP VHUYLGRU GH HPDLOV $V FRQWDV GR *RRJOH *0DLO H GD $2/ SRGHP VHU XVDGDV QR 2XWORRN FRPR FRQWDV ,0$3 6H QmR VRXEHU DR FHUWR TXDO p R WLSR GD VXD FRQWD HQWUH HP FRQWDWR FRP R VHX SURYHGRU GH VHUYLoRV GH ,QWHUQHW ,63 RX DGPLQLVWUDGRU GH HPDLO &OLTXH HP 'HยฟQLU PDQXDOPHQWH DV FRQยฟJXUDo}HV GR VHUYLGRU RX WLSRV GH VHUYLGRU DGLFLRQDLV H HP $YDQoDU &OLTXH HP (PDLO GD ,QWHUQHW H HP $YDQoDU (P ,QIRUPDo}HV GR 8VXiULR IDoD R VHJXLQWH x 1D FDL[D 1RPH GLJLWH VHX QRPH GD IRUPD TXH DSDUHFHUi SDUD DV RXWUDV SHVVRDV x 1D FDL[D (QGHUHoR GH (PDLO GLJLWH R HQGHUHoR GH HPDLO FRPSOHWR DWULEXtGR SRU VHX DGPLQLVWUDGRU GH HPDLO RX ,63 1mR VH HVTXHoD GH LQFOXLU R QRPH GH XVXiULR R VtPEROR # H R QRPH GR GRPtQLR FRPR SRU H[HPSOR SDW#FRQWRVR FRP x 1DV FDL[DV 6HQKD H &RQยฟUPDU 6HQKD GLJLWH D VHQKD DWULEXtGD RX FULDGD SRU YRFr 'LFD $ VHQKD SRGHUi GLIHUHQFLDU PDL~VFXODV GH PLQ~VFXODV 9HULยฟTXH VH D WHFOD &$36 /2&. IRL SUHVVLRQDGD GXUDQWH D LQVHUomR GD VXD VHQKD Em Informaรงรตes do Servidor, faรงa o seguinte: x 1D FDL[D GH OLVWDJHP 7LSR GH &RQWD HVFROKD 323 RX ,0$3 x Na caixa Servidor de entrada de emails, digite o nome completo do servidor fornecido pelo provedor de serviรงos de Internet RX SHOR DGPLQLVWUDGRU GH HPDLO *HUDOPHQWH p PDLO VHJXLGR GR QRPH GH GRPtQLR SRU H[HPSOR PDLO FRQWRVR FRP x 1D FDL[D 6HUYLGRU GH VDtGD GH HPDLOV 6073 GLJLWH R QRPH FRPSOHWR GR VHUYLGRU IRUQHFLGR SHOR SURYHGRU GH VHUYLoRV GH ,QWHUQHW RX SHOR DGPLQLVWUDGRU GH HPDLO *HUDOPHQWH p PDLO VHJXLGR GR QRPH GR GRPtQLR SRU H[HPSOR PDLO FRQWRVR FRP Em Informaรงรตes de Logon, faรงa o seguinte: x 1D FDL[D 1RPH GH 8VXiULR GLJLWH R QRPH GR XVXiULR IRUQHFLGR SHOR SURYHGRU RX SHOR DGPLQLVWUDGRU GH HPDLO (OH SRGH fazer parte do seu endereรงo de email antes do sรญmbolo @, como pat, ou pode ser o seu endereรงo de email completo, como pat@ FRQWRVR FRP x Na caixa Senha, digite a senha fornecida pelo provedor ou pelo administrador de email ou uma senha que tenha sido criada SRU YRFr x 0DUTXH D FDL[D GH VHOHomR /HPEUDU VHQKD 2EVHUYDomR 9RFr WHP D RSomR GH VDOYDU VXD VHQKD GLJLWDQGR D QD FDL[D 6HQKD H PDUFDQGR D FDL[D GH VHOHomR /HPEUDU VHQKD 6H YRFr HVFROKHX HVVD RSomR QmR SUHFLVDUi GLJLWDU D VHQKD VHPSUH TXH DFHVVDU D FRQWD 1R HQWDQWR LVVR WDPEpP WRUQD D FRQWD YXOQHUiYHO D TXDOTXHU SHVVRD TXH WHQKD DFHVVR DR VHX FRPSXWDGRU 2SFLRQDOPHQWH YRFr SRGHUi GHQRPLQDU VXD FRQWD GH HPDLO FRPR HOD DSDUHFH QR 2XWORRN ,VVR VHUi ~WLO FDVR YRFr HVWHMD XVDQGR PDLV GH XPD FRQWD GH HPDLO &OLTXH HP 0DLV &RQยฟJXUDo}HV 1D JXLD *HUDO HP &RQWD GH (PDLO GLJLWH XP QRPH TXH DMXGDUi D LGHQWLยฟFDU D FRQWD SRU H[HPSOR 0HX (PDLO GH 3URYHGRU GH 6HUYLoRV GH ,QWHUQHW 5HVLGHQFLDO $ VXD FRQWD GH HPDLO SRGH H[LJLU XPD RX PDLV GDV FRQยฟJXUDo}HV DGLFLRQDLV D VHJXLU (QWUH HP FRQWDWR FRP R VHX ,63 VH WLYHU G~YLGDV VREUH TXDLV FRQยฟJXUDo}HV XVDU SDUD VXD FRQWD GH HPDLO x $XWHQWLFDomR GH 6073 &OLTXH HP 0DLV &RQยฟJXUDo}HV 1D JXLD 6DtGD PDUTXH D FDL[D GH VHOHomR 0HX VHUYLGRU GH VDtGD GH HPDLOV UHTXHU DXWHQWLFDomR FDVR LVVR VHMD H[LJLGR SHOD FRQWD

Didatismo e Conhecimento

174


CONHECIMENTOS DE INFORMÁTICA x &ULSWRJUD¿D GH 323 3DUD FRQWDV 323 FOLTXH HP 0DLV &RQ¿JXUDo}HV 1D JXLD $YDQoDGD HP 1~PHURV GDV SRUWDV GR VHUYLGRU HP 6HUYLGRU GH HQWUDGD 323 PDUTXH D FDL[D GH VHOHomR 2 VHUYLGRU UHTXHU XPD FRQH[mR FULSWRJUDIDGD 66/ FDVR R SURYHGRU GH VHUYLoRV GH ,QWHUQHW LQVWUXD YRFr D XVDU HVVD FRQ¿JXUDomR x &ULSWRJUD¿D GH ,0$3 3DUD FRQWDV ,0$3 FOLTXH HP 0DLV &RQ¿JXUDo}HV 1D JXLD $YDQoDGD HP 1~PHURV GDV SRUWDV GR VHUYLGRU HP 6HUYLGRU GH HQWUDGD ,0$3 SDUD D RSomR 8VDU R VHJXLQWH WLSR GH FRQH[mR FULSWRJUDIDGD FOLTXH HP 1HQKXPD 66/ 7/6 RX $XWRPiWLFD FDVR R SURYHGRU GH VHUYLoRV GH ,QWHUQHW LQVWUXD YRFr D XVDU XPD GHVVDV FRQ¿JXUDo}HV x &ULSWRJUD¿D GH 6073 &OLTXH HP 0DLV &RQ¿JXUDo}HV 1D JXLD $YDQoDGD HP 1~PHURV GDV SRUWDV GR VHUYLGRU HP 6HUYLGRU GH VDtGD 6073 SDUD D RSomR 8VDU R VHJXLQWH WLSR GH FRQH[mR FULSWRJUDIDGD FOLTXH HP 1HQKXPD 66/ 7/6 RX $XWRPiWLFD FDVR R SURYHGRU GH VHUYLoRV GH LQWHUQHW LQVWUXD YRFr D XVDU XPD GHVVDV FRQ¿JXUDo}HV 2SFLRQDOPHQWH FOLTXH HP 7HVWDU &RQ¿JXUDo}HV GD &RQWD SDUD YHUL¿FDU VH D FRQWD HVWi IXQFLRQDQGR 6H KRXYHU LQIRUPDo}HV DXVHQWHV RX LQFRUUHWDV FRPR D VHQKD VHUi VROLFLWDGR TXH VHMDP IRUQHFLGDV RX FRUULJLGDV 9HUL¿TXH VH R FRPSXWDGRU HVWi FRQHFWDGR FRP D ,QWHUQHW &OLTXH HP $YDQoDU &OLTXH HP &RQFOXLU &RQ¿JXUDU PDQXDOPHQWH XPD FRQWD GR 0LFURVRIW ([FKDQJH As contas do Microsoft Exchange são usadas por organizações como parte de um pacote de ferramentas de colaboração incluindo PHQVDJHQV GH HPDLO FDOHQGiULR H DJHQGDPHQWR GH UHXQL}HV H FRQWUROH GH WDUHIDV $OJXQV SURYHGRUHV GH VHUYLoRV GH ,QWHUQHW ,63V WDPEpP RIHUHFHP FRQWDV GR ([FKDQJH KRVSHGDGDV 6H QmR HVWLYHU FHUWR VREUH R WLSR GH FRQWD TXH XWLOL]D HQWUH HP FRQWDWR FRP R VHX ,63 RX DGPLQLVWUDGRU GH HPDLO $ FRQ¿JXUDomR PDQXDO GH FRQWDV GR 0LFURVRIW ([FKDQJH QmR SRGH VHU IHLWD HQTXDQWR R 2XWORRN HVWLYHU HP H[HFXomR 3DUD DGLFLRQDU XPD FRQWD GR 0LFURVRIW ([FKDQJH VLJD DV HWDSDV GH $GLFLRQDU D XP SHU¿O H[LVWHQWH RX $GLFLRQDU D XP QRYR SHU¿O H VLJD XP destes procedimentos: &OLTXH HP 'H¿QLU PDQXDOPHQWH DV FRQ¿JXUDo}HV GR VHUYLGRU RX WLSRV GH VHUYLGRU DGLFLRQDLV H HP $YDQoDU &OLTXH HP 0LFURVRIW ([FKDQJH H HP VHJXLGD FOLTXH HP $YDQoDU 'LJLWH R QRPH DWULEXtGR SHOR DGPLQLVWUDGRU GH HPDLO SDUD R VHUYLGRU H[HFXWDQGR R ([FKDQJH 3DUD XVDU DV &RQ¿JXUDo}HV GR 0RGR &DFKH GR ([FKDQJH PDUTXH D FDL[D GH VHOHomR 8VDU R 0RGR &DFKH GR ([FKDQJH 1D FDL[D 1RPH GH 8VXiULR GLJLWH R QRPH GR XVXiULR DWULEXtGR DR DGPLQLVWUDGRU GH HPDLO (OH QmR FRVWXPD VHU VHX QRPH FRPSOHWR Opcionalmente, siga um destes procedimentos: x &OLTXH HP 0DLV &RQ¿JXUDo}HV 1D JXLD *HUDO HP &RQWD GH (PDLO GLJLWH R QRPH TXH DMXGDUi D LGHQWL¿FDU D FRQWD SRU H[HPSOR 0HX (PDLO GH 7UDEDOKR x &OLTXH HP 0DLV &RQ¿JXUDo}HV (P TXDOTXHU XPD GDV JXLDV FRQ¿JXUH DV RSo}HV GHVHMDGDV x &OLTXH HP 9HUL¿FDU 1RPHV SDUD FRQ¿UPDU VH R VHUYLGRU UHFRQKHFH R VHX QRPH H VH R FRPSXWDGRU HVWi FRQHFWDGR FRP D UHGH 2V QRPHV GH FRQWD H GH VHUYLGRU HVSHFL¿FDGRV QDV HWDSDV H GHYHP VH WRUQDU VXEOLQKDGRV 6H LVVR QmR DFRQWHFHU HQWUH HP FRQWDWR FRP R DGPLQLVWUDGRU GR ([FKDQJH 6H YRFr FOLFRX HP 0DLV &RQ¿JXUDo}HV H DEULX D FDL[D GH GLiORJR 0LFURVRIW ([FKDQJH 6HUYHU FOLTXH HP 2. &OLTXH HP $YDQoDU &OLTXH HP &RQFOXLU Remover uma conta de email &OLTXH QD JXLD $UTXLYR (P ,QIRUPDo}HV GD &RQWD FOLTXH HP &RQ¿JXUDo}HV GH &RQWD H GHSRLV HP &RQ¿JXUDo}HV GH &RQWD

Didatismo e Conhecimento

175


CONHECIMENTOS DE INFORMÁTICA 6HOHFLRQH D FRQWD GH HPDLO TXH YRFr GHVHMD UHPRYHU H FOLTXH HP 5HPRYHU 3DUD FRQ¿UPDU D UHPRomR GD FRQWD FOLTXH HP 6LP 3DUD UHPRYHU XPD FRQWD GH HPDLO GH XP SHU¿O GLIHUHQWH HQFHUUH H UHLQLFLH R 2XWORRN FRP R RXWUR SHU¿O H VLJD DV HWDSDV DQWHULRUHV 9RFr WDPEpP SRGH UHPRYHU FRQWDV GH RXWURV SHU¿V GD VHJXLQWH IRUPD 6DLD GR 2XWORRN 1R 3DLQHO GH &RQWUROH FOLTXH RX FOLTXH GXDV YH]HV HP (PDLO $ EDUUD GH WtWXOR GD FDL[D GH GLiORJR &RQ¿JXUDU (PDLO FRQWpP R QRPH GR SHU¿O DWXDO 3DUD VHOHFLRQDU XP SHU¿O GLIHUHQWH Mi H[LVWHQWH FOLTXH HP 0RVWUDU 3HU¿V VHOHFLRQH R QRPH GR SHU¿O H HP VHJXLGD FOLTXH HP 3URSULHGDGHV &OLTXH HP &RQWDV GH (PDLO 6HOHFLRQH D FRQWD H FOLTXH HP 5HPRYHU 3DUD FRQ¿UPDU D UHPRomR GD FRQWD FOLTXH HP 6LP Observações x $ UHPRomR GH XPD FRQWD GH HPDLO 323 RX ,0$3 QmR H[FOXL RV LWHQV HQYLDGRV H UHFHELGRV FRP R XVR GHVVD FRQWD 6H YRFr HVWLYHU XVDQGR XPD FRQWD 323 DLQGD SRGHUi XVDU R $UTXLYR GH 'DGRV GR 2XWORRN SVW SDUD WUDEDOKDU FRP RV VHXV LWHQV x Se estiver usando uma conta do Exchange, seus dados permanecerão no servidor de email, a não ser que eles sejam movidos SDUD XP $UTXLYR GH 'DGRV GR 2XWORRN SVW Criar uma mensagem de email 1D JXLD 3iJLQD ,QLFLDO QR JUXSR 1RYR FOLTXH HP 1RYR (PDLO

$WDOKR GR WHFODGR 3DUD FULDU XPD PHQVDJHP GH HPDLO D SDUWLU GH TXDOTXHU SDVWD GR 2XWORRN SUHVVLRQH &75/ 6+,)7 0 1D FDL[D $VVXQWR GLJLWH R DVVXQWR GD PHQVDJHP Insira os endereços de email ou os nomes dos destinatários na caixa 3DUD &F RX &FR 6HSDUH YiULRV GHVWLQDWiULRV SRU SRQWR H YtUJXOD 3DUD VHOHFLRQDU RV QRPHV GRV GHVWLQDWiULRV HP XPD OLVWD QR &DWiORJR GH (QGHUHoRV FOLTXH HP 3DUD &F RX &FR H FOLTXH QRV QRPHV GHVHMDGRV 'HSRLV GH UHGLJLU D PHQVDJHP FOLTXH HP (QYLDU Responder ou encaminhar uma mensagem de email Quando você responde a uma mensagem de email, o remetente da mensagem original é automaticamente adicionado à caixa 3DUD 'H PRGR VHPHOKDQWH TXDQGR YRFr XVD 5HVSRQGHU D 7RGRV XPD PHQVDJHP p FULDGD H HQGHUHoDGD DR UHPHWHQWH H D WRGRV RV GHVWLQDWiULRV DGLFLRQDLV GD PHQVDJHP RULJLQDO 6HMD TXDO IRU VXD HVFROKD YRFr SRGHUi DOWHUDU RV GHVWLQDWiULRV QDV FDL[DV 3DUD &F H &FR $R HQFDPLQKDU XPD PHQVDJHP DV FDL[DV 3DUD &F H &FR ¿FDP YD]LDV H p SUHFLVR IRUQHFHU SHOR PHQRV XP GHVWLQDWiULR Responder ao remetente ou a outros destinatários 9RFr SRGHU UHVSRQGHU DSHQDV DR UHPHWHQWH GH XPD PHQVDJHP RX D TXDOTXHU FRPELQDomR GH SHVVRDV H[LVWHQWH QDV OLQKDV 3DUD H &F 3RGH WDPEpP DGLFLRQDU QRYRV GHVWLQDWiULRV 1D JXLD 3iJLQD ,QLFLDO RX QD JXLD 0HQVDJHP QR JUXSR 5HVSRQGHU FOLTXH HP 5HVSRQGHU RX HP 5HVSRQGHU D 7RGRV Observação: O nome da guia depende da condição da mensagem, se está selecionada na lista de mensagens ou se está aberta na UHVSHFWLYD MDQHOD 3DUD UHPRYHU R QRPH GDV OLQKDV 3DUD H &F FOLTXH QR QRPH H SUHVVLRQH '(/(7( 3DUD DGLFLRQDU XP GHVWLQDWiULR FOLTXH QD FDL[D 3DUD &F RX &FR H HVSHFL¿TXH R GHVWLQDWiULR (VFUHYD VXD PHQVDJHP &OLTXH HP (QYLDU Dica Seja cuidadoso ao clicar em Responder a Todos, principalmente quando houver listas de distribuição ou um grande núPHUR GH GHVWLQDWiULRV HP VXD UHVSRVWD *HUDOPHQWH R PHOKRU p XVDU 5HVSRQGHU H DGLFLRQDU VRPHQWH RV GHVWLQDWiULRV QHFHVViULRV RX HQWmR XVDU 5HVSRQGHU D 7RGRV PDV UHPRYHU RV GHVWLQDWiULRV GHVQHFHVViULRV H DV OLVWDV GH GLVWULEXLomR Didatismo e Conhecimento

176


CONHECIMENTOS DE INFORMร TICA Encaminhar uma mensagem $R HQFDPLQKDU XPD PHQVDJHP HOD LQFOXLUi WRGRV RV DQH[RV TXH HVWDYDP LQFOXtGRV QD PHQVDJHP RULJLQDO 3DUD LQFOXLU PDLV DQH[RV FRQVXOWH $QH[DU XP DUTXLYR RX RXWUR LWHP D XPD PHQVDJHP GH HPDLO 1D JXLD 3iJLQD ,QLFLDO RX 0HQVDJHP QR JUXSR 5HVSRQGHU FOLTXH HP (QFDPLQKDU Observaรงรฃo: O nome da guia depende da condiรงรฃo da mensagem, se estรก selecionada na lista de mensagens ou se estรก aberta na UHVSHFWLYD MDQHOD (VSHFLยฟTXH GHVWLQDWiULRV QDV FDL[DV 3DUD &F RX &FR (VFUHYD VXD PHQVDJHP &OLTXH HP (QYLDU Dica: Se quiser encaminhar duas ou mais mensagens para os mesmos destinatรกrios, como se fossem uma sรณ, em Email, clique HP XPD GDV PHQVDJHQV SUHVVLRQH &75/ H FOLTXH HP FDGD PHQVDJHP DGLFLRQDO 1D JXLD 3iJLQD ,QLFLDO QR JUXSR 5HVSRQGHU FOLTXH HP (QFDPLQKDU &DGD PHQVDJHP VHUi HQFDPLQKDGD FRPR DQH[R GH XPD QRYD PHQVDJHP Adicionar um anexo a uma mensagem de email $UTXLYRV SRGHP VHU DQH[DGRV D XPD PHQVDJHP GH HPDLO $OpP GLVVR RXWURV LWHQV GR 2XWORRN FRPR PHQVDJHQV FRQWDWRV RX WDUHIDV SRGHP VHU LQFOXtGRV FRP DV PHQVDJHQV HQYLDGDV &ULH XPD PHQVDJHP RX SDUD XPD PHQVDJHP H[LVWHQWH FOLTXH HP 5HVSRQGHU 5HVSRQGHU D 7RGRV RX (QFDPLQKDU 1D MDQHOD GD PHQVDJHP QD JXLD 0HQVDJHP QR JUXSR ,QFOXLU FOLTXH HP $QH[DU $UTXLYR

Abrir e salvar anexos $QH[RV VmR DUTXLYRV RX LWHQV TXH SRGHP VHU LQFOXtGRV HP XPD PHQVDJHP GH HPDLO $V PHQVDJHQV FRP DQH[RV VmR LGHQWLยฟFDGDV por um รญcone de clipe de papel QD OLVWD GH PHQVDJHQV 'HSHQGHQGR GR IRUPDWR GD PHQVDJHP UHFHELGD RV DQH[RV VmR H[LELGRV HP XP GH GRLV ORFDLV QD PHQVDJHP x Se o formato da mensagem for HTML ou texto sem formataรงรฃo, os anexos serรฃo exibidos na caixa de anexo, sob a linha $VVXQWR x Se o formato da mensagem for o formato menos comum RTF (Rich Text Format), os anexos serรฃo exibidos no corpo da PHQVDJHP 0HVPR TXH R DUTXLYR DSDUHoD QR FRUSR GD PHQVDJHP HOH FRQWLQXD VHQGR XP DQH[R VHSDUDGR 2EVHUYDomR 2 IRUPDWR XWLOL]DGR QD FULDomR GD PHQVDJHP p LQGLFDGR QD EDUUD GH WtWXOR QD SDUWH VXSHULRU GD PHQVDJHP Abrir um anexo 8P DQH[R SRGH VHU DEHUWR QR 3DLQHO GH /HLWXUD RX HP XPD PHQVDJHP DEHUWD (P TXDOTXHU XP GRV FDVRV FOLTXH GXDV YH]HV QR DQH[R SDUD DEUL OR 3DUD DEULU XP DQH[R QD OLVWD GH PHQVDJHQV FOLTXH FRP R ERWmR GLUHLWR GR PRXVH QD PHQVDJHP TXH FRQWpP R DQH[R FOLTXH HP ([LELU $QH[RV H FOLTXH QR QRPH GR DQH[R Observaรงรตes x 9RFr SRGH YLVXDOL]DU DQH[RV GH PHQVDJHQV +70/ RX FRP WH[WR VHP IRUPDWDomR QR 3DLQHO GH /HLWXUD H HP PHQVDJHQV DEHUWDV &OLTXH QR DQH[R D VHU YLVXDOL]DGR H HOH VHUi H[LELGR QR FRUSR GD PHQVDJHP 3DUD YROWDU j PHQVDJHP QD JXLD )HUUDPHQWDV GH $QH[R QR JUXSR 0HQVDJHP FOLTXH HP 0RVWUDU 0HQVDJHP 2 UHFXUVR GH YLVXDOL]DomR QmR HVWi GLVSRQtYHO SDUD PHQVDJHQV 57) x 3RU SDGUmR R 0LFURVRIW 2XWORRN EORTXHLD DUTXLYRV GH DQH[R SRWHQFLDOPHQWH SHULJRVRV LQFOXVLYH RV DUTXLYRV EDW H[H YEV H MV RV TXDLV SRVVDP FRQWHU YtUXV 6H R 2XWORRN EORTXHDU DOJXP DUTXLYR GH DQH[R HP XPD PHQVDJHP XPD OLVWD GRV WLSRV GH DUTXLYRV EORTXHDGRV VHUi H[LELGD QD %DUUD GH ,QIRUPDo}HV QD SDUWH VXSHULRU GD PHQVDJHP

Didatismo e Conhecimento

177


CONHECIMENTOS DE INFORMĂ TICA

Salvar um anexo $SyV DEULU H H[LELU XP DQH[R YRFr SRGH SUHIHULU VDOYi OR HP XPD XQLGDGH GH GLVFR 6H D PHQVDJHP WLYHU PDLV GH XP DQH[R YRFr SRGHUi VDOYDU RV YiULRV DQH[RV FRPR XP JUXSR RX XP GH FDGD YH] Salvar um único anexo de mensagem Execute um dos seguintes procedimentos: x 6H D PHQVDJHP HVWLYHU QR IRUPDWR +70/ RX GH WH[WR VHP IRUPDWDomR &OLTXH QR DQH[R QR 3DLQHO GH /HLWXUD RX DEUD D PHQVDJHP 1D JXLD $QH[RV QR JUXSR $o}HV FOLTXH HP 6DOYDU FRPR e SRVVtYHO FOLFDU FRP R ERWmR GLUHLWR GR PRXVH QR DQH[R H HQWmR FOLFDU HP 6DOYDU FRPR x 6H D PHQVDJHP HVWLYHU QR IRUPDWR 57) 1R 3DLQHO GH /HLWXUD RX QD PHQVDJHP DEHUWD FOLTXH FRP R ERWmR GLUHLWR GR PRXVH QR DQH[R H FOLTXH HP 6DOYDU FRPR (VFROKD XPD ORFDO GH SDVWD H FOLTXH HP 6DOYDU Salvar vårios anexos de uma mensagem 1R 3DLQHO GH /HLWXUD RX QD PHQVDJHP DEHUWD VHOHFLRQH RV DQH[RV D VHUHP VDOYRV 3DUD VHOHFLRQDU YiULRV DQH[RV FOLTXH QHOHV PDQWHQGR SUHVVLRQDGD D WHFOD &75/ Execute um dos seguintes procedimentos: x 6H D PHQVDJHP HVWLYHU QR IRUPDWR +70/ RX GH WH[WR VHP IRUPDWDomR 1D JXLD $QH[RV QR JUXSR $o}HV FOLTXH HP 6DOYDU FRPR x Se a mensagem estiver no formato RTF Clique com o botão direito do mouse em uma das mensagens selecionadas e GHSRLV FOLTXH HP 6DOYDU FRPR &OLTXH HP XPD ORFDO GH SDVWD H FOLTXH HP 2. Salvar todos os anexos de uma mensagem 1R 3DLQHO GH /HLWXUD RX QD PHQVDJHP DEHUWD FOLTXH HP XP DQH[R Siga um destes procedimentos: x Se a mensagem estiver no formato HTML ou de texto sem formatação Na guia Anexos, no grupo Açþes, clique em Salvar 7RGRV RV $QH[RV x 6H D PHQVDJHP HVWLYHU QR IRUPDWR 57) &OLTXH QD JXLD $UTXLYR SDUD DEULU R PRGR GH H[LELomR %DFNVWDJH (P VHJXLGD FOLTXH HP 6DOYDU DQH[RV H GHSRLV HP 2. &OLTXH HP XPD ORFDO GH SDVWD H FOLTXH HP 2. Adicionar uma assinatura de email às mensagens Você pode criar assinaturas personalizadas para suas mensagens de email que incluem texto, imagens, seu Cartão de Visita EleWU{QLFR XP ORJRWLSR RX DWp PHVPR XPD LPDJHP GD VXD DVVLQDWXUD PDQXVFULWD Criar uma assinatura x $EUD XPD QRYD PHQVDJHP 1D JXLD 0HQVDJHP QR JUXSR ,QFOXLU FOLTXH HP $VVLQDWXUD H HP $VVLQDWXUDV

Didatismo e Conhecimento

178


CONHECIMENTOS DE INFORMĂ TICA x 1D JXLD $VVLQDWXUD GH (PDLO FOLTXH HP 1RYR Adicionar uma assinatura x (P XPD QRYD PHQVDJHP QD JXLD 0HQVDJHP QR JUXSR ,QFOXLU FOLTXH HP $VVLQDWXUD H FOLTXH QD DVVLQDWXUD GHVHMDGD

Criar um compromisso de calendĂĄrio Compromissos sĂŁo atividades que vocĂŞ agenda no seu calendĂĄrio e que nĂŁo envolvem convites a outras pessoas nem reserva de UHFXUVRV x (P &DOHQGiULR QD JXLD 3iJLQD ,QLFLDO QR JUXSR 1RYR FOLTXH HP 1RYR &RPSURPLVVR &RPR DOWHUQDWLYD YRFr SRGH FOLFDU FRP R ERWmR GLUHLWR GR PRXVH HP XP EORFR GH WHPSR HP VXD JUDGH GH FDOHQGiULR H FOLFDU HP 1RYR &RPSURPLVVR

$WDOKR GR WHFODGR 3DUD FULDU XP FRPSURPLVVR SUHVVLRQH &75/ 6+,)7 $ Agendar uma reuniĂŁo com outras pessoas 8PD UHXQLmR p XP FRPSURPLVVR TXH LQFOXL RXWUDV SHVVRDV H SRGH LQFOXLU UHFXUVRV FRPR VDODV GH FRQIHUrQFLD $V UHVSRVWDV jV VXDV VROLFLWDo}HV GH UHXQLmR VmR H[LELGDV QD &DL[D GH (QWUDGD x (P &DOHQGiULR QD JXLD 3iJLQD ,QLFLDO QR JUXSR 1RYR FOLTXH HP 1RYD 5HXQLmR

$WDOKR GR WHFODGR 3DUD FULDU XPD QRYD VROLFLWDomR GH UHXQLmR GH TXDOTXHU SDVWD QR 2XWORRN SUHVVLRQH &75/ 6+,)7 4 'H¿QLU XP OHPEUHWH 9RFr SRGH GH¿QLU RX UHPRYHU OHPEUHWHV SDUD YiULRV LWHQV LQFOXLQGR PHQVDJHQV GH HPDLO FRPSURPLVVRV H FRQWDWRV Para compromissos ou reuniþes Em um item aberto, na guia Compromisso ou Reunião, no grupo Opçþes, na lista suspensa Lembrete, selecione o período de WHPSR DQWHV GR FRPSURPLVVR RX GD UHXQLmR SDUD TXH R OHPEUHWH DSDUHoD 3DUD GHVDWLYDU XP OHPEUHWH VHOHFLRQH 1HQKXP Para mensagens de email, contatos e tarefas x 1D JXLD 3iJLQD ,QLFLDO QR JUXSR 0DUFDV FOLTXH HP $FRPSDQKDU H HP $GLFLRQDU /HPEUHWH

Didatismo e Conhecimento

179


CONHECIMENTOS DE INFORMà TICA 'LFD 9RFr SRGH VLQDOL]DU UDSLGDPHQWH PHQVDJHQV GH HPDLO FRPR LWHQV GH WDUHIDV SHQGHQWHV XVDQGR OHPEUHWHV &OLTXH FRP R ERWmR GLUHLWR GR PRXVH QD FROXQD 6WDWXV GR 6LQDOL]DGRU QD OLVWD GH PHQVDJHQV 2X VH D PHQVDJHP HVWLYHU DEHUWD QD JXLD 0HQVDJHP QR JUXSR &RQWUROH FOLTXH HP $FRPSDQKDPHQWR H HP VHJXLGD FOLTXH HP $GLFLRQDU /HPEUHWH Criar um contato Contatos podem ser tão simples quanto um nome e endereço de email ou incluir outras informaçþes detalhadas, como endereço ItVLFR YiULRV WHOHIRQHV XPD LPDJHP GDWDV GH DQLYHUViULR H TXDLVTXHU RXWUDV LQIRUPDo}HV TXH VH UHODFLRQHP DR FRQWDWR x (P &RQWDWRV QD JXLD 3iJLQD ,QLFLDO QR JUXSR 1RYR FOLTXH HP 1RYR &RQWDWR

$WDOKR GR WHFODGR 3DUD FULDU XP FRQWDWR GH TXDOTXHU SDVWD QR 2XWORRN SUHVVLRQH &75/ 6+,)7 & Criar uma tarefa Muitas pessoas mantĂŞm uma lista de coisas a fazer — em papel, em uma planilha ou com uma combinação de papel e mĂŠtodos HOHWU{QLFRV 1R 0LFURVRIW 2XWORRN YRFr SRGH FRPELQDU YiULDV OLVWDV HP XPD Vy UHFHEHU OHPEUHWHV H FRQWURODU R DQGDPHQWR GDV WDUHIDV x (P 7DUHIDV QD JXLD 3iJLQD ,QLFLDO QR JUXSR 1RYR FOLTXH HP 1RYD 7DUHID

$WDOKR GR WHFODGR 3DUD FULDU XPD QRYD WDUHID SUHVVLRQH &75/ 6+,)7 .

CONCEITOS E TECNOLOGIAS RELACIONADOS À INTERNET E A CORREIO ELETRÔNICO. INTERNET EXPLORER 8

INTERNET ³,PDJLQH TXH IRVVH GHVFREHUWR XP FRQWLQHQWH WmR YDVWR TXH VXDV GLPHQV}HV QmR WLYHVVHP ¿P ,PDJLQH XP PXQGR QRYR com tantos recursos que a ganância do futuro não seria capaz de esgotar; com tantas oportunidades que os empreendedores seriam pouFRV SDUD DSURYHLWi ODV H FRP XP WLSR SHFXOLDU GH LPyYHO TXH VH H[SDQGLULD FRP R GHVHQYROYLPHQWR ´ John P. Barlow 2V (VWDGRV 8QLGRV WHPLDP TXH HP XP DWDTXH QXFOHDU ¿FDVVHP VHP FRPXQLFDomR HQWUH D &DVD %UDQFD H R 3HQWiJRQR (VWH PHLR GH FRPXQLFDomR ³LQIDOtYHO´ DWp R ¿P GD GpFDGD GH ¿FRX HP SRGHU H[FOXVLYR GR JRYHUQR FRQHFWDQGR EDVHV PLOLWDUHV HP TXDWUR ORFDOLGDGHV Nos anos 70, seu uso foi liberado para instituiçþes norte-americanas de pesquisa que desejassem aprimorar a tecnologia, logo vinte e três computadores foram conectados, porÊm o padrão de conversação entre as måquinas se tornou impróprio pela quantidade de HTXLSDPHQWRV (UD QHFHVViULR FULDU XP PRGHOR SDGUmR H XQLYHUVDO SDUD TXH DV PiTXLQDV FRQWLQXDVVHP WURFDQGR GDGRV VXUJLX HQWmR R 3URWRFROR 3DGUmR 7&3 ,3 TXH SHUPLWLULD SRUWDQWR TXH PDLV RXWUDV PiTXLQDV IRVVHP LQVHULGDV jTXHOD UHGH

Didatismo e Conhecimento

180


CONHECIMENTOS DE INFORMÁTICA &RP HVVHV DYDQoRV HP p FULDGR R FRUUHLR HOHWU{QLFR R ( PDLO SHUPLWLQGR D WURFD GH PHQVDJHQV HQWUH DV PiTXLQDV TXH FRPSXQKDP DTXHOD UHGH GH SHVTXLVD DVVLP QR DQR VHJXLQWH D UHGH VH WRUQD LQWHUQDFLRQDO 1D GpFDGD GH D )XQGDomR 1DFLRQDO GH &LrQFLD GR %UDVLO FRQHFWRX VXD JUDQGH UHGH j $53$1(7 JHUDQGR DTXLOR TXH FRQKHFHPRV hoje como internet, auxiliando portanto o processo de pesquisa em tecnologia e outras áreas a nível mundial, além de alimentar as forças DUPDGDV EUDVLOHLUDV GH LQIRUPDomR GH WRGRV RV WLSRV DWp TXH HP FDtVVH QR GRPtQLR S~EOLFR &RP HVWD SRSXODULGDGH H R VXUJLPHQWR GH VRIWZDUHV GH QDYHJDomR GH LQWHUIDFH DPLJiYHO QR ¿P GD GpFDGD GH SHVVRDV TXH QmR WLQKDP FRQKHFLPHQWRV SURIXQGRV GH LQIRUPiWLFD FRPHoDUDP D XWLOL]DU D UHGH LQWHUQDFLRQDO Acesso à Internet 2 ,63 ,QWHUQHW 6HUYLFH 3URYLGHU RX 3URYHGRU GH 6HUYLoR GH ,QWHUQHW RIHUHFH SULQFLSDOPHQWH VHUYLoR GH DFHVVR j ,QWHUQHW DGLFLRnando serviços como e-mail, hospedagem de sites ou blogs, ou seja, são instituições que se conectam à Internet com o objetivo de IRUQHFHU VHUYLoRV j HOD UHODFLRQDGRV H HP IXQomR GR VHUYLoR FODVVL¿FDP VH HP 3URYHGRUHV GH %DFNERQH 6mR LQVWLWXLo}HV TXH FRQVWURHP H DGPLQLVWUDP EDFNERQHV GH ORQJR DOFDQFH RX VHMD HVWUXWXUD ItVLFD GH conexão, com o objetivo de fornecer acesso à Internet para redes locais; 3URYHGRUHV GH $FHVVR 6mR LQVWLWXLo}HV TXH VH FRQHFWDP j ,QWHUQHW YLD XP RX PDLV DFHVVRV GHGLFDGRV H GLVSRQLELOL]DP DFHVVR j terceiros a partir de suas instalações; 3URYHGRUHV GH ,QIRUPDomR 6mR LQVWLWXLo}HV TXH GLVSRQLELOL]DP LQIRUPDomR DWUDYpV GD ,QWHUQHW Endereço Eletrônico ou URL 3DUD VH ORFDOL]DU XP UHFXUVR QD UHGH PXQGLDO GHYH VH FRQKHFHU R VHX HQGHUHoR (VWH HQGHUHoR TXH p ~QLFR WDPEpP p FRQVLGHUDGR VXD 85/ 8QLIRUP 5HVRXUFH /RFDWRU RX /RFDOL]DGRU GH 5HFXUVRV 8QLYHUVDO %RD SDUWH GRV HQGHUHoRV DSUHVHQWD VH DVVLP ZZZ [[[[ FRP EU Onde: ZZZ SURWRFROR GD :RUOG :LGH :HE [[[ GRPtQLR FRP FRPHUFLDO EU EUDVLO WWW = World Wide Web ou Grande Teia Mundial e XP VHUYLoR GLVSRQtYHO QD ,QWHUQHW TXH SRVVXL XP FRQMXQWR GH GRFXPHQWRV HVSDOKDGRV SRU WRGD UHGH H GLVSRQLELOL]DGRV D TXDOTXHU XP (VWHV GRFXPHQWRV VmR HVFULWRV HP KLSHUWH[WR TXH XWLOL]D XPD OLQJXDJHP HVSHFLDO FKDPDGD +70/ Domínio 'HVLJQD R GRQR GR HQGHUHoR HOHWU{QLFR HP TXHVWmR H RQGH RV KLSHUWH[WRV GHVWH HPSUHHQGLPHQWR HVWmR ORFDOL]DGRV 4XDQWR ao tipo do domínio, existem: FRP ,QVWLWXLomR FRPHUFLDO RX SURYHGRU GH VHUYLoR HGX ,QVWLWXLomR DFDGrPLFD JRY ,QVWLWXLomR JRYHUQDPHQWDO PLO ,QVWLWXLomR PLOLWDU QRUWH DPHULFDQD QHW 3URYHGRU GH VHUYLoRV HP UHGHV RUJ 2UJDQL]DomR VHP ¿QV OXFUDWLYRV HTTP, Hyper Texto Transfer Protocol ou Protocolo de Trasferência em Hipertexto e XP SURWRFROR RX OtQJXD HVSHFt¿FD GD LQWHUQHW UHVSRQViYHO SHOD FRPXQLFDomR HQWUH FRPSXWDGRUHV 8P KLSHUWH[WR p XP WH[WR HP IRUPDWR GLJLWDO H SRGH OHYDU D RXWURV ID]HQGR R XVR GH HOHPHQWRV HVSHFLDLV SDODYUDV IUDVHV tFRQHV JUi¿FRV RX DLQGD XP 0DSD 6HQVLWLYR R TXDO OHYD D RXWURV FRQMXQWRV GH LQIRUPDomR QD IRUPD GH EORFRV GH WH[WRV LPDJHQV RX VRQV $VVLP XP OLQN RX KLSHUOLQN TXDQGR DFLRQDGR FRP R PRXVH UHPHWH R XVXiULR j RXWUD SDUWH GR GRFXPHQWR RX RXWUR GRFXPHQWR

Didatismo e Conhecimento

181


CONHECIMENTOS DE INFORMÁTICA Home Page 6HQGR DVVLP KRPH SDJH GHVLJQD D SiJLQD LQLFLDO SULQFLSDO GR VLWH RX ZHE SDJH e PXLWR FRPXP RV XVXiULRV FRQIXQGLUHP XP %ORJ RX 3HU¿O QR 2UNXW FRP XPD +RPH 3DJH SRUpP VmR FRLVDV GLVWLQWDV DRQGH XP %ORJ p XP GLiULR H XP 3HU¿O QR 2UNXW p XP 3UR¿OH RX VHMD XP KLSHUWH[WR TXH SRVVXL LQIRUPDo}HV GH XP XVXiULR GHQWUR GH XPD FRPXQLGDGH YLUWXDO HTML, Hyper Text Markut language ou Linguagem de Marcação de Hipertexto e D OLQJXDJHP FRP D TXDO VH FULD DV SiJLQDV SDUD D ZHE Suas principais características são: 3RUWDELOLGDGH 2V GRFXPHQWRV HVFULWRV HP +70/ GHYHP WHU DSDUrQFLD VHPHOKDQWH QDV GLYHUVDV SODWDIRUPDV GH WUDEDOKR )OH[LELOLGDGH 2 XVXiULR GHYH WHU D OLEHUGDGH GH ³FXVWRPL]DU´ GLYHUVRV HOHPHQWRV GR GRFXPHQWR FRPR R WDPDQKR SDGUmR GD OHWUD as cores, etc); 7DPDQKR 5HGX]LGR 2V GRFXPHQWRV GHYHP WHU XP WDPDQKR UHGX]LGR D ¿P GH HFRQRPL]DU WHPSR QD WUDQVPLVVmR DWUDYpV GD ,QWHUQHW HYLWDQGR ORQJRV SHUtRGRV GH HVSHUD H FRQJHVWLRQDPHQWR QD UHGH Browser ou Navegador e R SURJUDPD HVSHFt¿FR SDUD YLVXDOL]DU DV SiJLQDV GD ZHE 2 %URZVHU Or H LQWHUSUHWD RV GRFXPHQWRV HVFULWRV HP +70/ DSUHVHQWDQGR DV SiJLQDV IRUPDWDGDV SDUD RV XVXiULRV $548,7(785$6 '( 5('(6 $V PRGHUQDV UHGHV GH FRPSXWDGRUHV VmR SURMHWDGDV GH IRUPD DOWDPHQWH HVWUXWXUDGD 1DV VHo}HV VHJXLQWHV H[DPLQDUHPRV FRP DOJXP GHWDOKH D WpFQLFD GH HVWUXWXUDomR +,(5$548,$6 '( 35272&2/26 3DUD UHGX]LU D FRPSOH[LGDGH GH SURMHWR D PDLRULD GDV UHGHV p RUJDQL]DGD HP FDPDGDV RX QtYHLV FDGD XPD FRQVWUXtGD VREUH VXD SUHGHFHVVRUD 2 Q~PHUR GH FDPDGDV R QRPH R FRQWH~GR H D IXQomR GH FDGD FDPDGD GLIHUHP GH XPD UHGH SDUD RXWUD 1R HQWDQWR HP todas as redes, o propósito de cada camada é oferecer certos serviços às camadas superiores, protegendo essas camadas dos detalhes de FRPR RV VHUYLoRV RIHUHFLGRV VmR GH IDWR LPSOHPHQWDGRV $ FDPDGD Q HP XPD PiTXLQD HVWDEHOHFH XPD FRQYHUVmR FRP D FDPDGD Q HP RXWUD PiTXLQD $V UHJUDV H FRQYHQo}HV XWLOL]DGDV nesta conversação são chamadas coletivamente de protocolo da camada n, conforme ilustrado na Figura abaixo para uma rede com sete FDPDGDV $V HQWLGDGHV TXH FRPS}HP DV FDPDGDV FRUUHVSRQGHQWHV HP PiTXLQDV GLIHUHQWHV VmR FKDPDGDV GH SURFHVVRV SDUFHLURV (P RXWUDV SDODYUDV VmR RV SURFHVVRV SDUFHLURV TXH VH FRPXQLFDP XWLOL]DQGR R SURWRFROR 1D YHUGDGH QHQKXP GDGR p WUDQVIHULGR GLUHWDPHQWH GD FDPDGD Q HP XPD PiTXLQD SDUD D FDPDGD Q HP RXWUD PiTXLQD (P YH] GLVVR FDGD FDPDGD SDVVD GDGRV H LQIRUPDo}HV GH FRQWUROH SDUD D FDPDGD LPHGLDWDPHQWH DEDL[R DWp TXH R QtYHO PDLV EDL[R VHMD DOFDQoDGR $EDL[R GR QtYHO HVWi R PHLR ItVLFR GH FRPXQLFDomR DWUDYpV GR TXDO D FRPXQLFDomR RFRUUH 1D )LJXUD DEDL[R D FRPXQLFDomR YLUWXDO p PRVWUDGD DWUDYpV GH OLQKDV SRQWLOKDGDV H D FRPXQLFDomR ItVLFD DWUDYpV GH OLQKDV VyOLGDV

Didatismo e Conhecimento

182


CONHECIMENTOS DE INFORMÁTICA

(QWUH FDGD SDU GH FDPDGDV DGMDFHQWHV Ki XPD LQWHUIDFH $ LQWHUIDFH GH¿QH TXDLV RSHUDo}HV SULPLWLYDV H VHUYLoRV D FDPDGD LQIHULRU RIHUHFH j FDPDGD VXSHULRU 4XDQGR RV SURMHWLVWDV GHFLGHP TXDQWDV FDPDGDV LQFOXLU HP XPD UHGH H R TXH FDGD FDPDGD GHYH ID]HU XPD GDV FRQVLGHUDo}HV PDLV LPSRUWDQWHV p GH¿QLU LQWHUIDFHV OLPSDV HQWUH DV FDPDGDV ,VVR UHTXHU SRU VXD YH] TXH FDGD FDPDGD GHVHPSHQKH XP FRQMXQWR HVSHFt¿FR GH IXQo}HV EHP FRPSUHHQGLGDV $OpP GH PLQLPL]DU D TXDQWLGDGH GH LQIRUPDo}HV TXH GHYH VHU SDVVDGD GH FDPDGD HP FDPDGD LQWHUIDFHV EHP GH¿QLGDV WDPEpP WRUQDP IiFLO D WURFD GD LPSOHPHQWDomR GH XPD FDPDGD SRU RXWUD LPSOHPHQWDomR completamente diferente (por exemplo, trocar todas as linhas telefônicas por canais de satélite), pois tudo o que é exigido da nova implePHQWDomR p TXH HOD RIHUHoD j FDPDGD VXSHULRU H[DWDPHQWH RV PHVPRV VHUYLoRV TXH D LPSOHPHQWDomR DQWLJD RIHUHFLD 2 FRQMXQWR GH FDPDGDV H SURWRFRORV p FKDPDGR GH DUTXLWHWXUD GH UHGH $ HVSHFL¿FDomR GH DUTXLWHWXUD GHYH FRQWHU LQIRUPDo}HV VX¿FLHQWHV SDUD TXH XP LPSOHPHQWDGRU SRVVD HVFUHYHU R SURJUDPD RX FRQVWUXLU R KDUGZDUH GH FDGD FDPDGD GH WDO IRUPD TXH REHGHoD FRUUHWDPHQWH DR SURWRFROR DSURSULDGR 1HP RV GHWDOKHV GH LPSOHPHQWDomR QHP D HVSHFL¿FDomR GDV LQWHUIDFHV VmR SDUWH GD DUTXLWHWXUD SRLV HVVHV GHWDOKHV HVWmR HVFRQGLGRV GHQWUR GD PiTXLQD H QmR VmR YLVtYHLV H[WHUQDPHQWH 1mR p QHP PHVPR QHFHVViULR TXH DV LQWHUIDFHV HP WRGDV DV PiTXLQDV HP XPD UHGH VHMDP DV PHVPDV GHVGH TXH FDGD PiTXLQD SRVVD XVDU FRUUHWDPHQWH WRGRV RV SURWRFRORV O endereço IP 4XDQGR YRFr TXHU HQYLDU XPD FDUWD D DOJXpP YRFr 2N YRFr QmR HQYLD PDLV FDUWDV SUHIHUH H PDLO RX GHL[DU XP UHFDGR QR )DFHERRN 9DPRV HQWmR PHOKRUDU HVWH H[HPSOR TXDQGR YRFr TXHU HQYLDU XP SUHVHQWH D DOJXpP YRFr REWpP R HQGHUHoR GD SHVVRD H FRQWUDWD RV &RUUHLRV RX XPD WUDQVSRUWDGRUD SDUD HQWUHJDU e JUDoDV DR HQGHUHoR TXH p SRVVtYHO HQFRQWUDU H[DWDPHQWH D SHVVRD D VHU SUHVHQWHDGD Também é graças ao seu endereço - único para cada residência ou estabelecimento - que você recebe suas contas de água, aquele produto TXH YRFr FRPSURX HP XPD ORMD RQ OLQH HQ¿P 1D LQWHUQHW R SULQFtSLR p R PHVPR 3DUD TXH R VHX FRPSXWDGRU VHMD HQFRQWUDGR H SRVVD ID]HU SDUWH GD UHGH PXQGLDO GH FRPSXWDGRUHV QHFHVVLWD WHU XP HQGHUHoR ~QLFR 2 PHVPR YDOH SDUD ZHEVLWHV HVWH ¿FD HP XP VHUYLGRU TXH SRU VXD YH] SUHFLVD WHU XP HQGHUHoR SDUD VHU ORFDOL]DGR QD LQWHUQHW ,VWR p IHLWR SHOR HQGHUHoR ,3 ,3 $GGUHVV UHFXUVR TXH WDPEpP p XWLOL]DGR SDUD UHGHV ORFDLV FRPR D H[LVWHQWH QD HPSUHVD TXH YRFr WUDEDOKD SRU H[HPSOR 2 HQGHUHoR ,3 p XPD VHTXrQFLD GH Q~PHURV FRPSRVWD GH ELWV (VVH YDORU FRQVLVWH HP XP FRQMXQWR GH TXDWUR VHTXrQFLDV GH ELWV &DGD XPD GHVWDV p VHSDUDGD SRU XP SRQWR H UHFHEH R QRPH GH RFWHWR RX VLPSOHVPHQWH E\WH Mi TXH XP E\WH p IRUPDGR SRU ELWV 2 Q~PHUR p XP H[HPSOR 5HSDUH TXH FDGD RFWHWR p IRUPDGR SRU Q~PHURV TXH SRGHP LU GH D QmR PDLV GR TXH LVVR

$ GLYLVmR GH XP ,3 HP TXDWUR SDUWHV IDFLOLWD D RUJDQL]DomR GD UHGH GD PHVPD IRUPD TXH D GLYLVmR GR VHX HQGHUHoR HP FLGDGH EDLUUR &(3 Q~PHUR HWF WRUQD SRVVtYHO D RUJDQL]DomR GDV FDVDV GD UHJLmR RQGH YRFr PRUD 1HVWH VHQWLGR RV GRLV SULPHLURV RFWHWRV GH XP HQGHUHoR ,3 SRGHP VHU XWLOL]DGRV SDUD LGHQWL¿FDU D UHGH SRU H[HPSOR (P XPD HVFROD TXH WHP SRU H[HPSOR XPD UHGH SDUD DOXQRV H RXWUD SDUD SURIHVVRUHV SRGH VH WHU [ [ SDUD XPD UHGH H [ [ SDUD D RXWUD VHQGR TXH RV GRLV ~OWLPRV RFWHWRV VmR XVDGRV QD LGHQWL¿FDomR GH FRPSXWDGRUHV

Didatismo e Conhecimento

183


CONHECIMENTOS DE INFORMÁTICA Classes de endereços IP 1HVWH SRQWR YRFr Mi VDEH TXH RV HQGHUHoRV ,3 SRGHP VHU XWLOL]DGRV WDQWR SDUD LGHQWL¿FDU R VHX FRPSXWDGRU GHQWUR GH XPD UHGH TXDQWR SDUD LGHQWL¿Fi OR QD LQWHUQHW 6H QD UHGH GD HPSUHVD RQGH YRFr WUDEDOKD R VHX FRPSXWDGRU WHP FRPR H[HPSOR ,3 XPD PiTXLQD HP RXWUD UHGH SRGH WHU HVWH PHVPR Q~PHUR D¿QDO DPEDV DV UHGHV VmR GLVWLQWDV H QmR VH FRPXQLFDP VHTXHU VDEHP GD H[LVWrQFLD GD RXWUD 0DV FRPR D LQWHUQHW p XPD UHGH JOREDO FDGD GLVSRVLWLYR FRQHFWDGR QHOD SUHFLVD WHU XP HQGHUHoR ~QLFR 2 PHVPR YDOH SDUD XPD UHGH ORFDO QHVWD FDGD GLVSRVLWLYR FRQHFWDGR GHYH UHFHEHU XP HQGHUHoR ~QLFR 6H GXDV RX PDLV PiTXLQDV WLYHUHP R PHVPR ,3 WHP VH HQWmR XP SUREOHPD FKDPDGR ³FRQÀLWR GH ,3´ TXH GL¿FXOWD D FRPXQLFDomR GHVWHV GLVSRVLWLYRV H SRGH LQFOXVLYH DWUDSDOKDU WRGD D UHGH 3DUD TXH VHMD SRVVtYHO WHUPRV WDQWR ,3V SDUD XVR HP UHGHV ORFDLV TXDQWR SDUD XWLOL]DomR QD LQWHUQHW FRQWDPRV FRP XP HVTXHPD GH distribuição estabelecido pelas entidades IANA (Internet Assigned Numbers Authority) e ICANN (Internet Corporation for Assigned 1DPHV DQG 1XPEHUV TXH EDVLFDPHQWH GLYLGH RV HQGHUHoRV HP WUrV FODVVHV SULQFLSDLV H PDLV GXDV FRPSOHPHQWDUHV 6mR HODV &ODVVH $ DWp SHUPLWH DWp UHGHV FDGD XPD FRP DWp GLVSRVLWLYRV FRQHFWDGRV &ODVVH % DWp SHUPLWH DWp UHGHV FDGD XPD FRP DWp GLVSRVLWLYRV &ODVVH & DWp SHUPLWH DWp UHGHV FDGD XPD FRP DWp GLVSRVLWLYRV &ODVVH ' DWp PXOWLFDVW &ODVVH ( DWp PXOWLFDVW UHVHUYDGR As três primeiras classes são assim divididas para atender às seguintes necessidades: 2V HQGHUHoRV ,3 GD FODVVH $ VmR XVDGRV HP ORFDLV RQGH VmR QHFHVViULDV SRXFDV UHGHV PDV XPD JUDQGH TXDQWLGDGH GH PiTXLQDV QHODV 3DUD LVVR R SULPHLUR E\WH p XWLOL]DGR FRPR LGHQWL¿FDGRU GD UHGH H RV GHPDLV VHUYHP FRPR LGHQWL¿FDGRU GRV GLVSRVLWLYRV FRQHFWDGRV 3&V LPSUHVVRUDV HWF 2V HQGHUHoRV ,3 GD FODVVH % VmR XVDGRV QRV FDVRV RQGH D TXDQWLGDGH GH UHGHV p HTXLYDOHQWH RX VHPHOKDQWH j TXDQWLGDGH GH GLVSRVLWLYRV 3DUD LVVR XVDP VH RV GRLV SULPHLURV E\WHV GR HQGHUHoR ,3 SDUD LGHQWL¿FDU D UHGH H RV UHVWDQWHV SDUD LGHQWL¿FDU RV GLVSRVLWLYRV 2V HQGHUHoRV ,3 GD FODVVH & VmR XVDGRV HP ORFDLV TXH UHTXHUHP JUDQGH TXDQWLGDGH GH UHGHV PDV FRP SRXFRV GLVSRVLWLYRV HP FDGD XPD $VVLP RV WUrV SULPHLURV E\WHV VmR XVDGRV SDUD LGHQWL¿FDU D UHGH H R ~OWLPR p XWLOL]DGR SDUD LGHQWL¿FDU DV PiTXLQDV Quanto às classes D e E, elas existem por motivos especiais: a primeira é usada para a propagação de pacotes especiais para a comuQLFDomR HQWUH RV FRPSXWDGRUHV HQTXDQWR TXH D VHJXQGD HVWi UHVHUYDGD SDUD DSOLFDo}HV IXWXUDV RX H[SHULPHQWDLV 9DOH IULVDU TXH Ki YiULRV EORFRV GH HQGHUHoRV UHVHUYDGRV SDUD ¿QV HVSHFLDLV 3RU H[HPSOR TXDQGR R HQGHUHoR FRPHoD FRP JHUDOPHQWH LQGLFD XPD UHGH ³IDOVD´ LVWR p LQH[LVWHQWH XWLOL]DGD SDUD WHVWHV 1R FDVR GR HQGHUHoR HVWH VHPSUH VH UHIHUH j SUySULD PiTXLQD RX VHMD DR SUySULR KRVW UD]mR HVWD TXH R OHYD D VHU FKDPDGR GH ORFDOKRVW -i R HQGHUHoR p XWLOL]DGR SDUD SURSDJDU PHQVDJHQV SDUD WRGRV RV KRVWV GH XPD UHGH GH PDQHLUD VLPXOWkQHD (QGHUHoRV ,3 SULYDGRV +i FRQMXQWRV GH HQGHUHoRV GDV FODVVHV $ % H & TXH VmR SULYDGRV ,VWR VLJQL¿FD TXH HOHV QmR SRGHP VHU XWLOL]DGRV QD LQWHUQHW VHQGR UHVHUYDGRV SDUD DSOLFDo}HV ORFDLV 6mR HVVHQFLDOPHQWH HVWHV &ODVVH $ j &ODVVH % j &ODVVH & j 6XSRQKD HQWmR TXH YRFr WHQKD TXH JHUHQFLDU XPD UHGH FRP FHUFD GH FRPSXWDGRUHV 9RFr SRGH DORFDU SDUD HVWDV PiTXLQDV HQGHUHoRV GH DWp SRU H[HPSOR 7RGDV HODV SUHFLVDP GH DFHVVR j LQWHUQHW 2 TXH ID]HU" $GLFLRQDU PDLV XP ,3 SDUD FDGD XPD GHODV" 1mR 1D YHUGDGH EDVWD FRQHFWi ODV D XP VHUYLGRU RX HTXLSDPHQWR GH UHGH FRPR XP URWHDGRU TXH UHFHED D FRQH[mR j LQWHUQHW H D FRPSDUWLOKH FRP WRGRV RV GLVSRVLWLYRV FRQHFWDGRV D HOH &RP LVVR VRPHQWH HVWH HTXLSDPHQWR SUHFLVDUi GH XP HQGHUHoR ,3 SDUD DFHVVR j UHGH PXQGLDO GH FRPSXWDGRUHV Máscara de sub-rede $V FODVVHV ,3 DMXGDP QD RUJDQL]DomR GHVWH WLSR GH HQGHUHoDPHQWR PDV SRGHP WDPEpP UHSUHVHQWDU GHVSHUGtFLR 8PD VROXomR bastante interessante para isso atende pelo nome de máscara de sub-rede, recurso onde parte dos números que um octeto destinado a LGHQWL¿FDU GLVSRVLWLYRV FRQHFWDGRV KRVWV p ³WURFDGR´ SDUD DXPHQWDU D FDSDFLGDGH GD UHGH 3DUD FRPSUHHQGHU PHOKRU YDPRV HQ[HUJDU as classes A, B e C da seguinte forma: $ 1 + + + % 1 1 + + & 1 1 1 + 1 VLJQL¿FD 1HWZRUN UHGH H + LQGLFD +RVW &RP R XVR GH PiVFDUDV SRGHPRV ID]HU XPD UHGH GR 1 1 + + VH ³WUDQVIRUPDU´ HP 1 1 1 + (P RXWUDV SDODYUDV DV PiVFDUDV GH VXE UHGH SHUPLWHP GHWHUPLQDU TXDQWRV RFWHWRV H ELWV VmR GHVWLQDGRV SDUD D LGHQWL¿FDomR GD UHGH H TXDQWRV VmR XWLOL]DGRV SDUD LGHQWL¿FDU RV GLVSRVLWLYRV

Didatismo e Conhecimento

184


CONHECIMENTOS DE INFORMÁTICA 3DUD LVVR XWLOL]D VH EDVLFDPHQWH R VHJXLQWH HVTXHPD VH XP RFWHWR p XVDGR SDUD LGHQWL¿FDomR GD UHGH HVWH UHFHEHUi D PiVFDUD GH VXE UHGH 0DV VH XP RFWHWR p DSOLFDGR SDUD RV GLVSRVLWLYRV VHX YDORU QD PiVFDUD GH VXE UHGH VHUi ]HUR $ WDEHOD D VHJXLU PRVWUD um exemplo desta relação: Classe

(QGHUHoR ,3

,GHQWL¿FDGRU ,GHQWL¿FDGRU GR Máscara de sub-rede da rede computador 10

A

B

C

10

9RFr SHUFHEH HQWmR TXH SRGHPRV WHU UHGHV FRP PiVFDUD H FDGD XPD LQGLFDQGR XPD FODVVH 0DV FRPR Mi LQIRUPDGR DLQGD SRGH KDYHU VLWXDo}HV RQGH Ki GHVSHUGtFLR 3RU H[HPSOR VXSRQKD TXH XPD IDFXOGDGH WHQKD TXH FULDU XPD UHGH SDUD FDGD XP GH VHXV FLQFR FXUVRV &DGD FXUVR SRVVXL FRPSXWDGRUHV $ VROXomR VHULD HQWmR FULDU FLQFR UHGHV FODVVH &" 3RGH VHU PHOKRU GR TXH XWLOL]DU FODVVHV % PDV DLQGD KDYHUi GHVSHUGtFLR 8PD IRUPD GH FRQWRUQDU HVWH SUREOHPD p FULDU XPD UHGH FODVVH & GLYLGLGD HP FLQFR VXE UHGHV 3DUD LVVR DV PiVFDUDV QRYDPHQWH HQWUDP HP DomR 1yV XWLOL]DPRV Q~PHURV GH D QRV RFWHWRV PDV HVWHV QD YHUGDGH UHSUHVHQWDP E\WHV OLQJXDJHP ELQiULD HP ELQiULR p 2 Q~PHUR ]HUR SRU VXD YH] p $VVLP D PiVFDUD GH XP HQGHUHoR FODVVH & p 3HUFHED HQWmR TXH DTXL WHPRV XPD PiVFDUD IRUPDGD SRU ELWV 3DUD FULDUPRV DV QRVVDV VXE UHGHV WHPRV TXH WHU XP HVTXHPD FRP RX PDLV ELWV FRQIRUPH D QHFHVVLGDGH H DV SRVVLELOLGDGHV (P RXWUDV SDODYUDV SUHFLVDPRV WURFDU DOJXQV ]HURV GR ~OWLPR RFWHWR SRU Suponha que trocamos os três primeiros bits do último octeto (sempre trocamos da esquerda para a direita), resultando em: 6H ¿]HUPRV R Q~PHUR HOHYDGR SHOD TXDQWLGDGH GH ELWV ³WURFDGRV´ WHUHPRV D TXDQWLGDGH SRVVtYHO GH VXE UHGHV (P QRVVR FDVR WHPRV A 7HPRV HQWmR D SRVVLELOLGDGH GH FULDU DWp RLWR VXE UHGHV 6REURX FLQFR ELWV SDUD R HQGHUHoDPHQWR GRV KRVW )D]HPRV D PHVPD FRQWD A $VVLP WHPRV GLVSRVLWLYRV HP FDGD VXE UHGH HVWDPRV ID]HQGR HVWHV FiOFXORV VHP FRQVLGHUDU OLPLWDo}HV TXH SRVVDP LPSHGLU R XVR GH WRGRV RV KRVWV H VXE UHGHV FRUUHVSRQGH D ORJR D PiVFDUD UHVXOWDQWH p 3HUFHED TXH HVVH HVTXHPD GH ³WURFDU´ ELWV SRGH VHU HPSUHJDGR WDPEpP HP HQGHUHoRV FODVVHV $ H % FRQIRUPH D QHFHVVLGDGH 9DOH UHVVDOWDU WDPEpP TXH QmR p SRVVtYHO XWLOL]DU RX FRPR PiVFDUD ,3 HVWiWLFR H ,3 GLQkPLFR ,3 HVWiWLFR RX ¿[R p XP HQGHUHoR ,3 GDGR SHUPDQHQWHPHQWH D XP GLVSRVLWLYR RX VHMD VHX Q~PHUR QmR PXGD H[FHWR VH WDO DomR IRU H[HFXWDGD PDQXDOPHQWH &RPR H[HPSOR Ki FDVRV GH DVVLQDWXUDV GH DFHVVR j LQWHUQHW YLD $'6/ RQGH R SURYHGRU DWULEXL XP ,3 HVWiWLFR DRV VHXV DVVLQDQWHV $VVLP VHPSUH TXH XP FOLHQWH VH FRQHFWDU XVDUi R PHVPR ,3 2 ,3 GLQkPLFR SRU VXD YH] p XP HQGHUHoR TXH p GDGR D XP FRPSXWDGRU TXDQGR HVWH VH FRQHFWD j UHGH PDV TXH PXGD WRGD YH] TXH Ki FRQH[mR 3RU H[HPSOR VXSRQKD TXH YRFr FRQHFWRX VHX FRPSXWDGRU j LQWHUQHW KRMH 4XDQGR YRFr FRQHFWi OR DPDQKm OKH VHUi GDGR RXWUR ,3 3DUD HQWHQGHU PHOKRU LPDJLQH D VHJXLQWH VLWXDomR XPD HPSUHVD WHP FRPSXWDGRUHV OLJDGRV HP UHGH 8VDQGR ,3V GLQkPLFRV D HPSUHVD GLVSRQLELOL]D HQGHUHoRV ,3 SDUD WDLV PiTXLQDV &RPR QHQKXP ,3 p ¿[R XP FRPSXWDGRU UHFHEHUi TXDQGR VH FRQHFWDU XP HQGHUHoR ,3 GHVWHV TXH QmR HVWLYHU VHQGR XWLOL]DGR e PDLV RX PHQRV DVVLP TXH RV SURYHGRUHV GH LQWHUQHW WUDEDOKDP 2 PpWRGR PDLV XWLOL]DGR QD GLVWULEXLomR GH ,3V GLQkPLFRV p R SURWRFROR '+&3 '\QDPLF +RVW &RQ¿JXUDWLRQ 3URWRFRO IP nos sites 9RFr Mi VDEH TXH RV VLWHV QD :HE WDPEpP QHFHVVLWDP GH XP ,3 0DV VH YRFr GLJLWDU HP VHX QDYHJDGRU ZZZ LQIRZHVWHU FRP SRU H[HPSOR FRPR p TXH R VHX FRPSXWDGRU VDEH TXDO R ,3 GHVWH VLWH DR SRQWR GH FRQVHJXLU HQFRQWUi OR" 4XDQGR YRFr GLJLWDU XP HQGHUHoR TXDOTXHU GH XP VLWH XP VHUYLGRU GH '16 'RPDLQ 1DPH 6\VWHP p FRQVXOWDGR (OH p TXHP LQIRUPD TXDO ,3 HVWi DVVRFLDGR D FDGD VLWH 2 VLVWHPD '16 SRVVXL XPD KLHUDUTXLD LQWHUHVVDQWH VHPHOKDQWH D XPD iUYRUH WHUPR FRQKHFLGR SRU SURJUDPDGRUHV 6H SRU H[HPSOR R VLWH ZZZ LQIRZHVWHU FRP p UHTXLVLWDGR R VLVWHPD HQYLD D VROLFLWDomR D XP VHUYLGRU UHVSRQViYHO SRU WHUPLQDo}HV ³ FRP´ (VVH VHUYLGRU ORFDOL]DUi TXDO R ,3 GR HQGHUHoR H UHVSRQGHUi j VROLFLWDomR 6H R VLWH VROLFLWDGR WHUPLQD FRP ³ EU´ XP VHUYLGRU UHVSRQViYHO SRU HVWD WHUPLQDomR p FRQVXOWDGR H DVVLP SRU GLDQWH

Didatismo e Conhecimento

185


CONHECIMENTOS DE INFORMÁTICA ,3Y 2 PXQGR HVWi FDGD YH] PDLV FRQHFWDGR 6H HP XP SDVVDGR QmR PXLWR GLVWDQWH YRFr FRQHFWDYD DSHQDV R 3& GD VXD FDVD j LQWHUQHW KRMH R ID] FRP R FHOXODU FRP R VHX QRWHERRN HP XP VHUYLoR GH DFHVVR Wi-Fi QR DHURSRUWR H DVVLP SRU GLDQWH 6RPDQGR HVWH DVSHFWR DR IDWR GH FDGD YH] PDLV SHVVRDV DFHVVDUHP D LQWHUQHW QR PXQGR LQWHLUR QRV GHSDUDPRV FRP XP JUDQGH SUREOHPD R Q~PHUR GH ,3V GLVSRQtYHLV GHL[D GH VHU VX¿FLHQWH SDUD WRGD DV IXWXUDV DSOLFDo}HV $ VROXomR SDUD HVWH JUDQGH SUREOHPD JUDQGH PHVPR D¿QDO D LQWHUQHW QmR SRGH SDUDU GH FUHVFHU DWHQGH SHOR QRPH GH ,3Y XPD QRYD HVSHFL¿FDomR FDSD] GH VXSRUWDU DWp UHVSLUH IXQGR GH HQGHUHoRV XP número absurdamente alto!

2 ,3Y QmR FRQVLVWH QHFHVVDULDPHQWH DSHQDV QR DXPHQWR GD TXDQWLGDGH GH RFWHWRV 8P HQGHUHoR GR WLSR SRGH VHU SRU H[HPSOR )('& ' ' '& )& ' & ))) Finalizando &RP R VXUJLPHQWR GR ,3Y WHP VH D LPSUHVVmR GH TXH D HVSHFL¿FDomR WUDWDGD QHVWH WH[WR R ,3Y YDL VXPLU GR PDSD ,VVR DWp GHYH DFRQWHFHU PDV YDL GHPRUDU EDVWDQWH 'XUDQWH HVVD IDVH TXH SRGHPRV FRQVLGHUDU GH WUDQVLomR R TXH YHUHPRV p D ³FRQYLYrQFLD´ HQWUH DPERV RV SDGU}HV 1mR SRU PHQRV SUDWLFDPHQWH WRGRV RV VLVWHPDV RSHUDFLRQDLV DWXDLV H D PDLRULD GRV GLVSRVLWLYRV GH UHGH HVWmR DSWRV D OLGDU WDQWR FRP XP TXDQWR FRP R RXWUR 3RU LVVR VH YRFr p RX SUHWHQGH VHU XP SUR¿VVLRQDO TXH WUDEDOKD FRP UHGHV RX VLPSOHVPHQWH TXHU FRQKHFHU PDLV R DVVXQWR SURFXUH VH DSURIXQGDU QDV GXDV HVSHFL¿FDo}HV $ HVWD DOWXUD YRFr WDPEpP GHYH HVWDU TXHUHQGR GHVFREULU TXDO R VHX ,3 &DGD VLVWHPD RSHUDFLRQDO WHP XPD IRUPD GH PRVWUDU LVVR 6H YRFr p XVXiULR GH :LQGRZV SRU H[HPSOR SRGH ID]r OR GLJLWDQGR FPG HP XP FDPSR GR 0HQX ,QLFLDU H QD MDQHOD TXH VXUJLU LQIRUPDU LSFRQ¿J DOO H DSHUWDU (QWHU (P DPELHQWHV /LQX[ R FRPDQGR p LIFRQ¿J

3HUFHED QR HQWDQWR TXH VH YRFr HVWLYHU FRQHFWDGR D SDUWLU GH XPD UHGH ORFDO WDO FRPR XPD UHGH ZLUHOHVV YLVXDOL]DUi R ,3 TXH HVWD GLVSRQLELOL]D j VXD FRQH[mR 3DUD VDEHU R HQGHUHoR ,3 GR DFHVVR j LQWHUQHW HP XVR SHOD UHGH YRFr SRGH YLVLWDU VLWHV FRPR ZKDWVP\LS RUJ Provedor 2 SURYHGRU p XPD HPSUHVD SUHVWDGRUD GH VHUYLoRV TXH RIHUHFH DFHVVR j ,QWHUQHW 3DUD DFHVVDU D ,QWHUQHW p QHFHVViULR FRQHFWDU VH com um computador que já esteja na Internet (no caso, o provedor) e esse computador deve permitir que seus usuários também tenham DFHVVR D ,QWHUQHW

Didatismo e Conhecimento

186


CONHECIMENTOS DE INFORMÁTICA No Brasil, a maioria dos provedores está conectada à Embratel, que por sua vez, está conectada com outros computadores fora do %UDVLO (VWD FRQH[mR FKDPD VH OLQN TXH p D FRQH[mR ItVLFD TXH LQWHUOLJD R SURYHGRU GH DFHVVR FRP D (PEUDWHO 1HVWH FDVR D (PEUDWHO p FRQKHFLGD FRPR EDFNERQH RX VHMD p D ³HVSLQKD GRUVDO´ GD ,QWHUQHW QR %UDVLO 3RGH VH LPDJLQDU R EDFNERQH FRPR VH IRVVH XPD DYHQLGD GH WUrV SLVWDV H RV OLQNV FRPR VH IRVVHP DV UXDV TXH HVWmR LQWHUOLJDGDV QHVWD DYHQLGD 7DQWR R OLQN FRPR R EDFNERQH SRVVXL XPD YHORFLGDGH GH WUDQVPLVVmR RX VHMD FRP TXDO YHORFLGDGH HOH WUDQVPLWH RV GDGRV (VWD YHORFLGDGH p GDGD HP ESV ELWV SRU VHJXQGR 'HYH VHU IHLWR XP FRQWUDWR FRP R SURYHGRU GH DFHVVR TXH IRUQHFHUi XP QRPH GH XVXiULR XPD VHQKD GH DFHVVR H XP HQGHUHoR HOHWU{QLFR QD ,QWHUQHW URL - Uniform Resource Locator 7XGR QD ,QWHUQHW WHP XP HQGHUHoR RX VHMD XPD LGHQWL¿FDomR GH RQGH HVWi ORFDOL]DGR R FRPSXWDGRU H TXDLV UHFXUVRV HVWH FRPSXWDGRU RIHUHFH 3RU H[HPSOR D 85/ KWWS ZZZ QRYDFRQFXUVRV FRP EU 6HUi PDLV EHP H[SOLFDGR DGLDQWH Como descobrir um endereço na Internet? 3DUD TXH SRVVDPRV HQWHQGHU PHOKRU YDPRV H[HPSOL¿FDU 9RFr HVWXGD HP XPD XQLYHUVLGDGH H SUHFLVD ID]HU DOJXPDV SHVTXLVDV SDUD XP WUDEDOKR 2QGH SURFXUDU DV LQIRUPDo}HV TXH SUHFLVR" 3DUD LVVR H[LVWHP QD ,QWHUQHW RV ³IDPRVRV´ VLWHV GH SURFXUD TXH VmR VLWHV TXH SRVVXHP XP HQRUPH EDQFR GH GDGRV TXH FRQWpP R FDGDVWUR GH PLOKDUHV GH +RPH 3DJHV TXH SHUPLWHP D SURFXUD SRU XP GHWHUPLQDGR DVVXQWR &DVR D SDODYUD RX R DVVXQWR TXH IRL SURFXUDGR H[LVWD HP DOJXPD GHVVDV SiJLQDV VHUi OLVWDGR WRGD HVWD UHODomR GH SiJLQDV HQFRQWUDGDV $ SHVTXLVD SRGH VHU UHDOL]DGD FRP XPD SDODYUD UHIHUHQWH DR DVVXQWR GHVHMDGR 3RU H[HPSOR YRFr TXHU SHVTXLVDU VREUH DPRUWHFHGRUHV FDVR QmR HQFRQWUH QDGD FRPR DPRUWHFHGRUHV SURFXUH FRPR DXWRSHoDV H DVVLP VXFHVVLYDPHQWH Barra de endereços $ %DUUD GH (QGHUHoRV SRVVLELOLWD TXH VH SRVVD QDYHJDU HP SiJLQDV GD LQWHUQHW EDVWDQGR SDUD LVWR GLJLWDU R HQGHUHoR GD SiJLQD Alguns sites interessantes: ZZZ GLDULRSRSXODU FRP EU -RUQDO 'LiULR 3RSXODU ZZZ XISHO WFKH EU 8ISHO ZZZ FHIHWUV WFKH EU &HIHW ZZZ VHUYLGRU JRY EU ,QIRUPDo}HV VREUH VHUYLGRU S~EOLFR ZZZ VLDSHQHW JRJ EU FRQWUDFKHTXH ZZZ SHORWDV FRP EU 6LWH 2¿FLDO GH 3HORWDV ZZZ PHF JRY EU 0LQLVWpULR GD (GXFDomR ,GHQWL¿FDomR GH HQGHUHoRV GH XP VLWH ([HPSOR KWWS ZZZ SHORWDV FRP EU KWWS ! +LSHU 7H[W 7UDQIHU 3URWRFRO SURWRFROR GH FRPXQLFDomR ::: ! :RUOG :LGH :HE *UDQGH UHGH PXQGLDO SHORWDV ! HPSUHVD RX RUJDQL]DomR TXH PDQWpP R VLWH FRP ! WLSR GH RUJDQL]DomR EU ! LGHQWL¿FD R SDtV Tipos de Organizações: HGX ! LQVWLWXLo}HV HGXFDFLRQDLV ([HPSOR PLFKLJDP HGX FRP ! LQVWLWXo}HV FRPHUFLDLV ([HPSOR PLFURVRIW FRP JRY ! JRYHUQDPHQWDO ([HPSOR ID]HQGD JRY PLO ! LQVWDODomR PLOLWDU ([HPSOR DI PLO QHW ! FRPSXWDGRUHV FRP IXQo}HV GH DGPLQLVWUDU UHGHV ([HPSOR HPEUDWHO QHW RUJ ! RUJDQL]Do}HV QmR JRYHUQDPHQWDLV ([HPSOR FDUH RUJ Didatismo e Conhecimento

187


CONHECIMENTOS DE INFORMÁTICA Home Page 3HOD GH¿QLomR WpFQLFD WHPRV TXH XPD +RPH 3DJH p XP DUTXLYR $6&,, QR IRUPDWR +70/ DFHVVDGR GH FRPSXWDGRUHV URGDQGR XP 1DYHJDGRU %URZVHU TXH SHUPLWH R DFHVVR jV LQIRUPDo}HV HP XP DPELHQWH JUi¿FR H PXOWLPtGLD 7RGR HP KLSHUWH[WR IDFLOLWDQGR D EXVFD GH LQIRUPDo}HV GHQWUR GDV +RPH 3DJHV 2 HQGHUHoR GH +RPH 3DJHV WHP R VHJXLQWH IRUPDWR KWWS ZZZ HQGHUHoR FRP SiJLQD KWPO 3RU H[HPSOR D SiJLQD SULQFLSDO GD 3URQDJ KWWS ZZZ SURQDJ FRP EU LQGH[ KWPO PLUG-INS 2V SOXJ LQV VmR SURJUDPDV TXH H[SDQGHP D FDSDFLGDGH GR %URZVHU HP UHFXUVRV HVSHFt¿FRV SHUPLWLQGR SRU H[HPSOR TXH YRFr WRTXH DUTXLYRV GH VRP RX YHMD ¿OPHV HP YtGHR GHQWUR GH XPD +RPH 3DJH $V HPSUHVDV GH VRIWZDUH YrP GHVHQYROYHQGR SOXJ LQV D XPD YHORFLGDGH LPSUHVVLRQDQWH 0DLRUHV LQIRUPDo}HV H HQGHUHoRV VREUH SOXJ LQV VmR HQFRQWUDGDV QD SiJLQD KWWS ZZZ \DKRR FRP &RPSXWHUVBDQGB,QWHUQHW 6RIWZDUH ,QWHUQHW :RUOGB:LGHB:HE %URZVHUV 3OXJB,QV ,QGLFHV $WXDOPHQWH H[LVWHP YiULRV WLSRV GH SOXJ LQV $EDL[R WHPRV XPD UHODomR GH DOJXQV GHOHV ' H $QLPDomR $UTXLYRV 950/ 03(* 4XLFN7LPH HWF ÈXGLR 9tGHR $UTXLYRV :$9 0,' $9, HWF 9LVXDOL]DGRUHV GH ,PDJHQV $UTXLYRV -3* *,) %03 3&; HWF 1HJyFLRV H 8WLOLWiULRV - Apresentações FTP - Transferência de Arquivos 3HUPLWH FRSLDU DUTXLYRV GH XP FRPSXWDGRU GD ,QWHUQHW SDUD R VHX FRPSXWDGRU Os programas disponíveis na Internet podem ser: x )UHHZDUH 3URJUDPD OLYUH TXH SRGH VHU GLVWULEXtGR H XWLOL]DGR OLYUHPHQWH QmR UHTXHU QHQKXPD WD[D SDUD VXD XWLOL]DomR H QmR p FRQVLGHUDGR ³SLUDWDULD´ D FySLD GHVWH SURJUDPD x 6KDUHZDUH 3URJUDPD GHPRQVWUDomR TXH SRGH VHU XWLOL]DGR SRU XP GHWHUPLQDGR SUD]R RX TXH FRQWpP DOJXQV OLPLWHV SDUD VHU XWLOL]DGR DSHQDV FRPR XP WHVWH GR SURJUDPD 6H R XVXiULR JRVWDU HOH FRPSUD FDVR FRQWUiULR QmR XVD PDLV R SURJUDPD 1D PDLRULD GDV YH]HV HVVHV SURJUDPDV H[LEHP GH WHPSRV HP WHPSRV XPD PHQVDJHP DYLVDQGR TXH HOH GHYH VHU UHJLVWUDGR 2XWURV WLSRV GH VKDUHZDUH WrP WHPSR GH XVR OLPLWDGR 'HSRLV GH H[SLUDGR HVWH WHPSR GH WHVWH p QHFHVViULR TXH VHMD IHLWR D FRPSUD GHVWH SURJUDPD Navegar nas páginas &RQVLVWH SHUFRUUHU DV SiJLQDV QD LQWHUQHW D SDUWLU GH XP GRFXPHQWR QRUPDO H GH OLQNV GDV SUySULDV SiJLQDV Como salvar documentos, arquivos e sites &OLTXH QR PHQX $UTXLYR H QD RSomR 6DOYDU FRPR Como copiar e colar para um editor de textos 6HOHFLRQDU R FRQWH~GR RX ¿JXUD GD SiJLQD &OLFDU FRP R ERWmR GLUHLWR GR PRXVH H HVFROKD D RSomR &RSLDU

Didatismo e Conhecimento

188


CONHECIMENTOS DE INFORMÁTICA

Abra o editor de texto clique em colar Navegadores 2 QDYHJDGRU GH ::: p D IHUUDPHQWD PDLV LPSRUWDQWH SDUD R XVXiULR GH ,QWHUQHW e FRP HOH TXH VH SRGHP YLVLWDU PXVHXV OHU UHYLVWDV HOHWU{QLFDV ID]HU FRPSUDV H DWp SDUWLFLSDU GH QRYHODV LQWHUDWLYDV $V LQIRUPDo}HV QD :HE VmR RUJDQL]DGDV QD IRUPD GH SiJLQDV GH KLSHUWH[WR FDGD XP FRP VHX HQGHUHoR SUySULR FRQKHFLGR FRPR 85/ 3DUD FRPHoDU D QDYHJDU p SUHFLVR GLJLWDU XP GHVVHV HQGHUHoRV QR FDPSR FKDPDGR (QGHUHoR QR QDYHJDGRU 2 VRIWZDUH HVWDEHOHFH D FRQH[mR H WUD] SDUD D WHOD D SiJLQD FRUUHVSRQGHQWH 2 QDYHJDGRU QmR SUHFLVD GH QHQKXPD FRQ¿JXUDomR HVSHFLDO SDUD H[LELU XPD SiJLQD GD :HE PDV p QHFHVViULR DMXVWDU DOJXQV SDUkPHWURV SDUD TXH HOH VHMD FDSD] GH HQYLDU H UHFHEHU DOJXPDV PHQVDJHQV GH FRUUHLR HOHWU{QLFR H DFHVVDU JUXSRV GH GLVFXVVmR QHZV 2 :RUOG :LGH :HE IRL LQLFLDOPHQWH GHVHQYROYLGR QR &HQWUR GH 3HVTXLVDV GD &(51 &RQVHLO (XURSHHQ SRXU OD 5HFKHUFKH 1XFOHDLUH 6XtoD 2ULJLQDOPHQWH R ::: HUD XP PHLR SDUD ItVLFRV GD &(51 WURFDU H[SHULrQFLDV VREUH VXDV SHVTXLVDV DWUDYpV GD H[LELomR GH SiJLQDV GH WH[WR )LFRX FODUR GHVGH R LQtFLR R LPHQVR SRWHQFLDO TXH R ::: SRVVXtD SDUD GLYHUVRV WLSRV GH DSOLFDo}HV LQFOXVLYH QmR FLHQWt¿FDV 2 ::: QmR GLVSXQKD GH JUi¿FRV HP VHXV SULPyUGLRV DSHQDV GH KLSHUWH[WR (QWUHWDQWR HP R SURMHWR ::: JDQKRX IRUoD H[WUD FRP D LQVHUomR GH XP YLVXDOL]DGRU WDPEpP FRQKHFLGR FRPR EURZVHU GH SiJLQDV FDSD] QmR DSHQDV GH IRUPDWDU WH[WR PDV WDPEpP GH H[LELU JUi¿FRV VRP H YtGHR (VWH EURZVHU FKDPDYD VH 0RVDLF H IRL GHVHQYROYLGR GHQWUR GD 1&6$ SRU XP WLPH FKH¿DGR SRU 0DUN $QGUHHVHQ 2 VXFHVVR GR 0RVDLF IRL HVSHWDFXODU 'HSRLV GLVWR YiULDV RXWUDV FRPSDQKLDV SDVVDUDP D SURGX]LU EURZVHUV TXH GHYHULDP ID]HU FRQFRUUrQFLD DR 0RVDLF 0DUN $QGUHHVHQ SDUWLX SDUD D FULDomR GD 1HWVFDSH &RPPXQLFDWLRQV FULDGRUD GR EURZVHU 1HWVFDSH 6XUJLUDP DLQGD R &HOOR R $,5 0RVDLF R 635< 0RVDLF R 0LFURVRIW ,QWHUQHW ([SORUHU R 0R]LOOD )LUHIR[ H PXLWRV RXWURV EURZVHUV Busca e pesquisa na web 2V VLWHV GH EXVFD VHUYHP SDUD SURFXUDU SRU XP GHWHUPLQDGR DVVXQWR RX LQIRUPDomR QD LQWHUQHW Alguns sites interessantes: x ZZZ JRRJOH FRP EU x KWWS EU DOWDYLVWD FRP x KWWS FDGH VHDUFK \DKRR FRP x KWWS EU ELQJ FRP Como fazer a pesquisa 'LJLWH QD EDUUD GH HQGHUHoR R HQGHUHoR GR VLWH GH SHVTXLVD 3RU H[HPSOR ZZZ JRRJOH FRP EU

Didatismo e Conhecimento

189


CONHECIMENTOS DE INFORMÁTICA (P SHVTXLVDU SRGH VH HVFROKHU RQGH VHUi IHLWD D SHVTXLVD

2V VLWHV GH SHVTXLVD HP JHUDO QmR ID]HP GLVWLQomR QD SHVTXLVD FRP OHWUDV PDL~VFXODV H PLQ~VFXODV H QHP SDODYUDV FRP RX VHP DFHQWR Opções de pesquisa

Web: pesquisa em todos os sites ,PDJHQV SHVTXLVD SRU LPDJHQV DQH[DGDV QDV SiJLQDV ([HPSOR GR UHVXOWDGR VH XPD SHVTXLVD

*UXSRV SHVTXLVD QRV JUXSRV GH GLVFXVVmR GD 8VHQHW ([HPSOR

'LUHWyULRV SHVTXLVD R FRQWH~GR GD LQWHUQHW RUJDQL]DGRV SRU DVVXQWR HP FDWHJRULDV ([HPSOR

Como escolher palavra-chave x %XVFD FRP XPD SDODYUD UHWRUQD SiJLQDV TXH LQFOXDP D SDODYUD GLJLWDGD x ³%XVFD HQWUH DVSDV´ D SHVTXLVD Vy UHWRUQD SiJLQDV TXH LQFOXDP WRGRV RV VHXV WHUPRV GH EXVFD RX VHMD WRGD D VHTXrQFLD GH WHUPRV TXH IRUDP GLJLWDGDV

Didatismo e Conhecimento

190


CONHECIMENTOS DE INFORMÁTICA x x x x x

%XVFD FRP VLQDO GH PDLV D SHVTXLVD UHWRUQD SiJLQDV TXH LQFOXDP WRGDV DV SDODYUDV DOHDWRULDPHQWH QD SiJLQD %XVFD FRP VLQDO GH PHQRV DV SDODYUDV TXH ¿FDP DQWHV GR VLQDO GH menos VmR H[FOXtGDV GD SHVTXLVD 5HVXOWDGR GH XP FiOFXOR SRGH VHU HIHWXDGR XP FiOFXOR HP XP VLWH GH SHVTXLVD

3RU H[HPSOR Irá retornar: O resultado da pesquisa O resultado da pesquisa é visualizado da seguinte forma:

CONCEITOS BÁSICOS DE SEGURANÇA DA INFORMAÇÃO

Segurança de Informação está relacionada com a proteção existente ou necessária sobre dados que possuem valor para alguém RX XPD RUJDQL]DomR 3RVVXL DVSHFWRV EiVLFRV FRPR FRQ¿GHQFLDOLGDGH LQWHJULGDGH H GLVSRQLELOLGDGH GD LQIRUPDomR TXH QRV DMXGD D entender as necessidades de sua proteção e que não se aplica ou está restrita a sistemas computacionais, nem a informações eletrônicas RX TXDOTXHU RXWUD IRUPD PHFkQLFD GH DUPD]HQDPHQWR (OD VH DSOLFD D WRGRV RV DVSHFWRV GH SURWHomR H DUPD]HQDPHQWR GH LQIRUPDo}HV H GDGRV HP TXDOTXHU IRUPD 2 QtYHO GH VHJXUDQoD GH XP VLVWHPD RSHUDFLRQDO GH FRPSXWDGRU SRGH VHU WLSL¿FDGR SHOD FRQ¿JXUDomR GH VHXV FRPSRQHQWHV CONCEITOS DE SEGURANÇA A Segurança da Informação refere-se à proteção existente sobre as informações de uma determinada empresa, instituição governaPHQWDO RX SHVVRD LVWR p DSOLFD VH WDQWR DV LQIRUPDo}HV FRUSRUDWLYDV TXDQWR DV SHVVRDLV (QWHQGH VH SRU LQIRUPDomR WRGR H TXDOTXHU FRQWH~GR RX GDGR TXH WHQKD YDORU SDUD DOJXPD RUJDQL]DomR RX SHVVRD (OD SRGH HVWDU JXDUGDGD SDUD XVR UHVWULWR RX H[SRVWD DR S~EOLFR SDUD FRQVXOWD RX DTXLVLomR 3RGHP VHU HVWDEHOHFLGDV PpWULFDV FRP R XVR RX QmR GH IHUUDPHQWDV SDUD D GH¿QLomR GR QtYHO GH VHJXUDQoD H[LVWHQWH H FRP LVWR VHUHP HVWDEHOHFLGDV DV EDVHV SDUD DQiOLVH GD PHOKRULD RX SLRUD GD VLWXDomR GH VHJXUDQoD H[LVWHQWH A segurança de uma determinada informação pode ser afetada por fatores comportamentais e de uso de quem se utiliza dela, pelo DPELHQWH RX LQIUDHVWUXWXUD TXH D FHUFD RX SRU SHVVRDV PDO LQWHQFLRQDGDV TXH WHP R REMHWLYR GH IXUWDU GHVWUXLU RX PRGL¿FDU D LQIRUPDomR Antes de proteger, devemos saber: 2 TXH SURWHJHU 'H TXHP SURWHJHU 3RQWRV YXOQHUiYHLV 3URFHVVRV D VHUHP VHJXLGRV

Didatismo e Conhecimento

191


CONHECIMENTOS DE INFORMĂ TICA MECANISMOS DE SEGURANÇA O suporte para as recomendaçþes de segurança pode ser encontrado em: ‡ &21752/(6 )Ă‹6,&26 sĂŁo barreiras que limitam o contato ou acesso direto a informação ou a infraestrutura (que garante a H[LVWrQFLD GD LQIRUPDomR TXH D VXSRUWD Devemos atentar para ameaças sempre presentes, mas nem sempre lembradas; incĂŞndios, desabamentos, relâmpagos, alagamentos, problePDV QD UHGH HOpWULFD DFHVVR LQGHYLGR GH SHVVRDV DRV VHUYLGRUHV RX HTXLSDPHQWRV GH UHGH WUHLQDPHQWR LQDGHTXDGR GH IXQFLRQiULRV HWF 0HGLGDV GH SURWHomR ItVLFD WDLV FRPR VHUYLoRV GH JXDUGD XVR GH QREUHDNV DODUPHV H IHFKDGXUDV FLUFXLWR LQWHUQR GH WHOHYLVmR H VLVWHPDV GH HVFXWD VmR UHDOPHQWH XPD SDUWH GD VHJXUDQoD GD LQIRUPDomR $V PHGLGDV GH SURWHomR ItVLFD VmR IUHTXHQWHPHQWH FLWDGDV FRPR ÂłVHJXUDQoD FRPSXWDFLRQDO´ YLVWR TXH WrP XP LPSRUWDQWH SDSHO WDPEpP QD SUHYHQomR GRV LWHQV FLWDGRV QR SDUiJUDIR DFLPD 2 SRQWR FKDYH p TXH DV WpFQLFDV GH SURWHomR GH GDGRV SRU PDLV VRÂżVWLFDGDV TXH VHMDP QmR WrP VHUYHQWLD QHQKXPD VH D VHJXUDQoD ItVLFD QmR IRU JDUDQWLGD Instalação e Atualização A maioria dos sistemas operacionais, principalmente as distribuiçþes Linux, vem acompanhada de muitos aplicativos que sĂŁo instaODGRV RSFLRQDOPHQWH QR SURFHVVR GH LQVWDODomR GR VLVWHPD Sendo assim, torna-se necessĂĄrio que vĂĄrios pontos sejam observados para garantir a segurança desde a instalação do sistema, dos quais podemos destacar: ‡ 6HMD PLQLPDOLVWD ,QVWDOH VRPHQWH RV DSOLFDWLYRV QHFHVViULRV DSOLFDWLYRV FRP SUREOHPDV SRGHP IDFLOLWDU R DFHVVR GH XP DWDFDQWH ‡ 'HYHP VHU GHVDWLYDGRV WRGRV RV VHUYLoRV GH VLVWHPD TXH QmR VHUmR XWLOL]DGRV 0XLWDV YH]HV R VLVWHPD LQLFLD DXWRPDWLFDPHQWH GLversos aplicativos que nĂŁo sĂŁo necessĂĄrios, esses aplicativos tambĂŠm podem facilitar a vida de um atacante; ‡ 'HYH VH WRPDU XP JUDQGH FXLGDGR FRP DV DSOLFDo}HV GH UHGH SUREOHPDV QHVVH WLSR GH DSOLFDomR SRGHP GHL[DU R VLVWHPD YXOQHUivel a ataques remotos que podem ser realizados atravĂŠs da rede ou Internet; ‡ 8VH SDUWLo}HV GLIHUHQWHV SDUD RV GLIHUHQWHV WLSRV GH GDGRV D GLYLVmR ItVLFD GRV GDGRV IDFLOLWD D PDQXWHQomR GD VHJXUDQoD ‡ 5HPRYD WRGDV DV FRQWDV GH XVXiULRV QmR XWLOL]DGDV &RQWDV GH XVXiULRV VHP VHQKD RX FRP D VHQKD RULJLQDO GH LQVWDODomR SRGHP VHU IDFLOPHQWH H[SORUDGDV SDUD REWHU VH DFHVVR DR VLVWHPD Grande parte das invasĂľes na Internet acontece devido a falhas conhecidas em aplicaçþes de rede, as quais os administradores de VLVWHPDV QmR IRUDP FDSD]HV GH FRUULJLU D WHPSR (VVD DÂżUPDomR SRGH VHU FRQÂżUPDGD IDFLOPHQWH SHOR VLPSOHV IDWR GH TXH TXDQGR XPD QRYD YXOQHUDELOLGDGH p GHVFREHUWD XP JUDQGH Q~PHUR GH DWDTXHV p UHDOL]DGR FRP VXFHVVR 3RU LVVR p H[WUHPDPHQWH LPSRUWDQWH TXH RV administradores de sistemas se mantenham atualizados sobre os principais problemas encontrados nos aplicativos utilizados, atravĂŠs GRV VLWHV GRV GHVHQYROYHGRUHV RX HVSHFtÂżFRV VREUH VHJXUDQoD GD ,QIRUPDomR $V SULQFLSDLV HPSUHVDV FRPHUFLDLV GHVHQYROYHGRUDV GH VRIWZDUH H DV SULQFLSDLV GLVWULEXLo}HV /LQX[ SRVVXHP EROHWLQV SHULyGLFRV LQIRUPDQGR VREUH DV ~OWLPDV YXOQHUDELOLGDGHV HQFRQWUDGDV H VXDV GHYLGDV FRUUHo}HV $OJXQV VLVWHPDV FKHJDP DWp D SRVVXLU R UHFXUVR GH DWXDOL]DomR DXWRPiWLFD IDFLOLWDQGR DLQGD PDLV R SURFHVVR Firewalls 'HÂżQLPRV R ÂżUHZDOO FRPR VHQGR XPD EDUUHLUD LQWHOLJHQWH HQWUH GXDV UHGHV JHUDOPHQWH D UHGH ORFDO H D ,QWHUQHW DWUDYpV GD TXDO Vy SDVVD WUiIHJR DXWRUL]DGR (VWH WUiIHJR p H[DPLQDGR SHOR ÂżUHZDOO HP WHPSR UHDO H D VHOHomR p IHLWD GH DFRUGR FRP XP FRQMXQWR GH UHJUDV GH DFHVVR (OH p WLSLFDPHQWH XP URWHDGRU HTXLSDPHQWR TXH OLJD DV UHGHV FRP D ,QWHUQHW XP FRPSXWDGRU URGDQGR ÂżOWUDJHQV GH SDFRWHV XP VRIWZDUH 3UR[\ XP ÂżUHZDOO LQ D ER[ XP KDUGZDUH SURSULHWiULR HVSHFtÂżFR SDUD IXQomR GH ÂżUHZDOO RX XP FRQMXQWR GHVVHV VLVWHPDV 3RGH VH GL]HU TXH ÂżUHZDOO p XP FRQFHLWR DR LQYpV GH XP SURGXWR (OH p D VRPD GH WRGDV DV UHJUDV DSOLFDGDV D UHGH *HUDOPHQWH HVVDV UHJUDV VmR HODERUDGDV FRQVLGHUDQGR DV SROtWLFDV GH DFHVVR GD RUJDQL]DomR 3RGHPRV REVHUYDU TXH R ÂżUHZDOO p ~QLFR SRQWR GH HQWUDGD GD UHGH TXDQGR LVVR DFRQWHFH R ÂżUHZDOO WDPEpP SRGH VHU GHVLJQDGR FRPR FKHFN SRLQW 'H DFRUGR FRP RV PHFDQLVPRV GH IXQFLRQDPHQWRV GRV ÂżUHZDOOV SRGHPRV GHVWDFDU WUrV WLSRV SULQFLSDLV ‡ )LOWURV GH SDFRWHV ‡ 6WDWHIXO )LUHZDOOV ‡ )LUHZDOOV HP 1tYHO GH $SOLFDomR

Didatismo e Conhecimento

192


CONHECIMENTOS DE INFORMÁTICA - )LOWURV GH 3DFRWHV (VVH p R WLSR GH ¿UHZDOO PDLV FRQKHFLGR H XWLOL]DGR (OH FRQWUROD D RULJHP H R GHVWLQR GRV SDFRWHV GH PHQVDJHQV GD ,QWHUQHW 4XDQGR XPD LQIRUPDomR p UHFHELGD R ¿UHZDOO YHUL¿FD DV LQIRUPDo}HV VREUH R HQGHUHoR ,3 GH RULJHP H GHVWLQR GR SDFRWH H FRPSDUD FRP XPD OLVWD GH UHJUDV GH DFHVVR SDUD GHWHUPLQDU VH SDFRWH HVWi DXWRUL]DGR RX QmR D VHU UHSDVVDGR DWUDYpV GHOH $WXDOPHQWH D ¿OWUDJHP GH SDFRWHV p LPSOHPHQWDGD QD PDLRULD GRV URWHDGRUHV H p WUDQVSDUHQWH DRV XVXiULRV SRUpP SRGH VHU IDFLOPHQWH FRQWRUQDGD FRP ,3 6SRRIHUV 3RU LVWR R XVR GH URWHDGRUHV FRPR ~QLFD GHIHVD SDUD XPD UHGH FRUSRUDWLYD QmR p DFRQVHOKiYHO 0HVPR TXH ¿OWUDJHP GH SDFRWHV SRVVD VHU IHLWD GLUHWDPHQWH QR URWHDGRU SDUD XPD PDLRU SHUIRUPDQFH H FRQWUROH p QHFHVViULD D XWLOL]DomR GH XP VLVWHPD HVSHFt¿FR GH ¿UHZDOO 4XDQGR XP JUDQGH Q~PHUR GH UHJUDV p DSOLFDGR GLUHWDPHQWH QR URWHDGRU HOH DFDED SHUGHQGR SHUIRUPDQFH $OpP GLVVR )LUHZDOO PDLV DYDQoDGRV SRGHP GHIHQGHU D UHGH FRQWUD VSRR¿QJ H DWDTXHV GR WLSR 'R6 ''R6 6WDWHIXO )LUHZDOOV 2XWUR WLSR GH ¿UHZDOO p FRQKHFLGR FRPR 6WDWHIXO )LUHZDOO (OH XWLOL]D XPD WpFQLFD FKDPDGD 6WDWHIXO 3DFNHW ,QVSHFWLRQ TXH p XP WLSR DYDQoDGR GH ¿OWUDJHP GH SDFRWHV (VVH WLSR GH ¿UHZDOO H[DPLQD WRGR R FRQWH~GR GH XP SDFRWH QmR DSHQDV VHX FDEHoDOKR TXH FRQWpP DSHQDV RV HQGHUHoRV GH RULJHP H GHVWLQR GD LQIRUPDomR (OH p FKDPDGR GH µVWDWHIXO¶ SRUTXH H[DPLQD RV FRQWH~GRV GRV SDFRWHV para determinar qual é o estado da conexão, Ex: Ele garante que o computador destino de uma informação tenha realmente solicitado DQWHULRUPHQWH D LQIRUPDomR DWUDYpV GD FRQH[mR DWXDO $OpP GH VHUHP PDLV ULJRURVRV QD LQVSHomR GRV SDFRWHV RV VWDWHIXO ¿UHZDOOV SRGHP DLQGD PDQWHU DV SRUWDV IHFKDGDV DWp TXH XPD FRQH[mR SDUD D SRUWD HVSHFt¿FD VHMD UHTXLVLWDGD ,VVR SHUPLWH XPD PDLRU SURWHomR FRQWUD D DPHDoD GH SRUW VFDQQLQJ )LUHZDOOV HP 1tYHO GH $SOLFDomR 1HVVH WLSR GH ¿UHZDOO R FRQWUROH p H[HFXWDGR SRU DSOLFDo}HV HVSHFt¿FDV GHQRPLQDGDV SUR[LHV SDUD FDGD WLSR GH VHUYLoR D VHU FRQWURODGR (VVDV DSOLFDo}HV LQWHUFHSWDP WRGR R WUiIHJR UHFHELGR H R HQYLD SDUD DV DSOLFDo}HV FRUUHVSRQGHQWHV DVVLP FDGD DSOLFDomR SRGH FRQWURODU R XVR GH XP VHUYLoR $SHVDU GHVVH WLSR GH ¿UHZDOO WHU XPD SHUGD PDLRU GH SHUIRUPDQFH Mi TXH HOH DQDOLVD WRGD D FRPXQLFDomR XWLOL]DQGR SUR[LHV HOH SHUPLWH XPD PDLRU DXGLWRULD VREUH R FRQWUROH QR WUiIHJR Mi TXH DV DSOLFDo}HV HVSHFt¿FDV SRGHP GHWDOKDU PHOKRU RV HYHQWRV DVVRFLDGRV D XP GDGR VHUYLoR $ PDLRU GL¿FXOGDGH QD VXD LPSOHPHQWDomR p D QHFHVVLGDGH GH LQVWDODomR H FRQ¿JXUDomR GH XP SUR[\ SDUD FDGD DSOLFDomR VHQGR TXH DOJXPDV DSOLFDo}HV QmR WUDEDOKDP FRUUHWDPHQWH FRP HVVHV PHFDQLVPRV Considerações sobre o uso de Firewalls (PERUD RV ¿UHZDOOV JDUDQWDP XPD PDLRU SURWHomR H VmR LQHVWLPiYHLV SDUD VHJXUDQoD GD LQIRUPDomR H[LVWHP DOJXQV DWDTXHV TXH RV ¿UHZDOOV QmR SRGHP SURWHJHU FRPR D LQWHUFHSWDomR GH WUiIHJR QmR FULSWRJUDIDGR H[ ,QWHUFHSWDomR GH H PDLO $OpP GLVVR HPERUD RV ¿UHZDOOV SRVVDP SURYHU XP ~QLFR SRQWR GH VHJXUDQoD H DXGLWRULD HOHV WDPEpP SRGHP VH WRUQDU XP ~QLFR SRQWR GH IDOKD ± R TXH TXHU GL]HU TXH RV ¿UHZDOOV VmR D ~OWLPD OLQKD GH GHIHVD 6LJQL¿FD TXH VH XP DWDFDQWH FRQVHJXLU TXHEUDU D VHJXUDQoD GH XP ¿UHZDOO HOH YDL WHU DFHVVR DR VLVWHPD H SRGH WHU D RSRUWXQLGDGH GH URXEDU RX GHVWUXLU LQIRUPDo}HV $OpP GLVVR RV ¿UHZDOOV SURWHJHP D UHGH FRQWUD RV DWDTXHV H[WHUQRV PDV QmR FRQWUD RV DWDTXHV LQWHUQRV 1R FDVR GH IXQFLRQiULRV PDO LQWHQFLRQDGRV RV ¿UHZDOOV QmR JDUDQWHP PXLWD SURWHomR )LQDOPHQWH FRPR PHQFLRQDGR RV ¿UHZDOOV GH ¿OWURV GH SDFRWHV VmR IDOKRV HP DOJXQV SRQWRV $V WpFQLFDV GH 6SRR¿QJ SRGHP VHU XP PHLR HIHWLYR GH DQXODU D VXD SURWHomR 3DUD XPD SURWHomR H¿FLHQWH FRQWUD DV DPHDoDV GH VHJXUDQoD H[LVWHQWHV RV ¿UHZDOOV GHYHP VHU XVDGRV HP FRQMXQWR FRP GLYHUVDV RXWUDV PHGLGDV GH VHJXUDQoD ([LVWHP FODUR RXWURV PHFDQLVPRV GH VHJXUDQoD TXH DSRLDP RV FRQWUROHV ItVLFRV 3RUWDV WUDQFDV SDUHGHV EOLQGDJHP JXDUGDV HWF &21752/(6 /Ï*,&26 são barreiras que impedem ou limitam o acesso à informação, que está em ambiente controlado, JHUDOPHQWH HOHWU{QLFR H TXH GH RXWUR PRGR ¿FDULD H[SRVWD D DOWHUDomR QmR DXWRUL]DGD SRU HOHPHQWR PDO LQWHQFLRQDGR Existem mecanismos de segurança que apoiam os controles lógicos:

Didatismo e Conhecimento

193


CONHECIMENTOS DE INFORMÁTICA Mecanismos de encriptação $ FULSWRJUD¿D YHP QD VXD RULJHP GD IXVmR GH GXDV SDODYUDV JUHJDV &5,372 RFXOWDU HVFRQGHU *5$),$ HVFUHYHU &ULSWRJUD¿D p DUWH RX FLrQFLD GH HVFUHYHU HP FLIUD RX HP FyGLJRV e HQWmR XP FRQMXQWR GH WpFQLFDV TXH WRUQDP XPD PHQVDJHP LQFRPSUHHQVtYHO SHUPLWLQGR DSHQDV TXH R GHVWLQDWiULR TXH FRQKHoD D FKDYH GH HQFULSWDomR SRVVD GHFULSWDU H OHU D PHQVDJHP FRP FODUH]D 3HUPLWHP D WUDQVIRUPDomR UHYHUVtYHO GD LQIRUPDomR GH IRUPD D WRUQi OD LQLQWHOLJtYHO D WHUFHLURV 8WLOL]D VH SDUD WDO DOJRULWPRV GHWHUPLQDGRV H XPD FKDYH VHFUHWD SDUD D SDUWLU GH XP FRQMXQWR GH GDGRV QmR HQFULSWDGRV SURGX]LU XPD VHTXrQFLD GH GDGRV HQFULSWDGRV $ RSHUDomR LQYHUVD p D GHVHQFULSWDomR Assinatura digital 8P FRQMXQWR GH GDGRV HQFULSWDGRV DVVRFLDGRV D XP GRFXPHQWR GR TXDO VmR IXQomR JDUDQWLQGR D LQWHJULGDGH GR GRFXPHQWR DVVRFLDGR PDV QmR D VXD FRQ¿GHQFLDOLGDGH $ DVVLQDWXUD GLJLWDO SRUWDQWR EXVFD UHVROYHU GRLV SUREOHPDV QmR JDUDQWLGRV DSHQDV FRP XVR GD FULSWRJUD¿D SDUD FRGL¿FDU DV LQIRUPDo}HV D ,QWHJULGDGH H D 3URFHGrQFLD (OD XWLOL]D XPD IXQomR FKDPDGD RQH ZD\ KDVK IXQFWLRQ WDPEpP FRQKHFLGD FRPR FRPSUHVVLRQ IXQFWLRQ FU\SWRJUDSKLF FKHFNVXP PHVVDJH GLJHVW RX ¿QJHUSULQW (VVD IXQomR JHUD XPD VWULQJ ~QLFD VREUH XPD LQIRUPDomR VH HVVH YDORU IRU R PHVPR WDQWR QR UHPHWHQWH TXDQWR GHVWLQDWiULR VLJQL¿FD TXH HVVD LQIRUPDomR QmR IRL DOWHUDGD Mesmo assim isso ainda não garante total integridade, pois a informação pode ter sido alterada no seu envio e um novo hash pode WHU VLGR FDOFXODGR 3DUD VROXFLRQDU HVVH SUREOHPD p XWLOL]DGD D FULSWRJUD¿D DVVLPpWULFD FRP D IXQomR GDV FKDYHV QXP VHQWLGR LQYHUVR RQGH R KDVK p FULSWRJUDIDGR XVDQGR D FKDYH SULYDGD GR UHPHWHQWH VHQGR DVVLP R GHVWLQDWiULR GH SRVVH GD FKDYH S~EOLFD GR UHPHWHQWH SRGHUi GHFULSWDU R KDVK 'HVVD PDQHLUD JDUDQWLPRV D SURFHGrQFLD SRLV VRPHQWH R UHPHWHQWH SRVVXL D FKDYH SULYDGD SDUD FRGL¿FDU R KDVK TXH VHUi DEHUWR SHOD VXD FKDYH S~EOLFD -i R KDVK JHUDGR D SDUWLU GD LQIRUPDomR RULJLQDO SURWHJLGR SHOD FULSWRJUD¿D JDUDQWLUi D LQWHJULGDGH GD LQIRUPDomR Mecanismos de garantia da integridade da informação 8VDQGR IXQo}HV GH ³+DVKLQJ´ RX GH FKHFDJHP FRQVLVWLQGR QD DGLomR Mecanismos de controle de acesso 3DODYUDV FKDYH VLVWHPDV ELRPpWULFRV ¿UHZDOOV FDUW}HV LQWHOLJHQWHV 0HFDQLVPRV GH FHUWL¿FDomR $WHVWD D YDOLGDGH GH XP GRFXPHQWR 2 &HUWL¿FDGR 'LJLWDO WDPEpP FRQKHFLGR FRPR &HUWL¿FDGR GH ,GHQWLGDGH 'LJLWDO DVVRFLD D identidade de um titular a um par de chaves eletrônicas (uma pública e outra privada) que, usadas em conjunto, fornecem a comprovação GD LGHQWLGDGH e XPD YHUVmR HOHWU{QLFD GLJLWDO GH DOJR SDUHFLGR D XPD &pGXOD GH ,GHQWLGDGH VHUYH FRPR SURYD GH LGHQWLGDGH UHFRQKHFLGD GLDQWH GH TXDOTXHU VLWXDomR RQGH VHMD QHFHVViULD D FRPSURYDomR GH LGHQWLGDGH 2 &HUWL¿FDGR 'LJLWDO SRGH VHU XVDGR HP XPD JUDQGH YDULHGDGH GH DSOLFDo}HV FRPR FRPpUFLR HOHWU{QLFR JURXSZDUH ,QWUDQHWV H ,QWHUQHW H WUDQVIHUrQFLD HOHWU{QLFD GH IXQGRV 'HVVD IRUPD XP FOLHQWH TXH FRPSUH HP XP VKRSSLQJ YLUWXDO XWLOL]DQGR XP 6HUYLGRU 6HJXUR VROLFLWDUi R &HUWL¿FDGR GH ,GHQWLGDGH 'LJLWDO GHVWH 6HUYLGRU SDUD YHUL¿FDU D LGHQWLGDGH GR YHQGHGRU H R FRQWH~GR GR &HUWL¿FDGR SRU HOH DSUHVHQWDGR 'D PHVPD IRUPD R VHUYLGRU SRGHUi VROLFLWDU DR FRPSUDGRU VHX &HUWL¿FDGR GH ,GHQWLGDGH 'LJLWDO SDUD LGHQWL¿Fi OR FRP VHJXUDQoD H SUHFLVmR &DVR TXDOTXHU XP GRV GRLV DSUHVHQWH XP &HUWL¿FDGR GH ,GHQWLGDGH 'LJLWDO DGXOWHUDGR HOH VHUi DYLVDGR GR IDWR H D FRPXQLFDomR FRP VHJXUDQoD QmR VHUi HVWDEHOHFLGD 2 &HUWL¿FDGR GH ,GHQWLGDGH 'LJLWDO p HPLWLGR H DVVLQDGR SRU XPD $XWRULGDGH &HUWL¿FDGRUD 'LJLWDO &HUWL¿FDWH $XWKRULW\ 3DUD WDQWR HVWD DXWRULGDGH XVD DV PDLV DYDQoDGDV WpFQLFDV GH FULSWRJUD¿D GLVSRQtYHLV H GH SDGU}HV LQWHUQDFLRQDLV QRUPD ,62 ; SDUD &HUWL¿FDGRV 'LJLWDLV SDUD D HPLVVmR H FKDQFHOD GLJLWDO GRV &HUWL¿FDGRV GH ,GHQWLGDGH 'LJLWDO 3RGHPRV GHVWDFDU WUrV HOHPHQWRV SULQFLSDLV ,QIRUPDomR GH DWULEXWR e D LQIRUPDomR VREUH R REMHWR TXH p FHUWL¿FDGR 1R FDVR GH XPD SHVVRD LVWR SRGH LQFOXLU VHX QRPH QDFLRQDOLGDGH H HQGHUHoR H PDLO VXD RUJDQL]DomR H R GHSDUWDPHQWR GD RUJDQL]DomR RQGH WUDEDOKD

Didatismo e Conhecimento

194


CONHECIMENTOS DE INFORMÁTICA &KDYH GH LQIRUPDomR S~EOLFD e D FKDYH S~EOLFD GD HQWLGDGH FHUWL¿FDGD 2 FHUWL¿FDGR DWXD SDUD DVVRFLDU D FKDYH S~EOLFD j LQIRUPDomR GH DWULEXWR GHVFULWD DFLPD $ FKDYH S~EOLFD SRGH VHU TXDOTXHU FKDYH DVVLPpWULFD PDV XVXDOPHQWH p XPD FKDYH 56$ $VVLQDWXUD GD $XWRULGDGH HP &HUWL¿FDomR &$ $ &$ DVVLQD RV GRLV SULPHLURV HOHPHQWRV H HQWmR DGLFLRQD FUHGLELOLGDGH DR FHUWL¿FDGR 4XHP UHFHEH R FHUWL¿FDGR YHUL¿FD D DVVLQDWXUD H DFUHGLWDUi QD LQIRUPDomR GH DWULEXWR H FKDYH S~EOLFD DVVRFLDGDV VH DFUHGLWDU QD $XWRULGDGH HP &HUWL¿FDomR ([LVWHP GLYHUVRV SURWRFRORV TXH XVDP RV FHUWL¿FDGRV GLJLWDLV SDUD FRPXQLFDo}HV VHJXUDV QD ,QWHUQHW 6HFXUH 6RFNHW /D\HU RX 66/ 6HFXUHG 0XOWLSXUSRVH 0DLO ([WHQVLRQV 6 0,0( )RUP 6LJQLQJ $XWKHQWLFRGH 2EMHFWVLJQLQJ O SSL p WDOYH] D PDLV GLIXQGLGD DSOLFDomR SDUD RV FHUWL¿FDGRV GLJLWDLV H p XVDGR HP SUDWLFDPHQWH WRGRV RV VLWHV TXH ID]HP FRPpUFLR HOHWU{QLFR QD UHGH OLYUDULDV ORMDV GH &' EDQFRV HWF 2 66/ WHYH XPD SULPHLUD IDVH GH DGRomR RQGH DSHQDV RV VHUYLGRUHV HVWDYDP LGHQWL¿FDGRV FRP FHUWL¿FDGRV GLJLWDLV H DVVLP WtQKDPRV JDUDQWLGR DOpP GD LGHQWLGDGH GR VHUYLGRU R VLJLOR QD VHVVmR (QWUHWDQWR DSHQDV FRP D FKHJDGD GRV FHUWL¿FDGRV SDUD RV EURZVHUV p TXH SXGHPRV FRQWDU WDPEpP FRP D LGHQWL¿FDomR QD SRQWD FOLHQWH HOLPLQDQGR DVVLP D QHFHVVLGDGH GR XVR GH VHQKDV H ORJLQV O S/Mime é também um protocolo muito popular, pois permite que as mensagens de correio eletrônico trafeguem encriptadas e/ou DVVLQDGDV GLJLWDOPHQWH 'HVWD IRUPD RV H PDLOV QmR SRGHP VHU OLGRV RX DGXOWHUDGRV SRU WHUFHLURV GXUDQWH R VHX WUkQVLWR HQWUH D PiTXLQD GR UHPHWHQWH H D GR GHVWLQDWiULR $OpP GLVVR R GHVWLQDWiULR WHP D JDUDQWLD GD LGHQWLGDGH GH TXHP HQYLRX R H PDLO O Form Signing p XPD WHFQRORJLD TXH SHUPLWH TXH RV XVXiULRV HPLWDP UHFLERV RQOLQH FRP VHXV FHUWL¿FDGRV GLJLWDLV 3RU H[HPSOR R XVXiULR DFHVVD R VHX ,QWHUQHW %DQNLQJ H VROLFLWD XPD WUDQVIHUrQFLD GH IXQGRV 2 VLVWHPD GR EDQFR DQWHV GH ID]HU D RSHUDomR SHGH TXH R XVXiULR DVVLQH FRP VHX FHUWL¿FDGR GLJLWDO XP UHFLER FRQ¿UPDQGR D RSHUDomR (VVH UHFLER SRGH VHU JXDUGDGR SHOR EDQFR SDUD VHUYLU FRPR SURYD FDVR R FOLHQWH SRVWHULRUPHQWH QHJXH WHU HIHWXDGR D WUDQVDomR O Authenticode e o Object Signing são tecnologias que permitem que um desenvolvedor de programas de computador assine diJLWDOPHQWH VHX VRIWZDUH $VVLP DR EDL[DU XP VRIWZDUH SHOD ,QWHUQHW R XVXiULR WHP FHUWH]D GD LGHQWLGDGH GR IDEULFDQWH GR SURJUDPD H TXH R VRIWZDUH VH PDQWHYH tQWHJUR GXUDQWH R SURFHVVR GH GRZQORDG 2V FHUWL¿FDGRV GLJLWDLV VH GLYLGHP HP EDVLFDPHQWH GRLV IRUPDWRV RV FHUWL¿FDGRV GH XVR JHUDO TXH VHULDP HTXLYDOHQWHV D XPD FDUWHLUD GH LGHQWLGDGH H RV GH XVR UHVWULWR HTXLYDOHQWHV D FDUW}HV GH EDQFR FDUWHLUDV GH FOXEH HWF 2V FHUWL¿FDGRV GH XVR JHUDO VmR HPLWLGRV GLUHWDPHQWH SDUD R XVXiULR ¿QDO HQTXDQWR TXH RV GH XVR UHVWULWR VmR YROWDGRV EDVLFDPHQWH SDUD HPSUHVDV RX JRYHUQR ,QWHJULGDGH 0HGLGD HP TXH XP VHUYLoR LQIRUPDomR p JHQXLQR LVWR p HVWD SURWHJLGR FRQWUD D SHUVRQL¿FDomR SRU LQWUXVRV +RQH\SRW e R QRPH GDGR D XP VRIWZDUH FXMD IXQomR p GHWHFWDU RX GH LPSHGLU D DomR GH XP FUDFNHU GH XP VSDPPHU RX GH TXDOTXHU DJHQWH H[WHUQR HVWUDQKR DR VLVWHPD HQJDQDQGR R ID]HQGR R SHQVDU TXH HVWHMD GH IDWR H[SORUDQGR XPD YXOQHUDELOLGDGH GDTXHOH VLVWHPD AMEAÇAS À SEGURANÇA $PHDoD p DOJR TXH RIHUHFH XP ULVFR H WHP FRPR IRFR DOJXP DWLYR 8PD DPHDoD WDPEpP SRGH DSURYHLWDU VH GH DOJXPD YXOQHUDELOLGDGH GR DPELHQWH ,GHQWL¿FDU $PHDoDV GH 6HJXUDQoD ± ,GHQWL¿FDU RV 7LSRV GH $WDTXHV p D EDVH SDUD FKHJDU DRV 5LVFRV /HPEUH VH TXH H[LVWHP DV SULRULGDGHV HVVDV SULRULGDGHV VmR RV SRQWRV TXH SRGHP FRPSURPHWHU R ³1HJyFLR GD (PSUHVD´ RX VHMD R TXH p FUXFLDO SDUD D VREUHYLYrQFLD GD (PSUHVD p FUXFLDO QR VHX SURMHWR GH 6HJXUDQoD Abaixo temos um conjunto de ameaças, chamado de FVRDNE: )DOVL¿FDomR )DOVL¿FDomR GH ,GHQWLGDGH p TXDQGR VH XVD QRPH GH XVXiULR H VHQKD GH RXWUD SHVVRD SDUD DFHVVDU UHFXUVRV RX H[HFXWDU WDUHIDV 6Hguem dois exemplos: )DOVL¿FDU PHQVDJHP GH H PDLO ([HFXWDU SDFRWHV GH DXWHQWLFDomR 8P DWDTXH GH )DOVL¿FDomR SRGH WHU LQtFLR HP XP 3RVW,W FRP VXD VHQKD JUXGDGR QR VHX PRQLWRU Didatismo e Conhecimento

195


CONHECIMENTOS DE INFORMร TICA Violaรงรฃo A Violaรงรฃo ocorre quando os dados sรฃo alterados: ย $OWHUDU GDGRV GXUDQWH D WUDQVPLVVmR ย $OWHUDU GDGRV HP DUTXLYRV Repudiaรงรฃo $ 5HSXGLDomR WDOYH] VHMD XPD GDV ~OWLPDV HWDSDV GH XP DWDTXH EHP VXFHGLGR SRLV p R DWR GH QHJDU DOJR TXH IRL IHLWR ,VVR SRGH VHU IHLWR DSDJDQGR DV HQWUDGDV GR /RJ DSyV XP DFHVVR LQGHYLGR ([HPSORV ย ([FOXLU XP DUTXLYR FUtWLFR H QHJDU TXH H[FOXLX ย &RPSUDU XP SURGXWR H PDLV WDUGH QHJDU TXH FRPSURX Divulgaรงรฃo $ 'LYXOJDomR GDV ,QIRUPDo}HV SRGH VHU WmR JUDYH H RX FXVWDU WmR FDUR TXDQWR XP DWDTXH GH ยณ1HJDomR GH 6HUYLoRยด SRLV LQIRUPDo}HV TXH QmR SRGLDP VHU DFHVVDGDV SRU WHUFHLURV DJRUD HVWmR VHQGR GLYXOJDGDV RX XVDGDV SDUD REWHU YDQWDJHP HP QHJyFLRV 'HSHQGHQGR GD LQIRUPDomR HOD SRGH VHU XVDGD FRPR REMHWR GH FKDQWDJHP $EDL[R H[HPSORV GH 'LYXOJDomR ย ([SRU LQIRUPDo}HV HP PHQVDJHQV GH HUUR ย ([SRU FyGLJR HP VLWHV Negaรงรฃo de Serviรงo (DoS) (Denial of Service, DoS) A forma mais conhecida de ataque que consiste na perturbaรงรฃo de um serviรงo, devido a danos fรญsicos ou lรณgicos causados no sistema TXH R VXSRUWDP 3DUD SURYRFDU XP 'R6 RV DWDFDQWHV GLVVHPLQDP YtUXV JHUDP JUDQGHV YROXPHV GH WUiIHJR GH IRUPD DUWLยฟFLDO RX PXLWRV SHGLGRV DRV VHUYLGRUHV TXH FDXVDP VXEFDUJD H HVWHV ~OWLPRV ยฟFDP LPSHGLGRV GH SURFHVVDU RV SHGLGRV QRUPDLV 2 REMHWLYR GHVWH DWDTXH p SDUDU DOJXP VHUYLoR ([HPSOR ย ยณ,QXQGDUยด XPD UHGH FRP SDFRWHV 6<1 6\Q )ORRG ย ยณ,QXQGDUยด XPD UHGH FRP SDFRWHV ,&30 IRUoDGRV 2 DOYR GHVWH WLSR GH DWDTXH SRGH VHU XP :HE 6HUYHU FRQWHQGR R VLWH GD HPSUHVD RX DWp PHVPR ยณLQXQGDUยด R '+&3 6HUYHU /RFDO FRP VROLFLWDo}HV GH ,3 ID]HQGR FRP TXH QHQKXPD HVWDomR FRP ,3 GLQkPLFR REWHQKD HQGHUHoR ,3 Elevaรงรฃo de Privilรฉgios $FRQWHFH TXDQGR R XVXiULR PDO LQWHQFLRQDGR TXHU H[HFXWDU XPD DomR GD TXDO QmR SRVVXL SULYLOpJLRV DGPLQLVWUDWLYRV VXยฟFLHQWHV ย ([SORUDU VDWXUDo}HV GR EXIIHU SDUD REWHU SULYLOpJLRV GR VLVWHPD ย 2EWHU SULYLOpJLRV GH DGPLQLVWUDGRU GH IRUPD LOHJtWLPD Este usuรกrio pode aproveitar-se que o Administrador da Rede efetuou logon numa mรกquina e a deixou desbloqueada, e com isso DGLFLRQDU D VXD SUySULD FRQWD DRV JUXSRV 'RPDLQ $GPLQV H 5HPRWH 'HVNWRS 8VHUV &RP LVVR HOH ID] R TXH TXLVHU FRP D UHGH GD HPSUHVD PHVPR TXH HVWHMD HP FDVD Quem pode ser uma ameaรงa? 4XHP DWDFD D UHGH VLVWHPD VmR DJHQWHV PDOLFLRVRV PXLWDV YH]HV FRQKHFLGRV FRPR FUDFNHUV KDFNHUV QmR VmR DJHQWHV PDOLFLRVRV WHQWDP DMXGDU D HQFRQWUDU SRVVtYHLV IDOKDV (VWDV SHVVRDV VmR PRWLYDGDV SDUD ID]HU HVWD LOHJDOLGDGH SRU YiULRV PRWLYRV 2V SULQFLSDLV PRWLYRV VmR QRWRULHGDGH DXWRHVWLPD YLQJDQoD H R GLQKHLUR e VDELGR TXH PDLV GH GRV DWDTXHV SDUWHP GH XVXiULRV OHJtWLPRV GH sistemas de informaรงรฃo (Insiders) -- o que motiva corporaรงรตes a investir largamente em controles de seguranรงa para seus ambientes FRUSRUDWLYRV LQWUDQHW e QHFHVViULR LGHQWLยฟFDU TXHP SRGH DWDFDU D PLQKD UHGH H TXDO D FDSDFLGDGH H RX REMHWLYR GHVWD SHVVRD ย 3ULQFLSLDQWH ยฑ QmR WHP QHQKXPD H[SHULrQFLD HP SURJUDPDomR H XVD IHUUDPHQWDV GH WHUFHLURV *HUDOPHQWH QmR WHP QRomR GR TXH HVWi ID]HQGR RX GDV FRQVHTXrQFLDV GDTXHOH DWR ย ,QWHUPHGLiULR ยฑ WHP DOJXP FRQKHFLPHQWR GH SURJUDPDomR H XWLOL]D IHUUDPHQWDV XVDGDV SRU WHUFHLURV (VWD SHVVRD SRGH TXHUHU DOJR DOpP GH WHVWDU XP ยณ3URJUDPLQKD +DFNHUยด ย $YDQoDGR ยฑ 3URJUDPDGRUHV H[SHULHQWHV SRVVXHP FRQKHFLPHQWR GH ,QIUDHVWUXWXUD H 3URWRFRORV 3RGHP UHDOL]DU DWDTXHV HVWUXWXUDGRV &HUWDPHQWH QmR HVWmR Vy WHVWDQGR RV VHXV SURJUDPDV Estas duas primeiras pessoas podem ser funcionรกrios da empresa, e provavelmente estรฃo se aproveitando de alguma vulnerabilidade GR VHX DPELHQWH Didatismo e Conhecimento

196


CONHECIMENTOS DE INFORMÁTICA VULNERABILIDADES Os ataques com mais chances de dar certo são aqueles que exploram vulnerabilidades, seja ela uma vulnerabilidade do sistema RSHUDFLRQDO DSOLFDWLYRV RX SROtWLFDV LQWHUQDV Veja algumas vulnerabilidades: 5RXER GH VHQKDV ± 8VR GH VHQKDV HP EUDQFR VHQKDV SUHYLVtYHLV RX TXH QmR XVDP UHTXLVLWRV PtQLPRV GH FRPSOH[LGDGH 'HL[DU XP 3RVWLW FRP D VXD VHQKD JUXGDGD QR PRQLWRU p XPD YXOQHUDELOLGDGH 6RIWZDUH VHP 3DWFKHV ± 8P JHUHQFLDPHQWR GH 6HUYLFH 3DFNV H +RW)L[HV PDO IHLWR p XPD YXOQHUDELOLGDGH FRPXP 9HMD FDVRV como os ataques do Slammer e do Blaster, sendo que suas respectivas correções já estavam disponíveis bem antes dos ataques serem UHDOL]DGRV &RQ¿JXUDomR ,QFRUUHWD ± $SOLFDWLYRV H[HFXWDGRV FRP FRQWDV GH 6LVWHPD /RFDO H XVXiULRV TXH SRVVXHP SHUPLVV}HV DFLPD GR QHFHVViULR (QJHQKDULD 6RFLDO ± 2 $GPLQLVWUDGRU SRGH DOWHUDU XPD VHQKD VHP YHUL¿FDU D LGHQWLGDGH GD FKDPDGD 6HJXUDQoD IUDFD QR 3HUtPHWUR ± 6HUYLoRV GHVQHFHVViULRV SRUWDV QmR VHJXUDV )LUHZDOO H 5RWHDGRUHV XVDGRV LQFRUUHWDPHQWH 7UDQVSRUWH GH 'DGRV VHP &ULSWRJUD¿D ± 3DFRWHV GH DXWHQWLFDomR XVDQGR SURWRFRORV GH WH[WR VLPSOHV GDGRV LPSRUWDQWHV HQYLDGRV HP WH[WR VLPSOHV SHOD ,QWHUQHW ,GHQWL¿TXH HQWHQGD FRPR H[SORUi ODV H PHVPR TXH QmR VHMD SRVVtYHO HOLPLQi ODV PRQLWRUH H JHUHQFLH R ULVFR GH VXDV YXOQHUDELOLGDGHV 1HP WRGRV RV SUREOHPDV GH VHJXUDQoD SRVVXHP XPD VROXomR GH¿QLWLYD D SDUWLU GLVVR LQLFLD VH R *HUHQFLDPHQWR GH 5LVFR DQDOLVDQGR H EDODQFHDQGR WRGDV DV LQIRUPDo}HV VREUH $WLYRV $PHDoDV 9XOQHUDELOLGDGHV SUREDELOLGDGH H LPSDFWR NÍVEL DE SEGURANÇA 'HSRLV GH LGHQWL¿FDGR R SRWHQFLDO GH DWDTXH DV RUJDQL]Do}HV WrP TXH GHFLGLU R QtYHO GH VHJXUDQoD D HVWDEHOHFHU SDUD XP UHGH RX VLVWHPD RV UHFXUVRV ItVLFRV H OyJLFRV D QHFHVVLWDU GH SURWHomR 1R QtYHO GH VHJXUDQoD GHYHP VHU TXDQWL¿FDGRV RV FXVWRV DVVRFLDGRV DRV DWDTXHV H RV DVVRFLDGRV j LPSOHPHQWDomR GH PHFDQLVPRV GH SURWHomR SDUD PLQLPL]DU D SUREDELOLGDGH GH RFRUUrQFLD GH XP DWDTXH POLÍTICAS DE SEGURANÇA 'H DFRUGR FRP R 5)& 7KH 6LWH 6HFXULW\ +DQGERRN XPD SROtWLFD GH VHJXUDQoD FRQVLVWH QXP FRQMXQWR IRUPDO GH UHJUDV TXH GHYHP VHU VHJXLGDV SHORV XVXiULRV GRV UHFXUVRV GH XPD RUJDQL]DomR $V SROtWLFDV GH VHJXUDQoD GHYHP WHU LPSOHPHQWDomR UHDOLVWD H GH¿QLU FODUDPHQWH DV iUHDV GH UHVSRQVDELOLGDGH GRV XVXiULRV GR SHVVRDO GH JHVWmR GH VLVWHPDV H UHGHV H GD GLUHomR 'HYH WDPEpP DGDSWDU VH D DOWHUDo}HV QD RUJDQL]DomR $V SROtWLFDV GH VHJXUDQoD IRUQHFHP XP HQTXDGUDPHQWR SDUD D LPSOHPHQWDomR GH PHFDQLVPRV GH VHJXUDQoD GH¿QHP SURFHGLPHQWRV GH VHJXUDQoD DGHTXDGRV SURFHVVRV GH DXGLWRULD j VHJXUDQoD H HVWDEHOHFHP XPD EDVH SDUD SURFHGLPHQWRV OHJDLV QD VHTXrQFLD GH DWDTXHV 2 GRFXPHQWR TXH GH¿QH D SROtWLFD GH VHJXUDQoD GHYH GHL[DU GH IRUD WRGRV RV DVSHWRV WpFQLFRV GH LPSOHPHQWDomR GRV PHFDQLVPRV GH VHJXUDQoD SRLV HVVD LPSOHPHQWDomR SRGH YDULDU DR ORQJR GR WHPSR 'HYH VHU WDPEpP XP GRFXPHQWR GH IiFLO OHLWXUD H FRPSUHHQVmR DOpP GH UHVXPLGR $OJXPDV QRUPDV GH¿QHP DVSHFWRV TXH GHYHP VHU OHYDGRV HP FRQVLGHUDomR DR HODERUDU SROtWLFDV GH VHJXUDQoD (QWUH HVVDV QRUPDV HVWmR D %6 HODERUDGD SHOD %ULWLVK 6WDQGDUGV ,QVWLWXWLRQ H D 1%5 ,62 ,(& D YHUVmR EUDVLOHLUD GHVWD SULPHLUD ([LVWHP GXDV ¿ORVR¿DV SRU WUiV GH TXDOTXHU SROtWLFD GH VHJXUDQoD D SURLELWLYD WXGR TXH QmR p H[SUHVVDPHQWH SHUPLWLGR p SURLELGR H D SHUPLVVLYD WXGR TXH QmR p SURLELGR p SHUPLWLGR (Q¿P LPSODQWDU 6HJXUDQoD HP XP DPELHQWH QmR GHSHQGH Vy GD 7HFQRORJLD XVDGD PDV WDPEpP GRV 3URFHVVRV XWLOL]DGRV QD VXD LPSOHPHQWDomR H GD UHVSRQVDELOLGDGH TXH DV 3HVVRDV WrP QHVWH FRQMXQWR (VWDU DWHQWR DR VXUJLPHQWR GH QRYDV WHFQRORJLDV QmR EDVWD p QHFHVViULR HQWHQGHU DV QHFHVVLGDGHV GR DPELHQWH H LPSODQWDU SROtWLFDV TXH FRQVFLHQWL]HP DV SHVVRDV D WUDEDOKDU GH PRGR VHJXUR Seu ambiente nunca estará seguro, não imagine que instalando um bom Antivírus você elimina as suas vulnerabilidades ou diminui a TXDQWLGDGH GH DPHDoDV e H[WUHPDPHQWH QHFHVViULR FRQKHFHU R DPELHQWH H ID]HU XP HVWXGR SDUD GHSRLV SRGHU LPSOHPHQWDU IHUUDPHQWDV H VROXo}HV GH VHJXUDQoD

Didatismo e Conhecimento

197


CONHECIMENTOS DE INFORMà TICA O que são vírus de computador? 2V YtUXV UHSUHVHQWDP XP GRV PDLRUHV SUREOHPDV SDUD XVXiULRV GH FRPSXWDGRU Consistem em pequenos programas criados para causar algum dano ao computador infectado, seja apagando dados, seja capturando LQIRUPDo}HV VHMD DOWHUDQGR R IXQFLRQDPHQWR QRUPDO GD PiTXLQD 2V XVXiULRV GRV VLVWHPDV RSHUDFLRQDLV :LQGRZV VmR YtWLPDV TXDVH TXH H[FOXVLYDV GH YtUXV Mi TXH RV VLVWHPDV GD 0LFURVRIW VmR ODUJDPHQWH XVDGRV QR PXQGR WRGR ([LVWHP YtUXV SDUD VLVWHPDV RSHUDFLRQDLV 0DF H RV EDVHDGRV HP 8QL[ PDV HVWHV VmR H[WUHPDPHQWH UDURV H FRVWXPDP VHU EDVWDQWH OLPLWDGRV (VVHV ³SURJUDPDV PDOLFLRVRV´ receberam o nome vírus porque possuem a característica de se multiplicar facilmente, assim como ocorre com os vírus reais, ou seja, RV YtUXV ELROyJLFRV (OHV VH GLVVHPLQDP RX DJHP SRU PHLR GH IDOKDV RX OLPLWDo}HV GH GHWHUPLQDGRV SURJUDPDV VH HVSDOKDQGR FRPR HP XPD LQIHFomR 3DUD FRQWDPLQDUHP RV FRPSXWDGRUHV RV YtUXV DQWLJDPHQWH XVDYDP GLVTXHWHV RX DUTXLYRV LQIHFWDGRV +RMH RV YtUXV SRGHP DWLQJLU HP SRXFRV PLQXWRV PLOKDUHV GH FRPSXWDGRUHV HP WRGR PXQGR ,VVR WXGR JUDoDV j ,QWHUQHW 2 PpWRGR GH SURSDJDomR PDLV FRPXP p R XVR GH H PDLOV RQGH R YtUXV XVD XP WH[WR TXH WHQWD FRQYHQFHU R LQWHUQDXWD D FOLFDU QR DUTXLYR HP DQH[R e QHVVH DQH[R TXH VH HQFRQWUD R YtUXV 2V PHLRV GH FRQYHQFLPHQWR VmR PXLWRV H FRVWXPDP VHU EDVWDQWH FULDWLYRV 2 H PDLO H DWp R FDPSR DVVXQWR GD PHQVDJHP FRVWXPD WHU WH[WRV TXH GHVSHUWDP D FXULRVLGDGH GR LQWHUQDXWD 0XLWRV H[SORUDP DVVXQWRV HUyWLFRV RX DERUGDP TXHVW}HV DWXDLV $OJXQV YtUXV SRGHP DWp XVDU XP UHPHWHQWH IDOVR ID]HQGR R GHVWLQDWiULR GR H PDLO DFUHGLWDU TXH VH WUDWD GH XPD PHQVDJHP YHUGDGHLUD 0XLWRV LQWHUQDXWDV FRVWXPDP LGHQWL¿FDU H PDLOV GH YtUXV PDV RV FULDGRUHV GHVWDV ³SUDJDV GLJLWDLV´ SRGHP XVDU DUWLItFLRV LQpGLWRV TXH QmR SRXSDP QHP R XVXiULR PDLV H[SHULHQWH 2 FRPSXWDGRU RX PHOKRU GL]HQGR R VLVWHPD RSHUDFLRQDO SRU VL Vy QmR WHP FRPR GHWHFWDU D H[LVWrQFLD GHVWH SURJUDPLQKD (OH QmR p UHIHUHQFLDGR HP QHQKXPD SDUWH GRV VHXV DUTXLYRV QLQJXpP VDEH GHOH H HOH QmR FRVWXPD VH PRVWUDU DQWHV GR DWDTXH IDWDO Em linhas gerais, um vírus completo (entenda-se por completo o vírus que usa todas as formas possíveis de contaminar e se ocultar) FKHJD DWp D PHPyULD GR FRPSXWDGRU GH GXDV IRUPDV A primeira e a mais simples Ê a seguinte: em qualquer disco (tanto disquete quanto HD) existe um setor que Ê lido primeiro pelo VLVWHPD RSHUDFLRQDO TXDQGR R FRPSXWDGRU R DFHVVD (VWH VHWRU LGHQWL¿FD R GLVFR H LQIRUPD FRPR R VLVWHPD RSHUDFLRQDO 62 GHYH DJLU 2 YtUXV VH DORMD H[DWDPHQWH QHVWH VHWRU H HVSHUD TXH R FRPSXWDGRU R DFHVVH $ SDUWLU GDt HOH SDVVD SDUD D PHPyULD GR FRPSXWDGRU H HQWUD QD VHJXQGD IDVH GD LQIHFomR 0DV DQWHV GH IDODUPRV GD VHJXQGD IDVH vamos analisar o segundo mÊtodo de infecção: o YtUXV VH DJUHJD D XP DUTXLYR H[HFXWiYHO ¿FD SHQGXUDGR PHVPR QHVVH DUTXLYR $FHVVDU R GLVFR RQGH HVWH DUTXLYR HVWi QmR p R VX¿FLHQWH SDUD VH FRQWDPLQDU e SUHFLVR H[HFXWDU R DUTXLYR FRQWDPLQDGR 2 YtUXV VH DQH[D JHUDOPHQWH HP XPD SDUWH GR DUTXLYR RQGH QmR LQWHU¿UD QR VHX IXQFLRQDPHQWR GR DUTXLYR SRLV DVVLP R XVXiULR QmR YDL SHUFHEHU QHQKXPD DOWHUDomR H YDL FRQWLQXDU XVDQGR R SURJUDPD LQIHFWDGR 2 YtUXV DSyV WHU VLGR H[HFXWDGR ¿FD HVFRQGLGR DJRUD QD PHPyULD GR FRPSXWDGRU H LPHGLDWDPHQWH LQIHFWD WRGRV RV GLVFRV TXH HVWmR ligados ao computador, colocando uma cópia de si mesmo no tal setor que Ê lido primeiro (chamado setor de boot), e quando o disco for transferido para outro computador, este ao acessar o disco contaminado (lendo o setor de boot), executarå o vírus e o alocarå na sua PHPyULD R TXH SRU VXD YH] LUi LQIHFWDU WRGRV RV GLVFRV XWLOL]DGRV QHVWH FRPSXWDGRU H DVVLP R YtUXV YDL VH DODVWUDQGR 2V YtUXV TXH VH DQH[DP D DUTXLYRV LQIHFWDP WDPEpP WRGRV RV DUTXLYRV TXH HVWmR VHQGR RX H VHUmR H[HFXWDGRV $OJXQV jV YH]HV UH FRQWDPLQDP R PHVPR DUTXLYR WDQWDV YH]HV H HOH ¿FD WmR JUDQGH TXH SDVVD D RFXSDU XP HVSDoR FRQVLGHUiYHO TXH p VHPSUH PXLWR SUHFLRVR HP VHX GLVFR 2XWURV PDLV LQWHOLJHQWHV VH HVFRQGHP HQWUH RV HVSDoRV GR SURJUDPD RULJLQDO SDUD QmR GDU D PHQRU SLVWD GH VXD H[LVWrQFLD Cada vírus possui um critÊrio para começar o ataque propriamente dito, onde os arquivos começam a ser apagados, o micro começa D WUDYDU GRFXPHQWRV TXH QmR VmR VDOYRV H YiULDV RXWUDV WUDJpGLDV $OJXQV DSHQDV PRVWUDP PHQVDJHQV FKDWDV RXWURV PDLV HODERUDGRV ID]HP HVWUDJRV PXLWRV JUDQGHV TIPOS Cavalo-de-Tróia $ GHQRPLQDomR ³&DYDOR GH 7UyLD´ 7URMDQ +RUVH IRL DWULEXtGD DRV SURJUDPDV TXH SHUPLWHP D LQYDVmR GH XP FRPSXWDGRU DOKHLR FRP HVSDQWRVD IDFLOLGDGH 1HVVH FDVR R WHUPR p DQiORJR DR IDPRVR DUWHIDWR PLOLWDU IDEULFDGR SHORV JUHJRV HVSDUWDQRV 8P ³DPLJR´ YLUWXDO SUHVHQWHLD R RXWUR FRP XP ³SUHVHQWH GH JUHJR´ TXH VHULD XP DSOLFDWLYR TXDOTXHU 4XDQGR R OHLJR R H[HFXWD R SURJUDPD DWXD GH IRUPD GLIHUHQWH GR TXH HUD HVSHUDGR Ao contrårio do que Ê erroneamHQWH LQIRUPDGR QD PtGLD TXH FODVVL¿FD R &DYDOR GH 7UyLD FRPR XP YtUXV HOH QmR VH UHSURGX] H QmR WHP QHQKXPD FRPSDUDomR FRP YtUXV GH FRPSXWDGRU VHQGR TXH VHX REMHWLYR p WRWDOPHQWH GLYHUVR 'HYH VH OHYDU HP FRQVLGHUDomR WDPEpP TXH D PDLRULD GRV DQWLYtUXV ID] D VXD GHWHFomR H RV FODVVL¿FDP FRPR WDO $ H[SUHVVmR ³7URMDQ´ GHYH VHU XVDGD H[FOXVLYDPHQWH FRPR GH¿QLomR SDUD SURJUDPDV TXH FDSWXUDP GDGRV VHP R FRQKHFLPHQWR GR XVXiULR

Didatismo e Conhecimento

198


CONHECIMENTOS DE INFORMÁTICA 2 &DYDOR GH 7UyLD p XP SURJUDPD TXH VH DORFD FRPR XP DUTXLYR QR FRPSXWDGRU GD YtWLPD (OH WHP R LQWXLWR GH URXEDU LQIRUPDo}HV FRPR SDVVZRUGV ORJLQV H TXDLVTXHU GDGRV VLJLORVRV RX QmR PDQWLGRV QR PLFUR GD YtWLPD 4XDQGR D PiTXLQD FRQWDPLQDGD SRU XP 7URMDQ FRQHFWDU VH j ,QWHUQHW SRGHUi WHU WRGDV DV LQIRUPDo}HV FRQWLGDV QR +' YLVXDOL]DGDV H FDSWXUDGDV SRU XP LQWUXVR TXDOTXHU (VWDV YLVLWDV VmR IHLWDV LPSHUFHSWLYHOPHQWH 6y TXHP Mi HVWHYH GHQWUR GH XP FRPSXWDGRU DOKHLR VDEH DV SRVVLELOLGDGHV RIHUHFLGDV Worm 2V ZRUPV YHUPHV SRGHP VHU LQWHUSUHWDGRV FRPR XP WLSR GH YtUXV PDLV LQWHOLJHQWH TXH RV GHPDLV $ SULQFLSDO GLIHUHQoD HQWUH HOHV HVWi QD IRUPD GH SURSDJDomR RV ZRUPV SRGHP VH SURSDJDU UDSLGDPHQWH SDUD RXWURV FRPSXWDGRUHV VHMD SHOD ,QWHUQHW VHMD SRU PHLR GH XPD UHGH ORFDO *HUDOPHQWH D FRQWDPLQDomR RFRUUH GH PDQHLUD GLVFUHWD H R XVXiULR Vy QRWD R SUREOHPD TXDQGR R FRPSXWDGRU DSUHVHQWD DOJXPD DQRUPDOLGDGH 2 TXH ID] GHVWHV YtUXV LQWHOLJHQWHV p D JDPD GH SRVVLELOLGDGHV GH SURSDJDomR 2 ZRUP SRGH FDSWXUDU HQGHUHoRV GH H PDLO HP DUTXLYRV GR XVXiULR XVDU VHUYLoRV GH 6073 VLVWHPD GH HQYLR GH H PDLOV SUySULRV RX TXDOTXHU RXWUR PHLR TXH SHUPLWD D FRQWDPLQDomR GH FRPSXWDGRUHV QRUPDOPHQWH PLOKDUHV HP SRXFR WHPSR Spywares, keyloggers e hijackers $SHVDU GH QmR VHUHP QHFHVVDULDPHQWH YtUXV HVWHV WUrV QRPHV WDPEpP UHSUHVHQWDP SHULJR 6S\ZDUHV VmR SURJUDPDV TXH ¿FDP ©HVSLRQDQGRª DV DWLYLGDGHV GRV LQWHUQDXWDV RX FDSWXUDP LQIRUPDo}HV VREUH HOHV 3DUD FRQWDPLQDU XP FRPSXWDGRU RV VS\ZDUHV SRGHP YLU HPEXWLGRV HP VRIWZDUHV GHVFRQKHFLGRV RX VHUHP EDL[DGRV DXWRPDWLFDPHQWH TXDQGR R LQWHUQDXWD YLVLWD VLWHV GH FRQWH~GR GXYLGRVR 2V NH\ORJJHUV VmR SHTXHQRV DSOLFDWLYRV TXH SRGHP YLU HPEXWLGRV HP YtUXV VS\ZDUHV RX VRIWZDUHV VXVSHLWRV GHVWLQDGRV D FDSWXUDU WXGR R TXH p GLJLWDGR QR WHFODGR 2 REMHWLYR SULQFLSDO QHVWHV FDVRV p FDSWXUDU VHQKDV +LMDFNHUV VmR SURJUDPDV RX VFULSWV TXH ©VHTXHVWUDPª QDYHJDGRUHV GH ,QWHUQHW SULQFLSDOPHQWH R ,QWHUQHW ([SORUHU 4XDQGR LVVR RFRUUH R KLMDFNHU DOWHUD D SiJLQD LQLFLDO GR EURZVHU H LPSHGH R XVXiULR GH PXGi OD H[LEH SURSDJDQGDV HP SRS XSV RX MDQHODV QRYDV LQVWDOD EDUUDV GH IHUUDPHQWDV QR QDYHJDGRU H SRGHP LPSHGLU DFHVVR D GHWHUPLQDGRV VLWHV FRPR VLWHV GH VRIWZDUH DQWLYtUXV SRU H[HPSOR 2V VS\ZDUHV H RV NH\ORJJHUV SRGHP VHU LGHQWL¿FDGRV SRU SURJUDPDV DQWL VS\ZDUHV 3RUpP DOJXPDV GHVWDV SUDJDV VmR WmR SHULJRVDV TXH DOJXQV DQWLYtUXV SRGHP VHU SUHSDUDGRV SDUD LGHQWL¿Fi ODV FRPR VH IRVVHP YtUXV 1R FDVR GH KLMDFNHUV PXLWDV YH]HV p QHFHVViULR XVDU XPD IHUUDPHQWD GHVHQYROYLGD HVSHFLDOPHQWH SDUD FRPEDWHU DTXHOD SUDJD ,VVR SRUTXH RV KLMDFNHUV SRGHP VH LQ¿OWUDU QR VLVWHPD RSHUDFLRQDO GH XPD IRUPD TXH QHP DQWLYtUXV QHP DQWL VS\ZDUHV FRQVHJXHP ³SHJDU´ Hoaxes, o que são? 6mR ERDWRV HVSDOKDGRV SRU PHQVDJHQV GH FRUUHLR HOHWU{QLFR TXH VHUYHP SDUD DVVXVWDU R XVXiULR GH FRPSXWDGRU 8PD PHQVDJHP no e-mail alerta para um novo vírus totalmente destrutivo que está circulando na rede e que infectará o micro do destinatário enquanto D PHQVDJHP HVWLYHU VHQGR OLGD RX TXDQGR R XVXiULR FOLFDU HP GHWHUPLQDGD WHFOD RX OLQN 4XHP FULD D PHQVDJHP KRD[ QRUPDOPHQWH FRVWXPD GL]HU TXH D LQIRUPDomR SDUWLX GH XPD HPSUHVD FRQ¿iYHO FRPR ,%0 H 0LFURVRIW H TXH WDO YtUXV SRGHUi GDQL¿FDU D PiTXLQD GR XVXiULR 'HVFRQVLGHUH D PHQVDJHP FIREWALL )LUHZDOO p XP SURJUDPD TXH PRQLWRUD DV FRQH[}HV IHLWDV SHOR VHX FRPSXWDGRU SDUD JDUDQWLU TXH QHQKXP UHFXUVR GR VHX FRPSXWDGRU HVWHMD VHQGR XVDGR LQGHYLGDPHQWH 6mR ~WHLV SDUD D SUHYHQomR GH ZRUPV H WURMDQV ANTIVÍRUS ([LVWH XPD YDULHGDGH HQRUPH GH VRIWZDUHV DQWLYtUXV QR PHUFDGR ,QGHSHQGHQWH GH TXDO YRFr XVD PDQWHQKD R VHPSUH DWXDOL]DGR ,VVR SRUTXH VXUJHP YtUXV QRYRV WRGRV RV GLDV H VHX DQWLYtUXV SUHFLVD VDEHU GD H[LVWrQFLD GHOHV SDUD SURWHJHU VHX VLVWHPD RSHUDFLRQDO $ PDLRULD GRV VRIWZDUHV DQWLYtUXV SRVVXHP VHUYLoRV GH DWXDOL]DomR DXWRPiWLFD $EDL[R Ki XPD OLVWD FRP RV DQWLYtUXV PDLV FRQKHcidos: 1RUWRQ $QWL9LUXV 6\PDQWHF ZZZ V\PDQWHF FRP EU 3RVVXL YHUVmR GH WHVWH 0F$IHH 0F$IHH KWWS ZZZ PFDIHH FRP EU 3RVVXL YHUVmR GH WHVWH $9* *ULVRIW ZZZ JULVRIW FRP 3RVVXL YHUVmR SDJD H RXWUD JUDWXLWD SDUD XVR QmR FRPHUFLDO FRP PHQRV IXQFLRQDOLGDGHV 3DQGD $QWLYtUXV 3DQGD 6RIWZDUH ZZZ SDQGDVRIWZDUH FRP EU 3RVVXL YHUVmR GH WHVWH e LPSRUWDQWH IULVDU TXH D PDLRULD GHVWHV GHVHQYROYHGRUHV SRVVXHP IHUUDPHQWDV JUDWXLWDV GHVWLQDGDV D UHPRYHU YtUXV HVSHFt¿FRV *HUDOPHQWH WDLV VRIWZDUHV VmR FULDGRV SDUD FRPEDWHU YtUXV SHULJRVRV RX FRP DOWR JUDX GH SURSDJDomR

Didatismo e Conhecimento

199


CONHECIMENTOS DE INFORMÁTICA PROTEÇÃO $ PHOKRU SROtWLFD FRP UHODomR j SURWHomR GR VHX FRPSXWDGRU FRQWUD YtUXV p SRVVXLU XP ERP VRIWZDUH DQWLYtUXV RULJLQDO LQVWDODGR H DWXDOL]i OR FRP IUHTXrQFLD SRLV VXUJHP YtUXV QRYRV D FDGD GLD 3RUWDQWR D UHJUD EiVLFD FRP UHODomR D YtUXV H RXWUDV LQIHFo}HV p -DPDLV H[HFXWH SURJUDPDV TXH QmR WHQKDP VLGR REWLGRV GH IRQWHV DEVROXWDPHQWH FRQ¿iYHLV 2 WHPD GRV YtUXV p PXLWR H[WHQVR H QmR VH SRGH SUHWHQGHU DERUGi OR DTXL VHQmR VXSHU¿FLDOPHQWH SDUD GDU RULHQWDo}HV HVVHQFLDLV 9DPRV D DOJXPDV UHFRPHQGDo}HV 2V SURFHVVRV PDLV FRPXQV GH VH UHFHEHU DUTXLYRV VmR FRPR DQH[RV GH PHQVDJHQV GH H PDLO DWUDYpV GH SURJUDPDV GH )73 RX SRU PHLR GH SURJUDPDV GH FRPXQLFDomR FRPR R ,&4 R 1HW0HHWLQJ HWF Note que: 1mR H[LVWHP YtUXV GH H PDLO 2 TXH H[LVWHP VmR YtUXV HVFRQGLGRV HP SURJUDPDV DQH[DGRV DR H PDLO 9RFr QmR LQIHFWD VHX FRPSXWDGRU Vy GH OHU XPD PHQVDJHP GH FRUUHLR HOHWU{QLFR HVFULWD HP IRUPDWR WH[WR W[W 0DV HYLWH OHU R FRQWH~GR GH DUTXLYRV DQH[DGRV VHP DQWHV FHUWL¿FDU VH GH TXH HOHV HVWmR OLYUHV GH YtUXV 6DOYH RV HP XP GLUHWyULR H SDVVH XP SURJUDPD DQWLYtUXV DWXDOL]DGR 6y GHSRLV DEUD R DUTXLYR Cuidados que se deve tomar com mensagens de correio eletrônico – Como já foi falado, simplesmente ler a mensagem não causa TXDOTXHU SUREOHPD 1R HQWDQWR VH D PHQVDJHP FRQWpP DQH[RV RX DWWDFKPHQWV HP ,QJOrV p SUHFLVR FXLGDGR 2 DQH[R SRGH VHU XP DUTXLYR H[HFXWiYHO SURJUDPD H SRUWDQWR SRGH HVWDU FRQWDPLQDGR $ QmR VHU TXH YRFr WHQKD FHUWH]D DEVROXWD GD LQWHJULGDGH GR DUTXLYR p PHOKRU VHU SUHFDYLGR H VXVSHLWDU 1mR DEUD R DUTXLYR VHP DQWHV SDVVi OR SRU XPD DQiOLVH GR DQWLYtUXV DWXDOL]DGR Mas se o anexo não for um programa, for um arquivo apenas de texto, é possível relaxar os cuidados? 1mR ,QIHOL]PHQWH RV FULDGRUHV GH YtUXV VmR PXLWR DWLYRV H H[LVWHP KRMH GLVVHPLQDQGR VH UDSLGDPHQWH YtUXV TXH FRQWDPLQDP DUTXLYRV GR 06 :RUG RX GR 06 ([FHO 6mR RV FKDPDGRV YtUXV GH PDFUR TXH LQIHFWDP RV PDFURV H[HFXWiYHLV GHVWHV DUTXLYRV $VVLP QmR DEUD DQH[RV GHVWH WLSR VHP SUpYLD YHUL¿FDomR É possível clicar no indicador de anexo para ver do que se trata? E como fazer em seguida? $SHQDV FOLFDU QR LQGLFDGRU TXH QR 06 2XWORRN ([SUHVV p XPD LPDJHP GH XP FOLS VLP 0DV FXLGDGR SDUD QmR GDU XP FOLTXH GXSOR RX FOLFDU QR QRPH GR DUTXLYR SRLV VH R DQH[R IRU XP SURJUDPD VHUi H[HFXWDGR )DoD DVVLP 1- Abra a janela da mensagem (em que o anexo aparece como um ícone no rodapé); 6DOYH R DQH[R HP XP GLUHWyULR j VXD HVFROKD R TXH SRGH VHU IHLWR GH GRLV PRGRV D FOLFDU R DQH[R FRP R ERWmR GLUHLWR GR PRXVH H HP VHJXLGD FOLFDU HP ³6DOYDU FRPR ´ E VHTXrQFLD GH FRPDQGRV $UTXLYR 6DOYDU DQH[RV 3DVVH XP DQWLYtUXV DWXDOL]DGR QR DQH[R VDOYR SDUD VH FHUWL¿FDU GH TXH HVWH QmR HVWi LQIHFWDGR 5LVFRV GRV ³GRZQORDGV´ 6LPSOHVPHQWH EDL[DU R SURJUDPD SDUD R VHX FRPSXWDGRU QmR FDXVD LQIHFomR VHMD SRU )73 ,&4 RX R TXH IRU 0DV GH PRGR DOJXP H[HFXWH R SURJUDPD GH TXDOTXHU WLSR MRJXLQKRV XWLOLWiULRV SURWHWRUHV GH WHOD HWF VHP DQWHV VXEPHWr OR D XP ERP DQWLYtUXV O que acontece se ocorrer uma infecção? 9RFr ¿FDUi j PHUFr GH SHVVRDV LQHVFUXSXORVDV TXDQGR HVWLYHU FRQHFWDGR j ,QWHUQHW (ODV SRGHUmR LQYDGLU VHX FRPSXWDGRU H UHDOL]DU atividades nocivas desde apenas ler seus arquivos, até causar danos como apagar arquivos, e até mesmo roubar suas senhas, causando WRGR R WLSR GH SUHMXt]RV Como me proteger? (P SULPHLUR OXJDU YROWHPRV D HQIDWL]DU D DWLWXGH EiVLFD GH HYLWDU H[HFXWDU SURJUDPDV GHVFRQKHFLGRV RX GH RULJHP GXYLGRVD 3RUWDQWR PDLV XPD YH] -DPDLV H[HFXWH SURJUDPDV TXH QmR WHQKDP VLGR REWLGRV GH IRQWHV DEVROXWDPHQWH FRQ¿iYHLV $OpP GLVWR Ki D TXHVWmR GDV VHQKDV 6H R VHX PLFUR HVWLYHU LQIHFWDGR RXWUDV SHVVRDV SRGHULDP DFHVVDU DV VXDV VHQKDV ( WURFD ODV QmR VHULD XPD VROXomR GH¿QLWLYD SRLV RV LQYDVRUHV SRGHULDP HQWUDU QR VHX PLFUR RXWUD YH] H URXED OD QRYDPHQWH 3RUWDQWR FRPR PHGLGD H[WUHPD GH SUHYHQomR R PHOKRU PHVPR p 1­2 '(,;$5 $6 6(1+$6 12 &20387$'25 ,VWR TXHU GL]HU TXH YRFr QmR GHYH XVDU RX GHYH GHVDELOLWDU VH Mi XVD RV UHFXUVRV GR WLSR ³OHPEUDU VHQKD´ (OHV JUDYDP VXD VHQKD SDUD HYLWDU D QHFHVVLGDGH GH GLJLWi OD QRYDPHQWH 6y TXH VH D VXD VHQKD HVWi JUDYDGD QR VHX FRPSXWDGRU HOD SRGH VHU OLGD SRU XP LQYDVRU $WXDOPHQWH p DOWDPHQWH UHFRPHQGiYHO TXH YRFr SUH¿UD GLJLWDU D VHQKD D FDGD YH] TXH ID] XPD FRQH[mR $EUD PmR GR FRQIRUWR HP IDYRU GD VXD VHJXUDQoD

Didatismo e Conhecimento

200


CONHECIMENTOS DE INFORMร TICA QUESTร ES COMENTADAS &RP UHODomR DR VLVWHPD RSHUDFLRQDO :LQGRZV DVVLQDOH D RSomR FRUUHWD $ $ GHVLQVWDODomR GH XP DSOLFDWLYR QR :LQGRZV GHYH VHU IHLWD D SDUWLU GH RSomR HTXLYDOHQWH GR 3DLQHO GH &RQWUROH GH PRGR D JDUDQWLU D FRUUHWD UHPRomR GRV DUTXLYRV UHODFLRQDGRV DR DSOLFDWLYR VHP SUHMXt]R DR VLVWHPD RSHUDFLRQDO (B) O acionamento simultรขneo das teclas CTRL, ALT e DELETE constitui ferramenta poderosa de acesso direto aos diretรณrios de SURJUDPDV LQVWDODGRV QD PiTXLQD HP XVR & 2 :LQGRZV RIHUHFH DFHVVR IDFLOLWDGR D XVXiULRV GH XP FRPSXWDGRU SRLV EDVWDP R QRPH GR XVXiULR H D VHQKD GD PiTXLQD SDUD VH WHU DFHVVR jV FRQWDV GRV GHPDLV XVXiULRV SRVVLYHOPHQWH FDGDVWUDGRV QHVVD PiTXLQD ' 2 :LQGRZV RIHUHFH XP FRQMXQWR GH DFHVVyULRV GLVSRQtYHLV SRU PHLR GD LQVWDODomR GR SDFRWH 2IยฟFH HQWUH HOHV FDOFXODGRUD EORFR GH QRWDV :RUG3DG H 3DLQW ( 2 FRPDQGR )D]HU /RJRII GLVSRQtYHO D SDUWLU GR ERWmR ,QLFLDU GR :LQGRZV RIHUHFH D RSomR GH VH HQFHUUDU R :LQGRZV GDU VDtGD QR XVXiULR FRUUHQWHPHQWH HP XVR QD PiTXLQD H HP VHJXLGD GHVOLJDU R FRPSXWDGRU &RPHQWiULRV 3DUD GHVLQVWDODU XP SURJUDPD GH IRUPD VHJXUD GHYH VH DFHVVDU 3DLQHO GH &RQWUROH $GLFLRQDU RX UHPRYHU SURJUDPDV Resposta โ Letra A 1RV VLVWHPDV RSHUDFLRQDLV FRPR R :LQGRZV DV LQIRUPDo}HV HVWmR FRQWLGDV HP DUTXLYRV GH YiULRV IRUPDWRV TXH VmR DUPD]HQDGRV QR GLVFR ยฟ[R RX HP RXWURV WLSRV GH PtGLDV UHPRYtYHLV GR FRPSXWDGRU RUJDQL]DGRV HP $ WHODV % SDVWDV & MDQHODV ' LPDJHQV ( SURJUDPDV &RPHQWiULRV 2 :LQGRZV ([SORUHU PRVWUD GH IRUPD EHP FODUD D RUJDQL]DomR SRU PHLR GH 3$67$6 TXH QDGD PDLV VmR GR TXH FRPSDUWLPHQWRV TXH DMXGDP D RUJDQL]DU RV DUTXLYRV HP HQGHUHoRV HVSHFtยฟFRV FRPR VH IRVVH XP VLVWHPD GH DUPiULR H JDYHWDV Resposta: Letra B 8P LWHP VHOHFLRQDGR GR :LQGRZV ;3 SRGH VHU H[FOXtGR SHUPDQHQWHPHQWH VHP FRORFi /R QD /L[HLUD SUHVVLRQDQGR VH VLPXOWDneamente as teclas $ &WUO 'HOHWH % 6KLIW (QG & 6KLIW 'HOHWH ' &WUO (QG ( &WUO ; &RPHQWiULR 4XDQGR GHVHMDPRV H[FOXLU SHUPDQHQWHPHQWH XP DUTXLYR RX SDVWD QR :LQGRZV VHP HQYLDU DQWHV SDUD D OL[HLUD EDVWD SUHVVLRQDUPRV D WHFOD 6KLIW HP FRQMXQWR FRP D WHFOD 'HOHWH 2 :LQGRZV H[LELUi XPD PHQVDJHP GR WLSR ยณ9RFr WHP FHUWH]D TXH GHVHMD H[FOXLU SHUPDQHQWHPHQWH HVWH DUTXLYR"ยด DR LQYpV GH ยณ9RFr WHP FHUWH]D TXH GHVHMD HQYLDU HVWH DUTXLYR SDUD D OL[HLUD"ยด Resposta: C 4XDO D WpFQLFD TXH SHUPLWH UHGX]LU R WDPDQKR GH DUTXLYRV VHP TXH KDMD SHUGD GH LQIRUPDomR" (A) Compactaรงรฃo (B) Deleรงรฃo & &ULSWRJUDยฟD (D) Minimizaรงรฃo (E) Encolhimento adaptativo &RPHQWiULRV $ FRPSDFWDomR GH DUTXLYRV p XPD WpFQLFD DPSODPHQWH XWLOL]DGD $OJXQV DUTXLYRV FRPSDFWDGRV SRGHP FRQWHU H[WHQV}HV =,3 7$5 *= 5$5 H DOJXQV H[HPSORV GH SURJUDPDV FRPSDFWDGRUHV VmR R :LQ=LS :LQ5DU 6ROXV=LS HWF Resposta: A

Didatismo e Conhecimento

201


CONHECIMENTOS DE INFORMÁTICA $ ¿JXUD D VHJuir foi extraída do MS-Excel:

6H R FRQWH~GR GD FpOXOD ' IRU FRSLDGR &WUO & H FRODGR &WUO 9 QD FpOXOD ' VHX YDORU VHUi (A) 7 % & ' (E) uma mensagem de erro &RPHQWiULRV WHPRV TXH ' 620$ $ & 4XDQGR FRSLDPRV XPD FpOXOD TXH FRQWpP XPD IyUPXOD H FRODPRV HP RXWUD FpOXOD D IyUPXOD PXGDUi DMXVWDQGR VH j QRYD SRVLomR 9HMD FRPR VDEHU FRPR ¿FDUi D QRYD IyUPXOD DR VHU FRSLDGD GH ' SDUD '

$JRUD p Vy VXEVWLWXLU RV YDORUHV $ IyUPXOD GL] SDUD VRPDU WRGDV DV FpOXODV GH $ DWp & GRLV SRQWRV VLJQL¿FDP µDWp¶ VHQGR DVVLP WHUHPRV TXH VRPDU $ % & REWHQGR VH R UHVXOWDGR 5HVSRVWD & ³2 FRUUHLR HOHWU{QLFR p XP PpWRGR TXH SHUPLWH FRPSRU HQYLDU H UHFHEHU PHQVDJHQV DWUDYpV GH VLVWHPDV HOHWU{QLFRV GH FRPXQLFDomR´ 6mR VRIWZDUHV JHUHQFLDGRUHV GH HPDLO (;&(72 $ 0R]LOOD 7KXQGHUELUG % <DKRR 0HVVHQJHU & 2XWORRN ([SUHVV ' ,QFUHGL0DLO ( 0LFURVRIW 2I¿FH 2XWORRN &RPHQWiULRV 3RGHPRV FLWDU YiULRV JHUHQFLDGRUHV GH H PDLO HOHWURQLF PDLO RX FRUUHLR HOHWU{QLFR PDV GHYHPRV PHPRUL]DU TXH RV VLVWHPDV TXH WUDEDOKDP R FRUUHLR HOHWU{QLFR SRGHP IXQFLRQDU SRU PHLR GH XP VRIWZDUH LQVWDODGR HP QRVVR FRPSXWDGRU ORFDO RX SRU PHLR GH XP SURJUDPD TXH IXQFLRQD GHQWUR GH XP QDYHJDGRU YLD DFHVVR SRU ,QWHUQHW (VWH SURJUDPD GD ,QWHUQHW TXH QmR SUHFLVD VHU LQVWDODGR H p FKDPDGR GH :(%0$,/ HQTXDQWR R VRIWZDUH ORFDO p R JHUHQFLDGRU GH H PDLO FLWDGR SHOD TXHVWmR 3ULQFLSDLV 9DQWDJHQV GR *HUHQFLDGRU GH H PDLO x 3RGH OHU H HVFUHYHU PHQVDJHQV PHVPR TXDQGR HVWi GHVFRQHFWDGR GD ,QWHUQHW x 3HUPLWH DUPD]HQDU DV PHQVDJHQV ORFDOPHQWH QR FRPSXWDGRU ORFDO x 3HUPLWH XWLOL]DU YiULDV FDL[DV GH H PDLO DR PHVPR WHPSR Maiores Desvantagens: x Ocupam espaço em disco; x &RPSDWLELOLGDGH FRP RV VHUYLGRUHV GH H PDLO QHP VHPSUH VmR FRPSDWtYHLV A seguir, uma lista de gerenciadores de e-mail (em negrito os mais conhecidos e utilizados atualmente):

Didatismo e Conhecimento

202


CONHECIMENTOS DE INFORMÁTICA 0LFURVRIW 2I¿FH 2XWORRN Microsoft Outlook Express; Mozilla Thunderbird; IcrediMail Eudora 3HJDVXV 0DLO Apple Mail (Apple) Kmail (Linux) :LQGRZV 0DLO $ TXHVWmR FLWD R <DKRR 0DLO PDV HVWH p XP :(%0$,/ RX VHMD QmR p LQVWDODGR QR FRPSXWDGRU ORFDO /RJR p R JDEDULWR GD TXHVWmR 5HVSRVWD % 7- Sobre os conceitos de utilização da Internet e correio eletrônico, analise: , $ 85/ GLJLWDGD QD EDUUD GH (QGHUHoR p XVDGD SHORV QDYHJDGRUHV GD :HE ,QWHUQHW ([SORUHU 0R]LOOD H *RRJOH &KURPH SDUD ORFDOL]DU UHFXUVRV H SiJLQDV GD ,QWHUQHW ([HPSOR KWWS ZZZ JRRJOH FRP EU ,, 'RZQORDG VLJQL¿FD GHVFDUUHJDU RX EDL[DU p D WUDQVIHUrQFLD GH GDGRV GH XP VHUYLGRU RX FRPSXWDGRU UHPRWR SDUD XP FRPSXWDGRU ORFDO ,,, 8SORDG p D WUDQVIHUrQFLD GH GDGRV GH XP FRPSXWDGRU ORFDO SDUD XP VHUYLGRU RX FRPSXWDGRU UHPRWR ,9 $QH[DU XP DUTXLYR HP PHQVDJHP GH H PDLO VLJQL¿FD PRYr OR GH¿QLWLYDPHQWH GD PiTXLQD ORFDO SDUD HQYLR D XP GHVWLQDWiULR FRP HQGHUHoR HOHWU{QLFR (VWmR FRUUHWDV DSHQDV DV D¿UPDWLYDV A) I, II, III, IV B) I, II C) I, II, III D) I, II, IV E) I, III, IV &RPHQWiULRV 2 85/ p R HQGHUHoR ~QLFR GH XP UHFXUVR QD ,QWHUQHW $ TXHVWmR SDUHFH GLIHUHQFLDU XP UHFXUVR GH SiJLQD PDV QD YHUGDGH XPD SiJLQD p XP UHFXUVR R PDLV FRQKHFLGR FUHLR GD :HE ,WHP YHUGDGHLUR e FRPXP FRQIXQGLU RV LWHQV ,, H ,,, SRU LVVR PHPRUL]H GRZQ EDL[R EDL[DU SDUD VXD PiTXLQD GHVFDUUHJDU ,, H ,,, VmR YHUGDGHLURV

1R LWHP ,9 HQFRQWUDPRV R LWHP IDOVR GD TXHVWmR R TXH QRV OHYD DR JDEDULWR ± OHWUD & $QH[DU XP DUTXLYR HP PHQVDJHP GH H PDLO VLJQL¿FD FRSLDU H QmR PRYHU 5HVSRVWD & $ UHVSHLWR GRV PRGRV GH XWLOL]DomR GH DSOLFDWLYRV GR DPELHQWH 06 2I¿FH DVVLQDOH D RSomR FRUUHWD $ $R VH FOLFDU QR QRPH GH XP GRFXPHQWR JUDYDGR FRP D H[WHQVmR [OV D SDUWLU GR 0HX &RPSXWDGRU R :LQGRZV DWLYD R 06 $FFHVV SDUD D DEHUWXUD GR GRFXPHQWR HP WHOD % $V RSo}HV &RSLDU H &RODU TXH SRGHP VHU REWLGDV DR VH DFLRQDU VLPXOWDQHDPHQWH DV WHFODV &75/ & H &75/ 9 UHVSHFWLYDPHQWH HVWmR GLVSRQtYHLV QR PHQX (GLWDU GH WRGRV RV DSOLFDWLYRV GD VXtWH 06 2I¿FH & $ RSomR 6DOYDU &RPR GLVSRQtYHO QR PHQX GDV DSOLFDo}HV GR 06 2I¿FH SHUPLWH TXH R XVXiULR VDOYH R GRFXPHQWR FRUUHQWHPHQWH DEHUWR FRP RXWUR QRPH 1HVVH FDVR D YHUVmR DQWLJD GR GRFXPHQWR p DSDJDGD H Vy D QRYD YHUVmR SHUPDQHFH DUPD]HQDGD QR FRPSXWDGRU (D) O menu Exibir permite a visualização do documento aberto correntemente, por exemplo, no formato do MS Word para ser DEHUWR QR 06 3RZHU3RLQW ( 8PD GDV YDQWDJHQV GH VH XWLOL]DU R 06 :RUG p D HODERUDomR GH DSUHVHQWDo}HV GH VOLGHV TXH XWLOL]HP FRQWH~GR H LPDJHQV GH PDQHLUD HVWUXWXUDGD H RUJDQL]DGD Didatismo e Conhecimento

203


CONHECIMENTOS DE INFORMĂ TICA ComentĂĄrios: O menu editar geralmente contĂŠm os comandos universais dos programas da Microsoft como ĂŠ o caso dos atalhos &75/ & &75/ 9 &75/ ; DOpP GR ORFDOL]DU Em relação Ă s outras letras: /HWUD $ Âą ,QFRUUHWR Âą $ H[WHQVmR [OV DEUH R DSOLFDWLYR ([FHO H QmR R $FFHVV /HWUD & Âą ,QFRUUHWR Âą $ RSomR VDOYDU FRPR FULD XPD FySLD GR DUTXLYR FRUUHQWH H QmR DSDJD D VXD YHUVmR DQWLJD Letra D – Incorreto – O menu exibir mostra formas de exibição do documento dentro do contexto de cada programa e nĂŁo de um SURJUDPD SDUD R RXWUR FRPR p R FDVR GD DÂżUPDWLYD /HWUD ( Âą ,QFRUUHWR Âą 2 0V :RUG QmR ID] DSUHVHQWDomR GH VOLGHV H VLP R 0V 3RZHU 3RLQW Resposta: B &RP UHODomR D FRQFHLWRV GH ,QWHUQHW H LQWUDQHW DVVLQDOH D RSomR FRUUHWD $ 'RPtQLR p R QRPH GDGR D XP VHUYLGRU TXH FRQWUROD D HQWUDGD H D VDtGD GH FRQWH~GR HP XPD UHGH FRPR RFRUUH QD ,QWHUQHW (B) A intranet sĂł pode ser acessada por usuĂĄrios da Internet que possuam uma conexĂŁo http, ao digitarem na barra de endereços do QDYHJDGRU KWWS LQWUDQHW FRP & 8P PRGHP $'6/ QmR SRGH VHU XWLOL]DGR HP XPD UHGH ORFDO SRLV VXD IXQomR p FRQHFWDU XP FRPSXWDGRU j UHGH GH WHOHIRQLD Âż[D (D) O modelo cliente/servidor, em que uma mĂĄquina denominada cliente requisita serviços a outra, denominada servidor, ainda ĂŠ o DWXDO SDUDGLJPD GH DFHVVR j ,QWHUQHW ( 8P VHUYLGRU GH SiJLQDV ZHE p D PiTXLQD TXH DUPD]HQD RV QRPHV GRV XVXiULRV TXH SRVVXHP SHUPLVVmR GH DFHVVR D XPD TXDQWLGDGH UHVWULWD GH SiJLQDV GD ,QWHUQHW &RPHQWiULRV 2 PRGHOR FOLHQWH VHUYLGRU p TXHVWLRQDGR HP WHUPRV GH LQWHUQHW SRLV QmR p WmR UREXVWR TXDQWR UHGHV 3 3 SRLV HQTXDQWR QR SULPHLUR PRGHOR XPD TXHGD GR VHUYLGRU FHQWUDO LPSHGH R DFHVVR DRV XVXiULRV FOLHQWHV QR VHJXQGR PHVPR TXH XP VHUYLGRU ÂłFDLD´ RXWURV VHUYLGRUHV DLQGD GDUmR DFHVVR DR PHVPR FRQWH~GR SHUPLWLQGR TXH R GRZQORDG FRQWLQXH ([ SURJUDPDV WRUUHQW (PXOH /LPHZDUH HWF Em relação Ă s outras letras: OHWUD $ Âą ,QFRUUHWR Âą 'RPtQLR p XP QRPH TXH VHUYH SDUD ORFDOL]DU H LGHQWLÂżFDU FRQMXQWRV GH FRPSXWDGRUHV QD ,QWHUQHW H FRUUHVSRQGH DR HQGHUHoR TXH GLJLWDPRV QR QDYHJDGRU letra B – Incorreto – A intranet ĂŠ acessada da mesma forma que a internet, contudo, o ambiente de acesso a rede ĂŠ restrito a uma UHGH ORFDO H QmR D LQWHUQHW FRPR XP WRGR letra C – Incorreto – O modem ADSL conecta o computador a internet, como o acesso a intranet se faz da mesma forma sĂł que de PDQHLUD ORFDO R DFHVVR YLD $'6/ SRGH VLP DFHVVDU UHGHV ORFDLV OHWUD ( Âą ,QFRUUHWR Âą 8P VHUYLGRU p XP VLVWHPD GH FRPSXWDomR TXH IRUQHFH VHUYLoRV D XPD UHGH GH FRPSXWDGRUHV ( QmR QHFHVVDULDPHQWH DUPD]HQD QRPHV GH XVXiULRV H RX UHVWULQJH DFHVVRV Resposta: D &RP UHODomR j ,QWHUQHW DVVLQDOH D RSomR FRUUHWD $ $ 85/ p R HQGHUHoR ItVLFR GH XPD PiTXLQD QD ,QWHUQHW SRLV SRU HVVH HQGHUHoR GHWHUPLQD VH D FLGDGH RQGH HVWi ORFDOL]DGD WDO PiTXLQD % 2 6073 p XP VHUYLoR TXH SHUPLWH D YiULRV XVXiULRV VH FRQHFWDUHP D XPD PHVPD PiTXLQD VLPXOWDQHDPHQWH FRPR QR FDVR GH VDODV GH EDWH SDSR & 2 VHUYLGRU 3RS p R UHVSRQViYHO SHOR HQYLR H UHFHELPHQWR GH DUTXLYRV QD ,QWHUQHW ' 4XDQGR VH GLJLWD R HQGHUHoR GH XPD SiJLQD ZHE R WHUPR KWWS VLJQLÂżFD R SURWRFROR GH DFHVVR D SiJLQDV HP IRUPDWR +70/ SRU H[HPSOR ( 2 SURWRFROR )73 p XWLOL]DGR TXDQGR XP XVXiULR GH FRUUHLR HOHWU{QLFR HQYLD XPD PHQVDJHP FRP DQH[R SDUD RXWUR GHVWLQDWiULR GH FRUUHLR HOHWU{QLFR &RPHQWiULRV 2V LWHQV DSUHVHQWDGRV QHVVD TXHVWmR HVWmR UHODFLRQDGRV D SURWRFRORV GH DFHVVR 6HJXH DEDL[R RV SURWRFRORV PDLV FRPXQV +773 +\SHUWH[W 7UDQVIHU 3URWRFRO Âą 3URWRFROH GH FDUUHJDPHQWR GH SiJLQDV GH +LSHUWH[WR Âą +70/ ,3 ,QWHUQHW 3URWRFRO Âą ,GHQWLÂżFDomR OyJLFD GH XPD PiTXLQD QD UHGH 323 3RVW 2IÂżFH 3URWRFRO Âą 3URWRFROR GH UHFHELPHQWR GH HPDLOV GLUHWR QR 3& YLD JHUHQFLDGRU GH HPDLOV 6073 6LPSOH 0DLO 7UDQVIHU 3URWRFRO Âą 3URWRFROR SDGUmR GH HQYLR GH HPDLOV ,0$3 ,QWHUQHW 0HVVDJH $FFHVV 3URWRFRO Âą 6HPHOKDQWH DR 323 QR HQWDQWR SRVVXL PDLV UHFXUVRV H Gi DR XVXiULR D SRVVLELOLGDGH GH DUPD]HQDPHQWR H DFHVVR D VXDV PHQVDJHQV GH HPDLO GLUHWR QR VHUYLGRU )73 )LOH 7UDQVIHU 3URWRFRO Âą 3URWRFROR SDUD WUDQVIHUrQFLD GH DUTXLYRV Resposta: D

Didatismo e Conhecimento

204


CONHECIMENTOS DE INFORMĂ TICA 4XDQWR DR :LQGRZV ([SORUHU DVVLQDOH D RSomR FRUUHWD $ 2 :LQGRZV ([SORUHU p XWLOL]DGR SDUD JHUHQFLDU SDVWDV H DUTXLYRV H SRU VHX LQWHUPpGLR QmR p SRVVtYHO DFHVVDU R 3DLQHO GH &RQWUROH R TXDO Vy SRGH VHU DFHVVDGR SHOR ERWmR ,QLFLDU GR :LQGRZV % 3DUD VH REWHU D OLVWDJHP FRPSOHWD GRV DUTXLYRV VDOYRV HP XP GLUHWyULR H[LELQGR VH WDPDQKR WLSR H GDWD GH PRGLÂżFDomR GHYH VH VHOHFLRQDU 'HWDOKHV QDV RSo}HV GH 0RGRV GH ([LELomR & 1R :LQGRZV ([SORUHU R LWHP 0HXV /RFDLV GH 5HGH RIHUHFH XP KLVWyULFR GH SiJLQDV YLVLWDGDV QD ,QWHUQHW SDUD DFHVVR GLUHWR D HODV ' 4XDQGR XP DUTXLYR HVWLYHU DEHUWR QR :LQGRZV H D RSomR 5HQRPHDU IRU DFLRQDGD QR :LQGRZV ([SORUHU FRP R ERWmR GLUHLWR GR PRXVH VHUi VDOYD XPD QRYD YHUVmR GR DUTXLYR H D DQWHULRU FRQWLQXDUi DEHUWD FRP R QRPH DQWLJR ( 3DUD VH HQFRQWUDU DUTXLYRV DUPD]HQDGRV QD HVWUXWXUD GH GLUHWyULRV GR :LQGRZV GHYH VH XWLOL]DU R VtWLR GH EXVFD *RRJOH SRLV p HOH TXH Gi DFHVVR D WRGRV RV GLUHWyULRV GH PiTXLQDV OLJDGDV j ,QWHUQHW &RPHQWiULRV 1D RSomR 0RGRV GH ([LELomR RV DUTXLYRV VmR PRVWUDGRV GH YiULDV IRUPDV FRPR /LVWDV 0LQLDWXUDV H 'HWDOKHV Resposta: B Atenção: Para responder Ă s questĂľes de nĂşmeros 12 e 13, considere integralmente o texto abaixo: Todos os textos produzidos no editor de textos padrĂŁo deverĂŁo ser publicados em rede interna de uso exclusivo do ĂłrgĂŁo, com tecnologia semelhante Ă usada na rede mundial de computadores. $QWHV GD LPSUHVVmR H RX GD SXEOLFDomR RV WH[WRV GHYHUmR VHU YHULÂżFDGRV SDUD TXH QmR FRQWHQKDP HUURV $OJXQV DUWLJRV GLJLWDGRV deverĂŁo conter a imagem dos resultados obtidos em planilhas eletrĂ´nicas, ou seja, linhas, colunas, valores e totais. Todo trabalho produzido deverĂĄ ser salvo e cuidados devem ser tomados para a recuperação em caso de perda e tambĂŠm para evitar o acesso por pessoas nĂŁo autorizadas Ă s informaçþes guardadas. Os funcionĂĄrios serĂŁo estimulados a realizar pesquisas na internet visando o atendimento do nĂ­vel de qualidade da informação prestada Ă sociedade, pelo ĂłrgĂŁo. 2 DPELHQWH RSHUDFLRQDO GH FRPSXWDomR GLVSRQtYHO SDUD UHDOL]DU HVWDV RSHUDo}HV HQYROYH R XVR GR 06 :LQGRZV GR 06 2IÂżFH GDV ferramentas Internet Explorer e de correio eletrĂ´nico, em portuguĂŞs e em suas versĂľes padrĂľes mais utilizadas atualmente. Observação: Entenda-se por mĂ­dia removĂ­vel disquetes, CD’s e DVD’s gravĂĄveis, Pen Drives (mĂ­dia removĂ­vel acoplada em portas do tipo USB) e outras funcionalmente semelhantes. $V FpOXODV TXH FRQWrP FiOFXORV IHLWRV QD SODQLOKD HOHWU{QLFD $ TXDQGR ÂłFRODGDV´ QR HGLWRU GH WH[WRV DSUHVHQWDUmR UHVXOWDGRV GLIHUHQWHV GR RULJLQDO % QmR SRGHP VHU ÂłFRODGDV´ QR HGLWRU GH WH[WRV & VRPHQWH SRGHP VHU FRSLDGDV SDUD R HGLWRU GH WH[WRV GHQWUR GH XP OLPLWH Pi[LPR GH GH] OLQKDV H FLQFR FROXQDV ' Vy SRGHP VHU FRSLDGDV SDUD R HGLWRU GH WH[WR XPD D XPD ( TXDQGR LQWHJUDOPHQWH VHOHFLRQDGDV FRSLDGDV H ÂłFRODGDV´ QR HGLWRU GH WH[WRV VHUmR H[LELGDV QD IRUPD GH WDEHOD ComentĂĄrios: Sempre que se copia cĂŠlulas de uma planilha eletrĂ´nica e cola-se no Word, estas se apresentam como uma tabela VLPSOHV RQGH DV IyUPXODV VmR HVTXHFLGDV H Vy RV Q~PHURV VmR FRODGRV Resposta: E 13- O envio do arquivo que contĂŠm o texto, por meio do correio eletrĂ´nico, deve considerar as operaçþes de $ DQH[DomR GH DUTXLYRV H GH LQVHUomR GRV HQGHUHoRV HOHWU{QLFRV GRV GHVWLQDWiULRV QR FDPSR Âł&FR´ % GH GHVDQH[DomR GH DUTXLYRV H GH LQVHUomR GRV HQGHUHoRV HOHWU{QLFRV GRV GHVWLQDWiULRV QR FDPSR Âł3DUD´ & GH DQH[DomR GH DUTXLYRV H GH LQVHUomR GRV HQGHUHoRV HOHWU{QLFRV GRV GHVWLQDWiULRV QR FDPSR Âł&F´ ' GH GHVDQH[DomR GH DUTXLYRV H GH LQVHUomR GRV HQGHUHoRV HOHWU{QLFRV GRV GHVWLQDWiULRV QR FDPSR Âł&FR´ ( GH DQH[DomR GH DUTXLYRV H GH LQVHUomR GRV HQGHUHoRV HOHWU{QLFRV GRV GHVWLQDWiULRV QR FDPSR Âł3DUD´ ComentĂĄrios: Claro que, para se enviar arquivos pelo correio eletrĂ´nico deve-se recorrer ao uso de anexação, ou seja, anexar o DUTXLYR j PHQVDJHP 4XDQGR FRORFDPRV RV HQGHUHoRV GRV GHVWLQDWiULRV QR FDPSR &FR RX VHMD QR FDPSR ÂłFRP FySLD RFXOWD´ XP GHVWLQDWiULR QmR ÂżFDUi VDEHQGR TXHP PDLV UHFHEHX DTXHOD PHQVDJHP R TXH DWHQGH D VHJXUDQoD VROLFLWDGD QR HQXQFLDGR Resposta: A

Didatismo e Conhecimento

205


CONHECIMENTOS DE INFORMĂ TICA 14. (Caixa EconĂ´mica Federal - TĂŠcnico BancĂĄrio Novo - CESGRANRIO/2012) Usado para o manuseio de arquivos em lotes, tambĂŠm denominados scripts, o shell de comando ĂŠ um programa que fornece comunicação entre o usuĂĄrio e o sistema operacional de forma direta e independente. Nos sistemas operacionais Windows XP, esse programa pode ser acessado por meio GH XP FRPDQGR GD SDVWD $FHVVyULRV GHQRPLQDGR (A) Prompt de Comando (B) Comandos de Sistema (C) Agendador de Tarefas (D) Acesso Independente (E) Acesso Direto Resposta: “Aâ€? ComentĂĄrios Prompt de Comando ĂŠ um recurso do Windows que oferece um ponto de entrada para a digitação de comandos do MSDOS (Microsoft Disk Operating System) e outros comandos do computador. O mais importante ĂŠ o fato de que, ao digitar comandos, vocĂŞ pode H[HFXWDU WDUHIDV QR FRPSXWDGRU VHP XVDU D LQWHUIDFH JUiÂżFD GR :LQGRZV 2 3URPSW GH &RPDQGR p QRUPDOPHQWH XVDGR DSHQDV SRU usuĂĄrios avançados. 15. (Caixa EconĂ´mica Federal - TĂŠcnico BancĂĄrio Novo - CESGRANRIO/2012) Seja o texto a seguir digitado no aplicativo Word. Aplicativos para edição de textos. Aplicando-se a esse texto o efeito de fonte Tachado, o resultado obtido serĂĄ

Resposta: “Câ€? ComentĂĄrios: Temos 3 itens com a formatação taxado aplicada: c, d, e. Entretanto, temos que observar que na questĂŁo os itens d, e, alĂŠm de UHFHEHUHP WD[DGR WDPEpP ÂżFDUDP HP FDL[D DOWD 2 ~QLFR TXH UHFHEH DSHQDV R WD[DGD VHP DOWHUDU RXWUDV IRUPDWDo}HV IRL R LWHP F 16. (Caixa EconĂ´mica Federal - TĂŠcnico BancĂĄrio Novo - CESGRANRIO/2012) O envio e o recebimento de um arquivo de textos ou de imagens na internet, entre um servidor e um cliente, constituem, em relação ao cliente, respectivamente, um (A) download e um upload (B) downgrade e um upgrade & GRZQÂżOH H XP XSÂżOH (D) upgrade e um downgrade (E) upload e um download Resposta: “Eâ€?. ComentĂĄrios: 8S Âą &LPD 'RZQ Âą EDL[R /RDG Âą &DUUHJDU 8SORDG Âą &DUUHJDU SDUD FLPD HQYLDU 'RZQORDG Âą &DUUHJDU SDUD EDL[R UHFHEHU RX ÂłEDL[DU´

17- (TJ/SP – Escrevente TĂŠc. Jud. – Vunesp/2011) Assinale a alternativa que contĂŠm os nomes dos menus do programa MiFURVRIW :RUG ;3 HP VXD FRQÂżJXUDomR SDGUmR TXH UHVSHFWLYDPHQWH SHUPLWHP DRV XVXiULRV , QXPHUDU DV SiJLQDV GR GRFXmento, (II) contar as palavras de um parĂĄgrafo e (III) adicionar um cabeçalho ao texto em edição. a) Janela, Ferramentas e Inserir. b) Inserir, Ferramentas e Exibir. c) Formatar, Editar e Janela. d) Arquivo, Exibir e Formatar. e) Arquivo, Ferramentas e Tabela.

Didatismo e Conhecimento

206


CONHECIMENTOS DE INFORMÁTICA Resposta: “B” Comentário: x Ação numerar - “INSERIR” x Ação contar paginas - “FERRAMENTAS” x Ação adicionar cabeçalho - “EXIBIR” 18- (TJ/SP – Escrevente Téc. Jud. – Vunesp/2011)

a) 3, 0 e 7. b) 5, 0 e 7. c) 5, 1 e 2. d) 7, 5 e 2. e) 8, 3 e 4. Resposta: “C” Comentário: Expressão =MÉDIA(A1:A3) São somadas as celular A1, A2 e A3, sendo uma média é dividido por 3 (pois tem 3 células): (8+3+4)/3 = 5 Expressão =MENOR(B1:B3;2) Da célula B1 até a B3, deve mostrar o 2º menor número, que seria o número 1. Para facilitar coloque esses números em ordem crescente. Expressão =MAIOR(C1:C3;3) Da célula C1 até a C3, deve mostrar o 3º maior número, que seria o número 2. Para facilitar coloque esses números em ordem decrescente.

ANOTAÇÕES

———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ————————————————————————————————————————————————————

Didatismo e Conhecimento

207


CONHECIMENTOS DE INFORMÁTICA ANOTAÇÕES

———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ——————————————————————————————————————————————————— ——————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ———————————————————————————————————————————————————— ————————————————————————————————————————————————————

Didatismo e Conhecimento

208


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.