{"id":4525,"date":"2022-05-08T21:11:21","date_gmt":"2022-05-08T21:11:21","guid":{"rendered":"https:\/\/computerscienced.co.uk\/site\/?page_id=4525"},"modified":"2022-05-11T20:08:20","modified_gmt":"2022-05-11T20:08:20","slug":"an-introduction-to-the-computing-lab","status":"publish","type":"page","link":"https:\/\/computerscienced.co.uk\/site\/ks3-computing-and-digital-literacy-age-11\/an-introduction-to-the-computing-lab\/","title":{"rendered":"An introduction to the computing lab"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:34% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"803\" height=\"259\" src=\"https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2022\/05\/undraw_shared_workspace_re_3gsu.svg\" alt=\"\" class=\"wp-image-4526 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\">In this topic you will be introduced to the basics of the computing lab and will cover how to log in to your computer, how to choose a password and how to access Office 365.  <\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-contrast-background-color has-contrast-color is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link has-accent-background-color has-background\" href=\"https:\/\/computerscienced.co.uk\/site\/choosing-a-password\/\">Choosing a password<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>A tutorial on how to create a strong password with discussion about password and account security.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-accent-background-color has-background\" href=\"https:\/\/computerscienced.co.uk\/site\/ks3-computing-and-digital-literacy-age-11\/an-introduction-to-the-computing-lab\/staying-safe-in-the-computing-lab\/\">Safety in the computing lab<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>A tutorial on staying safe when in the computing lab and what to do if you spot something that is unsafe.  <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-accent-background-color has-background\" href=\"https:\/\/computerscienced.co.uk\/site\/ks3-computing-and-digital-literacy-age-11\/an-introduction-to-the-computing-lab\/accessing-office-365\/\">Accessing Office 365<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>A tutorial on how to login to Microsoft Office 365 and what can be accessed from within.  <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link has-accent-background-color has-background\" href=\"https:\/\/computerscienced.co.uk\/site\/how-to-screenshot\/\">How to screenshot<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>A tutorial on how to use screenshots to create evidence of your work<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this topic you will be introduced to the basics of the computing lab and will cover how to log&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4526,"parent":4524,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"disable_featured_image":true,"footnotes":""},"class_list":["post-4525","page","type-page","status-publish","has-post-thumbnail","hentry"],"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2022\/05\/undraw_shared_workspace_re_3gsu.svg",150,48,true],"full":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2022\/05\/undraw_shared_workspace_re_3gsu.svg",803,259,false]},"categories_names":null,"comments_number":"0","_links":{"self":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/4525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/comments?post=4525"}],"version-history":[{"count":8,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/4525\/revisions"}],"predecessor-version":[{"id":4577,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/4525\/revisions\/4577"}],"up":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/4524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media\/4526"}],"wp:attachment":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media?parent=4525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}