Skip Navigation
News - AT Messenger
DATI Logo

Delaware Assistive Technology Initiative

. . . bringing technology to you

AT Messenger Logo - Bringing Technology to You

Vol. 6, No. 5 Fall 1998

Previous Issues

Subscribe to AT Messenger
Download PDF Viewer
PDF Version (for Printing)
Large Print (pdf)
Text Version

Making Computers Kid-Friendly

by Ed Salisbury, Kent County ATRC

For a child, the use of a computer can greatly enhance learning, encourage socialization, and provide recreational activities. Even though the computer is a valuable tool for children of all ages, there are many factors to consider before giving young people access to the family computer. Most children who use a computer in the home share it with others in the household. This presents the problem of how to limit the information to which he or she has access. Obviously, most parents don't want young children exploring their hard drives and possibly moving or deleting files or icons. Some files on the hard drive may be of a sensitive nature or inappropriate for children's viewing. Another factor to consider is how to create a computing environment that is not intimidating to young children. Nothing can cut short a session on the computer faster than a frustrated child not being able to access his or her favorite game. Finally, because many households are now connected to the Internet, parents need to be aware of the ways in which their children are accessing the outside world.

Luckily, all of the problems presented by young children's hard drive explorations and the wild untamed Internet do not outweigh the numerous benefits that the computer provides. A variety of software is available to assist parents in keeping the computer as well as their children safe.

You Clicked on What?

Several software programs are available for those with children who like to explore the numerous files found on the average home computer. Kid Desk from Edmark creates a kid friendly environment that is not only fun but limits the child to only those programs and files that he or she has been given access. The Kid Desk software resembles an actual desktop that one would find in a home or office. The child can choose a style of desk that most closely matches his or her interests. Each child in the family can set up his or her own personalized desktop with single-click access to selected programs. In addition to providing program launching capabilities, Kid Desk also contains icons resembling items commonly found on a desk. For example, clicking on the telephone icon lets the child send e-mail to another family member. The picture frame on the desk is a simple drawing program. The address card file lets the child store addresses, phone numbers, and birthdays. When an adult wants to use the computer, he or she simply types a password and the Macintosh or Windows desktop returns to normal.

screen shot of Kid Desk Family EditionFor those who have outgrown Kid Desk but for whom some level of hard drive protection is desired, Apple Computer sells At Ease 3.0 for the Macintosh. At Ease offers the same program launching features as Kid Desk but without the extra graphics and activities. At Ease provides two levels of protection. The first level presents a single-click launching environment allowing access to only selected applications. The second level allows access to the typical Macintosh desktop with restricted access to certain files as well as limitations on copying, renaming, and deleting files. Shareware programs similar to At Ease are available for IBM and compatible computers from Cetus Software. They are Storm Windows for Windows95 and ProGuard for Windows 3.X. These applications do not change the appearance of the desktop. They do, however, require a password to be entered before selected applications can be opened. Also, various levels of restrictions can be placed on the deletion, moving, and duplication of programs on the hard drive. Because these software products are shareware, fully functional versions can be downloaded and evaluated for a length of time before one would decide to purchase.

Backup! Backup! Backup!

Regardless of how well one safeguards the computer, the threat of data loss is always present. If a file gets deleted accidentally it is generally not the end of the world. The Windows operating system includes an Undelete feature that can usually recover deleted files as long as new files have not been saved over top of them. The Norton Utilities from Symantec provides Macintosh users similar file recovery capabilities as well as other useful disk utilities. If a file is unrecoverable, one can only hope that it was backed up. It is always a good idea to back up all software that is not contained on original diskettes or CDROM. This would include software that has been downloaded from the Internet as well as personal word processing, database, graphics, and other application files. Both tape backup and high capacity removable storage devices can be purchased from local computer retailers. The Zip and Jaz drives from Omega, as well as the Syquest brand of drives, are popular removable storage devices that can be used to backup important data. The use of a tape drive is a very cost effective method of backup but is somewhat slow and limited in capabilities. Most of these devices include file synchronization software for easy backup of newly created files.

Beyond PG13

In Cyberspace it is almost impossible to verify the age of the person sitting at a home computer browsing the Web. Fortunately, there is a variety of software available which attempts to filter the information children receive from the Internet. Products such as Cyber Patrol, Cyber Sitter, Net Nanny, Surf Watch, etc. have been designed for this purpose. They can be downloaded from several large download sites as well as from their individual sites. Most are available for a limited trial and must be purchased if one wants to continue using them. These software programs do need to be periodically updated because new sites are added to the Web each day.

Didn't I tell you never to talk to strangers?

Most children have been taught not to talk to strangers and not to divulge personal information over the phone. The Internet, however, provides what appears to be a safe environment for interactions of all types. In the comfort of their living room or bedroom, children become careless in their conversations with others. When participating in chat sessions, a child may think he or she is chatting with a peer, yet there is no way to tell the age or gender of the person with whom he or she is chatting. Those who prey on children and teenagers take full advantage of this anonymity to find out personal information like address and phone number as well as to arrange meetings with an unsuspecting child. Even if a child is chatting with familiar people, there is no guarantee that someone with questionable motives is not observing their friendly chat session. Although the Internet filters that are used to screen inappropriate material can also be used to prevent children from accessing chat areas, parental supervision and education seem to be the most effective tool against these predators.

So you say the aliens have taken over Washington?

Many believe that all information obtained from the Internet is true. After all, why would a computer lie? Unfortunately, a lot of information presented as fact is inaccurate, opinion biased, and at times totally fictitious. As a matter of fact, the Internet is more of an open forum than a structured information source. As a consequence, many people now have a voice who otherwise would not. Any person with a reasonable amount of Internet experience and the proper software can design a Web page that rivals that of large companies and organizations. On this web site, this person could post anything he or she desires, regardless of truthfulness. When using the Internet for research, one must remember to consider the source before accepting information as fact. Search results that contain the suffixes .gov, .org, and .edu can generally be trusted. These sites are administered by governmental bodies, organizations, and educational institutions, respectively.

What do you mean I'm infected?

It is difficult to believe that very talented computer programmers would have nothing better to do than wreak havoc on an untold number of home computers, but it happens every day. Many think that computer viruses arose as a result of malfunctioning software or accidental happenings. In actuality, viruses are software programs that have been intentionally written for the purpose of destroying the data on the computers of unfortunate and unsuspecting victims. Some viruses are little more than a nuisance while others can render a computer inoperable in a matter of minutes. Those who download software from the Internet, insert floppy disks into their computers, or receive e-mail are susceptible to computer viruses. Luckily, a multi-billion dollar industry has sprouted up to combat those mischievous programmers who author and disseminate this destructive software. Programs like Norton Antivirus, McAfee Virus Shield, and Dr. Solomon's Antivirus are all available for IBM and compatible computers. These valuable utilities examine any data coming into the computer. If a virus is detected, it is quickly eliminated. Because new viruses are disseminated every day, these programs need to be periodically updated. This is generally achieved through a fast, free, and automatic download from the manufacturer's web site.

With a minimal investment in software and the time to educate and supervise their children, parents can ensure a positive and rewarding computing experience each and every time their kids log-on. Although the Internet has many downfalls, the overall value of e-mail, chat lines, newsgroups, and the World Wide Web is very high. The computer, especially one connected to the Internet, offers something for every member of the family to learn from and enjoy. For more information on computers, the Internet, or any of the products listed above contact your local ATRC.

Current Issue