0% found this document useful (0 votes)
29 views5 pages

August

This document provides information about computer safety and responsible use of technology for students. It discusses proper posture and movement when using computers to prevent injury. It also outlines rules for the computer lab to keep it orderly and safe. The document teaches students how to recognize malware like viruses, worms, and Trojans, and how to properly manage files and folders.

Uploaded by

Via Liwanag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

August

This document provides information about computer safety and responsible use of technology for students. It discusses proper posture and movement when using computers to prevent injury. It also outlines rules for the computer lab to keep it orderly and safe. The document teaches students how to recognize malware like viruses, worms, and Trojans, and how to properly manage files and folders.

Uploaded by

Via Liwanag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

TOP ACHIEVERS PRIVATE SCHOOL, INC.

(TAPS)
Alicia; Cauayan; Santiago; Sta. Ana; Roxas, Ilagan; Solano Campus

COMPUTER 4 MODULE FOR THE MONTH OF AUGUST

UNIT 1 PRACTICING SAFE AND RESPONSIBLE USE OF ICT

Information and Communications Technology (ICT) is the age that opened a lot of windows for society. Information is
available with a click of a mouse, swish of a finger, and press of a button.
Along with this new technology are advantages and disadvantages. We may not avoid the dangers of technology, but we
can equip ourselves with various ways to protect ourselves.

LESSON 1: BEING HEALTHY AND SAFE WHEN USING COMPUTER


Let’s See
At the end of the lesson, we should be able to
1. Recognize ways of staying healthy while using computers
2. Practice ways of being safe when using computers
Let’s Ask ourselves
 What are the use of computers?
 How do we keep our selves healthy while using computers?
 How do we keep ourselves safe while using computers?

Key Vocabulary
1. Workshop is a computer unit connected to other computers through a network
2. Network is a group of computers connected together.

Let’s Discover
- Computers can be used in a lot of ways. They are used in education, health and medicine, recreation and
entertainment and government.
- Computers are used in education to get information. Students can use computers for researching on the internet.
Education has also evolved into using the Internet for mobile learning.

- Computers are also used in the field of medicine. Information now can be digitized, and electronic devices to help
patients have been developed. People who are hard of hearing can now have hearing instruments that can be
adjusted to precise measurements using computers.
- The field of recreation and entertainment has also been penetrated by computers. Movies can be created with the
help of software imaging. Watching movies and cartoons can also be done with computers.
- The government also uses computers. Records are computerized for faster transactions. Traffic control is also done
using computers.

- Bad Habits Prevention


-
- People spend a lot of time in front of their computers. Their bodies are physically stressed without them even
knowing it. They acquire bad habits when working in front of their machines. These bad habits can cause injuries
and pain. How can we avoid these bad habits?

Here are some practices to help keep us healthy while using our computers.
1. Arrange our workstation regularly.
If it does not feel right to be in a certain position, chances are we have the wrong posture.
2. Modify our body mechanics.
a. Make sure that eyeglasses fit properly.
b. Sit "tall" and straighten our backs.
c. Rest our wrists during breaks.

3. Move.
We should move to relax our muscles and prevent stiffness We can take short breaks by going to the kitchen and drinking a
glass of water.

4. Exercise while we work.


a. Slowly rotate our necks and shoulders.
b. Squeeze our backs by pulling our elbows to our sides. c. Drop our arms to our sides and shake them a bit.
d. Rotate our wrists.
e. Fan our fingers. Spread our fingers as far apart as possible.
f. Curl our toes. Circle our feet slowly from our ankles.
g. Cup our hands over our eyes for 30 seconds. Roll our eyes.
h. Look away from our computers and observe distant objects.

Computer Laboratory Rules


Rules keep things in order. Here are some computer laboratory rules to help make our computer laboratory a safe and
orderly place.
1. Before entering the laboratory, we:
a. Keep our hands clean.
b. Knock on the door and wait, if we are late.
c. Do not bring food and drinks.
d. Do not enter when there is no teacher.
e. Throw away candy or gum in the trash.

2. In the laboratory, we:

a. Do not run.
b. Do not bang on the equipment.
c. Do not bump into other students, chairs, and tables. d. Do not touch other student's monitor, keyboard, or mouse.
e. Stay in our assigned seat.

3. During instruction, we:

a. Do not start any program until the teacher says so


b. Follow instructions and stay on the task
c. Respect the files of other students.
d. Do not download any files or programs into our computers.
e. Do not change the settings of our computers.
4. At the end of the period, we:
a. Save our works promptly.
b. Close all programs and log off or shut down properly.
c. Straighten up the keyboard and the mouse.
d. Keep the chairs in line. e Leave the room quietly.

LESSON 2: LEARNING MANAGEMENT

Let’s See
At the end of the lesson, we should be able to:
1. Use correct file names.
2. Manage files and folders.
Let’s Ask Ourselves
- What are correct file names?
- How do we manage our files and folders?

- .Camel case is a naming convention where the first letter of each word is capitalized. This method may be used with file
names, variables, and other naming methods.
- File management is the sort ing, naming, and maintaining of computer files. It aims to organize, label, and classify
computer data in order to remove unwanted files.

Good File Names versus Bad File Names

Did you know that there are good file names and bad file names? Good file names help us easily find the file we
need. It should tell us what the file is about even before we open the file. This saves a lot of time. Bad file names,
on the other hand, cause delay and confusion.

Good File Names Creation

1. File names must be specific. A good file name should tell us what the file is all about. Try to be as specific as
possible.
2. Do not make file names too long. Long file names do not always work well with all types of software.
3. Avoid using special characters. Some special characters are:
4. Do not use spaces. Use underscores, dashes, no spaces, or Camel case instead.
a. Underscores (e.g., file_name)
b. Dashes (e.g., file-name)
c. No spaces (e.g., filename)
d. Camel case - The first letter of each word is capitalized. with no spaces in between words (e.g., FileName.)

File Management

To keep order in our computers, we need to manage our files and folders properly.

File management is the sorting, naming, and maintaining of computer files. It aims to organize and classify
computer data to remove unwanted files. Good file management lets us open and get our files faster and easier.
In creating a folder, we need to specify what name we want our folder to have. We can ask ourselves these
questions, "What files will this folder have?" "Will it contain schoolwork for Math, English, Science. or Filipino?"
When we have an idea for our folder name, we can now start creating a folder.

Folder Creation

To create folders, we do these steps:


1. Right-click a blank space on the desktop. This will display Desktop options where new folders can be created.
2. Choose New to create a new folder.
New folder
3. Rename the new folder with the name we plan to use (e.g.. subject folders for schoolwork: Math, English, or
Filipino):
Subfolder Creation

Subfolders are created in a similar manner, but this time, we right click inside the main folder to activate the
options, and follow the same steps in creating a folder

If we already have created folders and we want to organize them, we may move folders around. To do this, we:
1. Select the folders we want to move.
2. Right-click the folder, then select Copy.
3. Open the destination folder or the main folder where we want to move the folder.
4. Right-click inside the main folder. then select Paste.
5. Return to the original location of the folder we moved, and delete the duplicate.

LESSON 3: RECOGNIZING COMPUTER THREATS

Let’s See
At the end of the lesson, we should able to:
1. Recognize a malware
2. Differentiate a virus, a worm, and a Trojan from one another.

Let’s Ask Ourselves

- What is a Malware?
- What is a virus, a worm, and a Trojan?

Key Vocabulary

1. Malware is a malicious code; short for malicious software. This is a type of code that was created with malicious intent.
It is designed to damage, destroy, steal, or inflict bad action on data, hosts, or networks.

2. Computer virus is a type of malware that propagates by inserting a copy of itself and becoming part of another program.
It spreads from one computer to another, leaving infections travels. as it
3. Computer worm is similar to viruses in the sense that they replicate copies of themselves and cause the same type of
damage. Unlike viruses, worms are stand alone software and do not require a host program to spread.

4. Trojan is another type of malware that was named after the wooden horse that the Greeks used to infiltrate Troy. It is a
software that looks real, but when loaded, it activates and attacks the host. It can vary from irritating the user with pop-ups,
deleting files, stealing data, or spreading viruses..
There are many types of malware, but in this lesson, we will discuss viruses, worms, and Trojans. These can be bundled
with other programs or attached as files. Majority of these are installed by selecting an e-mail attachment or downloading a
file from the Internet.

Computer Threats
1. A computer virus is a type of malware that propagates by inserting a copy of itself and becoming part of another
program.
It spreads from one (1) computer to another, leaving Infections as it travels. Some viruses overwrite other programs with
copies of themselves that destroy the host program altogether.

2. A computer worm is similar to computer virus in the sense that it replicates copies of itself and causes the same type of
damage.

Unlike a virus, a worm is a stand-alone software and does not require a host program to spread. It enters a computer and
takes advantage of file-transport or informational transport features on the system that allows it to travel on its own.

3. A Trojan is another type of malware that was named after the wooden horse that the Greeks used to infiltrate the city of
Troy.
It is a software that looks real, but it activates and attacks the host when loaded. It irritates the user with pop-ups, deletes
files, steals data, and spreads viruses.

You might also like