August
August
(TAPS)
Alicia; Cauayan; Santiago; Sta. Ana; Roxas, Ilagan; Solano Campus
Information and Communications Technology (ICT) is the age that opened a lot of windows for society. Information is
available with a click of a mouse, swish of a finger, and press of a button.
Along with this new technology are advantages and disadvantages. We may not avoid the dangers of technology, but we
can equip ourselves with various ways to protect ourselves.
Key Vocabulary
1. Workshop is a computer unit connected to other computers through a network
2. Network is a group of computers connected together.
Let’s Discover
- Computers can be used in a lot of ways. They are used in education, health and medicine, recreation and
entertainment and government.
- Computers are used in education to get information. Students can use computers for researching on the internet.
Education has also evolved into using the Internet for mobile learning.
- Computers are also used in the field of medicine. Information now can be digitized, and electronic devices to help
patients have been developed. People who are hard of hearing can now have hearing instruments that can be
adjusted to precise measurements using computers.
- The field of recreation and entertainment has also been penetrated by computers. Movies can be created with the
help of software imaging. Watching movies and cartoons can also be done with computers.
- The government also uses computers. Records are computerized for faster transactions. Traffic control is also done
using computers.
Here are some practices to help keep us healthy while using our computers.
1. Arrange our workstation regularly.
If it does not feel right to be in a certain position, chances are we have the wrong posture.
2. Modify our body mechanics.
a. Make sure that eyeglasses fit properly.
b. Sit "tall" and straighten our backs.
c. Rest our wrists during breaks.
3. Move.
We should move to relax our muscles and prevent stiffness We can take short breaks by going to the kitchen and drinking a
glass of water.
a. Do not run.
b. Do not bang on the equipment.
c. Do not bump into other students, chairs, and tables. d. Do not touch other student's monitor, keyboard, or mouse.
e. Stay in our assigned seat.
Let’s See
At the end of the lesson, we should be able to:
1. Use correct file names.
2. Manage files and folders.
Let’s Ask Ourselves
- What are correct file names?
- How do we manage our files and folders?
- .Camel case is a naming convention where the first letter of each word is capitalized. This method may be used with file
names, variables, and other naming methods.
- File management is the sort ing, naming, and maintaining of computer files. It aims to organize, label, and classify
computer data in order to remove unwanted files.
Did you know that there are good file names and bad file names? Good file names help us easily find the file we
need. It should tell us what the file is about even before we open the file. This saves a lot of time. Bad file names,
on the other hand, cause delay and confusion.
1. File names must be specific. A good file name should tell us what the file is all about. Try to be as specific as
possible.
2. Do not make file names too long. Long file names do not always work well with all types of software.
3. Avoid using special characters. Some special characters are:
4. Do not use spaces. Use underscores, dashes, no spaces, or Camel case instead.
a. Underscores (e.g., file_name)
b. Dashes (e.g., file-name)
c. No spaces (e.g., filename)
d. Camel case - The first letter of each word is capitalized. with no spaces in between words (e.g., FileName.)
File Management
To keep order in our computers, we need to manage our files and folders properly.
File management is the sorting, naming, and maintaining of computer files. It aims to organize and classify
computer data to remove unwanted files. Good file management lets us open and get our files faster and easier.
In creating a folder, we need to specify what name we want our folder to have. We can ask ourselves these
questions, "What files will this folder have?" "Will it contain schoolwork for Math, English, Science. or Filipino?"
When we have an idea for our folder name, we can now start creating a folder.
Folder Creation
Subfolders are created in a similar manner, but this time, we right click inside the main folder to activate the
options, and follow the same steps in creating a folder
If we already have created folders and we want to organize them, we may move folders around. To do this, we:
1. Select the folders we want to move.
2. Right-click the folder, then select Copy.
3. Open the destination folder or the main folder where we want to move the folder.
4. Right-click inside the main folder. then select Paste.
5. Return to the original location of the folder we moved, and delete the duplicate.
Let’s See
At the end of the lesson, we should able to:
1. Recognize a malware
2. Differentiate a virus, a worm, and a Trojan from one another.
- What is a Malware?
- What is a virus, a worm, and a Trojan?
Key Vocabulary
1. Malware is a malicious code; short for malicious software. This is a type of code that was created with malicious intent.
It is designed to damage, destroy, steal, or inflict bad action on data, hosts, or networks.
2. Computer virus is a type of malware that propagates by inserting a copy of itself and becoming part of another program.
It spreads from one computer to another, leaving infections travels. as it
3. Computer worm is similar to viruses in the sense that they replicate copies of themselves and cause the same type of
damage. Unlike viruses, worms are stand alone software and do not require a host program to spread.
4. Trojan is another type of malware that was named after the wooden horse that the Greeks used to infiltrate Troy. It is a
software that looks real, but when loaded, it activates and attacks the host. It can vary from irritating the user with pop-ups,
deleting files, stealing data, or spreading viruses..
There are many types of malware, but in this lesson, we will discuss viruses, worms, and Trojans. These can be bundled
with other programs or attached as files. Majority of these are installed by selecting an e-mail attachment or downloading a
file from the Internet.
Computer Threats
1. A computer virus is a type of malware that propagates by inserting a copy of itself and becoming part of another
program.
It spreads from one (1) computer to another, leaving Infections as it travels. Some viruses overwrite other programs with
copies of themselves that destroy the host program altogether.
2. A computer worm is similar to computer virus in the sense that it replicates copies of itself and causes the same type of
damage.
Unlike a virus, a worm is a stand-alone software and does not require a host program to spread. It enters a computer and
takes advantage of file-transport or informational transport features on the system that allows it to travel on its own.
3. A Trojan is another type of malware that was named after the wooden horse that the Greeks used to infiltrate the city of
Troy.
It is a software that looks real, but it activates and attacks the host when loaded. It irritates the user with pop-ups, deletes
files, steals data, and spreads viruses.