0% found this document useful (0 votes)
83 views192 pages

CBLM Perform Computer Operations

This competency-based learning module focuses on performing computer operations for the Cookery NC II qualification in the tourism sector. It includes training materials, activities, and assessments to help trainees acquire necessary skills in computer usage, data handling, and system maintenance. The module emphasizes independent learning, with support from trainers and recognition of prior learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views192 pages

CBLM Perform Computer Operations

This competency-based learning module focuses on performing computer operations for the Cookery NC II qualification in the tourism sector. It includes training materials, activities, and assessments to help trainees acquire necessary skills in computer usage, data handling, and system maintenance. The module emphasizes independent learning, with support from trainers and recognition of prior learning.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 192

i

COMPETENCY BASED LEARNING MATERIAL

Sector: TOURISM (Hotel and Restaurant)

Qualification: COOKERY NC II

Unit of Competency: PERFORM COMPUTER OPERATIONS

Module Title: PERFORMING COMPUTER OPERATIONS

Prepared by:

CHLOE ANNE A. PALMARIA


HOW TO USE THIS COMPETENCY BASED LEARNING MODULE

Welcome to the Module PERFORMING COMPUTER


OPERATIONS. This module contains training materials and
activities for you to complete.
The unit of competency PERFORM COMPUTER
OPERATIONS contains the knowledge and skills and attitudes
required for environmental protection. It is one of the specialized
modules at National Certificate level II (NC II).
You are required to go through a series of learning activities in
order to complete each learning outcomes of the module. In each
learning outcome there are Information Sheets to help you better
understand the required activities. Follow these activities on your
own and answer the self –check at the end of each learning
outcome. You may remove a blank answer sheet at the end of each
module (or get from your facilitator/ trainer) to write your answers
for each self-check. If you have questions, don’t hesitate to ask your
facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills
covered in this module because you have:

 Been working in the same industry for some time.


 Already completed training in this area.
If you can demonstrate to your trainer that you are competent in a
particular skill or skills, talk to him/her about having them formally
recognized so you won’t have to do the same training again. If you have
qualifications or Certificates of Competency from previous trainings, show
them to your trainer. If the skills you acquired are still relevant to this
module, they may become part of the evidence you can present for RPL.

A Trainee Record Book (TRB) is given to you to record important


dates, jobs undertaken and other workplace events that will assist you in
providing

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
further details to your trainer/assessor. A Record of Achievement/Progress
Chart is also provided to your trainer to complete/accomplish once you have
completed the module. This will show your own progress.

DIRECTION FOR USE OF THE CBLM

This module was prepared to help you achieve the required competency:
Performing Computer Operations. This will be the source of information for
you to acquire the knowledge and skills in this particular module with minimum
supervision or help from your trainer. With the aid of this material, you will
acquire the competency independently and at your own pace.
Talk to your trainer and agree on how you will both organize the training
of this unit. Read through the module carefully. It is divided into sections which
covers all the skills and knowledge you need to successfully complete in this
module.
Work through all the information sheets and complete the activities in
each section. Do what is asked in the INSTRUCTIONAL SHEETS and complete
the SELF-CHECK. Suggested references are included to supplement the
materials provided in this module.
Most probably, your trainer will also be your supervisor or manager.
He/she is there to support you and show you the correct way to do things. Ask
for help.
Your trainer will tell you about the important things you need to consider
when you are completing activities and it is important that you listen and take
notes.
Talk to more experienced workmates and ask for their guidance.
Use the self-check questions at the end of each section to test your own
progress.
When you are ready, ask your trainer to watch you perform the activities
outlined in the module.
As you work through the activities, ask for written feedback on your
progress. Your trainer gives feedback/pre-assessment reports for this reason.
When you have successfully completed each element or learning outcome, ask
your trainer to mark on the reports that you are ready for assessment.
When you have completed this module and feel confident that you have
had sufficient practice, your trainer will schedule you for the institutional

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
assessment. The result of your assessment/evaluation will be recorded in your
COMPETENCY ACHIEVEMENT RECORD.

MODULE CONTENT

UNIT OF COMPETENCY: PERFORM COMPUTER OPERATIONS

MODULE TITLE : PERFORMING COMPUTER OPERATIONS

INTRODUCTION:

This module covers the knowledge, skills and attitudes needed to


perform computer operations which include inputting, accessing,
producing and transferring data using appropriate hardware and software.

NOMINAL DURATION : 6 Hours

LEARNING OUTOMES :

At the end of the module, the trainee must be able to:

1. Identify and explain the functions, general features and capabilities


of both hardware and software
2. Prepare and use appropriate hardware and software according to
task requirement
3. Use appropriate devices and procedures to transfer files/data
4. Produce accurate and complete data according to the requirements
5. Maintain computer system

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
LEARNING OUTCOME 1

IDENTIFY AND EXPLAIN THE FUNCTIONS, GENERAL FEATURES AND


CAPABILITIES OF BOTH HARDWARE AND SOFTWARE

CONTENTS:

 Basic ergonomics of keyboard and computer use


 Main types of computers and basic features of different operating
systems
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software
 Peripheral devices
 OH & S principles and responsibilities
 Reading skills required to interpret work instruction
 Communication skills

ASSESSMENT CRITERIA:

1. General features of the computer are explained according to sequence


of operation.
2. Functions of computer hardware and software are identified and
explained.
3. Types of peripheral devices are identified.
4. Connections between computer and peripheral devices are explained.

CONDITIONS:

The students/ trainees must be provided with the following:

EQUIPMENT LEARNING MATERIALS

 LCD Projector (optional) Books relating to:


 Overhead Projector
(optional)  Computer books and CDs
 Computer
 Printer

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
METHODOLOGIES:

 Lecture
 Group discussion
 Tutorial or self-pace

ASSESSMENT METHODS

 Observation
 Questioning
 Practical demonstration

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-1

BASIC ERGONOMICS OF KEYBOARD AND COMPUTER USE

Learning Objective:

After reading the information sheet, you should be able to:

1. Identify some basic ergonomics of keyboard and computer use


2. Explain why each ergonomics should be discussed

Introduction

There are a number of factors involved in ensuring your work environment


is ergonomic. These involve the position of the chair you sit in, the monitor,
the keyboard surface, and other general techniques to create an ideal
environment, which enhances comfort and productivity.

SEATING CONSIDERATIONS

• Adjust the height of the chair to achieve proper posture – your legs from the
body should be close to parallel to the floor.
• Adjust the backrest of the chair to provide support for your lower back.
• Your chair should have space behind your knees while seated properly with
your back against the backrest.
• Proper posture means having 90-degree or higher angles at the hips and
knees with feet supported by an angled footrest.

MONITOR CONSIDERATIONS

• Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
• The top of the viewing surface of the monitor should be at or below eye level.
• Your monitor should be located 12” to 24” from your eyes.
• Use accessories such as anti-glare filters and adjusting screen angle to
prevent screen glare – if you can, use softer color schemes on your monitor.
Orient your workstation so that you are parallel to sources of light.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
KEYBOARD SURFACE CONSIDERATIONS

• Ensure that your forearms are parallel to the floor or slightly downward when
you are typing.
• If you are using a mouse, make sure it is as close to the keyboard as possible
– if you have limited surface, consider using a touch pad.
• When typing, maintain a neutral wrist position where the forearms, wrists and
hands are in a straight line.

GENERAL CONSIDERATIONS

• Keep shoulders relaxed and head and neck in an upright but relaxed position.
• Get regular eye exams and wear corrective lenses – use a task light to
illuminate documents if background lighting is poor.
• Use a document holder to place source documents as close to the screen as
possible and at the same height and distance (use a document holder attached
to the screen or an articulating one attached to the desk).
• Avoid long periods of repetitive activity; where possible, alternate computer
work with other tasks like filing, phone calls, etc.
• Drink water throughout the day and keep yourself well hydrated.

Self-Check 3.1-1

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Read the following sentences. Write T if it is true and F if it is false.

1. The top of the viewing surface of the monitor should be at or below eye
level.
2. Proper posture means having 180-degree or higher angles at the hips and
knees with feet supported by an angled footrest.
3. Your monitor should be located 12” to 24” from your eyes.
4. Ensure that your forearms are parallel to the table or slightly downward
when you are typing.
5. Drink water throughout the day and keep yourself well hydrated.
6. Keep shoulders relaxed and head and neck in a downward but relaxed
position.
7. When typing, maintain a neutral wrist position where the forearms, wrists
and hands are in a straight line.
8. Adjust the height of the chair to achieve proper posture – your legs from
the body should be close to perpendicular to the floor.
9. Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.

10. Adjust the backrest of the chair to provide support for your upper
back.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.1-1

1. T
2. F
3. T
4. F
5. T
6. F
7. T
8. F
9. T
10. F

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-2

MAIN TYPES OF COMPUTERS AND BASIC FEATURES OF DIFFERENT


OPERATING SYSTEMS

Learning Objectives:

After reading this information sheet, the student/ trainee should be able
to;

1. Identify the types of computers


2. Discuss the basic features of different operating systems

TYPES OF COMPUTERS

Supercomputer

The Columbia Supercomputer - once one of the fastest.

Supercomputers are the fastest and the most expensive computers. These
huge computers are used to solve very complex science and engineering
problems. Supercomputers get their processing power by taking advantage
of parallel processing; they use lots of CPUs at the same time on one problem. A
typical supercomputer can do up to ten trillion individual calculations every
second.

Example Supercomputers:

K Computer

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Columbia

Mainframe

A pair of IBM mainframes

Mainframe (coloquially, "big iron")


computers are similar to supercomputers in
many aspects, the main difference between
them is the fact that a supercomputer use all
its raw power to focus on very few tasks,
while a mainframe purpose is to perform thousands or millions of operations
concurrently. Due to its nature, mainframes are often employed by large
organizations for bulk data processing, such as census, industry and consumer
statistics, enterprise resource planning and transaction processing.

Server Computer

Inside of a Rack unit Server

A server is a central computer that


contains collections of data and programs. Also
called a network server, this system allows all
connected users to share and store electronic
data and applications. Two important types of
servers are file servers and application servers.
Servers are a step under supercomputers, because they don't focus on
trying to solve one very complex problem, but try to solve many similar smaller
ones. An example of servers would be the computers that Wikipedia stores its
encyclopaedias on. Those computers have to go and find the page you're
looking for and send it to you. In itself it's not a big task, but it becomes a job for
a server when the computers have to go and find lots of pages for a lot of
people and send them to the right place. Some servers, like the ones Google
uses for something like Google Documents, have applications on them instead
of just files, like Wikipedia.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Workstation Computer

Sun SPARCstation

Workstations are high-end, expensive


computers that are made for more complex
procedures and are intended for one user at a
time. Some of the complex procedures consist
of science, math and engineering calculations
and are useful for computer design and
manufacturing. Workstations are sometimes
improperly named for marketing reasons. Real
workstations are not usually sold in retail, but
this is starting to change; Apple's Mac Pro
would be considered a workstation.
The movie Toy Story was made on a set of
Sun (Sparc) workstations.

Personal Computer or PC

PC is an abbreviation for a Personal


Computer, it is also known as a Microcomputer.
Its physical characteristics and low cost are
appealing and useful for its users. The
capabilities of a personal computer have
changed greatly since the introduction of
electronic computers. By the early 1970s,
people in academic or research institutions had
the opportunity for single-person use of a
computer system in interactive mode for extended durations, although these
systems would still have been too expensive to be owned by a single individual.
The introduction of the microprocessor, a single chip with all the circuitry
that formerly occupied large cabinets, led to the proliferation of personal
computers after about 1975. Early personal computers, generally called
microcomputers, sold often in kit form and in limited volumes and were of

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
interest mostly to hobbyists and technicians. By the late 1970s, mass-market
pre-assembled computers allowed a wider range of people to use computers,
focusing more on software applications and less on development of the
processor hardware. Throughout the 1970s and 1980s, home computers were
developed for household use, offering some personal productivity, programming
and games, while somewhat larger and more expensive systems (although still
low-cost compared with minicomputers and mainframes) were aimed for office
and small business use.
Today a personal computer is an all-around device that can be used as a
productivity tool, a media server and a gaming machine. The modular
construction of the personal computer allows components to be easily swapped
out when broken or upgrading.

Microcontroller

An Arduino, a common programmable


microcontroller.

Microcontrollers are mini computers


that enable the user to store data and
execute simple commands and tasks. These
single circuit devices have minimal memory
and program length but are normally
designed to be very good at performing a
niche task. Many such systems are known as embedded systems. The computer
in your car, for example is an embedded system. A common microcontroller that
one might come across is called Arduino.

Smartphone

Do you own a smartphone? Your smart phone is a


computer! Most smartphones run iOS or Android.
Android is an operating system that is based
on Linux. Smartphones are becoming
exponentially faster and also have an
exponentially increasing data capacity.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
HTC One Max

BASIC FEATURES OF DIFFERENT OPERATING SYSTEMS

Mac OS X, Time Machine

Configuring
backups has,
traditionally, been one of
the least fun things about
computing. It's perhaps
only slightly less
frustrating than trying to
recover your system from
said backup. If you don't
have too many files to
back up, services like
Dropbox, Sugarsync, and
Windows Live Mesh work quite well. In fact, for several years I used Live Sync
(formerly Foldershare, now called Live Mesh) to create real-time offsite backups
of my most important files. But you can't back up and recover an entire system
that way.

Apple introduced Time Machine backup software with Mac OS X 10.5 in


2007, and I have to say it's one of the more brilliant tools I've used. Time
Machine is easy to configure and pretty much operates as a set-and-forget
service. You can back up to a local drive connected via USB or Firewire or even
to network storage via Ethernet or WiFi. As long as your backup volume is
available, Time Machine creates hourly, daily and weekly incremental backups
of your system.

Unix, The Shell Terminal

The terminal was my first experience of computing...and by terminal I


mean a teleprinter terminal: typewriter keys and a continuous roll of paper

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
scrolling up line by line. The shell was also, for a long time, my portal to the
Internet. Then there was MS-DOS...

Command line computing lives on, and is even making something of a


comeback among users of graphical UI operating systems. Linux and Mac OS X
still have their terminal fanboys. And of course you've got a selection of shells,
from the original Bourne shell to bash, C, dash, Korn and Z, not to mention fish,
psh, rc, scsh, wish and zoidberg.

Windows had its roots in the MS-DOS command line, and continues to this
day with the "DOS box" command prompt, cmd.exe. There's Windows
PowerShell if you want a more robust scripting environment in Windows, and
Cygwin if you prefer something more in line with the traditional Unix terminal.

There's always tension between command-line and graphical interfaces,


and for the last decade or more, GUIs have been the dominant face of most
OSes. But as Max Steenbergen writes in his article "Commands Lines: Alive &
Kicking" for UX Magazine, the command line is making a comeback via app
launchers like Alfred, Launchy and GNOME Do. Even applications like Google
Chrome and Wolfram|Alpha are blurring the line between textual search and
command-line scripting.

Ubuntu, Simplified Linux Setup

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Much of the Linux revolution has been powered by hackers of the first
order. While getting a Linux system up and running isn't rocket science, it does
take quite a bit of planning (is my hardware compatible?), knowledge (sudo
what?) and time (I've got work to do...). Of course, once you figure those details
out, you end up with a powerful, highly customizable and secure system that
runs well even on modest hardware.

Over the years,


increasingly easy access
to configuration and
installation information
via the internet has
helped Linux reach a
broader audience . A
large and growing list of
high-quality, free, open-
source software for Linux
also contributes to its
appeal. Still, the learning
curve has been steep and
the availability of over
two hundred different
Linux distros makes the
choice of where to start
difficult.

That is until the release of the Debian-derived Ubuntu in 2004. Ubuntu


aims for easy installation and configuration, and that's been my experience so
far. You can download a live CD ISO or a Windows installer to get going. It
doesn't require much of a commitment if you just want to give Ubuntu a try.
Burn the ISO to CD and boot from that, or install it in a virtual machine using
VirtualBox, Virtual PC or VMWare Player.

BeOS, 64-Bit Journaling File System

When Jean Louis Gasse left Apple, he founded a new team that created
the charming and forward-looking BeOS in 1991. At the time, BeOS featured
some pretty radical technology. Designed from the ground up as an efficient,
lightweight multithreaded system with preemptive multitasking, it was very fast
on modest hardware and scaled up to take advantage of any processors on the
system (in those days, rarely more than two, but still...).

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
The file system
included with BeOS,
however, is one of its truly
cool features. Called BFS
(BeOS File System), it was
a 64-bit journaling file
system using file attributes,
or metadata. The ability to
query and sort against file
metadata gave BFS some
relational database-like
quality similar to what we
may finally see via WinFS in
Windows 8. The 64-bit
address space gave BFS
the theoretical ability to
support volumes of more
than eight exobytes and
files over 30 GB. This at a time when 30 GB hard drives were hardly
commonplace.

Coupled with BeOS's performance-focused multithreaded core, BFS could


provide high-performance streaming read, write and query access to storage
with the ability to recover quickly after a failure. This made BeOS well-suited for
audio and video manipulation, a task that it still accomplishes today in high-end
media production systems.

BeOS faded away as a commercial OS, but there's still a small, loyal group of
enthusiasts keeping the flame burning. If you can find a BeOS 5 CD, it'll
probably run on most commodity x86 hardware. Software is available from the
BeBits repository. In addition, the Haiku project is an ongoing community effort
to build a source-compatible open-source version of BeOS. They recently
dropped an Alpha 2 release that's reasonably stable and runs most of the
available legacy code.

MS-DOS, BASIC

MS-DOS was
undeniably the
dominant desktop
operating system

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
throughout the '80s, and every one of those computers running MS-DOS
included the Microsoft BASIC programming language in one form or another. In
fact, the version of BASIC created by Paul Allen and Bill Gates predates even
MS-DOS, originating as Altair BASIC in the '70s.

The BASIC language tools included in MS-DOS evolved over the years to
include rudimentary Integrated Development Environment (IDE) features and a
compiler for faster execution of programs. Microsoft BASIC, GW-BASIC,
QuickBASIC and QBasic ultimately evolved into the Visual Basic language we
know today, acquiring millions of enthusiasts along the way.

More recently, Microsoft DevLabs released an updated Windows


interpretation of QBasic called Small Basic, which is intended to be used as a
tool for teaching and experimentation.

Windows 3.0, Alt-Tab Task


Switching

One of the great features of


multitasking, windowed OSes is the
ability to have multiple application
windows open at once. Seems kind
of obvious now, but it was a pretty
radical step forward at the time. Of course, with multiple windows open, how do
you switch apps? Well, you can click the window you want to bring forward, or
maybe click the app icon in the taskbar. Both are fine methods if you don't mind
mousing around a bit.

But if you're trying to be productive and have to do this task repeatedly, a


keyboard shortcut is usually the answer. Enter Alt-Tab task switching.

If Wikipedia is to be believed, Alt-Tab task switching has always been a


feature of Windows and was first introduced to the world in Windows 1.0.
Pressing the Alt and Tab keys brings up a window that displays an icon for each
open window present on the system (even if minimized). The currently active
window is highlighted by default. Holding down the Alt key, you release and

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
press the Tab key to move the highlight to the next window, thereby making it
the active window and bringing it to the front.

iOS, Multi-Touch

It's true that Apple did not invent touch computing. Far from it. In fact,
workable touch computing systems -- albeit crude by current standards -- were
produced by IBM and Control Data in the late 1960s and early 1970s. In the
1980s, Bell Labs and the University of Toronto's Input Research Group (including
Bill Buxton, currently at Microsoft Research) independently built touch screens
that could respond to multiple touches. Microsoft's Surface tabletop computing
platform was introduced in 2001.

For an interesting walk through this history of touch computing, read


through Bill Buxton's "Multi-Touch Systems that I Have Known and Loved" and
other articles on his Web site.

The introduction of what we now know as iOS for the iPhone in 2007,
however, represented the first chance for many of us to have a hands-on
experience with multi-touch. Apple later opened up iOS and the Cocoa Touch
APIs to developers to build their own touch-aware applications, and iOS is now
featured on the iPhone, iPod Touch and iPad. Of course, Google and Microsoft
were not (too far) behind with both Android and Windows Phone 7 featuring
their own multi-touch interfaces.

Windows 7, Start Menu and Taskbar

One thing you can count on is that


each new version of Windows will be better
than the last. Even Vista, for all its flaws,
included a lot of good ideas that were riffed
on and improved upon in Windows 7. The
Start menu and taskbar represent the main
interface through which you interact with
Windows and your applications, and they've

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
been subtly improved over the years to the extent that they've become very
powerful, useful and customizable.

The Start menu and taskbar as we know them in Windows today debuted
in Windows 95. With each new release of Windows, new features have been
added: integrated search, pinned applications, recently used files and one-click
access to often used folders and system configuration tools. Vista added the
ability to type a string into the search box and get a list of files and applications
matching that string. Windows 7 made that feature actually work properly
(mostly through more efficient file indexing) and added per-application recently
used file listings.

Self-Check 3.1-2

Identify the words that best describes the following sentences.

__________________ 1. These are the fastest and the most expensive computers.
These huge computers are used to solve very complex science and engineering
problems.

__________________ 2. A type of computer that are high-end, expensive computers


that are made for more complex procedures and are intended for one user at a
time.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
__________________ 3. Mini computers that enable the user to store data and
execute simple commands and tasks.

__________________ 4. These computers are similar to supercomputers in many


aspects, the main difference between them is the fact that a supercomputer use
all its raw power to focus on very few tasks, while a mainframe purpose is to
perform thousands or millions of operations concurrently.

__________________ 5. A central computer that contains collections of data and


programs. Also called a network server, this system allows all connected users
to share and store electronic data and applications.

Answer Key 3.1-2

1. Supercomputers
2. Workstations
3. Microcontrollers
4. Mainframe
5. Server

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-3

MAIN PARTS OF A COMPUTER

Objectives:

1. Identify the main parts of a computer


2. Describe the uses of the main parts of a computer

Introduction

A computer is a complex machine that is capable of performing huge


computations at an extraordinary speed. Its processing power is often compared

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
to that of a human brain. Although human intellect is the undoubted winner in
this competition, the capabilities of a computer cannot be underestimated. This
complex machine, influenced from the design of a human brain, mainly consists
of a processing unit, an arithmetic/logic unit, computer storage, and input and
output devices along with its peripherals. It is these 'parts' that make the
'whole' system. So, let's take a look at the major parts of a computer.

What are the Main Parts of a Computer?

Central Processing Unit (CPU)

Also known as the computer


processor, the CPU is an electronic
circuit that executes computer
programs. The primary responsibility
of a computer processor is to execute
a sequential set of instructions that
constitute a program. CPU operation
can be divided into four basic steps,
namely, fetch, decode, execute, and
writeback. During the 'fetch' step, the
processor retrieves program instructions from memory. In the decode step, the
instruction is broken down into parts. The instruction set architecture of the CPU
defines the way in which an instruction is decoded. In the 'execute' step, CPU
performs the operation implied by the program instruction. During the
'writeback' step, the CPU writes back the results of execution, to the computer's
memory.

Motherboard

A computer motherboard consists of


sockets in which microprocessors are
installed, memory slots, a chipset that acts
as an interface between the CPU bus and
the peripheral buses (a bus connects all
the internal parts of a computer), non-
volatile memory chips housing the
system's firmware and a clock generator,
which helps in the synchronization of
various system components. Some motherboards also include logic and

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
connectors to support input devices like PS/2 connectors for a mouse and
keyboard.

Hard Disc

A hard disc is described as a


part of the computer disc drive,
which stores data and provides
computer users with quick access to
large amounts of data. A hard disc is
an electromagnetically charged
surface or set of discs that record
data in concentric circles known as
tracks. It is a non-volatile storage
device that stores digitally encoded
data. A head, resembling a phonograph arm, is used to read and write data onto
a hard disk. The hard discs of desktops are generally capable of storing 120 GB
to 2 TB of data. Laptop hard disc drives are smaller and have lower data storage
capacities.

Computer Memory

It refers to those components of a


computer, which retain digital data. It forms
the core of a computer and makes up the basic
computer model in collaboration with the CPU.
Magnetic drums and delay lines used as
primary storage by computers of the early
days, have metamorphosed into a miniature silicon chip, which can achieve
efficient storage of large volumes of data. Random Access Memory, popularly
known as RAM, is a small-sized light and volatile form of computer memory. It is
capable of temporary storage of data. Registers located in a computer processor
are the fastest forms of computer storage. The most frequently used
information is duplicated in the processor cache of a computer, thereby
improving its performance. Computers require a non-volatile primary storage to
read large programs. This non-volatile memory is known as ROM or Read-only
memory. It also contains the startup programs used for bootstrapping a
computer. Secondary storage media such as flash memory, magnetic tape,
punch cards, and zip drives and tertiary storage media like tape libraries are
also a part of computer memory.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Monitor

A visual display unit, as it is called, is an


electrical equipment that displays images
generated by the video output of a computer.
Monitors of the early years used CRT
technology for imaging, while modern
computer monitors use LCD or even plasma
screens. The display provides computer users
with an instant feedback in the form of text and
graphic images. Monitors are the most-used
output devices of a computer.

Keyboard

A keyboard is regarded as an input


device for a computer. With respect to
the arrangement of keys, a computer
keyboard is similar to a typewriter. The
keys or buttons act as electronic
switches or mechanical levers with
characters printed on them, with each keypress corresponding to a written
symbol. A keyboard has its own processor and circuitry, which consists of a key
matrix, which helps bring about the keyboard operation.

Mouse

A computer mouse is a pointing device


that detects two-dimensional motion. Apple's
Macintosh was the first successful mouse-
driven computer. A mouse translates the
motion of your hand into signals that a
computer can recognize and respond to.
There are three basic types of mice, namely,
mechanical, opto-mechanical, and optical.
Mechanical mice have a rubber or metal ball
that can roll in all directions. Mechanical

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
sensors in the mouse detect the direction of motion of the ball. Opto-mechanical
mice differ from mechanical mice, in that they use optical sensors to detect
motion. Optical mice, popularly used today, have a laser to detect movement of
the mouse. They do not have mechanical moving parts and possess higher
performance speeds.

Self-Check 3.1-3

Identify the words that best describes the following sentences.

_______________ 1. It is described as a part of the computer disc drive, which


stores data and provides computer users with quick access to large amounts of
data.

_______________ 2. It refers to those components of a computer, which retain


digital data. It forms the core of a computer and makes up the basic computer
model in collaboration with the CPU.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
_______________ 3. A pointing device that detects two-dimensional motion.

_______________ 4. This is regarded as an input device for a computer. With


respect to the arrangement of keys, it is similar to a typewriter.

_______________ 5. An electrical equipment that displays images generated by


the video output of a computer.

Answer Key 3.1-3

1. Hard disc
2. Computer Memory
3. Mouse
4. Keyboard
5. Monitor

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-4

STORAGE DEVICES AND BASIC CATEGORIES OF MEMORY

Objectives:

1. Identify the types of storage devices


2. Discuss the uses of each type

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Storage Devices

A storage device is used in the computers to store the data. It provides


one of the core functions of the modern computer.

Types of Storage

There are four types of storage:

• Primary Storage
• Secondary Storage
• Tertiary Storage
• Off-line Storage

Primary Storage
• Also known as main memory.
• Main memory is directly or indirectly connected to the central
processing unit via a memory bus.
• The CPU continuously reads instructions stored there and executes them
as required.
Example:
– RAM
– ROM
– Cache

RAM

• It is called Random Access Memory because any of the data in RAM can
be accessed just as fast as any of the other data.

• There are two types of RAM:

– DRAM (Dynamic Random Access Memory)

– SRAM (Static Random Access Memory)

RAM

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Static RAM

• Faster
• More expensive
• More power consumption
• does not need to be refreshed

Dynamic RAM

• Slower
• Less expensive
• Less power consumption
• needs to be refreshed

ROM

• This memory is used as the computer begins to boot up.


• Small programs called firmware are often stored in ROM chips on
hardware devices (like a BIOS chip), and they contain instructions the
computer can use in performing some of the most basic operations
required to operate hardware devices.
• ROM memory cannot be easily or quickly overwritten or modified.

Cache
• Cache is a high-speed access area that can be either a reserved section
of main memory or a storage device.
• Most computers today come with L3 cache or L2 cache, while older
computers included only L1 cache.
Secondary Storage
• It is not directly accessible by the CPU.
• Computer usually uses its input/output channels to access secondary
storage and transfers the desired data using intermediate area in primary
storage.
• Example: – Hard disk

Hard Disk

• The hard disk drive is the main, and usually largest, data storage device
in a computer.
• It can store anywhere from 160 gigabytes to 2 terabytes.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
• Hard disk speed is the speed at which content can be read and written
on a hard disk.
• A hard disk unit comes with a set rotation speed varying from 4500 to
7200 rpm.
• Disk access time is measured in milliseconds.

Tertiary Storage
• Typically it involves a robotic mechanism which will mount (insert) and
dismount removable mass storage media into a storage device.
• It is a comprehensive computer storage system that is usually very slow,
so it is usually used to archive data that is not accessed frequently.
• This is primarily useful for extraordinarily large data stores, accessed
without human operators.

Examples:
– Magnetic Tape
– Optical Disc

Magnetic Tape

• A magnetically coated strip of plastic on which data can be encoded.


• Tapes for computers are similar to tapes used to store music.
• Tape is much less expensive than other storage mediums but commonly
a much slower solution that is commonly used for backup.

Optical Disc

• Optical disc is any storage media that holds content in digital format and
is read using a laser assembly is considered optical media.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
• The most common types of optical media are
– Blu-ray (BD)
– Compact Disc (CD)
– Digital Versatile Disc (DVD)

Off-line Storage

• Also known as disconnected storage.


• Is a computer data storage on a medium or a device that is not under
the control of a processing unit.
• It must be inserted or connected by a human operator before a
computer can access it again.

Examples:
– Floppy Disk
– Zip diskette
– USB Flash drive
– Memory card

Floppy Disk
• A soft magnetic disk.
• Floppy disks are portable.
• Floppy disks are slower to
access than hard disks and
have less storage capacity, but
they are much less expensive.
• Can store data up to 1.44MB.
• Two common sizes: 5 ¼” and 3
½”.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Zip Diskette

• Hardware data storage device developed by Iomega that functions like a


Standard 1.44" floppy drive.
• Capable to hold up to 100 MB of data or 250 MB of data on new drives.
• Now it less popular as users needed larger storage capabilities.

USB Flash Drive

• A small, portable flash memory card that plugs into a computer’s USB
port and functions as a portable hard drive.
• Flash drives are available in sizes such as 256MB, 512MB, 1GB, 5GB,
and 16GB and are an easy way to transfer and store information.

Memory Card

• An electronic flash memory storage disk commonly used in consumer


electronic devices such as digital cameras, MP3 players, mobile phones,
and other small portable devices.
• Memory cards are
usually read by
connecting the
device containing
the card to your
computer, or by
using a USB card
reader.

Self-Check 3.1-4

Choose the letter of the correct answer for each item.

1. Amount of data a Floppy Disk can store


A. 14 MB
B. 1.4 GB
C. 1.4 MB

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
2. Removable and rewritable electronic data storage device that can be
plugged into almost any PC.
A. USB
B. Floppy Disk
C. Memory Cards

3. ROM stands for:


A. Read Optical Memory
B. Read Only Memory
C. Ready Only Memory

4. High-speed access area that can be either a reserved section of main


memory or a storage device.
A. Cache
B. ROM
C. Hard Disk

5. Basic Unit of Measurement storage in computer science.


A. Kilobyte
B. Bite
C. Byte

Answer Key 3.1-4

1. C
2. A
3. B
4. A
5. C

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-5

RELEVANT TYPES OF SOFTWARE

Objectives:

1. Distinguish the types of software


2. Explain the importance of each software

Introduction

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Software is the language of a computer. And like human language, there
are many different computer languages. Essentially, computer software can be
divided into three main groups depending on their use and application. These
are system software or operating system referred simply as the OS, application
software and programming languages. Usually most of us interact with a
computer using application software.

Software is a set of instructions, data or programs used to operate


computers and execute specific tasks. Opposite of hardware, which describes
the physical aspects of a computer, software is a generic term used to refer to
applications, scripts and programs that run on a device. Software can be
thought of as the variable part of a computer and hardware the invariable part.

1. System Software

System software or operating system is the software used by the


computer to translate inputs from various sources into a language which a
machine can understand. Basically, the OS coordinates the different hardware
components of a computer. There are many OS in the market. The most popular
OS are from the stable of Microsoft. We have all heard, used and wondered at
the Windows software, which is an OS. Starting with Windows, Microsoft has
migrated to Vista, its latest offering in the market. It may come as a surprise to
some that there are other operating systems used by others. Among these UNIX
is used for large office setups with extensive networking. XENIX is software
which has now become redundant. HP -UX and AIX are some operating systems
used by HP computers. Apache OS is quite popular with web servers. IBM still
uses proprietary operating systems for its main frames. Proprietary systems are
generally built with the help of a variant of UNIX operating system.

2. Application software

A normal user rarely gets to see the operating system or to work with it. But
all of us are familiar with application software which we must use to interact
with a computer. Popular examples of application software are the Microsoft
office suite which includes Word, Excel and PowerPoint. We have used these
applications extensively. Internet explorer, Mozilla Firefox is two applications
used to access the internet. E-mail software like Outlook express is used to
manage Emails.

3. Programming languages

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Now this is a kind of computer software which is used exclusively by
computer programmers. Unless we are also programmers, we are unlikely to
come across programming languages. A simple way to understand
programming languages is to think of them as bricks which can be used to
create applications and operating system. C++, Java and Simlab are some
popular programming languages. Generally Java is used for internet
applications. C++ is a language of professional developers and used extensively
in developing operating systems. PHP is another language used for internet
applications. There is a new class of languages which are being utilized for the
mobiles. These are light weight, modular languages which are used to design
mobile applications.

Self-Check 3.1-5

Explain the differences of the types of software in a sheet of paper.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.1-6

PERIPHERAL DEVICES

Objectives:

1. Define peripheral devices


2. Explain the importance and uses of each peripheral devices

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Introduction

Say you just bought a new computer and, with excitement, you unpack it
and set it all up. The first thing you want to do is print out some photographs of
the last family party. So it's time to head back to the store to buy a printer. A
printer is known as a peripheral device.

A computer peripheral is a device that is connected to a computer but


is not part of the core computer architecture. The core elements of a computer
are the central processing unit, power supply, motherboard and the computer
case that contains those three components. Technically speaking, everything
else is considered a peripheral device. However, this is a somewhat narrow
view, since various other elements are required for a computer to actually
function, such as a hard drive and random-access memory (or RAM).

Most people use the term peripheral more loosely to refer to a device
external to the computer case. You connect the device to the computer to
expand the functionality of the system. For example, consider a printer. Once
the printer is connected to a computer, you can print out documents. Another
way to look at peripheral devices is that they are dependent on the computer
system. For example, most printers can't do much on their own, and they only
become functional when connected to a computer system.

Types of Peripheral Devices

There are many different peripheral devices, but they fall into three
general categories:

Input devices, such as


a mouse and a keyboard

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Output devices, such as a
monitor and a printer

Storage devices, such as a


hard drive or flash drive

Self-Check 3.1-6

On the diagram below, write the similarities of the three peripheral


devices on the center, their differences on the three small portions, and
examples on the big portions.

Input Output

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Storage

Information Sheet 3.1-7

OH & S PRINCIPLES AND RESPONSIBILITIES

Objectives:

1. Identify OHS principles and responsibilities


2. Cite the significance of these principles and responsibilities

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Introduction

What is an occupational health and safety (OH&S) program?

A health and safety program is a definite plan of action designed to


prevent accidents and occupational diseases. Some form of a program is
required under occupational health and safety legislation in most Canadian
jurisdictions. A health and safety program must include the elements required
by the health and safety legislation as a minimum.

Because organizations differ, a program developed for one organization


cannot necessarily be expected to meet the needs of another. This document
summarizes the general elements of a health and safety program. This
approach should help smaller organizations to develop programs to deal with
their specific needs.

The principles of health and safety protection

The 2004 Act was varied to include the following health and safety principles:

 all people are given the highest level of health and safety protection that
is reasonably practicable;
 those who manage or control activities that give rise, or may give rise, to
risks to health or safety are responsible for eliminating or reducing health
and safety risks, so far as is reasonably practicable;
 employers and self-employed people should be proactive and take
reasonably practicable measures to ensure health and safety in their
business activities;
 employers and employees should exchange information about risks to
health or safety and measures that can be taken to eliminate or reduce
those risks; and
 employees are entitled, and should be encouraged, to be represented on
health and safety issues.

What are individual OH&S responsibilities?


Health and safety is the joint responsibility of management and workers.
Management is accountable for non-compliance to health and safety legislation.
Responsibility may be defined as an individual's obligation to carry out
assigned duties. Authority implies the right to make decisions and the power to
direct others. Responsibility and authority can be delegated to subordinates,

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
giving them the right to act for superiors. It is important to note that, while
some responsibilities can be delegated, the superior remains accountable for
seeing that they are carried out.
Individual responsibilities apply to every employee in the workplace,
including the Chief Executive Officer. All employees will then know exactly what
is expected of each individual in health and safety terms.
To fulfill their individual responsibilities, the people must:

 Know what these responsibilities are (communication required).


 Have sufficient authority to carry them out (organizational issue).
 Have the required ability and competence (training or certification
required).

Once all these criteria have been met, safety performance can be assessed
by each individual's supervisor on an equal basis with other key job elements.
Health and safety is not just an extra part of an employee's job: it is an integral,
full-time component of each individual's responsibilities.

What are examples of responsibilities of workers?


Examples of responsibilities of workers include:

 Using personal protection and safety equipment as required by the


employer.
 Following safe work procedures.
 Knowing and complying with all regulations.
 Reporting any injury or illness immediately.
 Reporting unsafe acts and unsafe conditions.
 Participating in joint health and safety committees or as the
representative.

What are examples of responsibilities of first-line supervisors?


Examples of responsibilities of first-line supervisors include:

 Instructing workers to follow safe work practices.


 Enforcing health and safety regulations.
 Correcting unsafe acts and unsafe conditions.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Ensuring that only authorized, adequately trained workers operate
equipment.
 Reporting and investigating all accidents/incidents.
 Inspecting own area and taking remedial action to minimize or eliminate
hazards.
 Ensuring equipment is properly maintained.
 Promoting safety awareness in workers.

What are examples of responsibilities of management?


Examples of responsibilities of management include:

 Providing a safe and healthful workplace.


 Establishing and maintaining a health and safety program.
 Ensuring workers are trained or certified, as required.
 Reporting accidents/incidents and cases of occupational disease to the
appropriate authority.
 Providing medical and first aid facilities.
 Ensuring personal protective equipment is available.
 Providing workers with health and safety information.
 Supporting supervisors in their health and safety activities.
 Evaluating health and safety performance of supervisors.

What are examples of responsibilities of safety coordinators?


Examples of responsibilities of safety coordinators include:

 Advising all employees on health and safety matters.


 Coordinating interdepartmental health and safety activities.
 Collecting and analyzing health and safety statistics.
 Providing health and safety training.
 Conducting research on special problems.
 Attending joint health and safety committee meetings as a resource
person.

Self-Check 3.1-7

Provide what is asked from each item.

Responsibilities of workers:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
1.
2.
3.
4.
5.

Responsibilities of first-line supervisors:


1.
2.
3.
4.
5.

Responsibilities of management:
1.
2.
3.
4.
5.

Responsibilities of safety coordinators:


1.
2.
3.
4.
5.

Answer Key 3.1-7


Examples of responsibilities of workers include:

 Using personal protection and safety equipment as required by the


employer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Following safe work procedures.
 Knowing and complying with all regulations.
 Reporting any injury or illness immediately.
 Reporting unsafe acts and unsafe conditions.
 Participating in joint health and safety committees or as the
representative.

Examples of responsibilities of first-line supervisors include:

 Instructing workers to follow safe work practices.


 Enforcing health and safety regulations.
 Correcting unsafe acts and unsafe conditions.
 Ensuring that only authorized, adequately trained workers operate
equipment.
 Reporting and investigating all accidents/incidents.
 Inspecting own area and taking remedial action to minimize or eliminate
hazards.
 Ensuring equipment is properly maintained.
 Promoting safety awareness in workers.

Examples of responsibilities of management include:

 Providing a safe and healthful workplace.


 Establishing and maintaining a health and safety program.
 Ensuring workers are trained or certified, as required.
 Reporting accidents/incidents and cases of occupational disease to the
appropriate authority.
 Providing medical and first aid facilities.
 Ensuring personal protective equipment is available.
 Providing workers with health and safety information.
 Supporting supervisors in their health and safety activities.
 Evaluating health and safety performance of supervisors.

Examples of responsibilities of safety coordinators include:

 Advising all employees on health and safety matters.


 Coordinating interdepartmental health and safety activities.
 Collecting and analyzing health and safety statistics.
 Providing health and safety training.
 Conducting research on special problems.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Attending joint health and safety committee meetings as a resource
person.

Information Sheet 3.1-8

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
READING SKILLS REQUIRED TO INTERPRET WORK INSTRUCTION

Objectives:

1. Identify some reading skills


2. Discuss the importance of reading skills

Introduction

Essential Skills for Reading

Some people think of the act of reading as a straightforward task that’s


easy to master. In reality, it’s a complex process that draws on many different
skills. Together, these skills lead to the ultimate goal of reading: reading
comprehension, or understanding what’s been read.
Reading comprehension can be challenging for kids for lots of reasons.
Whatever the cause, knowing the skills involved, and which ones your child
struggles with, can help you get the right support.

Here are six essential skills needed for reading comprehension, and tips on
what can help kids improve this skill.

1. Decoding
Decoding is a vital step in the reading process. Kids use this skill to sound
out words they’ve heard before but haven’t seen written out. The ability to do
that is the foundation for other reading skills.
Decoding relies on an early language skill called phonemic awareness. (This
skill is part of an even broader skill called phonological awareness.) Phonemic
awareness lets kids hear individual sounds in words (known as phonemes). It
also allows them to “play” with sounds at the word and syllable level.
Decoding also relies on connecting individual sounds to letters. For
instance, to read the word sun, kids must know that the letter s makes the /s/
sound. Grasping the connection between a letter (or group of letters) and the
sounds they typically make is an important step toward “sounding out” words.

2. Fluency
To read fluently, you need to instantly recognize words, including ones they
can’t sound out. Fluency speeds up the rate at which they can read and
understand text. It’s also important when kids encounter irregular words, like of
and the, which can’t be sounded out.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Sounding out or decoding every word can take a lot of effort. Word
recognition is the ability to recognize whole words instantly by sight, without
sounding them out.

3. Vocabulary
To understand what you’re reading, you need to understand most of the
words in the text. Having a strong vocabulary is a key component of reading
comprehension. Students can learn vocabulary through instruction. But they
typically learn the meaning of words through everyday experience and also by
reading.

4. Sentence Construction and Cohesion


Understanding how sentences are built might seem like a writing skill. So
might connecting ideas within and between sentences, which is called cohesion.
But these skills are important for reading comprehension as well.
Knowing how ideas link up at the sentence level helps kids get meaning
from passages and entire texts. It also leads to something called coherence, or
the ability to connect ideas to other ideas in an overall piece of writing.

5. Reasoning and Background Knowledge


Most readers relate what they’ve read to what they know. So it’s important
to have background or prior knowledge about the world when reading. They also
need to be able to “read between the lines” and pull out meaning even when
it’s not literally spelled out.

6. Working Memory and Attention


These two skills are both part of a group of abilities known as executive
function. They’re different but closely related.
When you read, attention allows them to take in information from the text.
Working memory allows them to hold on to that information and use it to gain
meaning and build knowledge from what they’re reading.

Self-Check 3.1-8

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Identify whether the following statements are true or false.

1. Decoding speeds up the rate at which they can read and understand
text.
2. Having a strong vocabulary is a key component of reading
comprehension.
3. Fluency relies on an early language skill called phonemic
awareness.
4. Most readers relate what they’ve read to what they know. So it’s not
important to have background or prior knowledge about the world
when reading.
5. Understanding how sentences are built might seem like a writing
skill. So might connecting ideas within and between sentences,
which is called cohesion.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.1-8

1. False – Fluency
2. True
3. False – Decoding
4. False – Important
5. True

Information Sheet 3.1-9

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
COMMUNICATION SKILLS

Objectives:

1. Define communication skills


2. Identify different communication skills

Introduction

Being able to communicate effectively is perhaps the most important of all


life skills. It is what enables us to pass information to other people, and to
understand what is said to us. You only have to watch a baby listening intently
to its mother and trying to repeat the sounds that she makes to understand how
fundamental the urge to communicate is.

The Importance of Communication Skills in the Workplace

Communication skills are essential no matter what job you work in or your
level of seniority. When there is a breakdown in communications, often
efficiency, morale and objectives can all suffer.
In today’s competitive jobs market, communication skills in the business
world are highly sought after, with recruiters looking for candidates who can
communicate information, negotiate and confidently deal with customers.
Listening carefully, speaking clearly and putting others at ease are very
valuable attributes to possess.

The Top 10 Communication Skills

1. Emotional Intelligence

Emotional intelligence is the ability to understand and manage your emotions so


as to communicate effectively, avoid stress, overcome challenges and
empathize with others. It’s a skill which is learned over time rather than
obtained.

There are four main strands to emotional intelligence:


 self-awareness
 self-management
 social awareness

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 relationship management.

2. Cohesion and Clarity

Good communication is much more than saying the right thing; it is about
communicating messages clearly and concisely.
Before you start a conversation, type an email or begin a discussion, have
in mind what the purpose of the communication is and what information you
hope to obtain as a result. Lack of clarity and cohesion can result in poor
decisions and confusion.

3. Friendliness

In any type of communication, make sure that you set the right tone. A
friendly tone will encourage others to communicate with you.
Always try to personalize messages, particularly when working with
partners or fellow colleagues. Wishing the recipient a good weekend, for
example, is a great way to personalize your message.

4. Confidence

In all interactions, confidence (but not over-confidence) is crucial.


Demonstrating confidence will give customers faith in your abilities to deliver
what they need, and that you will follow through with what you have promised.
Conveying confidence can be something as simple as maintaining eye
contact during a conversation, or using a firm but friendly tone when speaking
with people over the phone. Be careful not to come across as aggressive, since
this will have the opposite effect of what you are hoping to achieve.

5. Empathy

Within a busy work environment, everyone will have their own ideas about
how things should be done. Even if you have disagreements with your
colleagues or partners, their point of view should be considered and respected.
Empathy is also beneficial when speaking with customers in certain types of
customer-facing role.
The goal here is to understand where the other person is coming from – and
respect their views even if they are very different from your own.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
6. Respect

Empathy leads into the next communication skill, respect. If you respect the
ideas and opinions of others, they will be more likely to communicate with you.
Active listening or simply using the name of the person you are speaking to can
both be effective.
Make sure that when you type emails, you don’t sound insincere or write in
a way that is insincere.

7. Listening

Good communication is all about listening effectively. Take the time to


listen to what the other person is saying and practice active listening. Pay
attention to what the other person is saying, ask questions and clarify points,
and rephrase what they have said so that you know you have understood
correctly.

8. Open Mindedness

Strong communications require an open mind and a commitment to


understanding other people’s points of view. If you disagree with the people you
are speaking to, try to reach a middle ground that benefits all parties.
Approaching a discussion with an open mind is more likely to result in a
successful outcome.

9. Tone of Voice

The tone of your voice can set the whole mood of the conversation. If you
start the discussion in an aggressive or unhelpful manner, the recipient will be
more inclined to respond in a similar way.
The tone of your voice will include the level of emotion that you use, the
volume you use and the level of communication you choose.
The same sentence can have a very different meaning depending on which
words are emphasized and the tone of your voice.
In a customer complaint scenario, for example, your tone of voice should be
as calm as possible, since an unfriendly tone of voice will only serve to worsen
the situation.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
10. Asking Good Questions

Good questions can help conversations flow and improve the outcome.
During a conversation, always aim to ask open-ended questions. These are
questions with prompts which encourage the recipient to speak about certain
points and they require more detailed responses.
If you need further information still, you can use probing questions which
request even more information from the recipient such as ‘Tell me the process
of…”
During the conversation include a mixture of questions including
clarification, ‘what if’ scenarios and open-ended questions to make sure that
you achieve what you set out to do at the beginning of the call or conversation.

It is likely that you will need to show evidence of your own communication
skills during a competency based interview. Questions you may be asked
include:

 Give an example of how you dealt with a difficult or sensitive situation that
required extensive communication.
 Give me an example of how you dealt with a difficult customer at work.
 Tell me about a time when you had to explain an issue or process to a
colleague (or colleagues) at work.
 Tell me about a time when you taught someone else something.
 How do you explain things to other people?

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.1-9

Identify the letter of the correct answer for each item.

1) Which of these is a communication skill?


A) talking clearly
B) chewing gum
C) looking bored

2) Which of these is a communication skill?


A) talking at the same time as someone else
B) listening to what people say
C) putting your fingers in your ears

3) Which of these is not a communication skill?


A) running
B) texting
C) chatting to people

4) What body language shows you are listening?


A) turning away from the speaker
B) nodding and making eye contact
C) looking out of the window

5) Which of these is not a communication skill?


A) laughing
B) swimming
C) asking questions

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.1-9

1. A
2. B
3. A
4. B
5. B

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
LEARNING OUTCOME 2

PREPARE AND USE APPROPRIATE HARDWARE AND SOFTWARE


ACCORDING TO TASK REQUIREMENT

CONTENTS:

 Basic ergonomics of keyboard and computer use


 Standard operating procedures in entering and saving data into the
computer
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software
 General security
 Viruses
 OH & S principles and responsibilities
 Reading skills required to interpret work instruction
 Communication skills

ASSESSMENT CRITERIA:

1. Requirements of task are determined.


2. Prepared and used hardware components correctly and according to task
requirement.
3. Task is planned to ensure OH & S guidelines and procedures are followed.

CONDITIONS:

The students/ trainees must be provided with the following:

EQUIPMENT LEARNING MATERIALS


 LCD Projector (optional) Books relating to:
 Overhead Projector  Computer books and CDs
(optional)
 Computer
 Printer

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
METHODOLOGIES:

 Lecture
 Group discussion
 Tutorial or self-pace

ASSESSMENT METHODS

 Observation
 Questioning
 Practical demonstration

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-1

BASIC ERGONOMICS OF KEYBOARD AND COMPUTER USE

Learning Objective:

After reading the information sheet, you should be able to:

1. Identify some basic ergonomics of keyboard and computer use


2. Explain why each ergonomics should be discussed

Introduction

There are a number of factors involved in ensuring your work environment


is ergonomic. These involve the position of the chair you sit in, the monitor,
the keyboard surface, and other general techniques to create an ideal
environment, which enhances comfort and productivity.

SEATING CONSIDERATIONS

• Adjust the height of the chair to achieve proper posture – your legs from the
body should be close to parallel to the floor.
• Adjust the backrest of the chair to provide support for your lower back.
• Your chair should have space behind your knees while seated properly with
your back against the backrest.
• Proper posture means having 90-degree or higher angles at the hips and
knees with feet supported by an angled footrest. MONITOR CONSIDERATIONS
• Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
• The top of the viewing surface of the monitor should be at or below eye level.
• Your monitor should be located 12” to 24” from your eyes.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
• Use accessories such as anti-glare filters and adjusting screen angle to
prevent screen glare – if you can, use softer color schemes on your monitor.
Orient your workstation so that you are parallel to sources of light.

KEYBOARD SURFACE CONSIDERATIONS

• Ensure that your forearms are parallel to the floor or slightly downward when
you are typing.
• If you are using a mouse, make sure it is as close to the keyboard as possible
– if you have limited surface, consider using a touch pad.
• When typing, maintain a neutral wrist position where the forearms, wrists and
hands are in a straight line.

GENERAL CONSIDERATIONS

• Keep shoulders relaxed and head and neck in an upright but relaxed position.
• Get regular eye exams and wear corrective lenses – use a task light to
illuminate documents if background lighting is poor.
• Use a document holder to place source documents as close to the screen as
possible and at the same height and distance (use a document holder attached
to the screen or an articulating one attached to the desk).
• Avoid long periods of repetitive activity; where possible, alternate computer
work with other tasks like filing, phone calls, etc.
• Drink water throughout the day and keep yourself well hydrated.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-1

Read the following sentences. Write T if it is true and F if it is false.

1. The top of the viewing surface of the monitor should be at or below eye
level.
2. Proper posture means having 180-degree or higher angles at the hips and
knees with feet supported by an angled footrest.
3. Your monitor should be located 12” to 24” from your eyes.
4. Ensure that your forearms are parallel to the table or slightly downward
when you are typing.
5. Drink water throughout the day and keep yourself well hydrated.
6. Keep shoulders relaxed and head and neck in a downward but relaxed
position.
7. When typing, maintain a neutral wrist position where the forearms, wrists
and hands are in a straight line.
8. Adjust the height of the chair to achieve proper posture – your legs from
the body should be close to perpendicular to the floor.
9. Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.

10. Adjust the backrest of the chair to provide support for your upper
back.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-1

1. T
2. F
3. T
4. F
5. T
6. F
7. T
8. F
9. T

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information sheet 3.2-2

PROCEDURES IN ENTERING AND SAVING DATA INTO THE COMPUTER

Learning Objective:

After reading the information sheet, you should be able to:

1. Identify some basic procedures in entering and saving data in the


computer
2. Show how to enter and save data into the computer

Introduction

Your commands, ideas, demands and concepts form the data your system
processes and stores. Without user input, a computer simply takes up desktop
space and waits for directions, like a lost motorist with a broken-down car.
Without input methods and devices, your correspondence, reports, images and
numbers remain in your head rather than becoming work in progress.
Data entry is the process of inputting data or information into the
computer using devices such as a keyboard, scanner, disk, and voice

Keyboards
Wired and wireless data keyboards break down linguistic input and
software commands into individual units of meaning. You can type a single
letter, combine alphanumeric keys with command keys to produce accented or
specialized characters, and enter simple or complex instructions to control
software processes. From the traditional QWERTY keyboard, adapted from the
typewriter, to layouts such as the Dvorak keyboard, which promotes faster
typing, and adapted variations with additional keys, these devices translate
finger-based keypresses into data input.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Pointing Devices
Pointing devices translate taps, gestures and drawing input, either
through wired or wireless interfaces. From clicking on a menu with a mouse or
trackball, to tapping on a touchpad or touchscreen, or drawing on a graphics
tablet, these devices instigate commands and help retouch photographs, create
illustrations and simulate the behavior of other devices, including paintbrushes
and airbrushes.

Data Drives
Flash, optical and hard drives store the output of computer processes, but
they also provide the input for other functions. From files that contain data to be
manipulated to temporary data storage that provides input from a clipboard or
program, these devices simplify and speed the act of making information
available to software processes. Some of these devices contain moving platters,
whereas others rely on solid-state NAND flash chips or inserted
writeable/rewriteable optical discs. They may be installed as internal computer
components or plugged in to a USB, FireWire or Thunderbolt port.

Audio/Video Devices
Computers accept a wide range of audio-data inputs. You can dictate
audio input into a headset for use in a text-to-speech program that converts
your words into word processing, sing or play a musical instrument into a
microphone for recording in an audio file, plug an electronic instrument into
your computer for direct input of synthesized sounds or transfer audio from a
recording device. To bring visual information into a new or existing document,
you can digitize objects or printed information on a two- or three-dimensional
scanner, transfer files from a digital camera or combined audio/video input from
a camcorder, or record an individual or a surveilled scene captured on a
webcam or security camera.

MIDI Devices
Keyboards, synthesizers and other musical technologies provide computer
input in the form of MIDI data. The Musical Instrument Digital Interface
specification includes three types of data pathways, received and transmitted
through MIDI IN, MIDI OUT and MIDI THRU ports. Instruments plug in to a MIDI IN
jack on a computer interface, which plugs in to a USB or other standard data
port. Instruments connect into series of daisy-chained devices by means of their
MIDI THRU jacks, which enables the output of one piece of hardware to control
or influence the behavior of another.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Specialized Hardware
From testing and diagnostic equipment, laboratory measurement devices
and manufacturing hardware to assistive technology that makes computers
accessible to persons with disabilities, specialized input hardware solves equally
specialized problems or overcomes specific challenges. Along with devices
designed for medical, scientific, engineering and manufacturing use, these
special-purpose input devices include gestural hardware that translates three-
dimensional movement of the hands or body into character movement for
animation or provides a substitute for conventional pointing devices.

Follow these step-by-step instructions to save a document

Step 1: Start a new document in Word and type your text.


Step 2: Click File in the top left-hand corner of the screen.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Step 3: From the menu, choose Save.

Step 4: A ‘Save’ dialogue box


will come up. At the top and
at the left-hand side in the list
of folder options, it will show
the folder where you’ll be
saving the document. If you
wish to change this folder,
navigate through the folders
on the left-hand side of the
dialogue box to choose the
one where you want to save
your document.

Step 5: Word will automatically give your document a name, based on


the first few words of your text. If you don’t like the one given, once you have
chosen the destination folder, type a name for your document in the ‘File name’
box. Come up with a name
that is concise but will
allow you to find the
document easily again.
Don’t worry about
changing what’s in the box
underneath, labelled ‘Save
as type’. This seldom

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
needs to be changed. It allows you to choose the type of format that all
documents created with these settings will have.

Step 6: Once you


have typed in the
name of your
document,
click Save.

Step 7: Your document will now have a name, which will be shown at the very
top of your document screen. If you make changes to your document and then
save them after it has been saved originally, the dialogue box will not come up
again. It will just save your changes without any visual notification being shown.

Step 8: The ‘Save As’ menu – the link to which is on the left-hand side of the
‘File’ dialogue box, beneath ‘Save’ – is used to save an existing document under
another name. This is helpful if you’ve made changes to your document and
then want to save the changes, but also keep the original document in its
original format and under its original name.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-2

Write the steps in saving a document

1.
2.
3.
4.
5.
6.
7.
8.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-2

Steps in saving a document

Step 1: Start a new document in Word and type your text.


Step 2: Click File in the top left-hand corner of the screen.
Step 3: From the menu, choose Save.
Step 4: A ‘Save’ dialogue box will come up. At the top and at the left-hand side
in the list of folder options, it will show the folder where you’ll be saving the
document. If you wish to change this folder, navigate through the folders on the
left-hand side of the dialogue box to choose the one where you want to save
your document.
Step 5: Word will automatically give your document a name, based on the first
few words of your text. If you don’t like the one given, once you have chosen
the destination folder, type a name for your document in the ‘File name’ box.
Come up with a name that is concise but will allow you to find the document
easily again.
Step 6: Once you have typed in the name of your document, click Save.
Step 7: Your document will now have a name, which will be shown at the very
top of your document screen. If you make changes to your document and then
save them after it has been saved originally, the dialogue box will not come up
again. It will just save your changes without any visual notification being shown.
Step 8: The ‘Save As’ menu – the link to which is on the left-hand side of the
‘File’ dialogue box, beneath ‘Save’ – is used to save an existing document under
another name. This is helpful if you’ve made changes to your document and
then want to save the changes, but also keep the original document in its
original format and under its original name.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-3

MAIN PARTS OF COMPUTERS

Learning Objectives:

After reading this information sheet, the student/ trainee should be able
to;

1. Identify the main parts of a computer


2. Differentiate the parts of a computer

Introduction

A computer is a complex machine that is capable of performing huge


computations at an extraordinary speed. Its processing power is often compared
to that of a human brain. Although human intellect is the undoubted winner in
this competition, the capabilities of a computer cannot be underestimated. This
complex machine, influenced from the design of a human brain, mainly consists
of a processing unit, an arithmetic/logic unit, computer storage, and input and
output devices along with its peripherals. It is these 'parts' that make the
'whole' system.

What are the Main Parts of a Computer?

Central Processing Unit (CPU)

Also known as the computer


processor, the CPU is an electronic
circuit that executes computer
programs. The primary responsibility

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
of a computer processor is to execute a sequential set of instructions that
constitute a program. CPU operation can be divided into four basic steps,
namely, fetch, decode, execute, and writeback. During the 'fetch' step, the
processor retrieves program instructions from memory. In the decode step, the
instruction is broken down into parts. The instruction set architecture of the CPU
defines the way in which an instruction is decoded.

Motherboard

A computer motherboard consists of


sockets in which microprocessors are
installed, memory slots, a chipset that acts
as an interface between the CPU bus and
the peripheral buses (a bus connects all
the internal parts of a computer), non-
volatile memory chips housing the
system's firmware and a clock generator,
which helps in the synchronization of
various system components. Some motherboards also include logic and
connectors to support input devices like PS/2 connectors for a mouse and
keyboard.

Hard Disc

A hard disc is described as a


part of the computer disc drive,
which stores data and provides
computer users with quick access to
large amounts of data. A hard disc is
an electromagnetically charged
surface or set of discs that record
data in concentric circles known as
tracks. It is a non-volatile storage
device that stores digitally encoded
data. A head, resembling a phonograph arm, is used to read and write data onto
a hard disk. The hard discs of desktops are generally capable of storing 120 GB
to 2 TB of data. Laptop hard disc drives are smaller and have lower data storage
capacities.

Computer Memory

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
It refers to those components of a computer, which retain digital data. It
forms the core of a computer and makes up the basic computer model in
collaboration with the CPU. Magnetic drums and delay lines used as primary
storage by computers of the early days, have metamorphosed into a miniature
silicon chip, which can achieve efficient storage of large volumes of data.
Random Access Memory, popularly known as RAM, is a small-sized light and
volatile form of computer memory. It is capable of temporary storage of data.
Registers located in a computer processor are the fastest forms of computer
storage. The most frequently used information is duplicated in the processor
cache of a computer, thereby improving its performance. Computers require a
non-volatile primary storage to read large programs. This non-volatile memory
is known as ROM or Read-only memory. It also contains the startup programs
used for bootstrapping a computer. Secondary storage media such as flash
memory, magnetic tape, punch cards, and zip drives and tertiary storage media
like tape libraries are also a part of computer memory.

Monitor

A visual display unit, as it is called, is an


electrical equipment that displays images
generated by the video output of a computer.
Monitors of the early years used CRT
technology for imaging, while modern
computer monitors use LCD or even plasma
screens. The display provides computer users
with an instant feedback in the form of text and
graphic images. Monitors are the most-used
output devices of a computer.

Keyboard

A keyboard is regarded as an input


device for a computer. With respect to
the arrangement of keys, a computer
keyboard is similar to a typewriter. The
keys or buttons act as electronic
switches or mechanical levers with

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
characters printed on them, with each keypress corresponding to a written
symbol. A keyboard has its own processor and circuitry, which consists of a key
matrix, which helps bring about the keyboard operation.

Mouse

A computer mouse is a pointing device


that detects two-dimensional motion. Apple's
Macintosh was the first successful mouse-
driven computer. A mouse translates the
motion of your hand into signals that a
computer can recognize and respond to.
There are three basic types of mice, namely,
mechanical, opto-mechanical, and optical.
Mechanical mice have a rubber or metal ball
that can roll in all directions. Mechanical
sensors in the mouse detect the direction of
motion of the ball. Opto-mechanical mice differ from mechanical mice, in that
they use optical sensors to detect motion. Optical mice, popularly used today,
have a laser to detect movement of the mouse. They do not have mechanical
moving parts and possess higher performance speeds.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-3

Identify the words that best describes the following sentences.

_______________ 1. It is described as a part of the computer disc drive, which


stores data and provides computer users with quick access to large amounts of
data.

_______________ 2. It refers to those components of a computer, which retain


digital data. It forms the core of a computer and makes up the basic computer
model in collaboration with the CPU.

_______________ 3. A pointing device that detects two-dimensional motion.

_______________ 4. This is regarded as an input device for a computer. With


respect to the arrangement of keys, it is similar to a typewriter.

_______________ 5. An electrical equipment that displays images generated by


the video output of a computer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-3

1. Hard disc
2. Computer Memory
3. Mouse
4. Keyboard
5. Monitor

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-4

STORAGE DEVICES AND BASIC CATEGORIES OF MEMORY

Objectives:

1. Identify the types of storage devices


2. Discuss the uses of each type

Storage Devices

A storage device is used in the computers to store the data. It provides


one of the core functions of the modern computer.

Types of Storage

There are four types of storage:

• Primary Storage
• Secondary Storage
• Tertiary Storage
• Off-line Storage

Primary Storage
• Also known as main memory.
• Main memory is directly or indirectly connected to the central
processing unit via a memory bus.
• The CPU continuously reads instructions stored there and executes them
as required.

Example:
– RAM
– ROM
– Cache

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
RAM

• It is called Random Access Memory because any of the data in RAM can
be accessed just as fast as any of the other data.

• There are two types of RAM:

– DRAM (Dynamic Random Access Memory)

– SRAM (Static Random Access Memory)

RAM

Static RAM

• Faster
• More expensive
• More power consumption
• does not need to be refreshed

Dynamic RAM

• Slower
• Less expensive
• Less power consumption
• needs to be refreshed

ROM

• This memory is used as the computer begins to boot up.


• Small programs called firmware are often stored in ROM chips on
hardware devices (like a BIOS chip), and they contain instructions the
computer can use in performing some of the most basic operations
required to operate hardware devices.
• ROM memory cannot be easily or quickly overwritten or modified.

Cache

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
• Cache is a high-speed access area that can be either a reserved section
of main memory or a storage device.
• Most computers today come with L3 cache or L2 cache, while older
computers included only L1 cache.
Secondary Storage
• It is not directly accessible by the CPU.
• Computer usually uses its input/output channels to access secondary
storage and transfers the desired data using intermediate area in primary
storage.
• Example: – Hard disk

Hard Disk

• The hard disk drive is the main, and usually largest, data storage device
in a computer.
• It can store anywhere from 160 gigabytes to 2 terabytes.
• Hard disk speed is the speed at which content can be read and written
on a hard disk.
• A hard disk unit comes with a set rotation speed varying from 4500 to
7200 rpm.
• Disk access time is measured in milliseconds.

Tertiary Storage
• Typically it involves a robotic mechanism which will mount (insert) and
dismount removable mass storage media into a storage device.
• It is a comprehensive computer storage system that is usually very slow,
so it is usually used to archive data that is not accessed frequently.
• This is primarily useful for extraordinarily large data stores, accessed
without human operators.

Examples:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
– Magnetic Tape
– Optical Disc

Magnetic Tape

• A magnetically coated strip of plastic on which data can be encoded.


• Tapes for computers are similar to tapes used to store music.
• Tape is much less expensive than other storage mediums but commonly
a much slower solution that is commonly used for backup.

Optical Disc

• Optical disc is any storage media that holds content in digital format and
is read using a laser assembly is considered optical media.
• The most common types of optical media are
– Blu-ray (BD)
– Compact Disc (CD)
– Digital Versatile Disc (DVD)

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Off-line Storage

• Also known as disconnected storage.


• Is a computer data storage on a medium or a device that is not under
the control of a processing unit.
• It must be inserted or connected by a human operator before a
computer can access it again.
Examples:
– Floppy Disk
– Zip diskette
– USB Flash drive
– Memory card

Floppy Disk
• A soft magnetic disk.
• Floppy disks are portable.
• Floppy disks are slower to
access than hard disks and
have less storage capacity, but
they are much less expensive.
• Can store data up to 1.44MB.
• Two common sizes: 5 ¼” and 3
½”.

Zip Diskette

• Hardware data storage device developed by Iomega that functions like a


Standard 1.44" floppy drive.
• Capable to hold up to 100 MB of data or 250 MB of data on new drives.
• Now it less popular as users needed larger storage capabilities.

USB Flash Drive

• A small, portable flash memory card that plugs into a computer’s USB
port and functions as a portable hard drive.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
• Flash drives are available in sizes such as 256MB, 512MB, 1GB, 5GB,
and 16GB and are an easy way to transfer and store information.

Memory Card

• An electronic flash memory storage disk commonly used in consumer


electronic devices such as digital cameras, MP3 players, mobile phones,
and other small portable devices.
• Memory cards are usually read by connecting the device containing the
card to your computer, or by using a USB card reader.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-4

Choose the letter of the correct answer for each item.

1. Amount of data a Floppy Disk can store


A. 14 MB
B. 1.4 GB
C. 1.4 MB

2. Removable and rewritable electronic data storage device that can be


plugged into almost any PC.
A. USB
B. Floppy Disk
C. Memory Cards

3. ROM stands for:


A. Read Optical Memory
B. Read Only Memory
C. Ready Only Memory

4. High-speed access area that can be either a reserved section of main


memory or a storage device.
A. Cache
B. ROM
C. Hard Disk

5. Basic Unit of Measurement storage in computer science.


A. Kilobyte
B. Bite
C. Byte

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-4

1. C
2. A
3. B
4. A
5. C

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-5

RELEVANT TYPES OF SOFTWARE

Objectives:

1. Distinguish the types of software


2. Explain the importance of each software

Introduction

Software is the language of a computer. And like human language, there


are many different computer languages. Essentially, computer software can be
divided into three main groups depending on their use and application. These
are system software or operating system referred simply as the OS, application
software and programming languages. Usually most of us interact with a
computer using application software.

Software is a set of instructions, data or programs used to operate


computers and execute specific tasks. Opposite of hardware, which describes
the physical aspects of a computer, software is a generic term used to refer to
applications, scripts and programs that run on a device. Software can be
thought of as the variable part of a computer and hardware the invariable part.

1. System Software

System software or operating system is the software used by the


computer to translate inputs from various sources into a language which a
machine can understand. Basically, the OS coordinates the different hardware
components of a computer. There are many OS in the market. The most popular
OS are from the stable of Microsoft. We have all heard, used and wondered at
the Windows software, which is an OS. Starting with Windows, Microsoft has

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
migrated to Vista, its latest offering in the market. It may come as a surprise to
some that there are other operating systems used by others. Among these UNIX
is used for large office setups with extensive networking. XENIX is software
which has now become redundant. HP -UX and AIX are some operating systems
used by HP computers. Apache OS is quite popular with web servers. IBM still
uses proprietary operating systems for its main frames. Proprietary systems are
generally built with the help of a variant of UNIX operating system.

2. Application software

A normal user rarely gets to see the operating system or to work with it. But
all of us are familiar with application software which we must use to interact
with a computer. Popular examples of application software are the Microsoft
office suite which includes Word, Excel and PowerPoint. We have used these
applications extensively. Internet explorer, Mozilla Firefox is two applications
used to access the internet. E-mail software like Outlook express is used to
manage Emails. It is obvious that all software utilized for working on a computer
is classified as application software. In fact all user interfaces are an application.
The anti-virus is an application and so is the Media player.

3. Programming languages

Now this is a kind of computer software which is used exclusively by


computer programmers. Unless we are also programmers, we are unlikely to
come across programming languages. A simple way to understand
programming languages is to think of them as bricks which can be used to
create applications and operating system. C++, Java and Simlab are some
popular programming languages. Generally Java is used for internet
applications. C++ is a language of professional developers and used extensively
in developing operating systems. PHP is another language used for internet
applications. There is a new class of languages which are being utilized for the
mobiles. These are light weight, modular languages which are used to design
mobile applications.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-5

Explain the differences of the types of software in a sheet of paper.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-5

Answers may vary.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-6

GENERAL SECURITY

Objectives:

1. Define security
2. Explain the significance of computer security

Introduction

People often think of computer security as something technical and


complicated. And when you get into the nitty-gritty, it can be—but the most
important stuff is actually very simple. Here are the basic, important things you
should do to make yourself safer online.

Basic Computer Security: How to Protect Yourself from Viruses,


Hackers, and Thieves

Enable Automatic Updates

All the software we use every


day is likely riddled with security
issues. These security issues are
constantly being found—whether
we’re talking about Windows,
Internet Explorer, Mozilla Firefox,

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Google Chrome, the Adobe Flash plugin, Adobe’s PDF Reader, Microsoft Office—
the list goes on and on.
These days, a lot of operating systems and programs come with
automatic updates to close these security holes. No longer do you need to click
a button or download a file to update your software; it’ll update itself in the
background without any input from you.
Use Antivirus and Anti-Malware

It seems like every couple of years an article will come out saying one
antivirus is the absolute best. Three more will follow saying three others
outperformed the first. On top of these, some security expert will write an article
saying antivirus is no longer relevant and you’re dumb if you use it.

Let’s set the record straight:


you should be running
antivirus, even if you’re careful on
the web. Which one? It’s up to you
—though when it comes to free,
simple, and good, there’s nothing
wrong with using Windows
Defender. It’s built in to Windows,
it updates automatically with the
Windows Update utility, it has no
discernible impact on
performance, and it’s free. To be
effective, an antivirus application
need to integrate with the operating
system on a very deep level. Who
better to know the internals of
Windows than the people who built
it? Plus, it won’t try to sell you other
products or inject other features you
don’t need, like some antivirus
programs do.

However, in addition to
antivirus, we also recommend
using Malwarebytes alongside your
antivirus. Just like your belt can use a good pair of suspenders to give it a little
help, applications like Malwarebytes can provide extra protection against
malicious software that traditional antivirus products may not identify. Malicious

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
programs like browser re-directors and advertisement injectors behave exactly
like some known legitimate network filters. They’re not technically viruses, but
you definitely don’t want them. Anti-malware applications can help you with
those. Malwarebytes is $40 per year, but you can get some of its features for
free.

Craft Better Passwords, and Automate Them

You probably know passwords are important, but you probably don’t know
how important—and how terrible most people’s passwords actually are.

Here’s the thing: we’re no longer in the olden days of the internet, where
you can just use the same password everywhere and call it a day. Services get
hacked all the time, and if you’re using the same password everywhere, you’ve
given someone access to all of your accounts when one service leaks
information. You need to use long passwords and you need to use different ones
on every site and service.

To do this, I recommend everyone use a password manager like LastPass.


It’ll automatically generate passwords for you, save them securely in one
central place, and even automatically insert them for you as you browse.

You should also


have a password on your computer and a passcode on your phone, too. I know, I
know, it’s inconvenient. But while it may take a few seconds longer than just
hitting one button, it’s an easy and important way to keep your information

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
secure. Having a password on your computer and phone will stop random
people from just picking up and using your device.

Think of all the


information on your cell phone.
Now think of all the websites
you’re logged into on your
computer. Would you want a
stranger having all that
access? Do you know how easy
it is to lose your phone or
laptop? You need to have a
password on your computer
and phone. No exceptions.

A good password is like a really good lock on the door, but locks can be
picked. Adding encryption turns that door into a bunker. If you encrypt your
computer or phone, you prevent thieves from getting to your data by other
more advanced means. We recommend using BitLocker on Windows if you have
Windows Pro or Enterprise, or VeraCryptif you have Windows Home. Mac users
should turn on FileVault. If you’re running Windows Home, something like
Veracrypt is a good option for you. iPhones and Android phones are usually
encrypted by default these days, but you can double check in the settings to be
sure.

Never Leave Your Phone or Computer Unattended

This may seem obvious,


but it deserves saying: never,
ever, ever leave your
computer or phone
unattended in public. On your
coffee table in your house?
Sure. On your table at
Starbucks? No way. Doing so
is asking for it to be stolen.

If your device gets


stolen, the best case scenario
is you losing your expensive

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
device. But if you leave something unattended and you haven’t followed all of
the above advice, the worst case scenario is that someone has your expensive
gadget and all of your personal information. All it takes is a kid with slightly-
more-than-basic computer knowledge to get at all your data, and if they have
your computer in their hands, it’s a lot easier (if you don’t use encryption—see
above).

Know Which Links Are Safe to Click in Emails

You hear it all the time: don’t open emails from people you don’t know,
and don’t click on links in emails you don’t trust. But that isn’t enough. A lot of
times, malicious links can come from friends who have been infected, or from
emails that look legitimate, but are actually fake. This is known as phishing.

If you want to be truly secure, you could never click on links in emails. But
that’s not realistic or convenient, although we do recommend against clicking
email links to sensitive locations like your bank’s website. Just head to your
bank’s website normally. For other links in emails, the middle ground option is
knowing how to investigate a link before you click on it—yes, even ones from
your friends.

First, check is if this link goes where it says it goes. If you hover your
cursor over the link, the destination should pop up at the bottom of your
browser window. If it doesn’t, Right-click on the link and select “Copy link
address.” You can then paste this somewhere safe (like a Notepad document)
and examine it.

Don’t Trust Your Popup Notifications

Similarly, never download or install something you didn’t go looking for. If


a website tells you Flash is out of date, Chrome needs to be updated, or a plugin
needs to be added, pump your brakes. This is a common trick to get you to
install something for an attacker. If you think the pop-up might be legitimate,
you still don’t want to click on it.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Let’s use Flash as an example. A site may give you a warning you need
the latest version to get that cat video to play. Instead of clicking the link (or
button) to update, do a search for “adobe flash” and get the update
from Adobe’s official website—not the popup from catvideos.com.

This applies to “tech support”, too. Don’t believe any site that says it’s
detected a virus on your system (or any calls from Microsoft). If a popup says
you have a virus on your computer, don’t click on it. Instead, go to your Start
menu, open your antivirus program of choice, and run a scan from there
instead.

SECURE COMPUTING TIPS

Tip #1 - You are a target to hackers


Don't ever say "It won't happen to me". We are all at risk and the stakes are
high - to your personal and financial well-being, and to the University's standing
and reputation.

 Keeping campus computing resources secure is everyone's responsibility.


 By following the tips below and remaining vigilant, you are doing your part
to protect yourself and others.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Tip #2 - Keep software up to date
Installing software updates for your operating system and programs is critical.
Always install the latest security updates for your devices:

 Turn on Automatic Updates for your operating system.


 Use web browsers such as Chrome or Firefox that receive frequent,
automatic security updates.
 Make sure to keep browser plug-ins (Flash, Java, etc.) up to date.
 Utilize Secunia PSI (free) to find other software on your computer that
needs to be updated.

Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone


calls
Phishing scams are a constant threat - using various social engineering(link is
external) ploys, cyber-criminals will attempt to trick you into divulging personal
information such as your login ID and password, banking or credit card
information.

 Phishing scams can be carried out by phone, text, or through social


networking sites - but most commonly by email.
 Be suspicious of any official-looking email message or phone call that asks
for personal or financial information.

Check out our Phishing Resources section for details about identifying phishing
scams and protecting yourself.

Tip #4 - Practice good password management


We all have too many passwords to manage - and it's easy to take short-cuts,
like reusing the same password. A password management program(link is
external) can help you to maintain strong unique passwords for all of your
accounts. These programs can generate strong passwords for you, enter
credentials automatically, and remind you to update your passwords
periodically.
There are several online password management services that offer free
versions, and KeePass(link is external) is a free application for Mac and
Windows.
Here are some general password tips to keep in mind:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Use long passwords - 20 characters or more is recommended.
 Use a strong mix of characters, and never use the same password for
multiple sites.
 Don't share your passwords and don't write them down (especially not on
a post-it note attached to your monitor).
 Update your passwords periodically, at least once every 6 months (90
days is better).

The Protecting Your Credentials how-to article contains detailed


recommendations for keeping your password safe.

Tip #5 - Be careful what you click


Avoid visiting unknown websites or downloading software from untrusted
sources. These sites often host malware that will automatically, and often
silently, compromise your computer.
If attachments or links in the email are unexpected or suspicious for any reason,
don't click on it.
ISO recommends using Click-to-Play or NoScript(link is external), browser add-
on features that prevent the automatic download of plug-in content (e.g., Java,
Flash) and scripts that can harbor malicious code.

Tip #6 - Never leave devices unattended


The physical security of your devices is just as important as their technical
security.

 If you need to leave your laptop, phone, or tablet for any length of time -
lock it up so no one else can use it.
 If you keep sensitive information on a flash drive or external hard drive,
make sure to keep these locked as well.
 For desktop computers, shut-down the system when not in use - or lock
your screen.

Tip #7 - Protect sensitive data


Be aware of sensitive data that you come into contact with, and associated
restrictions - review the UCB Data Classification Standard to understand data
protection level requirements. In general:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Keep sensitive data (e.g., SSN's, credit card information, student records,
health information, etc.) off of your workstation, laptop, or mobile devices.
 Securely remove sensitive data files from your system when they are no
longer needed.
 Always use encryption when storing or transmitting sensitive data.

Unsure of how to store or handle sensitive data? Contact us and ask!

Tip #8 - Use mobile devices safely


Considering how much we rely on our mobile devices, and how susceptible they
are to attack, you'll want to make sure you are protected:

 Lock your device with a PIN or password - and never leave it unprotected
in public.
 Only install apps from trusted sources.
 Keep your device's operating system updated.
 Don't click on links or attachments from unsolicited emails or texts.
 Avoid transmitting or storing personal information on the device.
 Most handheld devices are capable of employing data encryption - consult
your device's documentation for available options.
 Use Apple's Find my iPhone(link is external) or the Android Device
Manager(link is external) tools to help prevent loss or theft.
 Backup your data.

Tip #9 - Install anti-virus protection


Only install an anti-virus program from a known and trusted source. Keep virus
definitions, engines and software up to date to ensure your anti-virus program
remains effective.
For personally-owned systems and unmanaged UCB owned computers, the
campus offers free anti-virus software, available for Windows and Mac, to
current faculty, staff, and students.

Tip #10 - Back up your data


Back up regularly - if you are a victim of a security incident, the only guaranteed
way to repair your computer is to erase and re-install the system.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Here are some additional tips to help keep you safe and secure online:
 Use a firewall - Mac and Windows have basic desktop firewalls as part of
their operating system that can help protect your computer from external
attacks.
 Use public wireless hot-spots wisely - follow these tips(link is
external) for staying safe.
 Be conscientious of what you plug into your computer (flash drives
and even smartphones can contain malware).
 Be careful of what you share on social networking sites.
 Monitor your accounts for suspicious activity.
 Bank or shop online only on trusted devices and networks - and
logout of these sites when you've completed your transactions.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-6

Give the 10 tips for secure computing.

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-6

Secure Computing Tips

Tip #1 - You are a target to hackers

Tip #2 - Keep software up to date

Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls

Tip #4 - Practice good password management

Tip #5 - Be careful what you click

Tip #6 - Never leave devices unattended

Tip #7 - Protect sensitive data

Tip #8 - Use mobile devices safely

Tip #9 - Install anti-virus protection

Tip #10 - Back up your data

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-7

VIRUSES

Objectives:

1. Define viruses
2. Identify ways to prevent viruses

VIRUS (Computer Virus)

A computer virus is malicious code that replicates by copying itself to


another program, computer boot sector or document and changes how a
computer works. The virus requires someone to knowingly or unknowingly
spread the infection without the knowledge or permission of a user or system
administrator. In contrast, a computer worm is stand-alone programming that
does not need to copy itself to a host program or require human interaction to
spread. Viruses and worms may also be referred to as malware.

Types of viruses

File infectors.
Some file infector viruses attach themselves to program files, usually
selected .com or .exe files. Some can infect any program for which execution is
requested, including .sys, .ovl, .prg, and .mnu files. When the program is loaded,
the virus is loaded as well. Other file infector viruses arrive as wholly contained
programs or scripts sent as an attachment to an email note.

Macro viruses.
These viruses specifically target macro language commands in
applications like Microsoft Word and other programs. In Word, macros are saved
sequences for commands or keystrokes that are embedded in the documents.
Macro viruses can add their malicious code to the legitimate macro sequences
in a Word file. Microsoft disabled macros by default in more recent versions of
Word; as a result, hackers have used social engineering schemes to convince
targeted users to enable macros and launch the virus. As macro viruses have
seen a resurgence in recent years, Microsoft added a new feature in Office 2016
that allows security managers to selectively enable macro use for trusted
workflows only, as well as block macros across an organization.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Overwrite viruses.
Some viruses are designed specifically to destroy a file or application's
data. After infecting a system, an overwrite virus begins overwriting files with its
own code. These viruses can target specific files or applications or
systematically overwrite all files on an infected device. An overwrite virus can
install new code in files and applications that programs them to spread the virus
to additional files, applications and systems.

Polymorphic viruses.
A polymorphic virus is a type of malware that has the ability to change or
mutate its underlying code without changing its basic functions or features. This
process helps a virus evade detection from many antimalware and threat
detection products that rely on identifying signatures of malware; once a
polymorphic virus' signature is identified by a security product, the virus can
then alter itself so that it will no longer be detected using that signature.

Resident viruses.
This type of virus embeds itself in the memory of a system. The original
virus program isn't needed to infect new files or applications; even if the original
virus is deleted, the version stored in memory can be activated when
the operating system loads a specific application or function. Resident viruses
are problematic because they can evade antivirus and antimalware software by
hiding in the system's RAM.

Rootkit viruses.
A rootkit virus is a type of malware that installs an unauthorized rootkit on
an infected system, giving attackers full control of the system with the ability to
fundamentally modify or disable functions and programs. Rootkit viruses were
designed to bypass antivirus software, which typically scanned only applications
and files. More recent versions of major antivirus and antimalware programs
include rootkit scanning to identify and mitigate these types of viruses.

System or boot-record infectors.


These viruses infect executable code found in certain system areas on a
disk. They attach to the DOS bootsector on diskettes and USB thumb drives or
the Master Boot Record on hard disks. In a typical attack scenario, the victim
receives storage device that contains a boot disk virus. When the victim's
operating system is running, files on the external storage device can infect the
system; rebooting the system will trigger the boot disk virus. An infected
storage device connected to a computer can modify or even replace the existing

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
boot code on the infected system so that when the system is booted next, the
virus will be loaded and run immediately as part of the master boot record. Boot
viruses are less common now as today's devices rely less on physical storage
media.

How to prevent computer viruses

The following measures can help prevent a virus infection:

 Install current antivirus and antispyware software and keep it up to date.


 Run daily scans of antivirus software.
 Disable autorun to prevent viruses from propagating to any media
connected to the system.
 Regularly patch the operating system and applications installed on
the computer.
 Don’t click on web links sent via email.
 Don’t download files from the Internet or email.
 Install a hardware-based firewall.

Signs you may be infected with a computer virus

The following are indications that a computer might be infected by a virus:

 The computer takes a long time to start up and performance is slow.


 The computer experiences frequent crashes, or shutdown and error
messages.
 The computer behaves erratically, such as not responding to clicks or
opening files on its own.
 The computer’s hard drive is acting strangely; for example, constantly
spinning or making continual noise.
 Email is corrupted.
 The amount of storage on the computer is reduced.
 Files and other data on the computer have gone missing.

How to remove a computer virus

To remove a virus from a PC, do the following:

Step 1: Enter Safe Mode. The process for doing so will depend on the version of
Windows you’re running.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Step 2: Delete temporary files. While in Safe Mode, use the Disk Cleanup tool to
delete Temporary Files.

Step 3: Download an on-demand and a real-time virus scanner.

Step 4: Run the on-demand scanner followed by the real-time scanner. If neither
scanner removes the virus, then it might need to be removed manually. This
should only be done by an expert who is experienced at using Windows Registry
and knows how to view and delete system and program files.

Step 5: Reinstall any files or programs damaged by the virus.

History of computer viruses

The first known computer virus was developed in 1971 by Robert Thomas,
an engineer at BBN Technologies. Known as the "Creeper" virus, Thomas'
experimental program infected mainframes on ARPANET, displaying the
teletype message, "I'm the creeper: Catch me if you can."

The first computer virus to be discovered in the wild was "Elk Cloner,"
which infected Apple II operating systems through floppy disks and displayed a
humorous message on infected computers. Elk Cloner, which was developed by
15-year-old Richard Skrenta in 1982, was designed as a prank but it
demonstrated how a potentially malicious program could be installed in an
Apple computer's memory and prevent users from removing the program.

The term "computer virus" wasn't used until a year later. Fred Cohen, a
graduate student at the University of California, wrote an academic paper titled
"Computer Viruses -- Theory and Experiments" and credited his academic
advisor and RSA Security co-founder Leonard Adleman with coining the phrase
"computer virus" in 1983.

Famous computer viruses

Notable examples of early computer viruses include:

 The "Brain" virus, which initially appeared in 1986, is considered to be the


first MS-DOS personal computer virus. Brain was a boot sector virus; it
spread through infected floppy disk boot sectors and, once installed on a
new PC, it would install itself to the system's memory and subsequently
infect any new disks inserted into that PC.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 The "Jerusalem" virus, also known as the "Friday the 13 th" virus, was
discovered in 1987 and spread throughout Israel via floppy disks and
email attachments. The DOS virus would infect a system and delete all
files and programs when the system's calendar reached Friday the 13 th.

 The Melissa virus, which first appeared in 1999, was distributed as an


email attachment. If the infected systems had Microsoft Outlook, the virus
would be sent to the first 50 people in an infected user's contact list. The
"Melissa" virus also affected macros in Microsoft Word and disabled or
lowered security protections in the program.

 The "Archiveus" Trojan, which debuted in 2006, was the first known case
of a ransomware virus that used strong encryption to encrypt users' files
and data. Archiveus targeted Windows systems, used RSA encryption
algorithms (earlier versions of ransomware used weaker and easily
defeated encryption technology) and demanded victims purchase
products from an online pharmacy.

 The "Zeus" Trojan, one of the most well-known and widely spread viruses
in history, first appeared in 2006 but has evolved over the years and
continued to cause problems as new variants emerge. The Zeus Trojan
was initially used to infect Windows systems and harvest banking
credentials and account information from victims. The virus spread
through phishing attacks, drive-by downloads and man-in-the-
browser techniques to infect users. The Zeus malware kit was adapted by
cybercriminals to include new functionality to evade antivirus programs as
well as spawn new variants of the Trojan such as "ZeusVM," which
uses steganography techniques to hide its data.

 "Cabir" virus is the first verified example of a mobile phone virus for the
now defunct Nokia Symbian operating system. The virus was believed to
be created by a group from the Czech Republic and Slovakia called 29A,
who sent it to a number of security software companies, including
Symantec in the United States and Kapersky Lab in Russia. Cabir is
considered a proof-of-concept virus, because it proves that a virus can be
written for mobile phones, something that was once doubted.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.2-7

Choose the letter of the correct answer for each item.

1. These viruses infect executable code found in certain system areas


on a disk.
a. System or boot-record infectors
b. Rootkit viruses
c. Resident viruses
d. Polymorphic viruses

2. A type of malware that installs an unauthorized rootkit on an


infected system, giving attackers full control of the system with the
ability to fundamentally modify or disable functions and programs.
a. System or boot-record infectors
b. Rootkit viruses
c. Resident viruses
d. Polymorphic viruses

3. A type of malware that has the ability to change or mutate its


underlying code without changing its basic functions or features.
a. Overwrite viruses
b. Macro viruses
c. Resident viruses
d. Polymorphic viruses

4. This type of virus embeds itself in the memory of a system.


a. Overwrite viruses
b. Macro viruses
c. Resident viruses
d. Polymorphic viruses

5. These viruses specifically target macro language commands in


applications like Microsoft Word and other programs.
a. Overwrite viruses
b. Macro viruses
c. Resident viruses
d. Polymorphic viruses

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.2-7

1. A
2. B
3. D
4. C
5. B

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.2-8

OH & S PRINCIPLES AND RESPONSIBILITIES

Objectives:

1. Identify OHS principles and responsibilities


2. Cite the significance of these principles and responsibilities

Introduction

What is an occupational health and safety (OH&S) program?

A health and safety program is a definite plan of action designed to


prevent accidents and occupational diseases. Some form of a program is
required under occupational health and safety legislation in most Canadian
jurisdictions. A health and safety program must include the elements required
by the health and safety legislation as a minimum.

Because organizations differ, a program developed for one organization


cannot necessarily be expected to meet the needs of another. This document
summarizes the general elements of a health and safety program. This
approach should help smaller organizations to develop programs to deal with
their specific needs.

The principles of health and safety protection

The 2004 Act was varied to include the following health and safety principles:

 all people are given the highest level of health and safety protection that
is reasonably practicable;
 those who manage or control activities that give rise, or may give rise, to
risks to health or safety are responsible for eliminating or reducing health
and safety risks, so far as is reasonably practicable;
 employers and self-employed people should be proactive and take
reasonably practicable measures to ensure health and safety in their
business activities;

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 employers and employees should exchange information about risks to
health or safety and measures that can be taken to eliminate or reduce
those risks; and
 employees are entitled, and should be encouraged, to be represented on
health and safety issues.

What are individual OH&S responsibilities?


Health and safety is the joint responsibility of management and workers.
Management is accountable for non-compliance to health and safety legislation.
Responsibility may be defined as an individual's obligation to carry out
assigned duties. Authority implies the right to make decisions and the power to
direct others. Responsibility and authority can be delegated to subordinates,
giving them the right to act for superiors. It is important to note that, while
some responsibilities can be delegated, the superior remains accountable for
seeing that they are carried out.
To fulfill their individual responsibilities, the people must:

 Know what these responsibilities are (communication required).


 Have sufficient authority to carry them out (organizational issue).
 Have the required ability and competence (training or certification
required).

Once all these criteria have been met, safety performance can be assessed
by each individual's supervisor on an equal basis with other key job elements.
Health and safety is not just an extra part of an employee's job: it is an integral,
full-time component of each individual's responsibilities.

What are examples of responsibilities of workers?


Examples of responsibilities of workers include:

 Using personal protection and safety equipment as required by the


employer.
 Following safe work procedures.
 Knowing and complying with all regulations.
 Reporting any injury or illness immediately.
 Reporting unsafe acts and unsafe conditions.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Participating in joint health and safety committees or as the
representative.

What are examples of responsibilities of first-line supervisors?


Examples of responsibilities of first-line supervisors include:

 Instructing workers to follow safe work practices.


 Enforcing health and safety regulations.
 Correcting unsafe acts and unsafe conditions.
 Ensuring that only authorized, adequately trained workers operate
equipment.
 Reporting and investigating all accidents/incidents.
 Inspecting own area and taking remedial action to minimize or eliminate
hazards.
 Ensuring equipment is properly maintained.
 Promoting safety awareness in workers.

What are examples of responsibilities of management?


Examples of responsibilities of management include:

 Providing a safe and healthful workplace.


 Establishing and maintaining a health and safety program.
 Ensuring workers are trained or certified, as required.
 Reporting accidents/incidents and cases of occupational disease to the
appropriate authority.
 Providing medical and first aid facilities.
 Ensuring personal protective equipment is available.
 Providing workers with health and safety information.
 Supporting supervisors in their health and safety activities.
 Evaluating health and safety performance of supervisors.

What are examples of responsibilities of safety coordinators?


Examples of responsibilities of safety coordinators include:

 Advising all employees on health and safety matters.


 Coordinating interdepartmental health and safety activities.
 Collecting and analyzing health and safety statistics.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Providing health and safety training.
 Conducting research on special problems.
 Attending joint health and safety committee meetings as a resource
person.

Self-Check 3.2-8

Provide what is asked from each item.

Responsibilities of workers:
1.
2.
3.
4.
5.

Responsibilities of first-line supervisors:


1.
2.
3.
4.
5.

Responsibilities of management:
1.
2.
3.
4.
5.

Responsibilities of safety coordinators:


1.
2.
3.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
4.
5.

Answer Key 3.2-8


Examples of responsibilities of workers include:

 Using personal protection and safety equipment as required by the


employer.
 Following safe work procedures.
 Knowing and complying with all regulations.
 Reporting any injury or illness immediately.
 Reporting unsafe acts and unsafe conditions.
 Participating in joint health and safety committees or as the
representative.

Examples of responsibilities of first-line supervisors include:

 Instructing workers to follow safe work practices.


 Enforcing health and safety regulations.
 Correcting unsafe acts and unsafe conditions.
 Ensuring that only authorized, adequately trained workers operate
equipment.
 Reporting and investigating all accidents/incidents.
 Inspecting own area and taking remedial action to minimize or eliminate
hazards.
 Ensuring equipment is properly maintained.
 Promoting safety awareness in workers.

Examples of responsibilities of management include:

 Providing a safe and healthful workplace.


 Establishing and maintaining a health and safety program.
 Ensuring workers are trained or certified, as required.
 Reporting accidents/incidents and cases of occupational disease to the
appropriate authority.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Providing medical and first aid facilities.
 Ensuring personal protective equipment is available.
 Providing workers with health and safety information.
 Supporting supervisors in their health and safety activities.
 Evaluating health and safety performance of supervisors.

Examples of responsibilities of safety coordinators include:

 Advising all employees on health and safety matters.


 Coordinating interdepartmental health and safety activities.
 Collecting and analyzing health and safety statistics.
 Providing health and safety training.
 Conducting research on special problems.
 Attending joint health and safety committee meetings as a resource
person.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
LEARNING OUTCOME 3

USE APPROPRIATE DEVICES AND PROCEDURES TO TRANSFER


FILES/DATA

CONTENTS:

 Procedures/techniques in accessing Information


 Desktop Icons
 Keyboard techniques based on OHS requirements

ASSESSMENT CRITERIA:

1. Correct program/application is selected based on job requirements.


2. Program/application containing the information required is accessed
according to company procedures.
3. Desktop icons are correctly selected, opened and closed for navigation
purposes.
4. Keyboard techniques are carried out in line with OH & S requirements
for safe use of keyboards.

CONDITIONS:

The students/ trainees must be provided with the following:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
EQUIPMENT LEARNING MATERIALS

 LCD Projector (optional) Books relating to:


 Overhead Projector
(optional)  Computer books and CDs
 Computer
 Printer

METHODOLOGIES:

 Lecture
 Group discussion
 Tutorial or self-pace

ASSESSMENT METHODS

 Observation
 Questioning
 Practical demonstration

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information sheet 3.3-1

PROCEDURES/TECHNIQUES IN ACCESSING INFORMATION

Objectives:

1. Identify procedures/techniques in accessing information


2. Discuss the techniques in accessing information

Introduction

When a file is used, information is read and accessed into computer


memory and there are several ways to access this information of the file. Some
systems provide only one access method for files. Other systems, such as those
of IBM, support many access methods, and choosing the right one for a
particular application is a major design problem.
There are three ways to access a file into a computer system: Sequential-
Access, Direct Access, Index sequential Method.
1. Sequential Access –
It is the simplest access method. Information in the file is processed in
order, one record after the other. This mode of access is by far the most
common; for example, editor and compiler usually access the file in this
fashion.
Read and write make up the bulk of the operation on a file. A read
operation -read next- read the next position of the file and automatically
advance a file pointer, which keeps track I/O location. Similarly, for the
write write next append to the end of the file and advance to the newly
written material.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Key points:
 Data is accessed one record right after another record in an order.
 When we use read command, it move ahead pointer by one
 When we use write command, it will allocate memory and move the
pointer to the end of the file
 Such a method is reasonable for tape.

2. Direct Access –
Another method is direct access method also known as relative access
method. A filed-length logical record that allows the program to read and
write record rapidly. in no particular order. The direct access is based on
the disk model of a file since disk allows random access to any file block.
For direct access, the file is viewed as a numbered sequence of block or
record. Thus, we may read block 14 then block 59 and then we can write
block 17. There is no restriction on the order of reading and writing for a
direct access file.
A block number provided by the user to the operating system is normally
a relative block number, the first relative block of the file is 0 and then 1
and so on.

3. Index sequential method –


It is the other method of accessing a file which is built on the top of the
direct access method. These methods construct an index for the file. The
index, like an index in the back of a book, contains the pointer to the
various blocks. To find a record in the file, we first search the index and
then by the help of pointer we access the file directly.

Key points:
 It is built on top of Sequential access.
 It control the pointer by using index.

Access Control
Access control is a security technique that regulates who or what can view
or use resources in a computing environment. It is a fundamental concept in
security that minimizes risk to the business or organization.

There are two types of access control: physical and logical. Physical
access control limits access to campuses, buildings, rooms and physical IT

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
assets. Logical access control limits connections to computer networks, system
files and data.

Types of access control

The main types of access control are:

 Mandatory access control (MAC): A security model in which access rights


are regulated by a central authority based on multiple levels of security.
Often used in government and military environments, classifications are
assigned to system resources and the operating system or security kernel,
grants or denies access to those resource objects based on the information
security clearance of the user or device. For example, Security Enhanced
Linux is an implementation of MAC on the Linux operating system.

 Discretionary access control (DAC): An access control method in which


owners or administrators of the protected system, data or resource set the
policies defining who or what is authorized to access the resource. Many of
these systems enable administrators to limit the propagation of access
rights. A common criticism of DAC systems is a lack of centralized control.

 Role-based access control (RBAC): A widely used access control


mechanism that restricts access to computer resources based on individuals
or groups with defined business functions -- executive level, engineer level 1
-- rather than the identities of individual users. The role-based security model
relies on a complex structure of role assignments, role authorizations and
role permissions developed using role engineering to regulate employee
access to systems. RBAC systems can be used to enforce MAC and DAC
frameworks.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Rule-based access control: A security model in which the system
administrator defines the rules that to govern access to resource objects.
Often these rules are based on conditions, such as time of day or location. It
is not uncommon to use some form of both rule-based access control and
role-based access control to enforce access policies and procedures.

 Attribute-based access control (ABAC): A methodology that manages


access rights by evaluating a set of rules, policies and relationships using the
attributes of users, systems and environmental conditions.

Self-Check 3.3-1

Match the definition in column A with the types of access control in column B.

A
B
1. A methodology that manages
access rights by evaluating a a. Mandatory access
set of rules, policies and control (MAC)
relationships using the b. Discretionary access
attributes of users, systems control (DAC)
and environmental conditions. c. Role-based access
control (RBAC)
2. A security model in which the d. Rule-based access
system administrator defines control
the rules that to govern e. Attribute-based access
access to resource objects. control (ABAC)
3. A widely used access control
mechanism that restricts
access to computer resources
based on individuals or groups
with defined business
functions -- executive level,
engineer level 1 -- rather than
the identities of individual
Date Developed: Document No.
users. July 2019 Issued by:
Date Revised:
4. An access control method in August 2019
Cookery
which owners or
administrators
MARINERS’ POLYTECHNIC of the Developed by:
Revision # 01
protected system, data or
COLLEGES FOUNDATION CHLOE ANNE A.
PALMARIA
resource set the policies
5. A security model in which
access rights are regulated by
Answer Key 3.3-1

1. E
2. D
3. C
4. B
5. A

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.3-2

DESKTOP ICONS

Objectives:

1. Define what desktop icons are


2. Discuss the importance of desktop icons

Introduction

An icon is a pictogram or ideogram displayed on a computer screen in


order to help the user navigate a computer system. The icon itself is a quickly
comprehensible symbol of a software tool, function, or a data file, accessible on
the system and is more like a traffic sign than a detailed illustration of the
actual entity it represents. It can serve as an electronic hyperlink or file
shortcut to access the program or data. The user can activate an icon using a
mouse, pointer, finger, or recently voice commands. Their placement on the
screen, also in relation to other icons, may provide further information to the
user about their usage. In activating an icon, the user can move directly into
and out of the identified function without knowing anything further about the
location or requirements of the file or code.
Icons as parts of the graphical user interface of the computer system, in
conjunction with windows, menus and a pointing device (mouse), belong to the
much larger topic of the interface that has largely supplanted the text-based
interface for casual use.

Managing Desktop Icons in Windows XP

1. To change the look of an icon e.g. the My Computer icon we need to access
the desktop properties, as before right click the desktop and select
properties
2. Select the Desktop tab
3. Click Customize Desktop
4. Highlight the My Computer icon (just a single left click to highlight). Then
select change icon pictures of all available icons will be displayed. Icon files
can also be downloaded from the internet to be used.
5. Highlight the picture to be used and click OK to apply
If icons have been downloaded use the browse button to locate them.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
6. The My Computer icon has now been changed to the new icon picture this
will appear in all menus including the start menu
7. We will now place a shortcut icon onto the desktop
From the start menu select programs and then the program you want make
the shortcut to. The example shown is for a screen shot program called
“Printscreen”
8. Right click the program,
9. then select send to
10. Then Desktop (create shortcut)
11. A shortcut icon has now been created on the desktop
12. Note the icon has a small arrow in the corner indicating this is a shortcut if
this icon was deleted it would not remove the associated program.
13. Another way of placing a shortcut on the desktop is to use drag and drop.
14. Drag and drop is simply left clicking the icon and holding down the left
mouse button. Then drag the icon to the desired location and release the
mouse button the icon is moved and shortcut created.
15. Drag and drop can also be used to move files from one location to
another.
16. Drag and drop will now be used to create a shortcut to windows media
player.
Click the start button
17. Left click windows media player and hold down the mouse button. Now
drag onto the desktop then release,
18. The shortcut to media player has now been created.
19. To tidy up the icons on the desktop, right click on the desktop and select
arrange icons by, then click Name
20. The icons will be arranged alphabetically with the exception of the default
icons My Documents, My Computer, My Network Places, Recycle Bin and
Internet Explorer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.3-2

If you are to make a software what would you call it and what would be its
features? Draw an icon of your software.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.3-3

KEYBOARD TECHNIQUES BASED ON OHS REQUIREMENTS

Objectives:

1. Identify keyboard techniques


2. Discuss the keyboard techniques

Keyboarding Techniques for Typing Faster

When a learner is acquiring the skill of typing, practicing it in a set


determined way is a must because only that is the way to learn skills can only be
learned that way. Our brain learns patters and repetitions when they are
repeated numerous times exactly in the same pattern. Therefore if the trainee
learns the right typing techniques from the beginning he definitely acquires the
skill in a reasonable period of time.

1. Maintain erect posture during typing

Speed typing is essentially physical work and being able to type for longer
periods without getting tired counts for productivity. An erect posture that leads
to maximum comfort during typing is a must. Maintaining a good posture also
keeps aches and pains away that may become long term problems.

2. Deploy touch typing

Every typing lesson begins with the instruction of touch typing. You should
spend least time touching keys of the keyboard. The keys should be tapped as
quickly as possible within a fraction of a second. For gaining high speed of typing
it is very important to deploy touch typing.

3. Use correct fingering

This is the foremost of all the essential or so called secret keyboarding


techniques. No doubt that one can develop his own method of hitting the keys,
but typing is definitely fastest if the standard way of fingering is followed. That is

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
because as per the standard method more keys can be hit in any span of given
time.

4. Put the habit of looking only at the screen

Pick and hunt typists have the habit to look at the keyboard most of the
time during typing. This is the reason they never learn real speed typing. Speed
typing can be learned only by following the practice of looking only at the
screen. Of course it is not easy to attain easily in the first go but you can go to
that level with practice. Being able to type and erase without looking at the
keyboard is the sign of a learned and skilled typist.

5. Press non-letter keys properly

While there are rules for pressing the letter keys there are also rules for
non-letter keys like Tab, enter, shift and backspace etc. The enter and
backspace keys should be pressed by the little finger of the right hand and the
keys like tab, shift or control have to be hit by the little finger of the left hand.
Shift key being both on right and left can be hit by either of the hands.

6. Keep a pace in typing

At any time while learning typing it is very important to keep a pace or


rhythm in typing. This enables to achieve speed in considerable time. Pushing
your limits for speed but at the same time keeping a pace in the speed you have
achieved in typing is a real must.

Takeaway:

These are the secret keyboarding techniques that can help you achieve
typing speed and accuracy that matters at different places with keyboarding
software. These are the only exact techniques that can help you acquire the
touch typing skill. Keyboarding online is one of the best typing software for
schools which can surely improve your typing skills.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.3-3

A. Identify the keyboarding techniques that correspond to each picture.

1. 2.

3. 4.

B. What is the importance of knowing the keyboarding techniques?

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.3-3

A.
1. Maintain erect posture during typing
2. Use correct fingering
3. Deploy touch typing
4. Put the habit of looking only at the screen

B. Answers may vary.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
LEARNING OUTCOME 4

PRODUCE ACCURATE AND COMPLETE DATA ACCORDING TO THE


REQUIREMENTS

CONTENTS:

 Software commands
 Operation and use of peripheral devices
 Procedures in producing and transferring files/data

ASSESSMENT CRITERIA:

1. Entered data are processed using appropriate software commands.


2. Data are printed out as required using computer hardware/peripheral
devices in accordance with standard operating procedures.
3. Files and data are transferred between compatible systems using
computer software, hardware/ peripheral devices in accordance with
standard operating procedures.

CONDITIONS:

The students/ trainees must be provided with the following:

EQUIPMENT LEARNING MATERIALS


 LCD Projector (optional) Books relating to:
 Overhead Projector  Computer books and CDs
(optional)
 Computer
 Printer

METHODOLOGIES:

 Lecture
 Group discussion
 Tutorial or self-pace

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
ASSESSMENT METHODS

 Observation
 Questioning
 Practical demonstration

Information Sheet 3.4-1

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
SOFTWARE COMMANDS

Objectives:

1. Define software command


2. Explain each command

Introduction

Common Software Commands

Software is developing a common language in the form of commands.

Commands
Commands are words recognized by the computer to access functions. Certain
common commands appear in most software packages. You may access
commands by pulling down the menus of the software features.

FILE feature
The FILE feature offers the commands of NEW, OPEN, CLOSE, SAVE, and
PRINT. Clicking on a command either executes the command or offers a
dialogue box.

NEW: Enter the NEW command when you start a new file. A dialogue box
may appear to ask you to select a format for the new document.

OPEN: Access an existing document by clicking the command OPEN. A


dialogue box appears prompting you to select from a file of existing
documents. Once you select the document you want to open, click on the
filename, and OK or double click the file name to open the file.

CLOSE: To close or exit a file, click CLOSE. A prompt appears that should
ask if you want to save the document. Selecting the desired option
automatically executes the function and closes the file.

SAVE: To save a file, click SAVE. The computer automatically saves the
data to whatever drive you specify, hard drive or floppy disk and prompts you to
name the file before saving it. To save data to disks or alternate hard drives in

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
another format or to rename a file, click SAVE AS. . . and enter the letter
designator of the disk or alternate drive.

PRINT: To print hard copies of an open document, click PRINT. A dialogue box
appears asking if you want the entire document or a portion of the document,
and how many copies you require.

Common commands are not the only commands you will see offered the FILE
pull-down menu but, other commands may be program specific. Familiarize
yourself with the software in your computer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.4-1

Identify what is asked from each item.

________________ 1. A dialogue box may appear to ask you to select a format for
the new document.

________________ 2. The computer automatically saves the data to whatever


drive you specify, hard drive or floppy disk and prompts you to name the file
before saving it.

________________ 3. A prompt appears that should ask if you want to save the
document. Selecting the desired option automatically executes the function
and closes the file.

________________ 4. A dialogue box appears asking if you want the entire


document or a portion of the document, and how many copies you require.

________________ 5. A dialogue box appears prompting you to select from a file of


existing documents.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.4-1

1. New
2. Save
3. Close
4. Print
5. Open

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.4-2

OPERATION AND USE OF PERIPHERAL DEVICES

Objectives:

1. Define peripheral devices


2. Discuss the uses of peripheral devices

Introduction

Without peripherals, your communication with your computer would be far


more limited. Peripherals are the devices external to your computer that take in
information, allow the computer to put out information in visible and audible
form, and perform other important tasks. Devices such as printers, scanners,
audio and visual equipment and external drives allow us to make full use of the
computer's resources.

What Are the Functions of Computer Peripherals?

Printers
Printers provide the means for the computer to output information in
portable form. Whether a document, a photograph or even an image on canvas
(for more sophisticated devices) a printer allows us to reproduce information
and share it with others.

Scanners
Scanners are input devices that give the means to insert information into
a computer. They can be used for visual information such as photographs or
drawing, or teamed with type-reading software to import documents and
translate the hard copy to text that can be edited in word processing programs.
Some scanners are sensitive enough to produce images that are many millions
of megabytes in size from an image as small as a slide.

Audio Peripherals
Audio peripherals are both input and output devices. Microphones make it
possible to put our voice into the computer and onto the web, or record an
instrument. They need a special jack (usually called a "stereo-mini") though
better mics can be used with the proper adapters or external hardware. Most

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
high-end recording studios now operate exclusively with computerized inputs
and sound boards. Speakers are another peripheral that output music and other
audio.

Video

Video cameras work with the microphones to create a complete


audio/visual input that can be edited on the computer and viewed, or uploaded
to a video website. To view video, the visual output is the monitor, not
considered a peripheral as it is vital to computer function. Some computers
have a microphone and camera built in, in which case they are not commonly
considered peripherals.

External Drives

External drives or memory can be much larger in size (in terms of


gigabytes of storage) than the hard drives on a computer, or small in memory
and portable enough to slide into a shirt pocket. They provide storage for digital
information that is too voluminous for the hard drive within the computer, and
the means to physically transport this information easily.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.4-2

Identify what is asked from each item.

________________ 1. They can be used for visual information such as photographs


or drawing, or teamed with type-reading software to import documents and
translate the hard copy to text that can be edited in word processing programs.

________________ 2. They provide storage for digital information that is too


voluminous for the hard drive within the computer, and the means to physically
transport this information easily.

________________ 3. Whether a document, a photograph or even an image on


canvas (for more sophisticated devices), it allows us to reproduce information
and share it with others.

________________ 4. They are both input and output devices. They need a special
jack (usually called a "stereo-mini") though better mics can be used with the
proper adapters or external hardware.

________________ 5. They create a complete audio/visual input that can be edited


on the computer and viewed, or uploaded to a video website.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.4-2

1. Scanners
2. External Drives
3. Printer
4. Audio Peripherals
5. Video

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.4-3

PROCEDURES IN PRODUCING AND TRANSFERRING FILES / DATA

Objectives:

1. Define file transfer


2. Explain the process of transferring files/data

Introduction

File transfer is the process of copying or moving a file from one computer
to another over a network or Internet connection. It enables sharing,
transferring or transmitting a file or a logical data object between different users
and/or computers both locally and remotely.

There are two main types of file transfer:

 Pull-Based: The file transfer request is initiated by the receiver.


 Push Based: The file transfer request is initiated by the sender.

Moreover, other than network or Internet, file transfer can be performed


manually by copying a file to a new folder/drive in the same computer or by
copying it on a USB pen drive, CD or other portable storage device to be
transferred to another computer.

Below is a listing of all the different ways you can copy information from one
computer to another computer. Review each of the below solutions to decide
what works best for you.

Network
If you have a network or plan on setting up a network, consider
transferring and sharing files between computers on the local area network. A
network is the fastest means of transferring files between your computers, and
once set up, it allows to you to continue to share files.

Over the cloud

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Online cloud services make it easy to move and share data between
multiple computers and other devices. Our favorite online cloud services
are Google Drive and Dropbox. Once in the cloud, any device with Internet
access can access the data.

USB
USB ports and devices, such as thumb drives, are also a fast and easy way
to transfer files from one computer to another computer using either of the
below USB options.

Method one

USB hard drives and USB thumb drives are an


easy way to transfer data between computers
and a good backup solution. Once information
is copied to the device, it can be connected and
transferred to the another computer.

Method two

A USB to USB connector allows you to transfer


information from one computer to another
computer over a USB cable. This solution is
sometimes easier to set up than a standard Ethernet network and still allows an
unlimited amount of data to be shared. If both computers are Windows-based,
you can use the built-in Windows Easy Transfer program to perform the data
transfer (called Files and Settings Transfer Wizard in Windows XP). You also
need an Easy Transfer USB cable for this process to work effectively.

Internet and e-mail

Today, there are dozens of online


services that allow you to move and copy
files from one computer to another

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
computer. Alternatively, if you have only a few files you want to copy, you may
want to consider sending the files through e-mail.

Note
Many e-mail providers limit the size of a file that can be attached and sent
through e-mail. Check with your e-mail provider to determine the maximum file
size attachment allowed in your e-mail messages.

CD and DVD

If you do not have any USB drives, burning your information to a CD or DVD
is another good solution to move files from one computer to another.

Floppy diskette

For older computers that do not have a disc burner, USB, or the Internet,
copying files to a floppy disk may be your only alternative. However, if you need
to copy large amounts of data from one computer to another, you should try an
alternate solution since a floppy disk does not hold much information.

Direct serial connect

Direct serial connection is a method of connecting older computers together


using the serial port and a serial cable. Although a much slower solution of
connecting computers to each other, this may be the only solution for
computers without Internet access, drives, or USB.

Hard drive transfer

If you are attempting to transfer files


from a computer that no longer
works, the hard drive can be
removed from the bad computer and
placed into a good computer to
transfer the information.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
For example, you could remove the hard drive from a laptop and connect it
directly to another computer. To do this, you would need a hard
drive enclosure kit that is designed for laptop hard drives. This enclosure kit
turns the hard drive into an external hard drive, and allows you to connect it to
any computer using the included USB cable. You can then transfer files off the
laptop hard drive onto the other computer.

Self-Check 3.4-3

Choose the letter of the correct answer for each item.

1. The fastest means of transferring files between your computers, and


once set up, it allows to you to continue to share files.
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. Network

2. You can transfer files from a computer that no longer works to a


good working computer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. Network

3. For older computers that do not have a disc burner, USB, or the
Internet, copying files to this device may be your only alternative.
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. USB

4. This involves sharing files through online.


a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. USB

5. A fast and easy way to transfer files from one computer to another
computer using either of the below USB options.
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. USB

Answer Key 3.4-3

1. D
2. A
3. B
4. C
5. D

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
LEARNING OUTCOME 5

MAINTAIN COMPUTER SYSTEM

CONTENTS:

 Cleaning, minor maintenance and replacements of consumables


 Creating more space in hard disk
 Reviewing programs
 Deleting unwanted files
 Checking hard disk for errors
 Viruses and up-to-date anti-virus programs

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
ASSESSMENT CRITERIA:

1. Systems for cleaning, minor maintenance and replacement of


consumables are implemented.
2. Procedures for ensuring security of data, including regular back-ups
and virus checks are implemented in accordance with standard
operating procedures.
3. Basic file maintenance procedures are implemented in line with the
standard operating procedures.

CONDITIONS:

The students/ trainees must be provided with the following:

TOOLS AND SUPPLIES & LEARNING


EQUIPMENT
ACCESSORIES MATERIALS MATERIALS
 LCD Projector  Set of screw  office supplies  Computer
(optional) driver  diskettes books and
 Overhead  CDs CDs
Projector  Zip disks  Learning
(optional) materials/
 Computer activity
 Printer sheets
 Manufactu
rer’s
manual

METHODOLOGIES:

 Lecture
 Group discussion
 Tutorial or self-pace

ASSESSMENT METHODS

 Observation
 Questioning
 Practical demonstration

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Job Sheet 3.5-1

CLEANING, MINOR MAINTENANCE AND REPLACEMENTS OF


CONSUMABLES

Objectives:

1. Define consumables
2. Clean, maintain and replace consumables

In this information sheet, you will learn how to maintain consumables. You
will be able to perform cleaning, minor maintenance and replacements of
consumables.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Introduction

Expenditure on computer systems does not stop with the initial purchase of
the hardware and software. Various computer supplies and consumables are
needed to keep a computer system operating. These include:

 paper for printers, photocopiers and fax machines


 ink and toner for printers, photocopiers and fax machines
 lubrication oil for various machines with moving parts
 spare replacement parts for various items
 storage disks of various kinds, such as floppy disks, tapes and CDs
 cables of various kinds
 cleaning materials
 tools for maintenance purposes

Maintain Equipment and Consumables

Routine maintenance (also known as preventive maintenance) is performed


on a regular basis in order to keep things working well and reduces the chance
of something going wrong.

Non-Routine maintenance is fixing something after it has broken or is not


working properly. Therefore, the more routine maintenance carried out the less
likelihood of non-routine maintenance is required.

Maintenance in an IT environment

Some items requiring maintenance in an IT environment would be:

 Printers- Printouts may be streaky or faded. The printer may need


either cleaning or new cartridge.
 Monitors- Fingerprints may make the text difficult to read.
 PC's- A PC may not boot correctly. In investigation required and
possible re-installation of the operating system.
 Peripherals- A scanner or bar code reader may not be functioning
properly.
 Floppy disk Drive- The system may not read floppy disks. The drive
may need cleaning.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Replacing paper- Printers, photocopiers and fax machines may run
out of paper.

Precautions

Precautions are guidelines to be followed to prevent damage to equipment or


injury to people. The following are very important precautions:

 Before cleaning any electrical equipment make sure that it


is switched off and unplugged from the mains.
 Allow certain equipment, such as monitors and laser printers, to cool
down and lose their capacitance (charge) before cleaning them for
at least 30minutes.
 When cleaning inside the PC, or handling parts from a PC such as
hard disk or circuit boards, you should earth yourself
using antistatic wrist strap.
 Always refer to the manufactures manual before attempting to clean
any equipment, because improper cleaning or maintenance may be
dangerous and also may invalidate your warranty.
 Some equipment such as power supplies and monitors use voltages
and therefore should only be maintained by specially trained
people. It could be dangerous for any one else to open these up for
maintenance.

Cleaning in an IT environment.

Why clean?

Dust needs to be removed because it acts as an insulator that prevents


air from circulating over or through the components and this can cause
overheating. If dust contains conductive particles it can also cause a short
circuit, which can damage components or even cause a fire.

Removing Dust

Dust can be removed using a household vacuum cleaner with an


appropriate attachment, although it is much easier to use a purpose-built
computer vacuum cleaner or keyboard cleaner.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Residue from hands

The human skin produces residues that cling to surface of the computer
hardware we touch, which can be removed with liquid cleaners. However, use
only specifically designed cleaners for cleaning computer equipment. Unsuitable
cleaners may:

· cause dangerous fumes


· damage the plastics used in computer hardware
· release ozone-damaging gases
· not clean effectively

Cleaning kits

The contents of kits vary, but generally kits include:

Item How is it used?


Small brush Or dusting components of electrical equipment
Antistatic grounding To earth yourself while cleaning inside a PC
strap
Lint-free foam cleaning Are used with isopropyl alcohol, which is
swabs or buds (looks like dabbed on the bud and then used to clean
cotton buds) such components as the edge connectors on
cards, the contacts inside mice, and
keyboards.
Cleaning wipes Are small lint-free cloths for cleaning the
system unit casing, monitor and keyboard
Contact cleaning Not only helps clean the edge connectors and
solution electrical contacts inside the PC but also helps
to promote reliable connections.
Compressed air Is used for blasting dust out of obscure corners
which might not be able to reach with a mini
vacuum cleaner.
Cleaning disks for 3.5 Consists of an outer shell and replaceable
and 5 1/4 disk drives inner material on to which you put a few drops
of special cleaning fluid.
CD-Cleaning kit Cleans dust and grease from the CD. Also keep
the CDs in their cases, handle them by edges
and periodically clean them using the cleaning
kit.
Cleaning sheets for laser Are fed through the device in the normal way

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
printers, plain-paper fax for paper, but they remove toner, dirt and dust
machines and from the paper path, which improves the print
photocopiers quality.

Cleaning Peripherals

Monitors

Carefully clean dust away from the vents in the monitor's enclosure using
a vacuum cleaner. Anything other than a vacuum cleaner (e.g. a rag or air
blower) is likely to push the dust inside the enclosure where it can lie on
electrical components, causing failure. You should clean the glass screen with
one of the cleaners described previously.

If you use a spray to clean a monitor you should be careful to spray the
wipe.

Printers

You will get the greatest benefit from cleaning a printer if you can remove
any dust from the paths of moving parts. To do this you may need to remove
covers or paper trays.

However, at all times refer to the printer manual. It will contain the
instructions for removing parts and may even have some tips on cleaning. Do
not use any liquid cleaner on a printer unless the manufacturer recommends it.

Laser Printers

To clean laser printers:

1. Switch off and unplug the printer, and wait at least 30 minutes for it
to cool.
2. Wear disposable plastics gloves.
3. Clean the outer casing of the printer using a dampened paper towel
or a lint-free cloth with a little detergent on it.
4. Check for, and remove any loose bits of paper.
5. Vacuum inside the printer using a static-safe vacuum cleaner.
6. Use a lint-free swab dipped in isopropyl alcohol to clean the corona
wire.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Keyboards

The keyboard tends to not only accumulate a lot of dust and skin residue
but also some hair and lint form clothing. Loose matter can generally be
removed with the vacuum cleaner.

Mouse

The mouse tends to accumulate a mixture of dust and skin residue from
the surface it rolls on. Therefore to properly clean the mouse:

1. Turn the mouse upside down and push down and away the roller-
opening hatch with two fingers until you see the panels open.

2. Use a soft, dry, lint free cloth to wipe the ball clean. Never use
cleaning fluid or solvent. Gently blow into the mouse housing to remove
any dust.

3. To clean the steel rollers carefully use a cotton swab to remove the
material buildup.

4. Replace the ball in it its housing, and then re-insert the retaining
panel. When the panel is in place push it down and backwards until it
locks firmly.

Scanners and photocopiers

The glass top flatbed scanners, like those of monitors and photocopiers,
can get pretty dirty with finger marks. Usually you would use a lint-free cloth
dabbed with whatever chemical the manufacture recommends to wipe it clean.

Power Supplies

Maintenance for the power supply to PCs includes:

· Vacuuming dust from the vent holes

· Checking that the cables coming out of them are not worn or
broken

· Checking that the power socket is clear of dust and dirt

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Tape Drives

Because tape drives are usually used for backing up data, it is important
that they are kept clean, so that data is not corrupted by oils and other
contaminants during the backup process. You can purchase cleaning tapes, or
you can usually use a lint-free bud.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
JOB SHEET (3.5-1)

Title: cleaning, minor maintenance and replacements of


consumables

Performance Objective: Given required supplies and materials


you should be able to:
1. identify consumables
2. clean the consumables
Supplies/Materials/Equipment :
Small brush
Antistatic grounding strap
Lint-free foam cleaning swabs or buds (looks like cotton buds)
Cleaning wipes
Contact cleaning solution
Compressed air
Cleaning disks for 3.5 and 5 1/4 disk drives
CD-Cleaning kit
Cleaning sheets for laser printers, plain-paper fax machines and
photocopiers

Steps/Procedure: Cleaning

Monitors

Carefully clean dust away from the vents in the monitor's


enclosure using a vacuum cleaner. Anything other than a vacuum
cleaner (e.g. a rag or air blower) is likely to push the dust inside the
enclosure where it can lie on electrical components, causing failure.
You should clean the glass screen with one of the cleaners described
previously.

If you use a spray to clean a monitor you should be careful to


spray the wipe.

Printers

You will get the greatest benefit from cleaning a printer if you
can remove any dust from the paths of moving parts. To do this you
may need to remove covers or paper trays.

However, at all times refer to the printer manual. It will contain


the instructions for removing parts and may even have some tips on
cleaning. Do not use any liquid cleaner on a printer unless the
manufacturer recommends it.
Date Developed: Document No.
July 2019 Issued by:
Laser Printers Date Revised:
August 2019
Cookery
To clean laser printers:
MARINERS’ POLYTECHNIC Developed by:
COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
1. Switch off and unplug the printer, and
PALMARIA
wait at least 30 minutes
for it to cool.
2. Wear disposable plastics gloves.
3. Clean the outer casing of the printer using a dampened
paper towel or a lint-free cloth with a little detergent on it.
Performance Criteria Checklist (3.5-1)

CRITERIA
YES NO
Did you….
1. Did you use the tools in cleaning of
consumables
2. Did you follow the procedure in cleaning of
consumables
3. Did you follow the precautions

4. Did you prepare the PPE before cleaning the


consumables

Information Sheet 3.5-2

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
CREATING MORE SPACE IN HARD DISK

Objectives:
1. Discuss the ways in creating more space in hard disk
2. Explain the importance of having more space in hard disk

What is taking up space on my hard drive?

If you haven’t got space on your computer for that new app or game, or
the clutter on your hard drive is just driving you crazy, you’re not alone.
With the introduction of SSDs (solid-state drives) offering loads less space
than traditional mechanical hard drives, in conjunction with games and
applications requiring more and more disk space, your hard drive can easily
become full.
In this article, we’ll go through the top 8 ways to clean up your Windows hard
drive: finding out what is taking up so much space on your hard drive, reducing
the clutter and creating space for those all important new applications or files.

1. Windows Disk Clean-up

Windows comes with a handful of great tools to help keep your computer’s
storage nice and tidy. The problem is, not everybody knows where to find these
functions, or what to look for.
Disk Cleanup is the first of these tools. It allows you to delete data such as
temporary files, which can amount to GB’s (gigabytes) of data over time.

To access the Disk Cleanup function:

Go to your Computer window (Start -> Computer)


Right-Click your hard-drive and select ‘Properties’
Under the ‘General’ tab, click ‘Disk Cleanup’
Windows will scan your drive and let you know how much space you can save
by running Disk Cleanup
Select the files that you wish to delete form the drive, and hit OK

Another function to mention here is ‘Clean up system files’. Using this


function, you can remove older Windows restore points from your drive, leaving
only the most recent one. If you wish to use this function, please ensure that
your computer is running as expected, as once the restore points are removed,
you will not be able to fall back to them.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
To use ‘Clean up system files’:

Click Clean up system files


Go to the ‘More Options tab’ in the Disk Cleanup window
Click ‘Clean up…’ under the ‘System Restore and Shadow Copies’ heading

2. Uninstall Programs

For many computer users, most of the disk space used is by applications and
games. If you find that you no longer use certain programs, you can uninstall
and remove them from your hard drive.
Again, Windows provides the ability to easily get rid of any unwanted
programs that we may have on our computer. To uninstall/remove programs,
follow the steps below:

Start -> Control Panel -> Uninstall a program

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Sort the list of programs by file size by clicking the ‘Size header’. Now you can
see which programs take up the most space on your computer.
Click any program that you wish to remove, and click ‘Uninstall’

3. Remove Duplicate Files

It is likely that you’ve accumulated duplicate files over time, which are
unnecessary for the running of your computer. Unfortunately, Windows does not
provide an easy way to find and remove these duplicate files, so a third party
software is needed.
There are a number of applications for the removal of duplicate files, but
we’ll look at Duplicate Sweeper here. Duplicate Sweeper has a clear and easy
interface, and finds and removes duplicates easily.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Let

Duplicate Sweeper automatically select duplicate files for removal, using your
preferences, or select individual files yourself.

On a similar point, you can also delete any duplicate tracks in iTunes
which can take up a lot of disk space. This function can be found in iTunes ->
File -> Library -> Show Duplicate Items. From this list you can delete any
duplicate tracks.

However, if you have loads of duplicate files listed, which ones should you
delete? To manually go through each track and pick the best may take some
time. For this reason, many people use a third-party software to help out.
One such application is Tune Sweeper. Tune Sweeper can quickly search
your iTunes library for duplicates, and automatically select which to remove
based on preferences such as highest quality, longest duration or latest played.
Tune Sweeper can also tidy up your iTunes library by fixing track
information, downloading missing album artwork to tracks, removing missing
tracks and loads more.

4. Temporary Files

“Wait, we just
removed temporary files
using Windows Disk
Cleanup”, I hear you say.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Yes, we deleted temporary files containing webpages, stored on your hard drive
for quick viewing. Unfortunately, the Disk Cleanup method did not include files
saved by external apps such as Google Chrome or Mozilla Firefox. There may
still be gigabytes worth of cookies, internet history and caches stored on your
computer.
You can delete this information directly from your browser, or by using a third-
party application.
For example, using Google Chrome, you can open the settings menu (the
3 dots next to the address bar) -> More tools -> Clear Browsing data… From
here you can select which data you wish to remove, then click ‘Clear browsing
data’.

5. Take out the Trash

Some of these
files which we have
removed using the
above steps may
end up being
moved to the
Recycle Bin. This is
a nice safety
measure, because if
you make a mistake
and have removed
a file which you now
want back, you can
easily restore the
file from the
Recycle Bin.
However, the
files in the Recycle Bin are still taking up space on your computer. If you’re sure
that you would like to remove the files in your Recycle Bin, you can select files
and right-click to delete them, or simply click ‘Empty the Recycle Bin’ to
permanently delete all of the files.

6. Store data on External Storage or in the Cloud

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
All previous methods in this list describe how to delete or remove files from
your computer which you may not need. However, what of the files which you
wish to keep, such as precious photos, video and music? These media types can
accumulate to some serious storage space, but if you no longer have space for
them on your PC hard drive, you still have options!

A common method for keeping data safe is to transfer it to external storage.


There are 2 platforms for storing your data elsewhere from your main computer:
physical storage and cloud storage.
Physical storage comes in many different shapes and sizes, but can most
commonly be seen as USB Drives or external hard drives. Transferring data
from your PC hard drive to an external hard drive allows you to delete the
original files on your PC, while still keeping them safe in storage. Needless to
say, this clear a huge chunk of storage space on your PC.

Cloud Storage
allows you to store
your files on remote
servers, and access
them via the
internet. There are
many different cloud
service
providers: Apple
iCloud and Microsoft
OneDrive are only
two examples. Most
providers offer a
certain amount of
storage space free, and then give the option to pay monthly for more storage
space if you should need it.

7. Defragment your Hard Drive

When adding a new file to


your computer, a particular
portion of your hard drive is
allocated to store the file.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
However, after constantly saving and deleting files, a disk will become
‘fragmented’. This means that there are gaps in your hard drive where
subsequent files would not fit, so they are left vacant.
As well as affecting your usable free space on your hard drive, fragmentation
also has a negative impact on your computer’s ability to store your data in
sequence, hence slowing down it’s speed.

Luckily, Windows has us covered, providing a ‘Disk Defragmentation’ tool.


Using this tool, we can analyze which of our drives would benefit from
defragmentation, before we commit to defragging. This is very useful, as if you
have a large drive full of data, it may take a substantial amount of time to
defrag.
To make use of this tool, hit your Windows icon, or Start menu, then start
typing “Defragment”. From the search list, click Disk Defragmenter. Once you
see the tool’s window, you can elect each drive and analyze them to determine
what percentage of them is fragmented. Higher percentages mean higher
fragmentation.
To defragment your disk, just hit “Defragment Disk”.

Note:
It is not advised to defragment your hard drive too often, as the constant
writing and erasing of data can reduce the lifespan of your hard drive.
It may also be worth pointing out that there has been some debate as to
whether defragmentation of SSDs (solid-state drives) is beneficial or detrimental
to the drive. If you are unsure, you can read up on the discussion at PC World

8. Sufficient RAM

RAM (Random
Access Memory) is the
hardware in your
computer which
determines how you
store data. RAM stores
data or instructions
which you use
frequently, providing
fast read or write
processes to improve
the general speed of
your computer experience.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Sounds great, right? Right. However, if you don’t have sufficient RAM, your
computer will start to store the overflow of information which should be stored
in RAM, in your hard drive instead. Then, when your computer wants to read or
write this data, it is a much slower process between hard drive-computer than
RAM-computer.
For these reasons, make sure that you have sufficient RAM for the processes
that you generally do on your computer. It may be worth pointing out that the
average user, who’s agenda may be text editing and web browsing, will not
require as much RAM as a user who frequently runs multiple programs at once
including photo or video editing and rendering software.

You can find out how much RAM you currently have installed in your
computer by going to Computer > Properties

Self-Check 3.5-2

Identify the 8 ways to clean up your Windows hard drive.

1.
2.
3.
4.
5.
6.
7.
8.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.5-2

1. Windows Disk Clean-up


2. Uninstall Programs
3. Remove Duplicate Files
4. Temporary Files
5. Take out the Trash
6. Store data on External Storage or in the Cloud
7. Defragment your Hard Drive
8. Sufficient RAM

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.5-3

REVIEWING PROGRAMS

Objectives:
1. Define programming and software review
2. Identify the varieties and types of review

What is programming?

Programming is basically the process of writing computer programs.


The art of programming is one of the most essential skills in the IT world,
without it technology would look very different.
Programming is achieved by taking an algorithm and encoding it into a
programming language so that it can then be executed by a computer.
The processing of programming involves designing, writing, testing, debugging,
and maintaining the source code of computer programs. Code can be written in
numerous different languages such as Java, C, Python, Swift, and many more.
Code works as a way of communicating with a computer without using ones and
zeros.
There are several quality requirements that must be fulfilled with program
development.
These requirements include reliability, which refers to how often the
results of a program are correct.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
A software review is "A process or meeting during which a software
product is examined by a project personnel, managers, users, customers, user
representatives, or other interested parties for comment or approval".

Varieties of software review

Software reviews may be divided into three categories:


 Software peer reviews are conducted by the author of the work product,
or by one or more colleagues of the author, to evaluate the technical
content and/or quality of the work.
 Software management reviews are conducted by management
representatives to evaluate the status of work done and to make
decisions regarding downstream activities.
 Software audit reviews are conducted by personnel external to the
software project, to evaluate compliance with specifications, standards,
contractual agreements, or other criteria.

Different types of Peer reviews


 Code review is systematic examination (often as peer review) of computer
source code.
 Pair programming is a type of code review where two persons develop
code together at the same workstation.
 Inspection is a very formal type of peer review where the reviewers are
following a well-defined process to find defects.
 Walkthrough is a form of peer review where the author leads members of
the development team and other interested parties go through a software
product and the participants ask questions and make comments about
defects.
 Technical review is a form of peer review in which a team of qualified
personnel examines the suitability of the software product for its intended
use and identifies discrepancies from specifications and standards.

Formal versus informal reviews


"Formality" identifies the degree to which an activity is governed by
agreed (written) rules. Software review processes exist across a spectrum of
formality, with relatively unstructured activities such as "buddy checking"
towards one end of the spectrum, and more formal approaches such as
walkthroughs, technical reviews, and software inspections, at the other. IEEE
Std. 1028-1997 defines formal structures, roles, and processes for each of the
last three ("formal peer reviews"), together with software audits.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Research studies tend to support the conclusion that formal reviews
greatly outperform informal reviews in cost-effectiveness. Informal reviews may
often be unnecessarily expensive (because of time-wasting through lack of
focus), and frequently provide a sense of security which is quite unjustified by
the relatively small number of real defects found and repaired.

Self-Check 3.5-3

Identify whether the statements are true or false.

1. Peer programming is a type of code review where two persons develop


code together at the same workstation.

2. The processing of reviewing involves designing, writing, testing,


debugging, and maintaining the source code of computer programs.
3. A software review is a process or meeting during which a software product
is examined by a project personnel, managers, users, customers, user
representatives, or other interested parties for comment or approval.
4. Software management reviews are conducted by the author of the work
product, or by one or more colleagues of the author, to evaluate the
technical content and/or quality of the work.

5. Software peer reviews are conducted by management representatives to


evaluate the status of work done and to make decisions regarding
downstream activities.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.5-3

1. False - pair
2. False – programming
3. True
4. False – peer
5. False - management

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.5-4

DELETING UNWANTED FILES

Objectives:
1. Define unwanted files
2. Identify ways to delete unwanted files

Introduction

The longer you have a PC, the more unnecessary, temporary, or duplicate
files will accumulate on your disk. These files take up space that may cause
your PC to run slower or take up space on your hard drive. By deleting or
consolidating these files you can easily boost your PC's performance and open
up room for new files.

How to Clear up Unnecessary Files on Your PC

Cleaning Your Disk

1. Open "My Computer." Right-


click on the drive that you want
to clean and select "Properties"
at the bottom of the menu.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
2. Select "Disk clean-up." This
can be found in the "Disk
Properties Menu." Disk Clean-up
is a built in feature of Windows
that allows you to delete
unnecessary files from your PC.

3.

Identify the files you wish to


delete. You will most likely
want to delete things like
temporary files, log files,
files in your recycle bin, and
other unimportant files and
you can do this by ticking
the box next to its name.

4. Delete unnecessary files. Once


you have selected the files you wish
to delete, select "Ok." This may
prompt a window to appear that will
confirm your actions. Click "Yes."
 There may be system files that you
want to delete but they do not
appear in the Disk Cleanup Menu. To
access them, go to "Cleanup System
Files" at the bottom of the Disk
Cleanup window.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
5. Go to "More Options." Once
the More Options Tab appears,
look under the section entitled
"System Restore and Shadow
Copies" and select "Clean Up."
This may take a few minutes
to complete.

6. Finish Up. Now that you have


deleted unnecessary or
temporary files on your
computer, your PC should run
faster and smoother. You can
determine how much space you
have freed up on your hard drive
by going to Computer and then
selecting your hard drive. The
amount of space you have will
be in the bottom of the window.

Deleting Temporary Internet Files

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
1. Go to "Internet Options."
This can be found by
selecting the Start Icon,
then "Control Panel," and
then selecting "Network and
Internet." In this method,
you will be deleting
temporary internet files,
which accumulate when you
visit certain websites. They
serve as your browser's
cache and save pages and
content like videos and
music so that the next time
you visit that site it will load
faster.

2. Select the "General Tab." Under


Browsing History, select "Delete."
This will prompt a window that will
ask you to confirm that you wish to
delete these files. Select "Delete
All" and then "Yes."

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
3. Click "Ok." This will delete all of the Temporary Internet Files folder on
your computer in order to free up space on your disk.

4. Finish up. Once you have done


this, exit out of the program and
determine the amount of space you
have freed up on your hard drive.
You can do this by going to
Computer and then clicking on your
hard drive. The amount of space
you have will be in the bottom of
the window.

Deleting Duplicate Files

1. Choose a duplicate finding


application. There are a number
of applications out there that find
and delete duplicate files on your
hard drive in order to free up
space. Some of the more popular
options are dupeGuru, VisiPics,
Duplicate File Finder, and
DigitalVolcano's Duplicate
Cleaner Free.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
2. Open the application. This
will present you with a window
where you can input files and
folders that you wish to be
scanned. After you have
entered a few files, select
"Scan."

3.
Delete duplicate files. Once the
program has scanned the selected
files, it will show you where there are
duplicates. Delete them by simply
selecting and then pressing "Delete."

4.

Finish up. Once you have


scanned your desired folders,
exit out of the program and
determine the amount of
space you have freed up on
your hard drive. You may
want to scan two to three
folders before checking the
amount of space you have
freed up. You can do this by
going to Computer and then
clicking on your hard drive. The amount of space you have will be in the
bottom of the window.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.5-4

Identify at least one way of deleting unwanted files from your computer.
Write it step by step.

Way: ________________

Steps:
_______________
_______________
_______________
_______________

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Information Sheet 3.5-5

CHECKING HARD DISK FOR ERRORS

Objectives:
1. Define errors
2. Explain how to check hard disk for errors

Check your hard disk for errors in Windows 7

Symptoms

When you perform specific actions or open certain files, your computer crashes
or programs freeze.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Resolution

Windows 7 Disk Check

Sometimes, your computer is noticeably slower or programs "hang" when


you access certain files. This problem might occur because there are errors on
your hard disk drive.

You can troubleshoot the problem by using the Disk Check tool in
Windows 7. Disk Check can identify and automatically correct file system errors
and make sure that you can continue to load and write data from the hard disk.
You can use Disk Check in Windows 7 not only for local hard drives, but also for
removable media such as USB memory sticks or memory cards.

Note
Please make sure that you close all open programs and files before you
start the disk check.

1. Right-click the Start Windows


icon.

2. In the shortcut menu, click Open


Windows Explorer.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
3. In the navigation pane,
click Computer so that your drives
appear in the right pane.

4. Right-click the drive that you


want to check.

5. Click Properties.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
6. Click the Tools tab.

7. Click the Check now button.

8. In the Check Disk <disk


name> window, select

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
the Automatically fix file system errors check box.

Note If you want to perform a detailed test of the hard drive, you can
select the Scan for and attempt recovery of bad sectors check box. You
should do that in the justified suspicion of existing hardware error in any case.
But please note that the operation can then take a long time. For a first routine
check, we recommend that you do not select this option.

9. Click Start.

10. If the drive that you want to check is


currently in use and it is your system
drive, you will see a dialog box with a
warning message. In this case,
click Schedule disk check.

11. Exit all open programs, and then restart


your computer. The checking will start
automatically before next Windows startup

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
and display the results when completed.

12. If you are not checking the


system drive, you do not have to
turn off the computer. However,
the selected drive may also be in
use. In this case, you receive a
message. After you have saved all
files and close all open programs,
click Force a dismount.

13. The checking starts


immediately. After it is
completed, the results will be
displayed.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Self-Check 3.5-5

Write the steps in checking your computer hard disk for errors

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Answer Key 3.5-5

1. Right-click the Start Windows icon.

2. In the shortcut menu, click Open Windows Explorer.

3. In the navigation pane, click Computer so that your drives appear in the
right pane.

4. Right-click the drive that you want to check.

5. Click Properties.

6. Click the Tools tab.

7. Click the Check now button.

8. In the Check Disk <disk name> window, select the automatically fix file
system errors check box.

9. Click Start.
10. If the drive that you want to check is currently in use and it is your system
drive, you will see a dialog box with a warning message. In this case,
click Schedule disk check.

11. Exit all open programs, and then restart your computer. The checking will
start automatically before next Windows startup and display the results when
completed.

12. If you are not checking the system drive, you do not have to turn off the
computer. However, the selected drive may also be in use. In this case, you

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
receive a message. After you have saved all files and close all open programs,
click Force a dismount.

13. The checking starts immediately. After it is completed, the results will be
displayed.

Information Sheet 3.5-6

VIRUSES AND UP-TO-DATE ANTI-VIRUS PROGRAMS

Objectives:
1. Define computer viruses
2. Identify anti-virus programs

Computer Viruses

A computer virus is a program designed to harm or cause harm on an


infected computer. Its spreads through e-mail attachments, portable devices,
websites containing malicious scripts and file downloads. A computer virus
attaches itself to the host files and always activate whenever you open the
infected files. The virus can replicate itself and then infect the other files on
your computer causing more damage. Below is a list of different types of
computer viruses and what they do.

THE DIFFERENT TYPES OF COMPUTER VIRUSES

Macro Viruses
These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb. They automatically infect
the files with macros and also templates and documents that are contained in
the file. They hide in documents shared through e-mail and networks.

Macro viruses include:


 Relax
 bablas
 Melissa.A

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 097M/Y2K

Memory Resident Viruses
They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened files. They
hide in RAM.

Memory Resident Viruses Include:


 CMJ
 meve
 randex
 mrklunky

Overwrite Viruses
These types of viruses delete any information in a file they infect, leaving
them partially or completely useless once they are infected. Once in the
computer, they replaces all the file content but the file size doesn’t change.

Overwrite Viruses Include:


 Trj.Reboot
 way
 trivial.88.D

Direct Action Viruses


These viruses mainly replicate or take action once they are executed.
When a certain condition is met, the viruses will act by infecting the files in the
directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally
found in the hard disk’s root directory, but they keep on changing location.

Direct Action Viruses Include:


 Vienna virus

Directory Virus
Also known as cluster virus or file system virus. They infect the
computer’s directory by changing the path indicating file location. They are
usually located in the disk but affect the entire directory.

Directory Viruses Include:


 dir-2 virus

Web Scripting Virus

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Most web pages include some complex codes in order to create an
interactive and interesting content. Such a code is often exploited to cause
certain undesirable actions. They mostly originate from the infected web pages
or browsers.

Web Scripting Viruses Include:


 JS.Fortnight – a virus that spreads via malicious emails.

Multipartite Virus
These type of viruses spread in many different ways. Their actions vary
depending on the OS installed and presence of certain files. They tend to hide in
the computer’s memory but do not infect the hard disk.

Multipartite Viruses Include:


 flip
 invader
 tequila

FAT Viruses
These lardy viruses attack the file allocation table (FAT) which is the disc
part used to store every information about the available space, location of files,
unusable space etc.

FAT Viruses Include:


 the link virus

Companion Viruses
These types of viruses infect files just like the direct action and the
resident types. Once inside the computer, they ‘accompany’ other existing files.

Companion Viruses Include:


 Asimov.1539
 stator and terrax.1069

Polymorphic Virus
They encode or encrypt themselves in a different way every time they
infect your computer. They use different encryption and algorithms. This makes
it difficult for the antivirus software to locate them using signature or string
searches (since they are very different in each encryption).

Polymorphic Viruses Include:

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
 Marburg
 tuareg
 Satan bug
 elkern

Worm
This program is very similar to a virus and has the ability to self-replicate
leading to negative effects on your computer.

Worm Viruses Include:


 lovgate.F
 sobig.D
 trile. C
 PSWBugbear.B
 Mapson

Trojans
Trojans can illegally trace important login details of users online. For
example E-Banking is very common among users, therefore, vulnerability of
tracing your login details whenever your PC is working without any strong
powerful antivirus installed.

Email Virus
This is a virus spread via an email. Such a virus will hide in an email and
when the recipient opens the mail.

Browser Hijacker
This virus can spread in many different ways including a voluntary
download. If infects certain browser functions especially in form of re-directing
the user automatically to certain sites. A good example is

Browser Hijackers Include:


 the cool web search

Boot Infectors
They include the boot sector plus master boot record types. All the viral
codes can be separate location; however they infect the hard disks or the
floppy.

Boot Infectors Include:


 the brain virus -it is the very first wild virus to be created.

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
From what we have seen, the many types of computer viruses and their effects
are very harmful and can completely damage your system. Always make sure
your system is up to date. Also install antivirus software. The antivirus program
protects your computer and the personal information in it.

Best free antivirus softwares

February 11, 2019, PC Mag’s Neil Rubenking rounded up the top 10 free
antivirus programs for 2019, with handy links to his unbiased, independent
reviews for each. So if you’re in need of free protection for Windows 7, 8, or 10,
here are his top picks:

1. Avast Free Antivirus


2. Kaspersky Free
3. AVG AntiVirus FREE
4. Bitdefender Antivirus Free Edition
5. Check Point ZoneAlarm Free Antivirus+ 2017
6. Sophos Home Free
7. Avira Antivirus
8. Adaware Antivirus Free
9. Comodo Antivirus 10
10. Panda Free Antivirus

Avast Free Antivirus - (Editors’ Choice, PC Mag)

Avast Free Antivirus took the top spot thanks to a combination of great
test results and built-in features. In addition to its proven malware protection
and excellent phishing protection, Avast packs in a basic password manager, a
secure web browser, and more. Avast’s all-in-one Smart Scan searches for
hidden malware, unwanted browser add-ons, network threats, and PC

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
performance issues. (But if you want to solve any performance issues it finds,
you’ll have to purchase Avast Cleanup Premium.)

Kaspersky Free

Kaspersky Free has earned excellent marks in independent test labs,


despite its lack of extra features found in some other free antivirus products.
The interface shows the same six icons as in the paid Kaspersky Internet
Security, but only Scan and Database Update are available to free users. If you
want access to Safe Money, Privacy Protection, Parental Control, and Protection
for All Devices, you’ll need to pay. That said, Kaspersky Free still gives you real-
time security, very good phishing protection, and even warns of unsafe
websites. Not bad for a free antivirus.

AVG AntiVirus FREE

PC Mag praised AVG AntiVirus FREE for achieving very good scores in a
variety of independent tests, and for its excellent protection
against phishing. AVG’s on-demand scan searches for hidden malware,
unwanted browser add-ons, and PC performance issues. AVG AntiVirus FREE
also gives you a free File Shredder to securely delete sensitive files. AVG
protects against 0-day threats by preventing unknown (and potentially
dangerous) files from opening and sending them to AVG Threat Labs for deeper
analysis. If they’re found to be malicious, a cure is created and pushed out to
you and all AVG users.

Bitdefender Antivirus Free Edition

Bitdefender Antivirus Free Edition includes the same core anti-malware


components of Bitdefender’s paid product, but with a far cleaner interface. It
obviously lacks the more advanced features of its bigger brother, but still
provides excellent performance and has earned top scores in independent lab
tests. But if you want a password manager, you’ll need Bitdefender’s paid
antivirus (or get it free with Avast Free Antivirus).

Check Point ZoneAlarm Free Antivirus+ 2017

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Check Point ZoneAlarm is a free antivirus-firewall combo that licenses its
antivirus engine from security giant Kaspersky. Aside from this antivirus
component, though, all features here are the same as you’ll find in Check Point
ZoneAlarm Free Firewall 2017. And that’s a good thing, because their
standalone firewall was a PC Mag Editors’ Choice winner. So, for many people,
this antivirus-firewall combo will be more than good enough. But if you’re
looking for features like web-based security and real-time, cloud-based
protection, you’ll need to look elsewhere.

Sophos Home Free

Sophos Home Free comes from Sophos, a company mainly focused on


business security, and their free antivirus offers much of the same protection as
their business products, including remote security management for up to three
PCs or Macs. This means you can also install the free antivirus on a less tech-
savvy family member’s computer and remotely manage their security for them.
Sophos Home Free offers excellent phishing protection and very good malicious
URL blocking, but unfortunately suffers a bit in PC Mag’s hands-on malware
protection test.

Avira Antivirus

Avira Antivirus received excellent scores in independent testing labs and a


very good score in PC Mag’s malware blocking test. When installing Avira
Antivirus, you also have the chance to install other tools, including Avira
Connect to launch and manage your other Avira products. On the negative side,
both of its on-demand and real-time scans are slow, and its Browser Safety
component only works with Chrome and Firefox.

Adaware Antivirus Free

Adaware Antivirus Free comes from Adaware, a company formerly known


as Lavasoft. This version of their free antivirus comes with a new look, but lacks
features found in other free products — including the company’s own previous
edition. Adaware Antivirus Free has received mixed scores in independent tests,
and it doesn’t provide any protection against malicious URLs. At the end of the
day, it’s a free antivirus, so there’s really no risk to try it, but you’ll find more
features and better protection in the competition.

Comodo Antivirus 10

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
Comodo Antivirus 10 is Comodo’s newest antivirus, having skipped from
version 8 straight to version 10. This newest version rocks an all-new look, but
you can still revert to the “Classic” theme via settings. According to PC Mag,
Comodo’s “results ranged from perfect to dismal”. The free antivirus sports
impressive on-access scan results and even includes sandboxing, but you’ll
need to pony up for the paid suite if you need web-based protection. Also, pay
careful attention during installation, because Comodo tries to change your
default homepage, new tab page, and default search engine to Yahoo!

Panda Free Antivirus

Panda Free Antivirus finished last in PC Mag’s top 10 list, but it’s still got a
few good things going for it. For one, it’s got a pretty interface. It’s also speedy
and lightweight, and includes USB Protection to vaccinate any USB device you
plug into your PC. But if you’re installing a 3rd-party antivirus, you’re looking for
protection, aren’t you? Panda Free Antivirus unfortunately underperforms in this
respect, as its detection rates have apparently waned recently in independent
virus lab tests.

Self-Check 3.5-6

Choose the letter of the correct answer for each item.

1. These viruses infect the files created using some applications or


programs that contain macros such as doc, pps, xls and mdb.
a. Macro Viruses
b. Memory Resident Viruses
c. Overwrite Viruses
d. Direct Action Viruses

2. These viruses mainly replicate or take action once they are


executed. When a certain condition is met, the viruses will act by
infecting the files in the directory or the folder specified in the
AUTOEXEC.BAT.
a. Macro Viruses
b. Memory Resident Viruses
c. Overwrite Viruses
d. Direct Action Viruses

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
3. These types of viruses delete any information in a file they infect,
leaving them partially or completely useless once they are infected.
a. Macro Viruses
b. Memory Resident Viruses
c. Overwrite Viruses
d. Direct Action Viruses

4. They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened
files. They hide in RAM
a. Macro Viruses
b. Memory Resident Viruses
c. Overwrite Viruses
d. Direct Action Viruses

5. These type of viruses spread in many different ways. They vary


depending on the OS installed and presence of certain files. They
tend to hide in the computer’s memory but do not infect the hard
disk.
a. Directory Virus
b. Web Scripting Virus
c. Multipartite Virus
d. FAT Viruses
6. Also known as cluster virus or file system virus. They infect the
computer’s directory by changing the path indicating file location.
They are usually located in the disk but affect the entire directory.
a. Directory Virus
b. Web Scripting Virus
c. Multipartite Virus
d. FAT Viruses

7. Most web pages include some complex codes in order to create an


interactive and interesting content. Such a code is often exploited to
cause certain undesirable actions. They mostly originate from the
infected web pages or browsers.
a. Directory Virus
b. Web Scripting Virus
c. Multipartite Virus
d. FAT Viruses

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA
8. These lardy viruses attack the file allocation table (FAT) which is the
disc part used to store every information about the available space,
location of files, unusable space etc.
a. Directory Virus
b. Web Scripting Virus
c. Multipartite Virus
d. FAT Viruses

9. This program is very similar to a virus and has the ability to self-
replicate leading to negative effects on your computer.
a. Trojans
b. Worm
c. E-mail Virus
d. Boot Infectors

10. These can illegally trace important login details of users


online.
a. Trojans
b. Worm
c. E-mail Virus
d. Boot Infectors

Answer Key 3.5-6

1. A
2. D
3. C
4. B
5. C
6. A
7. B
8. D
9. B
10. A

Date Developed: Document No.


July 2019 Issued by:
Date Revised:
August 2019
Cookery

MARINERS’ POLYTECHNIC Developed by:


COLLEGES FOUNDATION CHLOE ANNE A. Revision # 01
PALMARIA

You might also like