CBLM Perform Computer Operations
CBLM Perform Computer Operations
Qualification: COOKERY NC II
Prepared by:
You may already have some or most of the knowledge and skills
covered in this module because you have:
This module was prepared to help you achieve the required competency:
Performing Computer Operations. This will be the source of information for
you to acquire the knowledge and skills in this particular module with minimum
supervision or help from your trainer. With the aid of this material, you will
acquire the competency independently and at your own pace.
Talk to your trainer and agree on how you will both organize the training
of this unit. Read through the module carefully. It is divided into sections which
covers all the skills and knowledge you need to successfully complete in this
module.
Work through all the information sheets and complete the activities in
each section. Do what is asked in the INSTRUCTIONAL SHEETS and complete
the SELF-CHECK. Suggested references are included to supplement the
materials provided in this module.
Most probably, your trainer will also be your supervisor or manager.
He/she is there to support you and show you the correct way to do things. Ask
for help.
Your trainer will tell you about the important things you need to consider
when you are completing activities and it is important that you listen and take
notes.
Talk to more experienced workmates and ask for their guidance.
Use the self-check questions at the end of each section to test your own
progress.
When you are ready, ask your trainer to watch you perform the activities
outlined in the module.
As you work through the activities, ask for written feedback on your
progress. Your trainer gives feedback/pre-assessment reports for this reason.
When you have successfully completed each element or learning outcome, ask
your trainer to mark on the reports that you are ready for assessment.
When you have completed this module and feel confident that you have
had sufficient practice, your trainer will schedule you for the institutional
MODULE CONTENT
INTRODUCTION:
LEARNING OUTOMES :
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
Lecture
Group discussion
Tutorial or self-pace
ASSESSMENT METHODS
Observation
Questioning
Practical demonstration
Learning Objective:
Introduction
SEATING CONSIDERATIONS
• Adjust the height of the chair to achieve proper posture – your legs from the
body should be close to parallel to the floor.
• Adjust the backrest of the chair to provide support for your lower back.
• Your chair should have space behind your knees while seated properly with
your back against the backrest.
• Proper posture means having 90-degree or higher angles at the hips and
knees with feet supported by an angled footrest.
MONITOR CONSIDERATIONS
• Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
• The top of the viewing surface of the monitor should be at or below eye level.
• Your monitor should be located 12” to 24” from your eyes.
• Use accessories such as anti-glare filters and adjusting screen angle to
prevent screen glare – if you can, use softer color schemes on your monitor.
Orient your workstation so that you are parallel to sources of light.
• Ensure that your forearms are parallel to the floor or slightly downward when
you are typing.
• If you are using a mouse, make sure it is as close to the keyboard as possible
– if you have limited surface, consider using a touch pad.
• When typing, maintain a neutral wrist position where the forearms, wrists and
hands are in a straight line.
GENERAL CONSIDERATIONS
• Keep shoulders relaxed and head and neck in an upright but relaxed position.
• Get regular eye exams and wear corrective lenses – use a task light to
illuminate documents if background lighting is poor.
• Use a document holder to place source documents as close to the screen as
possible and at the same height and distance (use a document holder attached
to the screen or an articulating one attached to the desk).
• Avoid long periods of repetitive activity; where possible, alternate computer
work with other tasks like filing, phone calls, etc.
• Drink water throughout the day and keep yourself well hydrated.
Self-Check 3.1-1
1. The top of the viewing surface of the monitor should be at or below eye
level.
2. Proper posture means having 180-degree or higher angles at the hips and
knees with feet supported by an angled footrest.
3. Your monitor should be located 12” to 24” from your eyes.
4. Ensure that your forearms are parallel to the table or slightly downward
when you are typing.
5. Drink water throughout the day and keep yourself well hydrated.
6. Keep shoulders relaxed and head and neck in a downward but relaxed
position.
7. When typing, maintain a neutral wrist position where the forearms, wrists
and hands are in a straight line.
8. Adjust the height of the chair to achieve proper posture – your legs from
the body should be close to perpendicular to the floor.
9. Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
10. Adjust the backrest of the chair to provide support for your upper
back.
1. T
2. F
3. T
4. F
5. T
6. F
7. T
8. F
9. T
10. F
Learning Objectives:
After reading this information sheet, the student/ trainee should be able
to;
TYPES OF COMPUTERS
Supercomputer
Supercomputers are the fastest and the most expensive computers. These
huge computers are used to solve very complex science and engineering
problems. Supercomputers get their processing power by taking advantage
of parallel processing; they use lots of CPUs at the same time on one problem. A
typical supercomputer can do up to ten trillion individual calculations every
second.
Example Supercomputers:
K Computer
Mainframe
Server Computer
Sun SPARCstation
Personal Computer or PC
Microcontroller
Smartphone
Configuring
backups has,
traditionally, been one of
the least fun things about
computing. It's perhaps
only slightly less
frustrating than trying to
recover your system from
said backup. If you don't
have too many files to
back up, services like
Dropbox, Sugarsync, and
Windows Live Mesh work quite well. In fact, for several years I used Live Sync
(formerly Foldershare, now called Live Mesh) to create real-time offsite backups
of my most important files. But you can't back up and recover an entire system
that way.
Windows had its roots in the MS-DOS command line, and continues to this
day with the "DOS box" command prompt, cmd.exe. There's Windows
PowerShell if you want a more robust scripting environment in Windows, and
Cygwin if you prefer something more in line with the traditional Unix terminal.
When Jean Louis Gasse left Apple, he founded a new team that created
the charming and forward-looking BeOS in 1991. At the time, BeOS featured
some pretty radical technology. Designed from the ground up as an efficient,
lightweight multithreaded system with preemptive multitasking, it was very fast
on modest hardware and scaled up to take advantage of any processors on the
system (in those days, rarely more than two, but still...).
BeOS faded away as a commercial OS, but there's still a small, loyal group of
enthusiasts keeping the flame burning. If you can find a BeOS 5 CD, it'll
probably run on most commodity x86 hardware. Software is available from the
BeBits repository. In addition, the Haiku project is an ongoing community effort
to build a source-compatible open-source version of BeOS. They recently
dropped an Alpha 2 release that's reasonably stable and runs most of the
available legacy code.
MS-DOS, BASIC
MS-DOS was
undeniably the
dominant desktop
operating system
The BASIC language tools included in MS-DOS evolved over the years to
include rudimentary Integrated Development Environment (IDE) features and a
compiler for faster execution of programs. Microsoft BASIC, GW-BASIC,
QuickBASIC and QBasic ultimately evolved into the Visual Basic language we
know today, acquiring millions of enthusiasts along the way.
iOS, Multi-Touch
It's true that Apple did not invent touch computing. Far from it. In fact,
workable touch computing systems -- albeit crude by current standards -- were
produced by IBM and Control Data in the late 1960s and early 1970s. In the
1980s, Bell Labs and the University of Toronto's Input Research Group (including
Bill Buxton, currently at Microsoft Research) independently built touch screens
that could respond to multiple touches. Microsoft's Surface tabletop computing
platform was introduced in 2001.
The introduction of what we now know as iOS for the iPhone in 2007,
however, represented the first chance for many of us to have a hands-on
experience with multi-touch. Apple later opened up iOS and the Cocoa Touch
APIs to developers to build their own touch-aware applications, and iOS is now
featured on the iPhone, iPod Touch and iPad. Of course, Google and Microsoft
were not (too far) behind with both Android and Windows Phone 7 featuring
their own multi-touch interfaces.
The Start menu and taskbar as we know them in Windows today debuted
in Windows 95. With each new release of Windows, new features have been
added: integrated search, pinned applications, recently used files and one-click
access to often used folders and system configuration tools. Vista added the
ability to type a string into the search box and get a list of files and applications
matching that string. Windows 7 made that feature actually work properly
(mostly through more efficient file indexing) and added per-application recently
used file listings.
Self-Check 3.1-2
__________________ 1. These are the fastest and the most expensive computers.
These huge computers are used to solve very complex science and engineering
problems.
1. Supercomputers
2. Workstations
3. Microcontrollers
4. Mainframe
5. Server
Objectives:
Introduction
Motherboard
Hard Disc
Computer Memory
Keyboard
Mouse
Self-Check 3.1-3
1. Hard disc
2. Computer Memory
3. Mouse
4. Keyboard
5. Monitor
Objectives:
Types of Storage
• Primary Storage
• Secondary Storage
• Tertiary Storage
• Off-line Storage
Primary Storage
• Also known as main memory.
• Main memory is directly or indirectly connected to the central
processing unit via a memory bus.
• The CPU continuously reads instructions stored there and executes them
as required.
Example:
– RAM
– ROM
– Cache
RAM
• It is called Random Access Memory because any of the data in RAM can
be accessed just as fast as any of the other data.
RAM
• Faster
• More expensive
• More power consumption
• does not need to be refreshed
Dynamic RAM
• Slower
• Less expensive
• Less power consumption
• needs to be refreshed
ROM
Cache
• Cache is a high-speed access area that can be either a reserved section
of main memory or a storage device.
• Most computers today come with L3 cache or L2 cache, while older
computers included only L1 cache.
Secondary Storage
• It is not directly accessible by the CPU.
• Computer usually uses its input/output channels to access secondary
storage and transfers the desired data using intermediate area in primary
storage.
• Example: – Hard disk
Hard Disk
• The hard disk drive is the main, and usually largest, data storage device
in a computer.
• It can store anywhere from 160 gigabytes to 2 terabytes.
Tertiary Storage
• Typically it involves a robotic mechanism which will mount (insert) and
dismount removable mass storage media into a storage device.
• It is a comprehensive computer storage system that is usually very slow,
so it is usually used to archive data that is not accessed frequently.
• This is primarily useful for extraordinarily large data stores, accessed
without human operators.
Examples:
– Magnetic Tape
– Optical Disc
Magnetic Tape
Optical Disc
• Optical disc is any storage media that holds content in digital format and
is read using a laser assembly is considered optical media.
Off-line Storage
Examples:
– Floppy Disk
– Zip diskette
– USB Flash drive
– Memory card
Floppy Disk
• A soft magnetic disk.
• Floppy disks are portable.
• Floppy disks are slower to
access than hard disks and
have less storage capacity, but
they are much less expensive.
• Can store data up to 1.44MB.
• Two common sizes: 5 ¼” and 3
½”.
• A small, portable flash memory card that plugs into a computer’s USB
port and functions as a portable hard drive.
• Flash drives are available in sizes such as 256MB, 512MB, 1GB, 5GB,
and 16GB and are an easy way to transfer and store information.
Memory Card
Self-Check 3.1-4
1. C
2. A
3. B
4. A
5. C
Objectives:
Introduction
1. System Software
2. Application software
A normal user rarely gets to see the operating system or to work with it. But
all of us are familiar with application software which we must use to interact
with a computer. Popular examples of application software are the Microsoft
office suite which includes Word, Excel and PowerPoint. We have used these
applications extensively. Internet explorer, Mozilla Firefox is two applications
used to access the internet. E-mail software like Outlook express is used to
manage Emails.
3. Programming languages
Self-Check 3.1-5
PERIPHERAL DEVICES
Objectives:
Say you just bought a new computer and, with excitement, you unpack it
and set it all up. The first thing you want to do is print out some photographs of
the last family party. So it's time to head back to the store to buy a printer. A
printer is known as a peripheral device.
Most people use the term peripheral more loosely to refer to a device
external to the computer case. You connect the device to the computer to
expand the functionality of the system. For example, consider a printer. Once
the printer is connected to a computer, you can print out documents. Another
way to look at peripheral devices is that they are dependent on the computer
system. For example, most printers can't do much on their own, and they only
become functional when connected to a computer system.
There are many different peripheral devices, but they fall into three
general categories:
Self-Check 3.1-6
Input Output
Objectives:
The 2004 Act was varied to include the following health and safety principles:
all people are given the highest level of health and safety protection that
is reasonably practicable;
those who manage or control activities that give rise, or may give rise, to
risks to health or safety are responsible for eliminating or reducing health
and safety risks, so far as is reasonably practicable;
employers and self-employed people should be proactive and take
reasonably practicable measures to ensure health and safety in their
business activities;
employers and employees should exchange information about risks to
health or safety and measures that can be taken to eliminate or reduce
those risks; and
employees are entitled, and should be encouraged, to be represented on
health and safety issues.
Once all these criteria have been met, safety performance can be assessed
by each individual's supervisor on an equal basis with other key job elements.
Health and safety is not just an extra part of an employee's job: it is an integral,
full-time component of each individual's responsibilities.
Self-Check 3.1-7
Responsibilities of workers:
Responsibilities of management:
1.
2.
3.
4.
5.
Objectives:
Introduction
Here are six essential skills needed for reading comprehension, and tips on
what can help kids improve this skill.
1. Decoding
Decoding is a vital step in the reading process. Kids use this skill to sound
out words they’ve heard before but haven’t seen written out. The ability to do
that is the foundation for other reading skills.
Decoding relies on an early language skill called phonemic awareness. (This
skill is part of an even broader skill called phonological awareness.) Phonemic
awareness lets kids hear individual sounds in words (known as phonemes). It
also allows them to “play” with sounds at the word and syllable level.
Decoding also relies on connecting individual sounds to letters. For
instance, to read the word sun, kids must know that the letter s makes the /s/
sound. Grasping the connection between a letter (or group of letters) and the
sounds they typically make is an important step toward “sounding out” words.
2. Fluency
To read fluently, you need to instantly recognize words, including ones they
can’t sound out. Fluency speeds up the rate at which they can read and
understand text. It’s also important when kids encounter irregular words, like of
and the, which can’t be sounded out.
3. Vocabulary
To understand what you’re reading, you need to understand most of the
words in the text. Having a strong vocabulary is a key component of reading
comprehension. Students can learn vocabulary through instruction. But they
typically learn the meaning of words through everyday experience and also by
reading.
Self-Check 3.1-8
1. Decoding speeds up the rate at which they can read and understand
text.
2. Having a strong vocabulary is a key component of reading
comprehension.
3. Fluency relies on an early language skill called phonemic
awareness.
4. Most readers relate what they’ve read to what they know. So it’s not
important to have background or prior knowledge about the world
when reading.
5. Understanding how sentences are built might seem like a writing
skill. So might connecting ideas within and between sentences,
which is called cohesion.
1. False – Fluency
2. True
3. False – Decoding
4. False – Important
5. True
Objectives:
Introduction
Communication skills are essential no matter what job you work in or your
level of seniority. When there is a breakdown in communications, often
efficiency, morale and objectives can all suffer.
In today’s competitive jobs market, communication skills in the business
world are highly sought after, with recruiters looking for candidates who can
communicate information, negotiate and confidently deal with customers.
Listening carefully, speaking clearly and putting others at ease are very
valuable attributes to possess.
1. Emotional Intelligence
Good communication is much more than saying the right thing; it is about
communicating messages clearly and concisely.
Before you start a conversation, type an email or begin a discussion, have
in mind what the purpose of the communication is and what information you
hope to obtain as a result. Lack of clarity and cohesion can result in poor
decisions and confusion.
3. Friendliness
In any type of communication, make sure that you set the right tone. A
friendly tone will encourage others to communicate with you.
Always try to personalize messages, particularly when working with
partners or fellow colleagues. Wishing the recipient a good weekend, for
example, is a great way to personalize your message.
4. Confidence
5. Empathy
Within a busy work environment, everyone will have their own ideas about
how things should be done. Even if you have disagreements with your
colleagues or partners, their point of view should be considered and respected.
Empathy is also beneficial when speaking with customers in certain types of
customer-facing role.
The goal here is to understand where the other person is coming from – and
respect their views even if they are very different from your own.
Empathy leads into the next communication skill, respect. If you respect the
ideas and opinions of others, they will be more likely to communicate with you.
Active listening or simply using the name of the person you are speaking to can
both be effective.
Make sure that when you type emails, you don’t sound insincere or write in
a way that is insincere.
7. Listening
8. Open Mindedness
9. Tone of Voice
The tone of your voice can set the whole mood of the conversation. If you
start the discussion in an aggressive or unhelpful manner, the recipient will be
more inclined to respond in a similar way.
The tone of your voice will include the level of emotion that you use, the
volume you use and the level of communication you choose.
The same sentence can have a very different meaning depending on which
words are emphasized and the tone of your voice.
In a customer complaint scenario, for example, your tone of voice should be
as calm as possible, since an unfriendly tone of voice will only serve to worsen
the situation.
Good questions can help conversations flow and improve the outcome.
During a conversation, always aim to ask open-ended questions. These are
questions with prompts which encourage the recipient to speak about certain
points and they require more detailed responses.
If you need further information still, you can use probing questions which
request even more information from the recipient such as ‘Tell me the process
of…”
During the conversation include a mixture of questions including
clarification, ‘what if’ scenarios and open-ended questions to make sure that
you achieve what you set out to do at the beginning of the call or conversation.
It is likely that you will need to show evidence of your own communication
skills during a competency based interview. Questions you may be asked
include:
Give an example of how you dealt with a difficult or sensitive situation that
required extensive communication.
Give me an example of how you dealt with a difficult customer at work.
Tell me about a time when you had to explain an issue or process to a
colleague (or colleagues) at work.
Tell me about a time when you taught someone else something.
How do you explain things to other people?
1. A
2. B
3. A
4. B
5. B
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
Lecture
Group discussion
Tutorial or self-pace
ASSESSMENT METHODS
Observation
Questioning
Practical demonstration
Learning Objective:
Introduction
SEATING CONSIDERATIONS
• Adjust the height of the chair to achieve proper posture – your legs from the
body should be close to parallel to the floor.
• Adjust the backrest of the chair to provide support for your lower back.
• Your chair should have space behind your knees while seated properly with
your back against the backrest.
• Proper posture means having 90-degree or higher angles at the hips and
knees with feet supported by an angled footrest. MONITOR CONSIDERATIONS
• Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
• The top of the viewing surface of the monitor should be at or below eye level.
• Your monitor should be located 12” to 24” from your eyes.
• Ensure that your forearms are parallel to the floor or slightly downward when
you are typing.
• If you are using a mouse, make sure it is as close to the keyboard as possible
– if you have limited surface, consider using a touch pad.
• When typing, maintain a neutral wrist position where the forearms, wrists and
hands are in a straight line.
GENERAL CONSIDERATIONS
• Keep shoulders relaxed and head and neck in an upright but relaxed position.
• Get regular eye exams and wear corrective lenses – use a task light to
illuminate documents if background lighting is poor.
• Use a document holder to place source documents as close to the screen as
possible and at the same height and distance (use a document holder attached
to the screen or an articulating one attached to the desk).
• Avoid long periods of repetitive activity; where possible, alternate computer
work with other tasks like filing, phone calls, etc.
• Drink water throughout the day and keep yourself well hydrated.
1. The top of the viewing surface of the monitor should be at or below eye
level.
2. Proper posture means having 180-degree or higher angles at the hips and
knees with feet supported by an angled footrest.
3. Your monitor should be located 12” to 24” from your eyes.
4. Ensure that your forearms are parallel to the table or slightly downward
when you are typing.
5. Drink water throughout the day and keep yourself well hydrated.
6. Keep shoulders relaxed and head and neck in a downward but relaxed
position.
7. When typing, maintain a neutral wrist position where the forearms, wrists
and hands are in a straight line.
8. Adjust the height of the chair to achieve proper posture – your legs from
the body should be close to perpendicular to the floor.
9. Your monitor should be directly in front of you when typing – you, the
keyboard and the monitor should form a straight line.
10. Adjust the backrest of the chair to provide support for your upper
back.
1. T
2. F
3. T
4. F
5. T
6. F
7. T
8. F
9. T
Learning Objective:
Introduction
Your commands, ideas, demands and concepts form the data your system
processes and stores. Without user input, a computer simply takes up desktop
space and waits for directions, like a lost motorist with a broken-down car.
Without input methods and devices, your correspondence, reports, images and
numbers remain in your head rather than becoming work in progress.
Data entry is the process of inputting data or information into the
computer using devices such as a keyboard, scanner, disk, and voice
Keyboards
Wired and wireless data keyboards break down linguistic input and
software commands into individual units of meaning. You can type a single
letter, combine alphanumeric keys with command keys to produce accented or
specialized characters, and enter simple or complex instructions to control
software processes. From the traditional QWERTY keyboard, adapted from the
typewriter, to layouts such as the Dvorak keyboard, which promotes faster
typing, and adapted variations with additional keys, these devices translate
finger-based keypresses into data input.
Data Drives
Flash, optical and hard drives store the output of computer processes, but
they also provide the input for other functions. From files that contain data to be
manipulated to temporary data storage that provides input from a clipboard or
program, these devices simplify and speed the act of making information
available to software processes. Some of these devices contain moving platters,
whereas others rely on solid-state NAND flash chips or inserted
writeable/rewriteable optical discs. They may be installed as internal computer
components or plugged in to a USB, FireWire or Thunderbolt port.
Audio/Video Devices
Computers accept a wide range of audio-data inputs. You can dictate
audio input into a headset for use in a text-to-speech program that converts
your words into word processing, sing or play a musical instrument into a
microphone for recording in an audio file, plug an electronic instrument into
your computer for direct input of synthesized sounds or transfer audio from a
recording device. To bring visual information into a new or existing document,
you can digitize objects or printed information on a two- or three-dimensional
scanner, transfer files from a digital camera or combined audio/video input from
a camcorder, or record an individual or a surveilled scene captured on a
webcam or security camera.
MIDI Devices
Keyboards, synthesizers and other musical technologies provide computer
input in the form of MIDI data. The Musical Instrument Digital Interface
specification includes three types of data pathways, received and transmitted
through MIDI IN, MIDI OUT and MIDI THRU ports. Instruments plug in to a MIDI IN
jack on a computer interface, which plugs in to a USB or other standard data
port. Instruments connect into series of daisy-chained devices by means of their
MIDI THRU jacks, which enables the output of one piece of hardware to control
or influence the behavior of another.
Step 7: Your document will now have a name, which will be shown at the very
top of your document screen. If you make changes to your document and then
save them after it has been saved originally, the dialogue box will not come up
again. It will just save your changes without any visual notification being shown.
Step 8: The ‘Save As’ menu – the link to which is on the left-hand side of the
‘File’ dialogue box, beneath ‘Save’ – is used to save an existing document under
another name. This is helpful if you’ve made changes to your document and
then want to save the changes, but also keep the original document in its
original format and under its original name.
1.
2.
3.
4.
5.
6.
7.
8.
Learning Objectives:
After reading this information sheet, the student/ trainee should be able
to;
Introduction
Motherboard
Hard Disc
Computer Memory
Monitor
Keyboard
Mouse
1. Hard disc
2. Computer Memory
3. Mouse
4. Keyboard
5. Monitor
Objectives:
Storage Devices
Types of Storage
• Primary Storage
• Secondary Storage
• Tertiary Storage
• Off-line Storage
Primary Storage
• Also known as main memory.
• Main memory is directly or indirectly connected to the central
processing unit via a memory bus.
• The CPU continuously reads instructions stored there and executes them
as required.
Example:
– RAM
– ROM
– Cache
• It is called Random Access Memory because any of the data in RAM can
be accessed just as fast as any of the other data.
RAM
Static RAM
• Faster
• More expensive
• More power consumption
• does not need to be refreshed
Dynamic RAM
• Slower
• Less expensive
• Less power consumption
• needs to be refreshed
ROM
Cache
Hard Disk
• The hard disk drive is the main, and usually largest, data storage device
in a computer.
• It can store anywhere from 160 gigabytes to 2 terabytes.
• Hard disk speed is the speed at which content can be read and written
on a hard disk.
• A hard disk unit comes with a set rotation speed varying from 4500 to
7200 rpm.
• Disk access time is measured in milliseconds.
Tertiary Storage
• Typically it involves a robotic mechanism which will mount (insert) and
dismount removable mass storage media into a storage device.
• It is a comprehensive computer storage system that is usually very slow,
so it is usually used to archive data that is not accessed frequently.
• This is primarily useful for extraordinarily large data stores, accessed
without human operators.
Examples:
Magnetic Tape
Optical Disc
• Optical disc is any storage media that holds content in digital format and
is read using a laser assembly is considered optical media.
• The most common types of optical media are
– Blu-ray (BD)
– Compact Disc (CD)
– Digital Versatile Disc (DVD)
Floppy Disk
• A soft magnetic disk.
• Floppy disks are portable.
• Floppy disks are slower to
access than hard disks and
have less storage capacity, but
they are much less expensive.
• Can store data up to 1.44MB.
• Two common sizes: 5 ¼” and 3
½”.
Zip Diskette
• A small, portable flash memory card that plugs into a computer’s USB
port and functions as a portable hard drive.
Memory Card
1. C
2. A
3. B
4. A
5. C
Objectives:
Introduction
1. System Software
2. Application software
A normal user rarely gets to see the operating system or to work with it. But
all of us are familiar with application software which we must use to interact
with a computer. Popular examples of application software are the Microsoft
office suite which includes Word, Excel and PowerPoint. We have used these
applications extensively. Internet explorer, Mozilla Firefox is two applications
used to access the internet. E-mail software like Outlook express is used to
manage Emails. It is obvious that all software utilized for working on a computer
is classified as application software. In fact all user interfaces are an application.
The anti-virus is an application and so is the Media player.
3. Programming languages
GENERAL SECURITY
Objectives:
1. Define security
2. Explain the significance of computer security
Introduction
It seems like every couple of years an article will come out saying one
antivirus is the absolute best. Three more will follow saying three others
outperformed the first. On top of these, some security expert will write an article
saying antivirus is no longer relevant and you’re dumb if you use it.
However, in addition to
antivirus, we also recommend
using Malwarebytes alongside your
antivirus. Just like your belt can use a good pair of suspenders to give it a little
help, applications like Malwarebytes can provide extra protection against
malicious software that traditional antivirus products may not identify. Malicious
You probably know passwords are important, but you probably don’t know
how important—and how terrible most people’s passwords actually are.
Here’s the thing: we’re no longer in the olden days of the internet, where
you can just use the same password everywhere and call it a day. Services get
hacked all the time, and if you’re using the same password everywhere, you’ve
given someone access to all of your accounts when one service leaks
information. You need to use long passwords and you need to use different ones
on every site and service.
A good password is like a really good lock on the door, but locks can be
picked. Adding encryption turns that door into a bunker. If you encrypt your
computer or phone, you prevent thieves from getting to your data by other
more advanced means. We recommend using BitLocker on Windows if you have
Windows Pro or Enterprise, or VeraCryptif you have Windows Home. Mac users
should turn on FileVault. If you’re running Windows Home, something like
Veracrypt is a good option for you. iPhones and Android phones are usually
encrypted by default these days, but you can double check in the settings to be
sure.
You hear it all the time: don’t open emails from people you don’t know,
and don’t click on links in emails you don’t trust. But that isn’t enough. A lot of
times, malicious links can come from friends who have been infected, or from
emails that look legitimate, but are actually fake. This is known as phishing.
If you want to be truly secure, you could never click on links in emails. But
that’s not realistic or convenient, although we do recommend against clicking
email links to sensitive locations like your bank’s website. Just head to your
bank’s website normally. For other links in emails, the middle ground option is
knowing how to investigate a link before you click on it—yes, even ones from
your friends.
First, check is if this link goes where it says it goes. If you hover your
cursor over the link, the destination should pop up at the bottom of your
browser window. If it doesn’t, Right-click on the link and select “Copy link
address.” You can then paste this somewhere safe (like a Notepad document)
and examine it.
This applies to “tech support”, too. Don’t believe any site that says it’s
detected a virus on your system (or any calls from Microsoft). If a popup says
you have a virus on your computer, don’t click on it. Instead, go to your Start
menu, open your antivirus program of choice, and run a scan from there
instead.
Check out our Phishing Resources section for details about identifying phishing
scams and protecting yourself.
If you need to leave your laptop, phone, or tablet for any length of time -
lock it up so no one else can use it.
If you keep sensitive information on a flash drive or external hard drive,
make sure to keep these locked as well.
For desktop computers, shut-down the system when not in use - or lock
your screen.
Lock your device with a PIN or password - and never leave it unprotected
in public.
Only install apps from trusted sources.
Keep your device's operating system updated.
Don't click on links or attachments from unsolicited emails or texts.
Avoid transmitting or storing personal information on the device.
Most handheld devices are capable of employing data encryption - consult
your device's documentation for available options.
Use Apple's Find my iPhone(link is external) or the Android Device
Manager(link is external) tools to help prevent loss or theft.
Backup your data.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls
VIRUSES
Objectives:
1. Define viruses
2. Identify ways to prevent viruses
Types of viruses
File infectors.
Some file infector viruses attach themselves to program files, usually
selected .com or .exe files. Some can infect any program for which execution is
requested, including .sys, .ovl, .prg, and .mnu files. When the program is loaded,
the virus is loaded as well. Other file infector viruses arrive as wholly contained
programs or scripts sent as an attachment to an email note.
Macro viruses.
These viruses specifically target macro language commands in
applications like Microsoft Word and other programs. In Word, macros are saved
sequences for commands or keystrokes that are embedded in the documents.
Macro viruses can add their malicious code to the legitimate macro sequences
in a Word file. Microsoft disabled macros by default in more recent versions of
Word; as a result, hackers have used social engineering schemes to convince
targeted users to enable macros and launch the virus. As macro viruses have
seen a resurgence in recent years, Microsoft added a new feature in Office 2016
that allows security managers to selectively enable macro use for trusted
workflows only, as well as block macros across an organization.
Polymorphic viruses.
A polymorphic virus is a type of malware that has the ability to change or
mutate its underlying code without changing its basic functions or features. This
process helps a virus evade detection from many antimalware and threat
detection products that rely on identifying signatures of malware; once a
polymorphic virus' signature is identified by a security product, the virus can
then alter itself so that it will no longer be detected using that signature.
Resident viruses.
This type of virus embeds itself in the memory of a system. The original
virus program isn't needed to infect new files or applications; even if the original
virus is deleted, the version stored in memory can be activated when
the operating system loads a specific application or function. Resident viruses
are problematic because they can evade antivirus and antimalware software by
hiding in the system's RAM.
Rootkit viruses.
A rootkit virus is a type of malware that installs an unauthorized rootkit on
an infected system, giving attackers full control of the system with the ability to
fundamentally modify or disable functions and programs. Rootkit viruses were
designed to bypass antivirus software, which typically scanned only applications
and files. More recent versions of major antivirus and antimalware programs
include rootkit scanning to identify and mitigate these types of viruses.
Step 1: Enter Safe Mode. The process for doing so will depend on the version of
Windows you’re running.
Step 4: Run the on-demand scanner followed by the real-time scanner. If neither
scanner removes the virus, then it might need to be removed manually. This
should only be done by an expert who is experienced at using Windows Registry
and knows how to view and delete system and program files.
The first known computer virus was developed in 1971 by Robert Thomas,
an engineer at BBN Technologies. Known as the "Creeper" virus, Thomas'
experimental program infected mainframes on ARPANET, displaying the
teletype message, "I'm the creeper: Catch me if you can."
The first computer virus to be discovered in the wild was "Elk Cloner,"
which infected Apple II operating systems through floppy disks and displayed a
humorous message on infected computers. Elk Cloner, which was developed by
15-year-old Richard Skrenta in 1982, was designed as a prank but it
demonstrated how a potentially malicious program could be installed in an
Apple computer's memory and prevent users from removing the program.
The term "computer virus" wasn't used until a year later. Fred Cohen, a
graduate student at the University of California, wrote an academic paper titled
"Computer Viruses -- Theory and Experiments" and credited his academic
advisor and RSA Security co-founder Leonard Adleman with coining the phrase
"computer virus" in 1983.
The "Archiveus" Trojan, which debuted in 2006, was the first known case
of a ransomware virus that used strong encryption to encrypt users' files
and data. Archiveus targeted Windows systems, used RSA encryption
algorithms (earlier versions of ransomware used weaker and easily
defeated encryption technology) and demanded victims purchase
products from an online pharmacy.
The "Zeus" Trojan, one of the most well-known and widely spread viruses
in history, first appeared in 2006 but has evolved over the years and
continued to cause problems as new variants emerge. The Zeus Trojan
was initially used to infect Windows systems and harvest banking
credentials and account information from victims. The virus spread
through phishing attacks, drive-by downloads and man-in-the-
browser techniques to infect users. The Zeus malware kit was adapted by
cybercriminals to include new functionality to evade antivirus programs as
well as spawn new variants of the Trojan such as "ZeusVM," which
uses steganography techniques to hide its data.
"Cabir" virus is the first verified example of a mobile phone virus for the
now defunct Nokia Symbian operating system. The virus was believed to
be created by a group from the Czech Republic and Slovakia called 29A,
who sent it to a number of security software companies, including
Symantec in the United States and Kapersky Lab in Russia. Cabir is
considered a proof-of-concept virus, because it proves that a virus can be
written for mobile phones, something that was once doubted.
1. A
2. B
3. D
4. C
5. B
Objectives:
Introduction
The 2004 Act was varied to include the following health and safety principles:
all people are given the highest level of health and safety protection that
is reasonably practicable;
those who manage or control activities that give rise, or may give rise, to
risks to health or safety are responsible for eliminating or reducing health
and safety risks, so far as is reasonably practicable;
employers and self-employed people should be proactive and take
reasonably practicable measures to ensure health and safety in their
business activities;
Once all these criteria have been met, safety performance can be assessed
by each individual's supervisor on an equal basis with other key job elements.
Health and safety is not just an extra part of an employee's job: it is an integral,
full-time component of each individual's responsibilities.
Self-Check 3.2-8
Responsibilities of workers:
1.
2.
3.
4.
5.
Responsibilities of management:
1.
2.
3.
4.
5.
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
METHODOLOGIES:
Lecture
Group discussion
Tutorial or self-pace
ASSESSMENT METHODS
Observation
Questioning
Practical demonstration
Objectives:
Introduction
2. Direct Access –
Another method is direct access method also known as relative access
method. A filed-length logical record that allows the program to read and
write record rapidly. in no particular order. The direct access is based on
the disk model of a file since disk allows random access to any file block.
For direct access, the file is viewed as a numbered sequence of block or
record. Thus, we may read block 14 then block 59 and then we can write
block 17. There is no restriction on the order of reading and writing for a
direct access file.
A block number provided by the user to the operating system is normally
a relative block number, the first relative block of the file is 0 and then 1
and so on.
Key points:
It is built on top of Sequential access.
It control the pointer by using index.
Access Control
Access control is a security technique that regulates who or what can view
or use resources in a computing environment. It is a fundamental concept in
security that minimizes risk to the business or organization.
There are two types of access control: physical and logical. Physical
access control limits access to campuses, buildings, rooms and physical IT
Self-Check 3.3-1
Match the definition in column A with the types of access control in column B.
A
B
1. A methodology that manages
access rights by evaluating a a. Mandatory access
set of rules, policies and control (MAC)
relationships using the b. Discretionary access
attributes of users, systems control (DAC)
and environmental conditions. c. Role-based access
control (RBAC)
2. A security model in which the d. Rule-based access
system administrator defines control
the rules that to govern e. Attribute-based access
access to resource objects. control (ABAC)
3. A widely used access control
mechanism that restricts
access to computer resources
based on individuals or groups
with defined business
functions -- executive level,
engineer level 1 -- rather than
the identities of individual
Date Developed: Document No.
users. July 2019 Issued by:
Date Revised:
4. An access control method in August 2019
Cookery
which owners or
administrators
MARINERS’ POLYTECHNIC of the Developed by:
Revision # 01
protected system, data or
COLLEGES FOUNDATION CHLOE ANNE A.
PALMARIA
resource set the policies
5. A security model in which
access rights are regulated by
Answer Key 3.3-1
1. E
2. D
3. C
4. B
5. A
DESKTOP ICONS
Objectives:
Introduction
1. To change the look of an icon e.g. the My Computer icon we need to access
the desktop properties, as before right click the desktop and select
properties
2. Select the Desktop tab
3. Click Customize Desktop
4. Highlight the My Computer icon (just a single left click to highlight). Then
select change icon pictures of all available icons will be displayed. Icon files
can also be downloaded from the internet to be used.
5. Highlight the picture to be used and click OK to apply
If icons have been downloaded use the browse button to locate them.
If you are to make a software what would you call it and what would be its
features? Draw an icon of your software.
Objectives:
Speed typing is essentially physical work and being able to type for longer
periods without getting tired counts for productivity. An erect posture that leads
to maximum comfort during typing is a must. Maintaining a good posture also
keeps aches and pains away that may become long term problems.
Every typing lesson begins with the instruction of touch typing. You should
spend least time touching keys of the keyboard. The keys should be tapped as
quickly as possible within a fraction of a second. For gaining high speed of typing
it is very important to deploy touch typing.
Pick and hunt typists have the habit to look at the keyboard most of the
time during typing. This is the reason they never learn real speed typing. Speed
typing can be learned only by following the practice of looking only at the
screen. Of course it is not easy to attain easily in the first go but you can go to
that level with practice. Being able to type and erase without looking at the
keyboard is the sign of a learned and skilled typist.
While there are rules for pressing the letter keys there are also rules for
non-letter keys like Tab, enter, shift and backspace etc. The enter and
backspace keys should be pressed by the little finger of the right hand and the
keys like tab, shift or control have to be hit by the little finger of the left hand.
Shift key being both on right and left can be hit by either of the hands.
Takeaway:
These are the secret keyboarding techniques that can help you achieve
typing speed and accuracy that matters at different places with keyboarding
software. These are the only exact techniques that can help you acquire the
touch typing skill. Keyboarding online is one of the best typing software for
schools which can surely improve your typing skills.
1. 2.
3. 4.
A.
1. Maintain erect posture during typing
2. Use correct fingering
3. Deploy touch typing
4. Put the habit of looking only at the screen
CONTENTS:
Software commands
Operation and use of peripheral devices
Procedures in producing and transferring files/data
ASSESSMENT CRITERIA:
CONDITIONS:
METHODOLOGIES:
Lecture
Group discussion
Tutorial or self-pace
Observation
Questioning
Practical demonstration
Objectives:
Introduction
Commands
Commands are words recognized by the computer to access functions. Certain
common commands appear in most software packages. You may access
commands by pulling down the menus of the software features.
FILE feature
The FILE feature offers the commands of NEW, OPEN, CLOSE, SAVE, and
PRINT. Clicking on a command either executes the command or offers a
dialogue box.
NEW: Enter the NEW command when you start a new file. A dialogue box
may appear to ask you to select a format for the new document.
CLOSE: To close or exit a file, click CLOSE. A prompt appears that should
ask if you want to save the document. Selecting the desired option
automatically executes the function and closes the file.
SAVE: To save a file, click SAVE. The computer automatically saves the
data to whatever drive you specify, hard drive or floppy disk and prompts you to
name the file before saving it. To save data to disks or alternate hard drives in
PRINT: To print hard copies of an open document, click PRINT. A dialogue box
appears asking if you want the entire document or a portion of the document,
and how many copies you require.
Common commands are not the only commands you will see offered the FILE
pull-down menu but, other commands may be program specific. Familiarize
yourself with the software in your computer.
________________ 1. A dialogue box may appear to ask you to select a format for
the new document.
________________ 3. A prompt appears that should ask if you want to save the
document. Selecting the desired option automatically executes the function
and closes the file.
1. New
2. Save
3. Close
4. Print
5. Open
Objectives:
Introduction
Printers
Printers provide the means for the computer to output information in
portable form. Whether a document, a photograph or even an image on canvas
(for more sophisticated devices) a printer allows us to reproduce information
and share it with others.
Scanners
Scanners are input devices that give the means to insert information into
a computer. They can be used for visual information such as photographs or
drawing, or teamed with type-reading software to import documents and
translate the hard copy to text that can be edited in word processing programs.
Some scanners are sensitive enough to produce images that are many millions
of megabytes in size from an image as small as a slide.
Audio Peripherals
Audio peripherals are both input and output devices. Microphones make it
possible to put our voice into the computer and onto the web, or record an
instrument. They need a special jack (usually called a "stereo-mini") though
better mics can be used with the proper adapters or external hardware. Most
Video
External Drives
________________ 4. They are both input and output devices. They need a special
jack (usually called a "stereo-mini") though better mics can be used with the
proper adapters or external hardware.
1. Scanners
2. External Drives
3. Printer
4. Audio Peripherals
5. Video
Objectives:
Introduction
File transfer is the process of copying or moving a file from one computer
to another over a network or Internet connection. It enables sharing,
transferring or transmitting a file or a logical data object between different users
and/or computers both locally and remotely.
Below is a listing of all the different ways you can copy information from one
computer to another computer. Review each of the below solutions to decide
what works best for you.
Network
If you have a network or plan on setting up a network, consider
transferring and sharing files between computers on the local area network. A
network is the fastest means of transferring files between your computers, and
once set up, it allows to you to continue to share files.
USB
USB ports and devices, such as thumb drives, are also a fast and easy way
to transfer files from one computer to another computer using either of the
below USB options.
Method one
Method two
Note
Many e-mail providers limit the size of a file that can be attached and sent
through e-mail. Check with your e-mail provider to determine the maximum file
size attachment allowed in your e-mail messages.
CD and DVD
If you do not have any USB drives, burning your information to a CD or DVD
is another good solution to move files from one computer to another.
Floppy diskette
For older computers that do not have a disc burner, USB, or the Internet,
copying files to a floppy disk may be your only alternative. However, if you need
to copy large amounts of data from one computer to another, you should try an
alternate solution since a floppy disk does not hold much information.
Self-Check 3.4-3
3. For older computers that do not have a disc burner, USB, or the
Internet, copying files to this device may be your only alternative.
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. USB
5. A fast and easy way to transfer files from one computer to another
computer using either of the below USB options.
a. Hard drive transfer
b. Floppy diskette
c. Internet and e-mail
d. USB
1. D
2. A
3. B
4. C
5. D
CONTENTS:
CONDITIONS:
METHODOLOGIES:
Lecture
Group discussion
Tutorial or self-pace
ASSESSMENT METHODS
Observation
Questioning
Practical demonstration
Objectives:
1. Define consumables
2. Clean, maintain and replace consumables
In this information sheet, you will learn how to maintain consumables. You
will be able to perform cleaning, minor maintenance and replacements of
consumables.
Expenditure on computer systems does not stop with the initial purchase of
the hardware and software. Various computer supplies and consumables are
needed to keep a computer system operating. These include:
Maintenance in an IT environment
Precautions
Cleaning in an IT environment.
Why clean?
Removing Dust
The human skin produces residues that cling to surface of the computer
hardware we touch, which can be removed with liquid cleaners. However, use
only specifically designed cleaners for cleaning computer equipment. Unsuitable
cleaners may:
Cleaning kits
Cleaning Peripherals
Monitors
Carefully clean dust away from the vents in the monitor's enclosure using
a vacuum cleaner. Anything other than a vacuum cleaner (e.g. a rag or air
blower) is likely to push the dust inside the enclosure where it can lie on
electrical components, causing failure. You should clean the glass screen with
one of the cleaners described previously.
If you use a spray to clean a monitor you should be careful to spray the
wipe.
Printers
You will get the greatest benefit from cleaning a printer if you can remove
any dust from the paths of moving parts. To do this you may need to remove
covers or paper trays.
However, at all times refer to the printer manual. It will contain the
instructions for removing parts and may even have some tips on cleaning. Do
not use any liquid cleaner on a printer unless the manufacturer recommends it.
Laser Printers
1. Switch off and unplug the printer, and wait at least 30 minutes for it
to cool.
2. Wear disposable plastics gloves.
3. Clean the outer casing of the printer using a dampened paper towel
or a lint-free cloth with a little detergent on it.
4. Check for, and remove any loose bits of paper.
5. Vacuum inside the printer using a static-safe vacuum cleaner.
6. Use a lint-free swab dipped in isopropyl alcohol to clean the corona
wire.
The keyboard tends to not only accumulate a lot of dust and skin residue
but also some hair and lint form clothing. Loose matter can generally be
removed with the vacuum cleaner.
Mouse
The mouse tends to accumulate a mixture of dust and skin residue from
the surface it rolls on. Therefore to properly clean the mouse:
1. Turn the mouse upside down and push down and away the roller-
opening hatch with two fingers until you see the panels open.
2. Use a soft, dry, lint free cloth to wipe the ball clean. Never use
cleaning fluid or solvent. Gently blow into the mouse housing to remove
any dust.
3. To clean the steel rollers carefully use a cotton swab to remove the
material buildup.
4. Replace the ball in it its housing, and then re-insert the retaining
panel. When the panel is in place push it down and backwards until it
locks firmly.
The glass top flatbed scanners, like those of monitors and photocopiers,
can get pretty dirty with finger marks. Usually you would use a lint-free cloth
dabbed with whatever chemical the manufacture recommends to wipe it clean.
Power Supplies
· Checking that the cables coming out of them are not worn or
broken
Because tape drives are usually used for backing up data, it is important
that they are kept clean, so that data is not corrupted by oils and other
contaminants during the backup process. You can purchase cleaning tapes, or
you can usually use a lint-free bud.
Steps/Procedure: Cleaning
Monitors
Printers
You will get the greatest benefit from cleaning a printer if you
can remove any dust from the paths of moving parts. To do this you
may need to remove covers or paper trays.
CRITERIA
YES NO
Did you….
1. Did you use the tools in cleaning of
consumables
2. Did you follow the procedure in cleaning of
consumables
3. Did you follow the precautions
Objectives:
1. Discuss the ways in creating more space in hard disk
2. Explain the importance of having more space in hard disk
If you haven’t got space on your computer for that new app or game, or
the clutter on your hard drive is just driving you crazy, you’re not alone.
With the introduction of SSDs (solid-state drives) offering loads less space
than traditional mechanical hard drives, in conjunction with games and
applications requiring more and more disk space, your hard drive can easily
become full.
In this article, we’ll go through the top 8 ways to clean up your Windows hard
drive: finding out what is taking up so much space on your hard drive, reducing
the clutter and creating space for those all important new applications or files.
Windows comes with a handful of great tools to help keep your computer’s
storage nice and tidy. The problem is, not everybody knows where to find these
functions, or what to look for.
Disk Cleanup is the first of these tools. It allows you to delete data such as
temporary files, which can amount to GB’s (gigabytes) of data over time.
2. Uninstall Programs
For many computer users, most of the disk space used is by applications and
games. If you find that you no longer use certain programs, you can uninstall
and remove them from your hard drive.
Again, Windows provides the ability to easily get rid of any unwanted
programs that we may have on our computer. To uninstall/remove programs,
follow the steps below:
It is likely that you’ve accumulated duplicate files over time, which are
unnecessary for the running of your computer. Unfortunately, Windows does not
provide an easy way to find and remove these duplicate files, so a third party
software is needed.
There are a number of applications for the removal of duplicate files, but
we’ll look at Duplicate Sweeper here. Duplicate Sweeper has a clear and easy
interface, and finds and removes duplicates easily.
Duplicate Sweeper automatically select duplicate files for removal, using your
preferences, or select individual files yourself.
On a similar point, you can also delete any duplicate tracks in iTunes
which can take up a lot of disk space. This function can be found in iTunes ->
File -> Library -> Show Duplicate Items. From this list you can delete any
duplicate tracks.
However, if you have loads of duplicate files listed, which ones should you
delete? To manually go through each track and pick the best may take some
time. For this reason, many people use a third-party software to help out.
One such application is Tune Sweeper. Tune Sweeper can quickly search
your iTunes library for duplicates, and automatically select which to remove
based on preferences such as highest quality, longest duration or latest played.
Tune Sweeper can also tidy up your iTunes library by fixing track
information, downloading missing album artwork to tracks, removing missing
tracks and loads more.
4. Temporary Files
“Wait, we just
removed temporary files
using Windows Disk
Cleanup”, I hear you say.
Some of these
files which we have
removed using the
above steps may
end up being
moved to the
Recycle Bin. This is
a nice safety
measure, because if
you make a mistake
and have removed
a file which you now
want back, you can
easily restore the
file from the
Recycle Bin.
However, the
files in the Recycle Bin are still taking up space on your computer. If you’re sure
that you would like to remove the files in your Recycle Bin, you can select files
and right-click to delete them, or simply click ‘Empty the Recycle Bin’ to
permanently delete all of the files.
Cloud Storage
allows you to store
your files on remote
servers, and access
them via the
internet. There are
many different cloud
service
providers: Apple
iCloud and Microsoft
OneDrive are only
two examples. Most
providers offer a
certain amount of
storage space free, and then give the option to pay monthly for more storage
space if you should need it.
Note:
It is not advised to defragment your hard drive too often, as the constant
writing and erasing of data can reduce the lifespan of your hard drive.
It may also be worth pointing out that there has been some debate as to
whether defragmentation of SSDs (solid-state drives) is beneficial or detrimental
to the drive. If you are unsure, you can read up on the discussion at PC World
8. Sufficient RAM
RAM (Random
Access Memory) is the
hardware in your
computer which
determines how you
store data. RAM stores
data or instructions
which you use
frequently, providing
fast read or write
processes to improve
the general speed of
your computer experience.
You can find out how much RAM you currently have installed in your
computer by going to Computer > Properties
Self-Check 3.5-2
1.
2.
3.
4.
5.
6.
7.
8.
REVIEWING PROGRAMS
Objectives:
1. Define programming and software review
2. Identify the varieties and types of review
What is programming?
Self-Check 3.5-3
1. False - pair
2. False – programming
3. True
4. False – peer
5. False - management
Objectives:
1. Define unwanted files
2. Identify ways to delete unwanted files
Introduction
The longer you have a PC, the more unnecessary, temporary, or duplicate
files will accumulate on your disk. These files take up space that may cause
your PC to run slower or take up space on your hard drive. By deleting or
consolidating these files you can easily boost your PC's performance and open
up room for new files.
3.
3.
Delete duplicate files. Once the
program has scanned the selected
files, it will show you where there are
duplicates. Delete them by simply
selecting and then pressing "Delete."
4.
Identify at least one way of deleting unwanted files from your computer.
Write it step by step.
Way: ________________
Steps:
_______________
_______________
_______________
_______________
Objectives:
1. Define errors
2. Explain how to check hard disk for errors
Symptoms
When you perform specific actions or open certain files, your computer crashes
or programs freeze.
You can troubleshoot the problem by using the Disk Check tool in
Windows 7. Disk Check can identify and automatically correct file system errors
and make sure that you can continue to load and write data from the hard disk.
You can use Disk Check in Windows 7 not only for local hard drives, but also for
removable media such as USB memory sticks or memory cards.
Note
Please make sure that you close all open programs and files before you
start the disk check.
5. Click Properties.
Note If you want to perform a detailed test of the hard drive, you can
select the Scan for and attempt recovery of bad sectors check box. You
should do that in the justified suspicion of existing hardware error in any case.
But please note that the operation can then take a long time. For a first routine
check, we recommend that you do not select this option.
9. Click Start.
Write the steps in checking your computer hard disk for errors
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
3. In the navigation pane, click Computer so that your drives appear in the
right pane.
5. Click Properties.
8. In the Check Disk <disk name> window, select the automatically fix file
system errors check box.
9. Click Start.
10. If the drive that you want to check is currently in use and it is your system
drive, you will see a dialog box with a warning message. In this case,
click Schedule disk check.
11. Exit all open programs, and then restart your computer. The checking will
start automatically before next Windows startup and display the results when
completed.
12. If you are not checking the system drive, you do not have to turn off the
computer. However, the selected drive may also be in use. In this case, you
13. The checking starts immediately. After it is completed, the results will be
displayed.
Objectives:
1. Define computer viruses
2. Identify anti-virus programs
Computer Viruses
Macro Viruses
These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb. They automatically infect
the files with macros and also templates and documents that are contained in
the file. They hide in documents shared through e-mail and networks.
Overwrite Viruses
These types of viruses delete any information in a file they infect, leaving
them partially or completely useless once they are infected. Once in the
computer, they replaces all the file content but the file size doesn’t change.
Directory Virus
Also known as cluster virus or file system virus. They infect the
computer’s directory by changing the path indicating file location. They are
usually located in the disk but affect the entire directory.
Multipartite Virus
These type of viruses spread in many different ways. Their actions vary
depending on the OS installed and presence of certain files. They tend to hide in
the computer’s memory but do not infect the hard disk.
FAT Viruses
These lardy viruses attack the file allocation table (FAT) which is the disc
part used to store every information about the available space, location of files,
unusable space etc.
Companion Viruses
These types of viruses infect files just like the direct action and the
resident types. Once inside the computer, they ‘accompany’ other existing files.
Polymorphic Virus
They encode or encrypt themselves in a different way every time they
infect your computer. They use different encryption and algorithms. This makes
it difficult for the antivirus software to locate them using signature or string
searches (since they are very different in each encryption).
Worm
This program is very similar to a virus and has the ability to self-replicate
leading to negative effects on your computer.
Trojans
Trojans can illegally trace important login details of users online. For
example E-Banking is very common among users, therefore, vulnerability of
tracing your login details whenever your PC is working without any strong
powerful antivirus installed.
Email Virus
This is a virus spread via an email. Such a virus will hide in an email and
when the recipient opens the mail.
Browser Hijacker
This virus can spread in many different ways including a voluntary
download. If infects certain browser functions especially in form of re-directing
the user automatically to certain sites. A good example is
Boot Infectors
They include the boot sector plus master boot record types. All the viral
codes can be separate location; however they infect the hard disks or the
floppy.
February 11, 2019, PC Mag’s Neil Rubenking rounded up the top 10 free
antivirus programs for 2019, with handy links to his unbiased, independent
reviews for each. So if you’re in need of free protection for Windows 7, 8, or 10,
here are his top picks:
Avast Free Antivirus took the top spot thanks to a combination of great
test results and built-in features. In addition to its proven malware protection
and excellent phishing protection, Avast packs in a basic password manager, a
secure web browser, and more. Avast’s all-in-one Smart Scan searches for
hidden malware, unwanted browser add-ons, network threats, and PC
Kaspersky Free
PC Mag praised AVG AntiVirus FREE for achieving very good scores in a
variety of independent tests, and for its excellent protection
against phishing. AVG’s on-demand scan searches for hidden malware,
unwanted browser add-ons, and PC performance issues. AVG AntiVirus FREE
also gives you a free File Shredder to securely delete sensitive files. AVG
protects against 0-day threats by preventing unknown (and potentially
dangerous) files from opening and sending them to AVG Threat Labs for deeper
analysis. If they’re found to be malicious, a cure is created and pushed out to
you and all AVG users.
Avira Antivirus
Comodo Antivirus 10
Panda Free Antivirus finished last in PC Mag’s top 10 list, but it’s still got a
few good things going for it. For one, it’s got a pretty interface. It’s also speedy
and lightweight, and includes USB Protection to vaccinate any USB device you
plug into your PC. But if you’re installing a 3rd-party antivirus, you’re looking for
protection, aren’t you? Panda Free Antivirus unfortunately underperforms in this
respect, as its detection rates have apparently waned recently in independent
virus lab tests.
Self-Check 3.5-6
4. They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened
files. They hide in RAM
a. Macro Viruses
b. Memory Resident Viruses
c. Overwrite Viruses
d. Direct Action Viruses
9. This program is very similar to a virus and has the ability to self-
replicate leading to negative effects on your computer.
a. Trojans
b. Worm
c. E-mail Virus
d. Boot Infectors
1. A
2. D
3. C
4. B
5. C
6. A
7. B
8. D
9. B
10. A