M09 Access & Use Inter
M09 Access & Use Inter
SERVICE LEVEL – I
Based on March 2022, Curriculum Version 1
1.1 Internet
A means of connecting a computer to any other computer anywhere in the world via dedicated routers
and servers. When two computers are connected over the Internet, they can send and receive all kinds
of information such as text, graphics, voice, video, and computer programs.
Uses for the Internet:
The Internet is used for many things such as e-mail, social networking, job-hunting, getting the latest
news, research, listening to music, watching videos, getting driving directions, reading online books
and so much more.
1.1.1 COMMON TERMS YOU MIGHT HEAR AND WHAT THEY MEAN:
BROWSER: - Is a free software package or mobile app that lets you view web pages, graphics, and
most online content? The most popular web browsers include Chrome, Firefox, Microsoft Edge, and
Safari, but there are many others.
WEBPAGE: - Is what you see in your browser when you are on the internet? Think of the webpage
as a Page in a magazine. You may see text, photos, images, diagrams, links, advertisements and
more on any page you view.
HTTP: - Is the protocol used to request and transmit files over the Internet or other computer?
URL:- (Uniform Resource Locator) in other words, the web address of internet pages and Files.
The URL tells the browser exactly where to find the page. For example, www.akronlibrary.org is the
URL or web address to get to the library‘s website. *.com signifies the part of the URL that
identifies what exactly that site is part of i.e., institution, government, business, etc.
A. . com: generally, for commercial businesses
B. . net: network providers
C. . mil: military organizations
D. . gov: government organizations
E. . edu: educational organizations
F. . org: non-profit organizations
Browsers are the easiest way of finding the information you need. Here you can find a list of the
main
Browsers found today and their characteristics
lists the most popular browsers as follow in terms of market share:
Google Chrome (61.36 %)
Mozilla Firefox (23.6 %)
Internet Explorer (8.0%)
Safari (3.7 %)
Opera (1.6 %)
The Internet is means of connecting a computer to any other computer anywhere in the world
via dedicated routers and servers. When two computers are connected over the Internet, they can
send and receive all kinds of information such as text, graphics, voice, video, and computer
programs.
No one owns Internet, although several organizations the world over collaborate in its functioning
and development. The high-speed, fiber-optic cables (called backbones) through which the bulk of
the Internet data travels are owned by telephone companies in their respective countries.
The internet developed from software called the ARPANET which the U.S military had developed.
It was only restrict to military personnel and the people who developed it. Only after it was
privatized was it allowed to be used commercially.
The internet has developed to give many benefits to mankind. The access to information is one of the
most important. Student can now have access to libraries around the world. Some charge a fee but
most provide free services. Before students had to spend hours and hours in the libraries but now at
the touch of a button students have a huge database in front of them
I. ARPANET: The acronym stands for Advanced Research Projects Agency Network.
ARPA of the United States Department of Defense developed ARPANET, which became
the world’s first packet switching network. Internet is the successor of ARPANET.
II. Internet Service Provider: A company, which provides users with an access to the
Internet, is known as an Internet service provider or Internet access provider. ISP, as it is
called, offers email accounts and other services like remote storage of files for its
customers. Here is a word about choosing a cheap ISP.
III. IP Address: It is a way of numerically identifying an entity on a computer network. The
original addressing system known as IPv4, used 32 bit addresses. With the growth of the
Internet, IPv6 came to be used wherein the addresses are composed of 128 bits.
Browser Software
Is a software program that allows a user to locate, access, and display web pages over the internet?
Mozilla includes a privacy browser so you can search online without cookies or other
trackers. And you can set this browser to delete all the cookies, cache and browser history
each time the browser closes. Mozilla is nicely laid out and has a clean interface, so it’s easy
to find most tools and features. You can have multiple browser tabs open at once in a single
window and rearrange their order by dragging and dropping the tabs. If you accidentally close
a tab, or even the entire browser, Firefox will recover it for you.
Chrome lets you set icons on your toolbar so you can quickly get to the pages you visit most
often. You can also pin bookmarks to the Google Chrome homepage. It has tabbed browsing so
you can have multiple viewing windows open at once and easily toggle between them. During
out in-house tests, we noticed Chrome didn’t identify as many phishing schemes as Firefox, but
it did stop malicious files, including ransom ware and Trojans, from opening and infecting our
computer. Chrome’s privacy browser is available on all devices, including cell phones, to keep
your online activity private.
C. Microsoft Edge: Best for battery life
Safari takes a moment to learn if you’re not already familiar with Mac computers, and you
can’t customize this browser with toolbars, but you still get tabbed browsing like Firefox and
Chrome offer. Safari lets you tag favorite sites and has a reading list where you can save
articles or parts of websites to read later. While you’re reading an article, Safari has a tool that
pushes ads and other distractions aside so you can read without unrelated text or images
breaking in.
This browser is the default for iPhones and iPads, and it syncs through your iCloud account, so
any changes you make on one device will be available on any device connected to your
account. When we tested its default security settings, Safari warned us of malicious websites
that had phishing schemes or dangerous links on them. But it didn’t stop malicious downloads,
so we had to depend on a Mac antivirus program to gather these threats during the download
process.
This is one of the few browsers that have live support. It also has great online resources, like
tutorials and searchable FAQs, so you can find answers on your own.
E. Opera: Good all-rounder
Opera is decently fast, about on par with Firefox and Chrome when it comes to initial startup,
site navigation and page loading. It’s compatible with both Windows and Mac computers, and
works on iOS and Android mobile devices. The URL bar doubles as a search bar, and it has
stacking, which means you can drag and drop open tabs in the order you want them.
1.2.2 Setting up Internet Option
A. Configuring Home page
Temporary Internet Files are a folder on Microsoft Windows which serves as the browser
cache for Internet Explorer to cache pages and other multimedia content, such as video and
audio files, from websites visited by the user. This allows such websites to load more quickly
the next time they are visited.
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including HTML and JavaScript code) are saved to the Temporary Internet Files
folder, creating a web cache of the web page on the local computer's hard disk drive, or other
form of digital data storage. The next time the user visits the cached website, only changed
content needs to be downloaded from the Internet; the unchanged data is available in the cache.
Despite the name 'temporary', the cache of a website remains stored on the hard disk until the
user manually clears the cache, the cache expires or if the cache is full. This is often regarded as
a privacy issue, because anyone with access to the computer can view the cache. The contents of
the folder are indexed using an index.dat file, a form of database.
The Temporary Internet Files cache can be useful in certain situations. For example, if
no Internet connection is available, previously cached websites are still available offline. Certain
online media files (such as embedded Flash movies) are not easily accessed directly through
Internet Explorer, but are automatically saved into the cache after viewing them. Depending on
the type of website and how often it is updated, the cached data may not reflect the online
version of the website. The cache is also useful for police to collect forensic evidence.
The cache can be cleared by using Internet Options within the Internet Explorer interface, but
this method is subject to deletion privacy issues. Many alternative tools exist to erase the data
instead.
1.2.3 Configuring privacy and security level
Optimizing your browser’s settings is a critical step in using the Internet securely and
privately. Today’s popular browsers include built-in security features, but users often fail to
optimize their browser’s security settings on installation. Failing to correctly set up your
browser’s security features can put you at a higher risk for malware infections and malicious
attacks. This installation of our “Cyber security 101” series provides our tips for securing
several of today’s most popular browsers, including Google Chrome, Mozilla Firefox, and
As a result, websites designed to support the earlier versions of these standards may display
differently when viewed with web browsers designed to support current versions of the
standards, such as Internet Explorer. In order to help such websites display correctly, Internet
Explorer supports a display mode called Compatibility View, which displays web pages as if
they were viewed by an earlier version of the browser.
In Firefox toolbars can be created as add-ons that contribute to the GUI by extending the
browser with XUL (support for XUL was removed in Firefox version 57). The logic behind the
In Safari 5 or later toolbars can be created as extensions that add bars and buttons. The logic
behind the toolbar is written in JavaScript with access to a special JavaScript API to interact
with the Safari application and web content.
In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to
the browser window. The logic behind the toolbar is written in JavaScript with access to a
special JavaScript API to interact with the Chrome application and web content. The privileges
under which a Chrome extension runs are governed by a set of permissions.
In Opera 11 or later toolbars can be created as extensions that add buttons to the browser
window. The logic behind the toolbar is written in JavaScript with access to a special JavaScript
API to interact with the Opera application and web content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
II. Native vs. injected toolbars
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e.,
toolbars which are directly inserted in the browser window. Examples of native toolbars are
Google Toolbar and Stumble upon Toolbar. Native toolbars use browser-specific code to create
the same toolbar for each different browser version.
Some toolbar developers use a different approach and make the browser extension inject a
JavaScript file in every web page visited by the user. All major browsers support injected
toolbars. The code in this file inserts the toolbar as a part of the DOM in every web page.
Injected toolbars use essentially the same JavaScript code to draw the toolbar for each different
browser version.
Each approach has advantages and disadvantages for the different stakeholders. From the user's
perspective: Native toolbars present faster load times, since injected toolbars must wait for the
DOM to be created in order to insert the toolbar in it. Toolbars require less frequent updates
because part of their code is dynamically downloaded in the JavaScript file that draws the
toolbar. From the developer's perspective:
Injected toolbars allow for shorter development times since the JavaScript code that creates the
toolbar may be written once for all browsers.
Injected toolbars allow for an easier toolbar update policy, since changes that are made in the
injected JavaScript code do not require releasing a new toolbar version.
From the toolbar owner's perspective: Injected toolbars consume requests to download the
JavaScript code that inserts the toolbar in every page, while native toolbars consume no such
requests.
Another way to simplify the task of developing a toolbar for different browsers is to rely on a
cross-browser extension development framework. Some of the most important frameworks are
listed below:
Toolbar Studio supports IE, Firefox. This is an IDE that allows developing toolbars via a visual
editor.
Neo bars supports Chrome, Firefox, IE, Safari and Opera. This is an online web constructor for
cross-browser extensions. Multiple widgets like Weather, RSS, YouTube, Twitter and Facebook
components are available. The platform is free to use.
1.3.2 Accessing and retrieving data from particular site
Accessing and Retrieving Site Data
For most people nowadays, using the internet involves accessing information or entertainment,
viewing products and services, or using social media platforms to keep in touch with friends and
acquaintances. It may seem that visiting a webpage merely involves entering the URL in the
address bar, but that’s just the start of a more complicated process. In a split second the browser
makes contact with globally distributed web servers, requests stored data packages, and then
assemble the webpage from the information contained in the packages. Read on to find out how
this process works and which steps are taken.
The easiest way to access a website is to write the desired address into the address bar
located in the browser. This address is known as a Uniform Resource Locator (URL), and every
webpage can be reached with its own individual URL (web address). A URL is made up of
several sections; all of which have their own functions. Here is a generic example of a webpage
URL:
The World Wide Web (WWW) is a system of electronically stored hypertext documents. The
hypertext transfer protocol (HTTP) is used in the World Wide Web in order to transfer webpage
data from the web server to the browser. In addition to HTTP, there’s also an encrypted version
of the protocol: Hypertext Transfer Protocol Secure (HTTPS).
The HTTP protocol header is followed by the hostname, which consists of a second-level and
top-level domain (in this order). In the web, we usually see “www” as third-level domain, but
there are other sub domains. If a URL points to a specific directory or file, the relevant
information will be placed after the hostname.
When a web address is entered into the search bar of the browser, the browser looks for the
requested domain in its cache. If it’s not there, it requests the operating system’s DNS server to
find the required IP address. A DNS server is liable for the name resolution. The DNS server
that is to be requested can be configured in the operating system as well as in the router. Per
default, the internet access provider sets the address of its own DNS server there. Since
requesting the domain name system takes some time, the IP addresses of sites that have already
been visited are usually stored in the operating system’s or the browser’s DNS cache. This cache
keeps IP addresses at hand for future visits to the website. This lightens the load of the DNS
server and speeds up the webpage’s loading time.
I. Modem Speed
The latest modems on the market would normally be installed to run at the fastest speed
possible, for example 115200 bits per second. Having a fast modem connected to your computer
will download images quickly. If a slower speed modem is connected to your computer, then
images will be downloaded at a much slower rate. Being aware of your modem’s capabilities
will help you decide on whether images should be loaded or not loaded. Time should also be
considered when accessing the Internet. Even a fast modem cannot take into consideration a
country’s business hours, or a 'high activity period, for example, after school hours or early
evening. Do not forget to consider these points if you are having difficulty in browsing the web
site you require.
The bandwidth of your Internet connection is dependent on the speed of your modem. If the
bandwidth is small it will not be able to download images very quickly. The file format of any
image saved on the computer will take up much more memory area than text. Hence, you must
make sure that you have adequate storage area for image file and the bandwidth is large enough
to transfer the image file.
The speed and capacity of your computer also affects the speed at which images are loaded.
If the computer's speed is slow and the capacity minimal, it may be better to turn off multimedia
features such as pictures, sounds and videos in order to speed up the delivery and display of web
page information.
To display web page details as quickly as possible, consideration should be given to the types of
browsers available. Browsers such as Microsoft Internet Explorer and Netscape Navigator are
referred to as graphical browsers as they are able to display graphics, colors and multimedia
features.
When a web site is visited, the details of that web page are stored in the browser's cache. Web
pages stored to be read offline are also stored in the cache. Microsoft Internet Explorer's cache is
labeled 'Temporary Internet Files' whereas Netscape Navigator stores its cache in the program
folder. This speeds up the display of pages that are visited frequently because the Web page
details are accessed from the cache instead of from the web. It is possible to increase the size of
the cache, but doing this will reduce the space available for other files on your computer. It is
also possible to delete files from the 'Temporary Internet files' folder to free up space within the
cache. However, deleting files could result in delay if those web pages are required at a later
date, as they can no longer be accessed from the cache and they will have to be downloaded
again.
Each website is located at a unique global address called a Uniform Resource Locator (URL).
When you know the address of a web site it is much easier to locate. Referencing the Uniform
Resource Locator URL allows you to jump directly to that page at that URL regardless of where
you currently are on the web. All web browsers let you jump directly to a Uniform Resource
Locator (URL) a unique address for Internet resources that are available through a web browser,
including files or directories.
URL’s specify three pieces of information needed to retrieve a document:
the protocol to be used
the server address and port to which to connect
the path to the information
The format for a URL is: Protocol://server-name: port/path. For example,
http://home.netscape.com/welcome/html
When a web site is displayed on the screen, it is possible to access the links that are
contained within that site. Clicking on a link (or tabbing to the link and pressing Enter) will
take you to another section of the web site, a Web page related to the site or even to a
different web site.
A link- is a connection from one web resource to another. Although a simple concept, the
link has been one of the primary forces driving the success of the web.
A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an
origin website to send state information to a user's browser and for the browser to return the
state information to the origin site.
The state information can be used for authentication, identification of a user session, user's
preferences, shopping cart contents, or anything else that can be accomplished through storing
text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install
malware on the host computer. However, they can be used by spyware to track user's browsing
activities – a major privacy concern that prompted European and US law makers to take action.
Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need
to delete cookies.
For Chrome on macOS, at the top-left corner of Chrome, select the green circle to go to full-screen
mode, and select it again to return to the full-size screen.
1. From the menu choose Zoom. Then, to the far right of the Zoom buttons, select the square icon.
You can change the items that appear in the overflow menu or your toolbar.
The address bar auto complete feature lets you search everything on it: bookmarks, history or search
engines, or enter a specific web address, all in one field.
Step 2 -Simply type into the field above your toolbar and choose from your history,
Step 3- presses the return Enter key to search using your default search engine.
You can also type into the search bar on your toolbar or on the New Tab page. Firefox can show you
popular searches for your default search engine as you're typing. See Search suggestions in Firefox. OR
Step 3 -All files uploaded to your site appear above the Upload File area. Click the file in the list or
search for it to attach it to the link.
Step 4- Click Go
In Chrome
Step1 -On your computer opens Chrome.
Step 2 -At the top right, click more .
Step3- Click more tools Clear browsing data.
Step 4 -At the top, choose a time range. To delete everything, select all time.
Step 5 -Next to "Cookies and other site data" and "Cached images and files," checks the boxes.
Step 6 -Click Clear data.
Quality: - Operate with shortest given time
1. ____________ is means of connecting a computer to any other computer anywhere in the world
via dedicated routers and servers
A. Browser soft wares C. Computer system
B. Internet D. Search engines
2. A company which provides users with an access to the Internet is
A. Google C. Internet service Provider
B. Yahoo D. home page
3. A reference in a document to another section of the document or to another document is termed as
A. Temporary files C. Internet
B. Hyperlink D. World Wide Web
4. _____ is used to refer to the page that is the default page of any website
A. Web page C. Home Page
B. Web site D. HTTP
5. A collection of interlinked documents that are accessible over the Internet is:
A. Internet Security C. World Wide Web
B. Mozilla fire fox D. Arpanet
Task 4. Using the required Address Access some data over the Internet
2. Search engines
A search engine is a tool we use to find websites and information on the Internet. Search engines
will search other computers connected to the Internet and classify the files they find on these
computers. Some search engines ‘crawl’ or ‘spider’ in different ways, while others create directories.
Therefore, search engines need access to different computers connected to
the Internet. For these reasons it is useful to use a variety of search engines.
There are a huge variety of search engines. Most search engines explore most of the computers
connected to the Internet. However, some ‘search engines’ are really a search of a particular site, or
perhaps a group of sites.
Some specialist search engines are based on specific topic areas. For example, Web Wombat was the
original Australian search engine. When you use this search engine you will find your results listed in
order of relevance to Australia.
Figure 2.5 The Ninemsn search engine in the left of the browser window
This time we have come up with 724,000. Still way too many to try to get to what we want.
Let’s assume it is the Certificate 2 through TAFENSW that you are looking for. Let’s add TAFENSW
and see how we go.
Now we have narrowed our results to 25,000. Let’s think more about what we are looking for. Assume
you want to know where this course is being conducted. Let’s narrow the search by adding the word
location.
5,850 hits. We’re certainly reducing the amount of information to be filtered. Though, this is still way
too many results to work through.
Let’s investigate a different search engine using the same expressions. Firstly, IT Certificate 2 across
the Web.
Without quotation marks we got 31, 600,000 hits, close to the results using Yahoo.com.
The results above show that this is unlikely to be recorded as one sequence of text, so the search
engine can’t find anything matching this particular entry when we put double quotations around
the whole phrase.
So now you have identified some of the ways to narrow and broaden a search using search
engines. Notice that different search engines will give you different results. Different search
operators, such as double quotations, + and – symbols, AND, OR, NOT will also give you
different results.
A special note here is that the Internet is a very dynamic world. Information located using search
engines varies on a daily, and sometimes hourly, basis. If you were to carry out the searches
above it is unlikely that you would come up with the same results. However, the principles of
using operators to narrow or broaden a search, and using a variety of search engines, always
remain true.
If you want to know more about these rules, go to 10 Core Rules where each one is explained at length.
*Flaming is writing content online that intentionally invokes responses such as rage,
sadness, humiliation, self-doubt, and others. From: No bullying.com.
Netiquette basics
These basic rules are adapted and updated from living internet.com:
Help the newbie’s – good netiquette dictates that you share your knowledge to new users by
answering some of their questions. Remember, you too were a newbie once.
Research before asking – most sites have a Frequently Asked Questions (FAQs) page to guide
new users. Read this before emailing or messaging so as not to waste other people’s time.
Remember emotion – subtle emotions and meanings do not transmit very well in an email.
However, do not use all caps as it designates shouting, or overuse smileys and emoticons as
these may make you look unprofessional. Constructing your sentences carefully and checking
(and re-checking, several times) what you write before hitting send is always a good policy.
Living internet.com also has helpful tips on the Netiquette of sending, Netiquette of replying, and
Netiquette of confidentiality. You can read them here: Internet Etiquette.
2.6 The Ten Commandments of Computer Ethics
Step 6 -On the Save Web Page screen, when you click on save, the file IT Framework Course –
Information Technology will be saved into the OTEN folder in this example.
In Netscape:
On clicking the print button you would create a hard copy of the two pages of this web page. Notice
that you will also print the page title (the name at the top of each page), and the URL of the page at the
bottom of the page.
The second way:
Step 1- Select the text and graphics you want to print.
Step 2 -Choose File menu, then Print.
Step 3 -At the next screen, go to Page Range, click in the circle next to the word Selection.
Step 4- By choosing Page Range, Selection from this screen, (note the dot against this option in the
screen above) only that information selected in the left area of the screen would be printed.
Quality criteria: - Operate with shortest given time
Operation sheet - 5 Steps to Shutting Down and Exiting Browser
Operat
ion title: Steps to Shutting Down and Exiting Browser
Purpose: to shut down browser
Instruction: Follow the steps and search
Tools and Equipment: Computer /PC
Precautions:- Check the internet connection
To close and exist Browser soft application follows one of the following procedures:
Step 1.
Click on the "X" button in the upper-right corner of the browser window to close it.
Step 2.
You can also click "File" in the upper-left corner and then choose "Exit" to close the browser.
Step 3.
For an alternate method, push "Alt" and "F4" simultaneously to close the browser using a Windows
shortcut.
Step 4
Click on the browser icon beneath "Applications" and select "End Task." This will force the browser to
close if it is frozen, although it may take a few seconds. Click "End Now" if you see a browser warning
window.
Quality criteria: - Operate with shortest given time
1. Online data storage refers to the practice of storing electronic data with a third party
services accessed via the internet
2. Saving the document means storing the document on to the secondary storage devices.
3. One of the biggest benefits of online storage is the ability to access data from anywhere.
4. Traditional local storage includes disk or tape storages.
5. To take the information with you everywhere, you must print it.
6. Chrome and Safari turned on Print Background Colors options by default
7. We can use the word shutting down and closing interchangeably
8. Before we are going to close our browser first we have to save all the necessary
information
III. Explain the following
1. Book mark,
2. URL.
Instructions: Given necessary templates, tools and materials you are required to perform the following
tasks within --- hour.
Task 1. Open Google Search Engines
I. Specific
Goals should be straightforward and emphasize what you want to happen. Specifics help us to
focus our efforts and clearly define what we are going to do
Specific is the What, Why, and How
WHAT are you going to do? Use action words such as direct, organize, coordinate, lead, develop, plan,
build etc.
WHY is this important to do at this time? What do you want to ultimately accomplish?
HOW are you going to do it? (By...)Ensure the goals you set is very specific, clear and easy
II. Measurable
If you can't measure it, you can't manage it. In the broadest sense, the whole goal statement is a
measure for the project; if the goal is accomplished, it is a success. However, there is usually several
short term or small measurements that can be built into the goal. Choose a goal with measurable
progress, so you can see the change occur
How will you be when you reach your goal? Be Specific! "I want to read 3 chapter books of 100 pages
on my own before my birthday" shows the specific target to be measure. "I want to be a good reader" is
not as measurable.
III. Attainable
When you identify goals that are most important to you, you begin to figure out ways you can
make them come true. You develop the attitudes, abilities, skills, and financial capacity to reach them.
Your begin seeing previously overlooked opportunities to bring yourself closer to the achievement of
your goals.
Goals you set which are too far out of your reach, you probably won't commit to doing.
Although you may start with the best of intentions, the knowledge that it's too much for you means
your subconscious will keep reminding you of this fact and will stop you from even giving it your best.
A goal needs to stretch you slightly so you feel you can do it and it will need a real commitment from
you. The feeling of success which this brings helps you to remain motivated.
IV. Realistic
This is not a synonym for "easy. “Realistic, in this case, means “do able. “It means that the
learning curve is not a vertical slope; that the skills needed to do the work are available; that the project
fits with the overall strategy and goals of the organization. A realistic project may push the skills and
knowledge of the people working on it but it shouldn't break them.
Devise a plan or a way of getting there which makes the goal realistic. The goal needs to be realistic for
you and where you are at the moment. For instance, it may be more realistic to set a goal of completing
5 things on your to do list than completing everything on your to do list.
Be sure to set goals that you can attain with some effort! Too difficult and you set the stage for failure,
but too low sends the message that you aren't very capable. Set the bar high enough for satisfying
achievement!
V. Timely
Set a timeframe for the goal: for next week, in three months, by November. Putting an end point on
your goal gives you a clear target to work towards. If you don't set a time, the commitment is too
vague. It tends not to happen because you feel you can start at any time. Without a time limit,
There’s no urgency to start taking action now. Time must be measurable, attainable and realistic.
3.1.2Prioritizing
Efficiency and effectiveness are not the same someone who works hard and is well organized
but spends all their time on unimportant tasks may be efficient but not effective. To be effective, you
need to decide what tasks are urgent and important and to focus on these. This is called
Differentiate also between urgent and important tasks: an urgent task may not necessarily be important!
When job hunting, you won't be able to apply to every employer. You will need to carefully priorities
those you wish to apply to, based upon factors such as closing date, location, degree class required, and
chances of getting in.
3.1.3Procrastination
Procrastination is the scourge of action planning. It's important that you manage 'Your fear of
doing things' you don't want to do and realize that the fear is often far worse than any possible negative
results. The best time to do something is usually NOW.
Taking action generates the impetus for further action Break down tasks Break goals down into
their components so that
You can accomplish them one step at a time. Write these steps down, and try to be as specific
as you can when you do this.
Try to complete one task before you go on to the next.
Reward yourself for achieving these goals to maintain your enthusiasm. Regularly review your
Progress towards your goals and revise plans as appropriate to take account of unforeseen changes.
Persevere inevitably, things will not always run smoothly as you progress towards your goals.
When things are not working out, you need to persevere and learn how to take a positive attitude
towards frustration and failure.
Mistakes are a crucial part of any creative process and each is a lesson leading you towards the right
solution. Fear of making or admitting mistakes is a major handicap to taking effective action. It is said
that the people who have achieved the most have made the most mistakes! Try to be aware that
satisfaction comes as much from pursuing goals as from achieving them.
Work at effective strategies to deal with pressure these can vary from taking exercise, to relaxation
techniques such as meditation, to simply sharing problems with friends.
Being assertive can also help here, for example, politely saying no to the demands of others when you
are pushed for time. Sharing tasks and problems with others will spread the burden and will bring a
fresh perspective to them.
It’s hard to do this if things you need to find are buried under a pile of paper! Work to schedule so that
you meet deadlines in good time doesn’t leave everything until the last minute.
Step 2
Break down the major tasks for the activity into smaller steps that you need to take for completion,
essentially creating a to-do list for the project. If other employees are working on the tasks with
you, assign each person a role and specific responsibilities to divide the workload.
Step 3
Establish the timeline for completing the work activity. Assign each individual task that goes into
the activity a completion date to make sure everything is completed in a timely manner. Give
yourself enough time to complete all associated tasks before the deadline passes.
Step 4
Write each due date for the project tasks on your calendar, or set up reminders that pop up on your
computer screen as the deadlines approach.
Step 5
Identify potential problems or barriers you may face for the work activities. Create an action plan to
avoid those issues to keep the project on track.
Step 6
Utilize an online project management program for major work activities that are critical to the
company's success. These programs are particularly effective for complicated projects or activities
that involve many team members. The progress is tracked and all employees can stay updated
through the program.
Step 7
Schedule planning meetings, when active participation and feedback is needed ,from others working
on the project. Keep the meetings focused and productive to use the time efficiently.
Step 8
Send out regular updates and communication to all other employees who are working on the
project. This allows all team members to stay informed and update their to-do lists and timelines as
necessary.
• Coach or mentor
• Supervisor or manager
• Team leader
• Peers, work colleagues or other members of your team
Identify your role in the organization from the organization to the work group to the
individual worker – the ‘big picture’ goals and plans are broken down until they reflect your
individual tasks and responsibilities.
If you don’t understand how you fit into the ‘big picture’, ask your supervisor to explain.
They should be able to explain how your work connects with the rest of your work group and the
organizational organization achieves synergy when the goals of the organization and individual team
A. Review priorities
It is a good idea to review your list of priorities about halfway through each day. This gives you a
chance to monitor your daily work schedule, set new priorities and make the best use of your
remaining time. Regularly review your long-term work schedule. As priorities change within the
organization, your own priorities should change as well. Your supervisor should tell you about any
changes as they occur. Always check with your supervisor if you are not sure about your priorities.
There are many reasons for an organization to change its priorities. Often, it’s in response to outside
factors. Outside factors that affect organizational priorities include:
As you gain more experience, you need to develop the ability to work on several tasks at the same
time. Life might be simpler if you could just work on one task, and then the next. However, that is
often not the most efficient way of working. Time management and multi-tasking are the important
skills in a workplace. They are skills that take practice and require you to think and plan ahead. For
example, many tasks, such as photocopying or working on reception, may involve some waiting, and
this waiting time can often be used to do something
Feedback from your supervisor is also valuable. They may have a private discussion with you for
things that only concern you. At other times they will give you feedback in a team meeting,
particularly if what they have to say concerns the rest of the work group. As well as informal
discussion and advice, you may have a more formal review. This may be called a ‘performance
appraisal’ and can happen every six months or once a year. It is an opportunity for you and your
supervisor to sit down and discuss all aspects of your work. Write notes about points that you can
rise in discussion with your supervisor and review your work plan for the last six months or year in
preparation for your performance appraisal. When reviewing your work plan, you should consider
the following points.
The purpose of the performance appraisal is to be clear about your job requirements and the
necessary standards of work performance and behavior. Your manager should give you constructive
feedback on your progress in relation to your work plan for the last six months or year. An appraisal
is also an opportunity to identify training and development needs related to your position and the
business needs of the organization.
Keep your daily work schedule on hand so you can see what needs to be done every day. Get
into the habit of ticking off each task as you complete it. This can be satisfying and will also remind
you of what else you need to do that day. If you are not completing your daily tasks and are regularly
behind schedule, you need to discuss the situation with your supervisor. You might need some help
to manage your time better, or you may need to share some of your work with other people.
Self-Check 3
Written Test
I. Instruction: Answer all the questions listed below, if you have some clarifications- feel free
to ask your teacher.
A. use technology
B. have an organized workstation
C. work on more than one task at the same time
D. monitor priorities
4. From the list below please match the Letter here with the correct definition for the term it
represents numbered below
5. Which of the following are the types of problems that can be encountered at work?
A. unlimited time
B. equipment breakdowns
C. unlimited resources
D. competing work demands
E. unlimited support
F. changes to procedures
G. environmental factors
6. From the list below please match the problem solving approaches here with their correct
explanations numbered below
7. A supervisor may expect you to report on your progress on tasks, which of the following people
could you ask for feedback on your work performance?
A. colleagues
B. customers
C. stationary delivery man
D. supervisor
E. parents