Anda di halaman 1dari 146

Quarter 1

Learning Outcome No. 1 ASSESS QUALITY OF RECEIVED MATERIALS


1.1.1 Obtain work instruction in accordance with standard
operating procedures
Information Sheet 1.1.1
Characteristics of Materials Used in Specific Projects
The student must relate material properties to product and process quality. These are the
factors that must be taken into consideration when choosing the right material for their
components and assemblies:
A. Selection of material
Material selection is one of the most common tasks for design engineering. The
ability to assess the material's impact on the performance of a product is crucial for
reliable performance. Sometimes, buyers are also considering the label or name of
the company which are producing great quality of materials and are known in the
market. Examples are the name HP for printer and Intel for some computer hardware.
B. Testing of material
The testing of material properties is widely understood to be the key to obtaining
data for a project, performing failure analysis, or understanding material interactions.
Material testing also provides information on the quality of incoming
and outgoing products. Inspection test equipment and techniques are demonstrated
for a wide range of materials and assemblies during the class. This provides the
participants with both knowledges of the common failure modes.
C. Cost of material
The cost of material is also considered when buying or selecting materials for a
specific project. The amount may vary but never taken for granted the quality and the
reliability of the material. Will you buy material which is less expensive but worst
quality? Will you buy material which you cannot afford? People look for places which
can meet their standards and right cost for materials to buy.
Characteristic of the materials to be considered before working with certain
project
Quality
This is the most important factor when choosing materials to buy. Products with
good quality are long-lasting and safe to use because you know that it follows certain
standards before being commercialized.
Reliability
It means that you can be sure that it will perform its function well, will operate
safely and will give the best it could give.
Suitability
Choose the materials which are very necessary to make the project possible.
Making a list of products/materials to buy is a good trait of a wise consumer. Products
which are not to be used must be crossed out.
Cost
It doesn't mean that you will choose for the less expensive one and exclude the
quality. Low cost means you can afford to buy the materials without hurting your
pocket and assure of better quality.

Activity 1.1.1

Directions: Enumerate the following. Use a separate sheet of paper in answering.


1. Give three factors to be considered when choosing the right material?
a.
b.
c.
2. Give three characteristic of materials to be used for specific project?
a.
b.
c.

Lets Do This! 1.1.1


Directions: Your task is to list at least 5 tools or equipment used in computer system servicing
and browse the internet to determine its possible cost. Use the given table below for this activity.
Name of stores & Store Price
Name of Tools/Equipment
Store Price
Name of
Store Price
Name of
Store Price
Name of
Store

Store

Store

1.
2.
3.
4.
5.

Lets Do This! Scoring Rubrics 1.1.1


Identified 5 tools/equipment used in computer system servicing
2-1(1)
Listed possible stores to purchase the item
8-1(5)
Listed the actual price of the tools/equipment
8-1(5)
Used the table as template for presenting the information

Points
5(5)

4-3(3)

15(10)

14-8(7)

15(10)

14-8(7)
10

Get involved1.1.1
Directions: You are the computer technician in your area. One day, your neighbor ask you to
repair his personal computer. After, your thorough examination of his computer unit you found
out that the mouse and keyboard of his PC needs replacement. Likewise, as a technician you
have to convinced him to buy the defective peripherals thus, you prepare a canvass of the price,
specs/features and even list the name of the stores and its location/address where to buy the
product using Microsoft Excel. (Note: Browse the internet in finding possible store selling the item
and use the given table as your sample template in Microsoft Excel).

Store Number 1
Name of Store:
1. Mouse
Specificati
on
Unit
Cost
2.
Specificati
Keyboard
on
Unit
Cost

Location:
Brand

Brand

Store Number 2
Name of Store:
1. Mouse
Specificati
on
Unit

Location:
Brand

Cost
2.
Keyboard
Unit
Cost

Specificati
on
Brand

Store Number 3
Name of Store:
1. Mouse
Specificati
on
Unit
Cost
2.
Specificati
Keyboard
on
Unit
Cost

Location:
Brand

Brand

Get involved Scoring Rubrics 1.1.1


Incomplet
e
(Lacking 2
store
informatio
n)
1
1
1
1
2
1
2
5

Point System
Incomplete
Complete
(Lacking 1
store
information
)
3
3
3
3
3
3
3
7

4
4
4
4
5
4
5
10

Have listed possible stores to purchase the item


Have listed the location/ address of the store
Have browse the internet efficiently
Have determined the cost of the items
Have listed the specification of the items in different store
Have listed the brand of the items sold in the certain
store
Have used the table as template for presenting the
information
Have presented the information using Microsoft Excel

Learning Outcome No. 1 ASSESS QUALITY OF RECEIVED MATERIALS


1.1.2 Check the received materials against workplace standard and
specification
Information Sheet 1.1.2
1.
2.
3.
4.
5.
6.

Movement of materials in a business


Purchase requisition
Purchase order
Goods Received Note
Materials requisition note
Materials transfer note and
Materials returned note.
Sample Illustration of Movement of materials in a business

Figure 1.1.2

Procedures for ordering, purchasing and receiving materials


The flow and proper records must be kept of the physical procedures for ordering and
receiving a consignment of materials to ensure that:

enough inventory is held


there is no duplication of ordering
quality is maintained
there is adequate record keeping for accounts purposes

The procedures for ordering, purchasing and receiving materials includes:

A. Documents for ordering, purchasing and receiving of materials


1. Purchase order
The purchasing department draws up a purchase order which is sent to the
supplier.
Copies of the purchase order must be sent to the accounts department and the
storekeeper (or goods receiving department).

2. Quotation

The purchasing department may have to obtain a number of quotations if a new


inventory line is required, the existing supplier's costs are too high or the existing
supplier no longer stocks the goods needed.

3. Delivery note

The supplier delivers the consignment of materials, and the storekeeper


signs a delivery note for the carrier. The packages must then be checked against
the copy of the purchase order, to ensure that the supplier has delivered the types
and quantities of materials which were ordered.

4. Goods received note

If the delivery is acceptable, the storekeeper prepares a goods received note


(GRN). A copy of the GRN is sent to the accounts department, where it is matched
with the copy of the purchase order. The supplier's invoice is checked against the
purchase order and GRN, and the necessary steps are taken to pay the supplier.

B. Documents for issuing inventory

1. Materials requisition note


Materials can only be issued to production departments against a materials
requisition. This document must record not only the quantity of goods issued, but
also the cost center or the job number for which the requisition is being made. The
materials requisition note may also have a column, to be filled in by the cost
department, for recording the cost or value of the materials issued to the cost
center or job.

2. Materials returned note

This is used to record any unused materials which are returned to stores.

3. Materials transfer note

This document is used to transfer materials from one production department


to another.

Activity 1.1.2
Directions: Match column A with Column B and write your answer on a separate
sheet of paper.
Column A
1. Goods received note

2. Materials Transfer Note

3. Materials Requisition
Note

4. Quotation

5. Materials Returned Note

6. Supplier

7.Delivery Note

8. Document

9. Inventory Form

10. Purchase Order

Column B
A form that records the transfer of material from one
accounting code to another
a commercial document and first official offer issued
by a buyer to a seller, indicating types, quantities,
and agreed prices for products or services.
A document that accompanies a goods shipment and
lists details about the goods delivered
A person or entity that is the source for goods or
services
A detailed, itemized list, report, or record of things in
one's possession, especially a periodic survey of all
goods and materials in stock
A written, drawn, presented or recorded
representation of thoughts
A record of the cost of materials acquired, the cost of
materials issued and the cost of the inventory
A record any unused materials which are returned to
stores
A receipt given to the supplier to confirm delivery or
acceptance of goods by the customer
A lists the items to be picked from inventory and
used in the production process or in the provision of
a service to a customer, usually for a specific job

Activity 1.1.2 Answer Key:


1.
2.
3.
4.
5.

I
A
J
G
H

6. D
7. C
8. F
9. E
10. B

Lets Do This! 1.1.2


Directions: The class will be divided into five groups. Each group will role play the process or
movement of materials in a business. Use the given diagram below as your guide in presenting
and making the script/skit of your role play.

Lets Do This! Scoring Rubrics 1.1.2


Speech was clear with appropriate volume and inflection.
Role was played in a convincing, consistent manner.
Arguments and viewpoints expressed fit role played.
Costumes and props were effectively used.
Role-play was well prepared and organized.
Role-play captured and maintained audience interest.

Points
54
54
54
54
54
54

3
3
3
3
3
3

2
2
2
2
2
2

1
1
1
1
1
1

Get involved1.1.2
Directions: You are the computer technician in a certain company. One day, your Manager wants
you to prepare an inventory of all the issued tools and equipment in your area using LibreOffice
as shown in the give figure below. Moreover, your manager gave you only an hour to complete
the assigned job. (Note: Read the Tags attached of the tools/equipment to determine the history
of inventory).
Inventory Form Sample
Counted Sheet Number:
Item Number

Item Description

Location

Date of Inventory:
Quantity

Remarks

Prepare by: (Name of Students)


Checked by: (Name of Teacher)

Get involved Scoring Rubrics 1.1.2


Not Yet
Performed

Performed
Have listed at least 10 tools/equipment
Have written the correct item number of each tools/equipment

Have
Have
Have
Have

listed the actual number of tools/equipment


written the correct description of the item
written the correct location of the item
created the inventory form using LibreOffice

Learning Outcome No. 1 ASSESS QUALITY OF RECEIVED MATERIALS


1.1.3 Identify and isolate faulty materials related to work
Information Sheet 1.1.2
Fault Identification and Reporting
Things to be considered when:
A. Receiving Materials:
1. Match the packing slip to the items received and ensures that the materials are
destined on tour department.
2. That you are receiving the materials indicated on the purchase order with regard
to quantity and discount.
3. That the materials are in acceptable condition.
4. That terms regarding installation and/ or set-up of equipment are met.
B. Receiving Reports
Whenever goods are received:
1. The person receiving the goods must document, using the administrative
software, that all goods were received for each requisition before any payment can
be made to the vendor.
2. Any exceptions must be noted so that partial payments can be processed or
defective goods can be returned.
C. Return of Merchandise
When merchandise is received which is incomplete or defective, the supervisor will
return the materials to the supplier or to the store where it was bought and make
arrangements with the vendor for replacement.
D. Make an Inventory Report of the Materials
All materials received must be listed and be reported to monitor how many
materials are already on hand, purchased or damaged. Effective management
checks are an important means of providing assurance of the integrity and security
of the benefit processes. They are also useful in identifying training needs;
indicating possible weaknesses in procedure and ensuring the section meets its
accuracy target set for Best Value Performance Indicators purposes.
Date Received

Example of Log Report (To be completed by quality checker)


O.R. Number
Item Name
Quantity
Signature

Quality
Checker

Example of Assessment of Materials Received (To be completed by quality checker)


Quality Checker:
Date:
Item Number
Total Number in Good Total Number of Errors
Comments

Condition

Activity 1.1.3
Directions: Sequence the steps in receiving materials. Write your answer on a
separate sheet of paper.
_______ Match the packing slip to the items received and ensures that the materials are
destined on tour department.
_______That you are receiving the materials indicated on the purchase order with regard
to quantity and discount.
_______That the materials are in acceptable condition.
_______That terms regarding installation and/ or set-up of equipment are met.

Lets Do This! 1.1.3


Directions: You are assigned to be the Quality checker for the Month of July. Make an Assessment
Report using the following data below. Make sure you will record all the items listed and if they
were in good condition or not. Write your answer on a sheet of paper.
Date Received

Example of Log Report (To be completed by quality checker)


O.R. Number
Item Name
Quantity
Signature

Quality
Checker

Lets Do This! Scoring Rubrics 1.1.3


Points

Have
Have
Have
Have
Have
Have

recorded the date received of the item


written the OR number of the item
determined the name and brand of the item
determined the quantity of the items
affix the signature of the quality checker
used the format of the Log Report

5
5
5
5
5
5

Get involved1.1.3
Directions: Directions: You are assigned to be the Quality checker for the Month of July. Make a
Log Report using the following data below. Make sure you will record all the items listed and if
they were in good condition or not. Write your answer on a sheet of paper.
Assessment of Materials Received
Quality Checker:
Item Number

Date:
Total Number in Good
Condition

Total Number of Errors

Comments

Get involve Scoring Rubrics 1.1.3


Have recorded the item number

Points
10

Have
Have
Have
Have
Have

identified the items which are in good condition


determined the total number of errors
given its comment on each items
prepare the report neatly
used the format of the Assessment Report

INFORMATION SHEET 1.1.4 AND 1.1.5

10
10
10
5
10

Record and/or report defects and any identified causes to the supervisor concerned in accordance with workplace
procedures

OHS or Occupational Health and Safety refers to the legislation, policies, procedures and activities that
aim to protect the health, safety and welfare of all people at the workplace.
1.

Do not work alone so that there's someone who can take care of you in case of emergency.

2.

Always power off the computer and unplug the computer before working on it.

3.

Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.

4.

Be careful with tools that may cause short circuit.

5.

Always ground or discharge yourself before touching any part of the computer.

6.

Do not use excessive force if things don't quite slip into place.

7.

Clean the area before and after using it to maintain sanitation and prevent accidents.

8.

Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.

9.

Always wear personal protective equipment (PPE) in accordance with the


organization's OHS procedures and practices.

10.

Make sure that the pins are properly aligned when connecting a cable connector.

11.

Contingency measures during workplace accidents, fire and other emergencies are
recognized.

12.

Use brush, compressed air or blower in cleaning the computer system.

Source: http://www.the12list.com/2014/06/12-ohs-procedures-for-computer-hardware.html
Task Sheet
Activity: Show scenarios or pictures having errors and let them identify the error based on the
OHS in the laboratory given to them.
1.

Working alone

3.

True or False:
___F___ 1. Working while the computer is on
Liquid in the working Area
is safe.
___T___ 2. Do not work alone so that there is
someone to help you.
2.

Tools3.damaging
the laptop
___F___
Leaving your
tools after working is
fine.
___F___ 4. Use excessive force while in
installing hardware parts is always advisable.
___T___ 5. Holding the components on the
edge to not touch the IC is okay.

Title

: Identify and replace the causes of defect in the workplace

Performance Objective:

Record and/ or report defects and any identified causes/hazards in accordance with workplace
procedures

Replace faulty materials in accordance with workplace procedures


Supplies/Materials:
Pen and paper
Equipment:

Computer unit and tools

Steps/Procedure:

1. The teacher will set up hazards in the lab and let the students identify it.
2. The teacher will call student/s to share ideas/s about the topic (summarize)
3. The teacher will group the class, each will present ideas/learning (relevant)
to the topic (Guide questions will be flash on the screen)
* What hazards do you see?
*how can you correct these hazards?
*How can we make our workplace safe?

Assessment Method

: Oral Questioning
Rubric for Skit

Criteria

Cooperation

Presentatio
n

weight

Task Description:

30%

30%

Exceptional

Admirable

Acceptable

Attempted

Accepts ideas
of others; able
to compromise
All members
contribute

Accepts most
ideas without
negative
comments;
able to
compromise
Some
members
contribute

Unwilling to
compromise
Few
members
contribute

Group does
not work
together
One person
does all the
work

Shows
confidence
Informative
Entertaining;
engages
audience
Speaks loudly
and clearly
Appropriate
use of body
language

Shows some
confidence
Presents
some
information
Engages
audience
Can be heard
Some use of
body
language

Unsure of
responsibility
Somewhat
informative
Engages
audience
intermittently
Hard to hear
Some
movement

Portrayal
stalls
Lacks
information
Audience
bored
Mumbles
Body
language is
lacking;
inappropriate

Assignment Score ________


________________

Beyond/Bonus ______________

Final Score

Information Sheet 2.2.1


Identify and use documentation relative to quality within the prescribed standard
Learning Objectives:
1.

Define the term document

2.

Appreciate the importance of using documents relative to quality within the prescribed standard

3.

Identify related documents

4.

Use documents/documentation relative to quality standards

Concepts:
1. A document is

piece of written, printed or electronic matter that provides information or evidence or that serves as
an official record. In general, a document (noun) is a record or the capturing of some event or thing so that the
information will not be lost. Usually, a document is written, but a document can also be made with pictures and sound.
A document usually adheres to some convention based on similar or previous documents or specified requirements.
Examples of documents are sales invoices, wills and deeds, newspaper issues, individual newspaper stories, oral
history recordings, executive orders, and product specifications.

a form of information . A document can be put into an electronic form and stored in a computer as one or more file s.
Often a single document becomes a single file. An entire document or individual parts may be treated as
individual data items. As files or data, a document may be part of a database . Electronic Document Management
( EDM ) deals with the management of electronically-stored documents. When using certain computer application
programs such as a word processor , a document is the unit of saved work. Each document is saved as a uniquely
named file.

In the computer industry, documentation is the information provided to a customer or other users about a product or
the process of preparing it.

To document (verb) a fact, event, or other thing is to record or annotate it, meaning to put it into some relatively
permanent form so that it can be retrieved later.

2. Related documents are the following:


a.

Service manuals - An owner's manual (also called an instruction manual) is an instructional book or
booklet that is supplied with almost all technologically advanced consumer products such as vehicles,
home appliances and computer peripherals.

b.

Operations manual / Manufacturers instruction manual - The operations manual is the authoritative
guidebook of how things are done in your business. It gives you an effective way of communicating
policy and procedures, and gives your employees the independence and security they need
to operate in their jobs for maximum results.

c.

Certifications - refers to the confirmation of certain characteristics of an object, person, or


organization. This confirmation is often, but not always, provided by some form of external review,
education, assessment, or audit. Accreditation is a specific organization's process of certification.

d.

Type approval certification - is granted to a product that meets a minimum set of regulatory, technical
and safety requirements. Generally, type approval is required before a product is allowed to be sold in
a particular country, so the requirements for a given product will vary around the world.

e.

Organization work procedures A set of policies are principles, rules, and guidelines formulated or
adopted

by

an organization to reach its long-term goals and

typically published in

a booklet or

other form that is widely accessible. Policies and procedures are designed to influence and determine
all major decisions and actions, and all activities take place within the boundaries set by them.
Procedures are the specific methods employed to express policies in action in day-to-day operations of

the organization. Together, policies and procedures ensure that a point of view held by the governing
body of an organization is translated into steps that result in an outcome compatible with that view.
f.

Customer requirements - Particular characteristics and specifications of a good or service as


determined by a customer.

g.

Forms - is piece of written, printed or electronic matter that provides information or evidence or that
serves as an official record and to be fill in or accomplish.

3. Use documents/documentation relative to quality standards

Manuals
1.

Make sure you have the right manual in front of you.

2.

Look for specific sections detailing the type of service or repair you are
going to perform.

3.

Read the Table of Contents to search for general topics.

4.

Look in the Index for key words or phrases related to the specific task you
intend to perform if it is not covered in the Table of Contents.

5.

Read the section which describes the task you are undertaking before you
actually start.

6.

Look for specific warnings.

7.

Look

for

references

to

specific

tools,

gauges,

or

other

specialized

equipment required to perform your maintenance or repair.


8.

Try using other, "outside" resources mentioned in the manual for repairs or
problems that the maintenance manual does not thoroughly cover.

9.

Obtain related manuals if you plan to do extensive work on your


equipment.

10. Follow instructions carefully when performing any maintenance until you
are familiar with the procedure.
11. Put a tab or bookmark on pages that you refer to frequently.
o

Tips

Make sure you pre-read the manual before doing the actual work.

If you need to, highlight sections that may be critical (such as safety issues).

If you are unsure of any abbreviations, check the index.

Be careful to use the correct measurements and sizes. SAE and metric units can appear similar
in text but are often radically different.

Use tables provided for noting maintenance you have performed.

Follow all safety precautions presented in the manual.

Make sure all tools you have used are accounted for when you're done. Leaving a tool in the

Tips

machine can cause extensive damage.

Wear appropriate safety equipment when performing maintenance, including eye and hearing
protection, gloves, and respirator.

References:
o

http://whatis.techtarget.com/definition/document

https://en.wikipedia.org/wiki/Owner%27s_manual

https://en.wikipedia.org/wiki/Certification

https://en.wikipedia.org/wiki/Type_approval

http://www.businessdictionary.com/definition/policies-and-procedures.html#ixzz4EyNhazRk

Task Sheet 2.2.1


Identify and use documentation relative to quality within the prescribed standard

Title

: Identify and use documentation relative to quality within the prescribed

Standard
Performance Objective : *Define the term document
*Identify related documents
*Use documents/documentation relative to quality standards
Supplies/Materials

: Hand-outs, Cartolina/Manila Paper, Colored Papers, Marking Pens

Equipment

: Laptop and Projector

Steps/Procedure

:
1. The teacher will call student/s to share ideas/s about the topic (summarize)
2. The teacher will group the class, each will present ideas/learning (relevant)
to the topic (Guide questions will be flash on the screen)
* What is a document?
*What are some related documents? and describe each
*How to use the related documents relative to quality standards?
*What is the importance of using documents/documentation relative
to quality within the prescribed standard

Assessment Method

: Oral Questioning and Presentation

Scoring Rubric for Oral Presentations


Content and Scientific Merit (60 points)
Introduction:

Defines background and importance of research.

States objective, and is able to identify relevant questions.


Body:

Conclusion:

Presenter has a scientifically valid argument.


Addresses audience at an appropriate level (rigorous, but generally understandable to a
scientifically-minded group).
Offers evidence of proof/disproof.
Describes methodology.
The talk is logical.
Summarizes major points of talk.
Summarizes potential weaknesses (if any) in findings.
Provides you with a take-home message.

Speaking Style/Delivery (20 points)

Speaks clearly and at an understandable pace.

Maintains eye contact with audience.

Well rehearsed (either extemporaneous or scripted presentation).

Limited use of filler words (umm, like, etc.).

Speaker uses body language appropriately.

Speaker is within time limits.

Speaker is able to answer questions professionally.

Speaker is dressed appropriately.


Audio/Visual (20 points)

Graphs/figures are clear and understandable.

The text is readable and clear.

Audio/Visual components support the main points of the talk.

Appropriate referencing of data that is/was not generated by presenter


General Comments

Job Sheet 2.2.1


Identify and use documentation relative to quality within the prescribed standard
Title

: Identify and use documentation relative to quality within the prescribed

Standard
Performance Objective : Able to explain the concept of documentation relative to quality within the
prescribed standard through role play
Supplies/Materials

: Props (Costume, backdraft, documents-manuals, etc.)

Equipment
Steps/Procedure

: Computer unit / Computer parts / devices


:
1. The teacher will call student/s to share ideas/s about the presentation
2. The teacher will give the next activity for them to perform
Activity:
Same group, they will present a role play that gives emphasis or
explains the concept of documents/documentation relative to quality
within the prescribed standard.

Assessment Method

: Oral Presentation and Questioning

Rubric for Skit or Role Play


Task Description: Able to explain the concept of documentation relative to quality within the

Criteria

Understanding
of Topic

Cooperation

Presentatio
n

weight

prescribed standard through role play

40%

30%

30%

Exceptional

Admirable

Acceptable

Attempted

Factual
information is
accurate

Indicates a
clear understanding
of topic

Factual
information is
mostly accurate
Good
understanding of
topic

Factual
information is
somewhat accurate
Fair
understanding of
topic

Information is
inaccurate
Presentation is off
topic

Accepts ideas of
others; able to
compromise
All members
contribute

Accepts most ideas


without negative
comments; able to
compromise
Some members
contribute

Unwilling to
compromise
Few members
contribute

Group does not


work together
One person does
all the work

Shows confidence
Informative
Entertaining;
engages audience
Speaks loudly and
clearly
Appropriate use of
body language

Shows some
confidence
Presents some
information
Engages audience
Can be heard
Some use of body
language

Unsure of
responsibility
Somewhat
informative
Engages audience
intermittently
Hard to hear
Some movement

Final Score ________________

Portrayal stalls
Lacks information
Audience bored
Mumbles
Body language is
lacking;
inappropriate

Information Sheet 1.2.3


Learning Competency: Assess Own Work
Lesson 1 : Applying Quality Standards (AQS)
Quarter : First

Identify and Isolate Errors


TYPES AND WORK-RELATED ERRORS
A. Quantity of work (untimely completion, limited production)
1. Poor prioritizing, timing, scheduling
2. Lost time
Tardiness, absenteeism, leaving without permission
Excessive visiting, phone use, break time, use of the Internet
Misuse of sick leave
3. Slow response to work requests, untimely completion of assignments
4. Preventable accidents
B. Quality of work (failure to meet quality standards)
1. Inaccuracies, errors
2. Failure to meet expectations for product quality, cost or service
3. Customer/client dissatisfaction
4. Spoilage and/or waste of materials
5. Inappropriate or poor work methods
Work Behavior Which Result in Performance Problems
A. Inappropriate behavior (often referred to as "poor attitude")
Negativism, lack of cooperation, hostility
Failure or refusal to follow instructions
Unwillingness to take responsibility ("passing the buck")
Insubordination
B. Resistance to change
Unwillingness, refusal or inability to update skills
Resistance to policy, procedure, work method changes
Lack of flexibility in response to problems
C. Inappropriate interpersonal relations
Inappropriate communication style: over-aggressive, passive
Impatient, inconsiderate, argumentative
Destructive humor, sarcasm, horseplay, fighting
Inappropriate conflict with others, customers, co-workers, supervisors
D. Inappropriate physical behavior
Smoking, eating, drinking in inappropriate places
Sleeping on the job
Alcohol or drug use
Problems with personal hygiene

SELF-ASSESSMENT
Test I. Write QN if the statement affects the quantity of work and QL if the statement affects the
quality of work. Write your answer on the space provided before each number.
(Do this Individually)
______ 1. Poor scheduling of work
______ 2. Failure to meet expectations for product quality, cost or service
______ 3. Customer/client dissatisfaction

______
______
______
______
______
______

4.
5.
6.
7.
8.
9.

Misuse of sick leave


Tardiness
Slow response to work requests
Break time
Poor work method
Spoilage and/or waste of materials

Test II. Cite two (2) examples for work behaviour given that can cause performance
problem.
1. Inappropriate behaviour.
2. Resistance to change.
3. Inappropriate interpersonal relations.
4. Inappropriate physical behaviour.

SELF-ASSESSMENT ANSWER KEY


Test I.
1.
2.
3.
4.
5.
6.
7.
8.
9.

QN
QL
QL
QN
QN
QN
QN
QL
QL

Test II.
1.

Negativism, lack of cooperation, hostility


Failure or refusal to follow instructions
Unwillingness to take responsibility ("passing the buck")
Insubordination

2.

Unwillingness, refusal or inability to update skills


Resistance to policy, procedure, work method changes
Lack of flexibility in response to problems

3.

Inappropriate communication style: over-aggressive, passive


Impatient, inconsiderate, argumentative
Destructive humor, sarcasm, horseplay, fighting
Inappropriate conflict with others, customers, co-workers, supervisors

Smoking, eating, drinking in inappropriate places


Sleeping on the job
Alcohol or drug use
Problems with personal hygiene

4.

Information Sheet 1.2.4

Learning Competency: Assess Own Work


Lesson 1 : Applying Quality Standards (AQS)
Quarter : First
Record information on the quality and other indicators of production
performance in accordance with workplace procedures.
Workplace Procedure is a set of written instructions that identifies the health and
safety issues that may arise from the jobs and tasks that make up a system of work.
A safe working procedure should be written when:
designing a new job or task
changing a job or task
introducing new equipment
reviewing a procedure when problems have been identified, example from an
accident or incident investigation
The safe working procedure should identify:
the teacher for the task or job and the students who will undertake the task
the tasks that are to be undertaken that pose risks
the equipment to be used in these tasks
the control measures that have been formulated for these tasks
any training or qualification needed to undertake the task
the personal protective equipment to be worn
action to be undertaken to address safety issues that may arise while undertaking
the task

These are the things to be considered when:


A. Receiving Materials:
1. Match the packing slip to the items received and ensure that the materials are destined on
your department/area.
2. That you are receiving the materials indicated on the purchase order with regard to quantity
and discount.
3. That the materials are in acceptable condition.
4. That terms regarding installation and/or set-up of equipment are met.
B. Receiving Reports
Whenever goods are received:
1. The person receiving the goods must document, using the administrative software, that all
goods were received for each requisition.
2. Any exceptions must be noted so that defective goods can be returned.

C. Return of Merchandise

When merchandise is received which is incomplete or defective, the supervisor will return
the materials to the supplier or to the store where it was bought and make arrangements with
the vendor for replacement.

D. Make an Inventory Report of the Materials


All materials received must be listed and reported to monitor how many materials are
already on hand, purchased or damaged.
Effective management checks are important means of providing assurance of the integrity
and security of the benefit processes. They are also useful in identifying training needs;
indicating possible weaknesses in procedure and ensuring the section meets its accuracy target
set for Best Value Performance Indicators purposes.

INFORMATION SHEETS 1.3.1


Participate process improvement procedures in relative to workplace
assignment

In technical usage, quality can have two meanings:


1. the characteristics of a product or service that bear on its ability to satisfy stated or
implied needs.
2. a product or service free of deficiencies.

The quality of a product or service refers to the perception of the degree to which the
product or service meets the customer's expectations. Quality has no specific meaning
unless related to a specific function and/or object. Quality is a perceptual, conditional
and somewhat subjective attribute.
The dimensions of quality refer to the attributes that quality achieves in Operations
Management:
Quality <-> Dependability <-> Speed <-> Flexibility <-> Cost

Quality supports dependability


Dependability supports Speed

Speed supports Flexibility

Flexibility supports Cost.

In the manufacturing industry it is commonly stated that Quality drives


productivity. Improved productivity is a source of greater revenues, employment
opportunities and technological advances. The best way to think about quality is in
process control. If the process is under control, inspection is not necessary. However,
there is one characteristic of modern quality that is universal. In the past, when we tried
to improve quality, typically defined as producing fewer defective parts, we did so at the
expense of increased cost, increased task time, longer cycle time, etc.

Quality Management Terms:


Quality Improvement can be distinguished from Quality Control in that Quality
Improvement is the purposeful change of a process to improve the reliability of
achieving an outcome.
Quality Control is the ongoing effort to maintain the integrity of a process to
maintain the reliability of achieving an outcome.
Quality Assurance is the planned or systematic actions necessary to provide

quality.

With development teams of two or three in daily contact and frequently


exchanging views and criticisms, detailed, written quality and task-completion checking
procedures may be felt to be unnecessary. Procedures still need to be agreed and the
results need to be documented. The need to check quality and task completion applies
at all stages of the development process but is underlined especially during the
prototype validation stages.
The importance of documenting checks applies whatever the size of the team and
whatever the complexity of the software. In the production of assets, this may involve
checking to confirm the following:

that all the asset files listed in the product specification document have been produced;
that files are correctly named;

that files are the correct byte size or near the projected file
(examining the file-sizes in a directory listing can be helpful
identifying problem files which are either much too large or
too small);

size
in
much

that files are the correct resolution (screen-size and bitthe case of graphics; duration, sampling frequency and bitthe case of sound files);

depth in
depth in

that the quality of files displaying on the target monitor or heard on target listening
equipment is acceptable.

Note that sampling is seldom a satisfactory checking method. Checking should be


exhaustive, unless for reasons of time or economy this is impossible. Usually, however,
trying to economize on checking and testing is a false economy and cutting corners here
will often come back to haunt the development team. At the end of the day, all files will
need to be tested and, if at all possible, this should be done sooner rather than at a later
trial stage.
TASK SHEET 1.3.1

Title:
condition.

Classify tools and testing devices using a check sheet to determine their

Performance Objective: Provided with the needed tools, testing devices and materials
in improving quality processes, classify them using a check sheet to determine their condition

Supplies/Materials

:cable, connectors ,tools and equipment found in the laboratory

Equipment

: Multitester , LAN Cable Tester

Steps/Procedure:

1. Prepare needed tools and devices as many as available in the shoproom


2. Classify whether its good or defective, operational or non operational using the given

form based on your own assessment/evaluation


3. Present your work to your trainer

Assessment Method:
Accomplish Check Sheet

JOB SHEET 1.3.1

Provided with the needed tools, testing devices and materials in improving quality
processes, classify them using a check sheet to determine their condition.

CONDITION

Tools
1.
2
3

Testing devices
1.
2
3

Materials
1.
2.

Good

Defective

3.

INFORMATION SHSEETS 1.3.2


Carry out work in accordance with process improvement procedures
Manufacturers can choose from a variety of tools to improve their quality
processes. The trick is to know which tools to use for each situation and increasing the
sophistication of the tools in the repertoire.
Easy to implement and follow up, the most commonly used and well-known quality
process is the plan/do/check/act (PDCA) cycle (Figure 1). Other processes are a takeoff of
this method, much in the way that computers today are takeoffs of the original IBM
system. The PDCA cycle promotes continuous improvement and should thus be
visualized as a spiral instead of a closed circle.
Another popular quality improvement process is the six-step PROFIT model in
which the acronym stands for:
P = Problem definition.
R = Root cause identification and analysis.
O = Optimal solution based on root cause(s).
F = Finalize how the corrective action will be implemented.
I = Implement the plan.
T = Track the effectiveness of the implementation and verify that the desired results are
met.
If the desired results are not met, the cycle is repeated. Both the PDCA and the
PROFIT models can be used for problem solving as well as for continuous quality
improvement. In companies that follow
total quality principles, whichever model is
chosen should be used consistently in
every department or function in which
quality improvement teams are working.

Figure 1. The most common process for


quality
improvement
is
the

plan/do/check/act cycle outlined above. The cycle promotes continuous improvement


and should be thought of as a spiral, not a circle.

Once the basic problem-solving or quality improvement process is understood, the


addition of quality tools can make the process proceed more quickly and systematically.
Seven simple tools can be used by any professional to ease the quality improvement
process: flowcharts, check sheets, Pareto diagrams, cause and effect diagrams,
histograms, scatter diagrams, and control charts. (Some books describe a graph instead
of a flowchart as one of the seven tools.)
The key to successful problem resolution is the ability to identify the problem, use
the appropriate tools based on the nature of the problem, and communicate the solution
quickly to others. Inexperienced personnel might do best by starting with the Pareto
chart and the cause and effect diagram before tackling the use of the other tools. Those
two tools are used most widely by quality improvement teams.

TASK SHEET 1.3.2

Title:

Role play plan/do/check/act (PDCA) cycle

Performance Objective :
Given some inputs/lectures on PDCA, form
groups and certain situations where PDCA cycle is
observable

Supplies/Materials

Equipment

:defective materials (any of their choice)

:computer systems / or any of their choice

Steps/Procedure:

1. Let students form groups


2. Perform role paly where PDCA is observable
3. Present play to your trainer.

Assessment Method:

Assessment using the Performance Criteria Checklist

Performance Criteria Checklist

CRITERIA

Ye
s

NO

Organization of the
Role play clearly describes PDCA
Participation of every character

INFORMATION SHEETS 1.3.3


Monitor performance of operation or quality of product of service to ensure
customer satisfaction
FLOWCHARTS
Flowcharts describe a process in as much detail
as possible by graphically displaying the steps in proper
sequence. A good flowchart should show all process
steps under analysis by the quality improvement team,
identify critical process points for control, suggest areas
for further improvement, and help explain and solve a
problem.
Flowcharts can be simple, such as the one
featured in Figure 2, or they can be made up of
numerous boxes, symbols, and if/then directional steps.
In more complex versions, flowcharts indicate the
process steps in the appropriate sequence, the
conditions in those steps, and the related constraints by
using elements such as arrows, yes/no choices, or
if/then statements.

CHECK SHEETS
Check sheets help organize data by category. They show how many times each
particular value occurs, and their information is increasingly helpful as more data are
collected. More than 50 observations should be available to be charted for this tool to be
really useful. Check sheets minimize clerical work since the operator merely adds a mark
to the tally on the prepared sheet rather than writing out a figure (Figure 3). By showing

the frequency of a particular defect (e.g., in a molded part) and how often it occurs in a
specific location, check sheets help operators spot problems. The check sheet example
shows a list of molded part defects on a production line covering a week's time. One can
easily see where to set priorities based on results shown on this check sheet. Assuming
the production flow is the same on each day, the part with the largest number of defects
carries the highest priority for correction.

track

Figure-3. Because it clearly organizes data, a check sheet is the easiest way to
information.

PARETO DIAGRAMS
The Pareto diagram is named after Vilfredo Pareto, a 19th-century Italian
economist. are caused by 20% of the potential sources.
A Pareto diagram puts data in a hierarchical
order (Figure 4), which allows the most significant
problems to be corrected first. The Pareto
analysis technique is used primarily to identify
and evaluate nonconformities, although it can
summarize all types of data. It is perhaps the
diagram most often used in management
presentations.
To create a Pareto diagram, the operator collects
random data, regroups the categories in order of
frequency, and creates a bar graph based on the
results.

Figure 4. By rearranging random data, a


Pareto

diagram

identifies

and

ranks

nonconformities in the quality process in


descending order.

CAUSE AND EFFECT DIAGRAMS


The cause and effect diagram is sometimes called an Ishikawa diagram after its
inventor. It is also known as a fish bone diagram because of its shape. A cause and effect
diagram describes a relationship between variables. The undesirable outcome is shown
as effect, and related causes are shown leading to, the said effect. This popular tool has
one severe limitation, however, in that users can overlook important, complex

interactions between causes. Thus, if a problem is caused by a combination of factors, it


is difficult to use this tool to depict and solve it.

Figure 5. Fish bone diagrams display the


various possible causes of the final effect.
Further analysis can prioritize them.

A fish bone diagram displays all contributing factors and their relationships to the
outcome to identify areas where data should be collected and analyzed. The major areas
of potential causes are shown as the main bones, Later, the subareas are depicted.
Thorough analysis of each cause can eliminate causes one by one, and the most
probable root cause can be selected for corrective action. Quantitative information can
also be used to prioritize means for improvement, whether it be to machine, design, or
operator.
HISTOGRAMS
The histogram plots data in a frequency distribution table. What
distinguishes the histogram from a check sheet is that its data are grouped into rows so
that the identity of individual values is lost. Commonly used to present quality
improvement data, histograms work best with small amounts of data that vary
considerably. When used in process capability studies, histograms can display
specification limits to show what portion of the data does
not meet the specifications.

After the raw data are collected, they are grouped in


value and frequency and plotted in a graphical form
(Figure 6). A histogram's shape shows the nature of the
distribution of the data, as well as central tendency
(average) and variability. Specification limits can be used
to display the capability of the process.
A
is an easy way to see the distribution
data, its average, and variability.

Figure 6.
histogram
of
the

SCATTER DIAGRAMS
A scatter diagram shows how two
are related and is thus used to test for
effect relationships. It cannot prove that
variable causes the change in the other,
a relationship exists and how strong it
scatter diagram, the horizontal (x) axis
the measurement values of one
and the vertical (y) axis represents the

variables
cause and
one
only that
is. In a
represents
variable,

measurements of the second variable. Figure 7 shows part clearance values on the x-axis
and the corresponding quantitative measurement values on the y-axis.

CONTROL CHARTS
A control chart displays statistically determined upper and
lower limits drawn on either side of a process average.
This chart shows if the collected data are within upper
and lower limits previously determined through statistical
calculations of raw data from earlier trials (Figure 8).
In preparing a control chart, the mean upper control limit
(UCL) and lower control limit (LCL) of an approved process
and its data are calculated. A blank control chart with
mean UCL and LCL with no data points is created; data
points are added as they are statistically calculated from
the raw data.
TASK SHEET 1.3.3
Title:
different chart

Monitor performance or quality of service using

JOB

Performance Objective:
Given sample charts, the trainees should be
able to analyze orally charts based on given data.
Supplies/Materials
Equipment

: Charts (Progress , Achievement, others )

Steps/Procedure:
1. Post charts on Walls or Projector
2. Let students examine relationships of variables on the charts
presented
3. Let them share possible factors affecting the relationships

Assessment Method:
Observations

SHEETS 1.3.3

TEST I.Direction: Write TRUE if the statement is correct and FALSE if it is wrong. Write
your answer in a separate sheet of paper.

Poor attitude results in performance problem.

A safe working procedure should be written when retrieving old


tasks.

Preventable accidents may affect the quantity of work.

Following certain procedure is very important in performing a given


operation.

Safe working procedure should not identify the tasks which are to
be undertaken.

Standards are set of rules that describe quality of materials,


product or system.

Quality assurance does not cover all the activities from design and
development, up to documentation.

Customer service is a series of activities designed to enhance the


level of customer satisfaction.

Customer service is not important in the companys customer


value proposition.

1
0

The durability of the work does not depend on the skills of those
who install it.

TEST II. Direction: Define the following.

1. Quality

___________________________________________________
___________________________________________________
___________________________________________________

2. Flow Chart

___________________________________________________
___________________________________________________
___________________________________________________

PRE-TEST/POST-TEST

1. TRUE
2. FALSE
3. TRUE
4. TRUE
5. FALSE
6. TRUE
7. FALSE
8. TRUE
9. FALSE
10.FALSE

3. Check Sheet

___________________________________________________
___________________________________________________
___________________________________________________

4. Pareto Diagram

___________________________________________________
___________________________________________________
___________________________________________________
TEST 1

1.TRUE
2.FALSE
3.TRUE
4.TRUE
5.FALSE
6.TRUE

TEST II.

1. Quality is the characteristics of a product that bear on its ability to satisfy or implied
needs.
2. Flowchart describes a process by graphically displaying the steps in proper sequence.
3. Check Sheet helps organize data by category.
4. Pareto Diagram puts data in hierarchical order which allows the most significant problems
to be corrected first.

PRE-TEST/POST-TEST

11.TRUE
12.FALSE
13.TRUE
14.TRUE
15.FALSE
16.TRUE
17.FALSE
18.TRUE
19.FALSE
20.FALSE

TASK SHEET 1.2.4


The teacher will be the assessor. You and other students will be randomly assigned: 1.)
one will act as Quality Checker; 2.) others will be responsible for monitoring and coordinating the
checking arrangements and; 3.) others must generate reports when receiving the
equipments/materials.
The Quality checker will record the date of receipt, name of materials purchased, quantity,
and official receipt number, signature of the person who received the materials and signed his
name afterwards. The Quality checker will identify if the materials are in good condition or
damaged and /or needing replacements. This will also be recorded on his report.
Feedback
Once the Quality checker has completed all the reports, the assessor will check if the
Quality Checker has provided all the data needed in the report.
Log Report (to be completed by the Quality checker)

Date
Received

O.R. #

Item
Name

Quantity

Signature

Quality
Checker

Performance Criteria and Checklist 1.2.4

Did the student.

1. Write Date when he/she received the materials?


2. Write O.R. # of the materials with good condition when he/she
received them?
3. Write Item Name of the materials with errors when he/she received
them?
4. Write Quality of materials when he/she received them?
6. Affix her/his signature as Quality Checker?
7. Write his/her name as Quality Checker?

Information Sheet 1.2.5


Learning Competency: Assess Own Work
Lesson 1 : Applying Quality Standards (AQS)
Quarter : First

Document and report cases of deviations from specific quality standards in


accordance with the workplaces procedures
Quality Improvement
In technical usage, quality can have two meanings:
3. the characteristics of a product or service that bear on its ability to satisfy stated
or implied needs.
4. a product or service free of deficiencies.
The quality of a product or service refers to the perception of the degree to which the
product or service meets the customer's expectations. Quality has no specific meaning
unless related to a specific function and/or object. Quality is a perceptual, conditional
and somewhat subjective attribute.
In the manufacturing industry it is commonly stated that Quality drives
productivity. Improved productivity is a source of greater revenues, employment
opportunities and technological advances. The best way to think about quality is in
process control. If the process is under control, inspection is not necessary. However,
there is one characteristic of modern quality that is universal. In the past, when we tried
to improve quality, typically defined as producing fewer defective parts, we did so at the
expense of increased cost, increased task time, longer cycle time, etc.
Quality and Task-Completion Checking
With development teams of two or three in daily contact and frequently
exchanging views and criticisms, detailed, written quality and task-completion checking
procedures may be felt to be unnecessary. Procedures still need to be agreed and the
results need to be documented. The need to check quality and task completion applies
at all stages of the development process but is underlined especially during the
prototype validation stages.
The importance of documenting checks applies whatever the size of the team and
whatever the complexity of the software. In the production of assets, this may involve
checking to confirm the following:
that all the asset files listed in the product specification document have been
produced;
that files are correctly named;

that files are the correct byte size or near the projected file size (examining the
file-sizes in a directory listing can be helpful in identifying problem files which are
either much too large or much too small);

that files are the correct resolution (screen-size and bit-depth in the case of
graphics; duration, sampling frequency and bit-depth in the case of sound files);

that the quality of files displaying on the target monitor or heard on target listening
equipment is acceptable.

ACTIVITY SHEET 1.2.5

Methodology
The teacher will be the assessor. You and other students will be
randomly assigned: 1.) one will act as Quality Checker; 2.) others will be
responsible for monitoring and coordinating the checking arrangements
and;
3.)
others
must
generate
reports
when
receiving
the
equipments/materials.
The Quality checker will record the date of receipt, name of materials
purchased, quantity, and official receipt number, signature of the person
who received the materials and signed his name afterwards. The Quality

checker will identify if the materials are in good condition or damaged


and /or needing replacements. This will also be recorded on his report.
Feedback
Once the Quality checker has completed all the reports, the assessor
will check if the Quality Checker has provided all the data needed in the
report.

Assessment of Materials Received (to be completed by the Quality


checker)
Quality Checker:

Date:

Total no. in
Item Name

Good
Condition

Total no.
of Errors

Comments

Performance Criteria and Checklist 1.2.5

Did the student.


1. Write the item name when he/she received the materials?
2. Write total no. of the materials with good condition when he/she
received them?
3. Write total no. of the materials with errors when he/she received
them?
4. Write date when he/she received materials?
5. Write remarks or suggestions for each material he/she received?

INFORMATION SHEET 2. 1.4

Lesson 2 LO 1: Plan and prepared for the Task undertaken: Follow the client specific guidelines and
procedures.

Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and
activities that aim to protect the health, safety and welfare of all people at the workplace.

Every worker has a right to healthy and safe work and to a work environment that enables
them to live a socially and economically productive life. Safety practices should be learned early

and always adhered to when working with any electrical device including personal computers
and peripherals.

Personal safety while working with PCs

Here are some safety precautions to take before working with any computer devices:

Before doing anything, listen to your teachers instruction to prevent accidents or any
unwanted events that may occur on your workplace.
Do not work on computer when you are wet because you might get electrocuted.
Do not remove internal devices of the computer when it is turned on.
Be sure not to mix electronic components and water.
Avoid playing or running while inside the room.
Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole,
anti-static wrist strap, etc.
Ask for assistance from your teacher when it comes on dealing with computer devices.
Applying safety measure when handling tools and equipment are necessary to avoid
certain damages.

The student is further expected to maintain good health, to be neat in personal appearance
and to practice safe working procedures at all time with appropriate equipment.

OHS Policies and Procedures

Occupational Health and Safety Policy

In the school as a computer teacher you must be aware of how your students behave when they are working in the computer
laboratory, as well as implementing a safe way of accomplishing every task. Safety practices should be learned
early and always adhered to when working with any electrical device, including personal computers and peripherals. This
is for the protection of not only the people working with them, but also for the devices themselves. The basis
for this process begins with your Occupational Health and Safety Policies.
Personal Safety While Working Along With PCs Computer equipment can be dangerous, and you or others
can be injured or even killed if you dont follow proper safety guidelines when working along PCs.
The following are some precautionary measures to take before working with any computer equipment:

Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or seriously
injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove all jewelry when working inside any computer related equipment.

Be sure not to mix electronic components and water


Personal Protective Equipment Personal Protective Equipment

It refers to protective clothing, helmets, goggles, or other gear designed to protect the wearer's body or clothing from injury by
electrical hazards, heat, chemicals, and infection, for job-related occupational safety and health purposes. PPE can also be
used to protect the working environment from pesticide application, pollution or infection from the worker (for example in a
microchip factory). Students even teacher during their laboratory period should require to use of personal protective
equipment. Some of these are:

Goggles A large spectacles, with shields around the rims,


for protecting the eyes from dust, excessive light, wind, etc.

Rubber Sole -A special type of shoes used to prevent


electrical shock and for waterproofing and insulating
purposes.

Apron A garment worn over the front of the body as a


protection for ones cloth.

Dust Mask- A covering for the face to prevent the inhaling


or absorbing dust and other chemicals

SafetyandAntiStaticRules

Whenpossible,trytoavoidworkingincarpetedareas.Carpetinggreatlyincreasesstaticbuildupwithinyour
body.
Alwaysuseanantistaticwriststrapwhenworkingonacomputer(exceptwhenworkingonmonitors

AlwaysdisconnectacomputerfromtheACpowerandfromanypoweredperipheralswhileyouareworkingon
it.
Alwaysgraspametalpartofthecomputerchassiswithyourbarehandbeforeyoutouchanythinginside.Dothis
evenifyouarewearinganantistaticwristband.
Alwayshandleelectroniccomponentsbyanonconducting(nonmetallic)edge.Don'ttouchthepinsorother
connectors.
NeverpluganATXpowersupplyintoACpowerunlessitisconnectedeithertoacomputer'smotherboardortoa
dummytestload.
AlwaysuseaULapprovedsurgeprotectororanUninterruptiblePowerSupplythatincorporatessurgeandspike
protection.
Nevereat,drink,orsmokewhileworkingonacomputer.

PERFORMANCE TASK 2-1.4

1.

Group yourselves into six members.

2.

Conduct a simulation on: Applying OH&S Policies and Procedures.

3.

The performance will be rated according to the following:


Performance Criteria:

- Have shown five OH&S policies in different areas

- Have shown four OH&S policies in different areas

- Have shown three OH&S policies in different areas

- Have shown two OH&S policies in different areas

- Have not shown any OH&S policies

ACTIVITYSHEET21.4
Directions:

Theclasswillbedividedintofivegroups.Eachgrouphastheirownrespectiveleader.
Thegroupwillprepareaskitregardingpersonalprotectiveequipment.Aftertheactivitythey
willbegradedthruthegivenPerformanceScoreCardbelow:

PERFORMANCESCORECARD

Score
1

1.1. The students clearly identified and follow personal protective


equipment procedure.
2.Standard procedures for OHS in installing devices/systems are
followed.
3.The students applied safety precautions during the play.
4.Whoisaccountableforoccupationalhealthandsafetyprograms.
5.Thegeneralresponsibilitiesofallemployees.
6.Thathealthandsafetyshallnotbesacrificedforexpediency
7.Thatunacceptableperformanceofhealthandsafetydutieswillnotbetolerated.
8. The play gave students more critical thinking on the
personal protective equipment
9. SignedbytheincumbentChiefExecutiveOfficer.
10.The students cooperatively performed the play.

ExcellentlyPerformed

VerySatisfactorilyPerformed

SatisfactorilyPerformed

FairlyPerformed

PoorlyPerformed

INFORMATION SHEET
LESSON 2: PERFORMING COMPUTER OPERATIONS (PCO)
1.1: Determine requirements of task in accordance with the required output.
OCCUPATIONAL HEALTH AND SAFETY PROCEDURE (OHSP)

General Safety Guidelines


Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and
damage to eyesight. As a best practice, make sure that a fire extinguisher and first aid
kit are available in case of fire or injury. Here are some general safety guidelines:
Remove your watch or any other jewelry and secure loose clothing.
Turn off the power and unplug equipment before opening the case and performing
service.
Cover any sharp edges inside the computer case with tape.
Never open a power supply or a monitor.
Do not touch areas in printers that are hot or those which use high voltage.
Know where the fire extinguisher is located and learn how to use it.
Know where the first aid kit is located.
Keep food and drinks out of your workspace.
Keep your workspace clean and free of clutter.
Lift heavy objects with sturdy leg support to avoid back injury
Fire Safety Guidelines
Follow fire safety guidelines to protect equipment and lives. Turn off and unplug the
computer before beginning a repair to avoid damage to the computer or electric shock to
the technician. Fire can spread rapidly and be very costly. Proper use of a fire
extinguisher can prevent a small fire from getting out of control. When working with
computer components, always consider the possibility of an accidental fire and prepare
how to react. If there is a fire, you should follow these safety procedures:
Always have a planned fire escape route before beginning any work.
Never fight a fire that is out of control or not contained.
Get out of the building quickly in case of an out-of-control fire.
Contact emergency services immediately for help.

TASK SHEET
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify whether each
statement is true or false. Gather picture evidences that make it true or false. On the
third column, show the effects of not following the safety precautions through a picture
presentation.
Example:
Turn off the power and unplug equipment before opening the case and performing
service.
Answer

Picture Presentation
Evidence

Effect

True

TRUE OR
FALSE
1. A safe workplace is

EVIDENCE

Effect

2.

3.

4.
5.
6.

clean, organized and


well-lit.
Before opening the
case and performing
services, one must
unplug the power
from the source.
It is a best practice
that a fire
extinguisher and first
aid kit be available in
the workplace.
You are allowed to
open the power
supply or a monitor.
You can eat inside the
laboratory.
You should contact
emergency services
immediately for help.

PERFORMANCE SHEET
Research and Investigate
Directions: Form a group of five members and research on the different safety
precautions used in computer laboratory. Interview/Observe a practitioner while lending
a quality service in computer hardware servicing. Use a video camera to record the
event stressing the safety guidelines and procedures in the laboratory. You will be rated
according to the following rubrics:
Video Documentation of Computer Laboratory Safety Precautions
Criteria

Poor (70-75)

Content/Informa
tion (50%)

The provided
information was
not necessary or
not sufficient to
the computer
laboratory safety
precautions.

Technically
sound
information

Coherence of
information
Quality of Video
(30%)
Clarity and
cohesiveness of
the video
Organization
and coherence
of ideas
Interview on
practitioner
(20%)

Excellent
(86- 100)
The provided
The provided
information was, information was
for the most part, necessary and
necessary and
sufficient to the
sufficient to the
computer
computer
laboratory
laboratory safety safety
precautions.
precautions.
Good (76-85)

It lacks clarity
Most part is well
and/or does not
organized, clear
present ideas in a and presents
coherent way.
ideas in a
coherent way.

The video was


well organized,
clear and
presents ideas
in a coherent
way.

Questions were
not congruent
with the topic

All of the
questions were
congruent with

Most of the
questions were
congruent with

Congruency of
questions to
the topic

Clarity of
questions

and were not


delivered clearly.

ANSWER KEY
1. A safe workplace is
clean, organized and
well-lit.
2. Before opening the
case and performing
services, one must
unplug the power from
the source.
3. It is a best practice
that a fire extinguisher
and first aid kit be
available in the
workplace.
4. You are allowed to
open the power supply
or a monitor.
5. You can eat inside the
laboratory.
6. You should contact
emergency services
immediately for help.

TRUE OR
FALSE
TRUE

TRUE

TRUE

FALSE

FALSE

TRUE

the topic and


delivered clearly.

EVIDENCE

the topic and


delivered clearly.

Effect

INFORMATION SHEET 2.1.2


Select appropriate hardware and software according to task assigned and required
outcome
At the end of this lesson, the students will be able to select and understand what
hardware and software appropriate on the required output.

WHAT IS A COMPUTER?
A computer allows users to store and process information quickly and automatically.

A computer is a programmable machine. It allows the user to store all sorts of


information and then process that information, or data, or carry out actions with the
information, such as calculating numbers or organising words.
Computer: A machine that can receive and store information and change or process it.
Information: Knowledge that is communicated.
Data (pl.): The representation of information in a formalised manner suitable for communication,
interpretation and processing, generally by a computer system. Note: the term raw data refers
to
unprocessed information.

Computers can be generally classified by size and power, although there can be
considerable overlap. Following are descriptions of several different types of computers.
Mainframe computers are large-sized, powerful multi-user computers that can
support concurrent programs. That means, they can perform different actions or
processes at the same time. Mainframe computers can be used by as many as
hundreds or thousands of users at the same time. Large organisations may use a
mainframe computer to execute large-scale processes such as processing the
organisations payroll.
Mini-computers are mid-sized multi-processing computers. Again, they can perform
several actions at the same time and can support from 4 to 200 users simultaneously.
In recent years the distinction between mini-computers and small mainframes has
become blurred. Often the distinction depends upon how the manufacturer wants to
market its machines. Organisations may use a mini-computer for such tasks as
managing the information in a small financial system or maintaining a small database
of information about registrations or applications.
Workstations are powerful, single-user computers. They have the capacity to store
and process large quantities of data, but they are only used by one person at a time.
However, workstations are typically linked together to form a computer network
called a local area network, which means that several people, such as staff in an office,
can communicate with each other and share electronic files and data.
Computer network: A grouping of computers and peripherals connected together by
telecommunications links to enable a group of users to share and exchange information.
Networks are discussed in more detail later in this module.

A workstation is similar to a personal computer but is more powerful and often comes
with a higher-quality monitor. In terms of computing power, workstations lie in
between personal computers and mini-computers. Workstations commonly support
applications that require relatively high-quality graphics capabilities and a lot of
memory, such as desktop publishing, software development and engineering
applications.
Personal computers (PCs), also called microcomputers, are the most popular type of
computer in use today. The PC is a small-sized, relatively inexpensive computer
designed for an individual user. Today, the world of PCs is basically divided between
IBM-compatible and Macintosh-compatible machines, named after the two computer

manufacturers. Computers may be called desktop computers, which stay on the


desk, or laptop computers, which are lightweight and portable. Organisations and
individuals use PCs for a wide range of tasks, including word processing, accounting,
desktop publishing, preparation and delivery of presentations, organisation of
spreadsheets and database management. Entry-level PCs are much more powerful
than a few years ago, and today there is little distinction between PCs and
workstations.

TASK SHEET
Activity 1
If your office has computers, find out the type or types. Are they mainframe computers,
mini-computers, workstations or personal computers? What processes or actions are
the computers used for? Write a brief description of the types of computers in place and
their main uses. If your office has more than one type of computer, find out why? What
different tasks are the different computers intended to do?
If your office does not have computers, try to contact a colleague or friend who has a
computer and ask him or her what type he or she has and what primary functions it is
used for.

WHAT ARE THE COMPONENTS OF A COMPUTER?


Computers are made up of two parts: the hardware and the software.
Hardware: The physical equipment required to create, use, manipulate and store electronic
data.
Software: The computerised instructions that operate a computer, manipulate the data and
execute particular functions or tasks.

All computers require the following hardware components:


central processing unit (CPU)

Central processing unit (CPU): The chip or chips at the heart of a computer that enable it to
process data. Also known as a processor.

memory

Memory: An area within a computer system that holds data waiting to be processed.

storage device

Storage device: The place where a computer puts data.

input devices : the devices that allow data and instructions to enter a computer (such
as a keyboard, mouse, scanner)
Input: Any resource required for the functioning of a process, in the course of which it will be
transformed into one or more outputs.

output devices: the devices that allow information to be represented (that is, given
out) to the user, such as a display screen or printer)
Output: The product of the transformation of inputs by a process.

Printers, scanners and external disk drives that may be connected to the computer are
also sometimes called peripheral devices.

Peripheral device: Any piece of equipment in a computer system that is not actually inside the
computer itself.

The central processing unit (CPU) is the heart of the computer. It carries out all of the
instructions given in a program, such as a word processing or spreadsheet program.
The CPU consists of one or more chips (another name for integrated circuits).

Chip: A small piece of semi-conducting material (such as silicon) about 1 centimetre ( inch)
square on which an integrated circuit is embedded. An integrated circuit is a number of
electronic components joined together to form a path for electricity. Central processing unit chips
contain the circuits representing the CPU.

A microprocessor is a particular type of chip. The original IBM personal computer used
the Intel 8088 microprocessor. Most of todays microcomputers are designed around a
microprocessor from one of two product families: x86 or Power. The 80286, 80386, and
80486 models that followed were referred to by the last three digits, 286, 386, and 486.
For the next generation, however, Intel broke with tradition and introduced the Pentium
in 1993. In 1997, it introduced the Pentium II to address
multi-media applications, and most recently the Pentium III to address the new
opportunities provided by access to large volumes of information on the world wide
Web. Other manufacturers of chips (such as Cyrix) produce chips of similar power
and capabilities.
CPUs are not all equal. Some process data faster than others. A computer contains a
system clock that emits pulses to establish the timing of all systems operations. The
system clock operates at a speed quite different from a clock that keeps track of the
time of the day. The system clock determines the speed at which the computer can
execute an instruction, and therefore limits the number of instructions the computer
can complete within a specific amount of time. The time to complete an instruction
execution cycle is measured in megahertz (MHz) or millions of cycles per second.
Although some instructions require multiple cycles to complete, the processor speed
should be thought of in terms of the number of instructions the processor can execute
in one second. Today, microprocessor speeds exceed 300 MHz. If all other
specifications are identical, then higher megahertz ratings means faster processing.
When determining what type of computer you are using or considering what type of
computer to acquire, it is important to know that these terms 286, 386, 486, Pentium
refer to the type of processor in the computer. Newer computers will come with
Pentium microprocessors (or the equivalent from other manufacturers); older ones
with microprocessors from the x86 family.
It is important to know the type of processor in your computer. Some newer computer
programs will not run on older processors, and some newer processors are too
sophisticated for older software.

The faster the processor in a computer, the more quickly the computer will perform operations.

The most common type of memory that most users are familiar with is main memory
or RAM (random-access memory).

Random access memory (RAM): An area in the computer system unit that temporarily holds a
users data, operating system instructions and program instructions.

The word main is used to distinguish it from external mass storage devices such as
the hard drive or disk drives. Note that the term mass storage refers to various
techniques and devices for storing large amounts of data; mass storage is distinct from
memory because it retains data even when the computer is turned off. Thus mass
storage is sometimes referred to as auxiliary storage. Following are definitions of
common storage devices:

Storage: The area within a computer system where


data can be left on a longer term basis while it is not
needed for processing.
Diskette. A small, removable, flexible mylar plastic disk covered with a thin layer of a
magnetisable
substance, onto which digital data can be recorded and stored. Also known as a floppy disk.
Hard drive: The storage area within the computer
itself, where megabytes of space are available to store bits of information. Also known as a hard
disk.
Optical disk: A storage device that uses reflecting surfaces and laser technology to read and
write data on a disk. Also known as a laser disk.

Magnetic tape: A continuous plastic strip covered with magnetic oxide; the tape is divided into
parallel tracks onto which data may be recorded by selectively magnetising parts of the surface,
or spots, in each of the tracks. The data can then be stored and reused.

TASK SHEET
Activity 2
If your office has a microcomputer, look at the manuals that come with it. Review the
manuals to find out what type of microprocessor is in the computer. Look also at the
computer screen when the computer is turned on to see if information about the
computer is shown there. Then examine two types of software used by your
organisation. What are the minimum requirements for a microprocessor for each type
of software? Does the computer meet the minimum requirements for the software?
Does it exceed the requirements (that is, is the computers microprocessor newer or
more powerful than the software requires)? Again, look in the software manuals for
information, or ask a friend or colleague to help you. Do not remove the back from
the computer or try to unload or reload the software.

HOW DOES A COMPUTER WORK?


A computer functions in the following manner:
The computer accepts input. Computer input is whatever is entered or fed into a
computer system. Input can be supplied by a person (such as by using a keyboard)
or by another computer or device (such as a diskette or CD-ROM). Some

examples of input include the words and symbols in a document, numbers for a
calculation, instructions for completing a process, pictures, and so on.
The computer performs useful operations, manipulating the data in many ways.
This manipulation is called processing. Examples of processing include
performing calculations, sorting lists of words or numbers, modifying documents
and pictures according to user instructions, and drawing graphs. A computer
processes data in the CPU.
Process: A systematic series of actions a computer uses
to manipulate data.

The computer stores data. A computer must store data so that it is available for
processing. Most computers have more than one location for storing data (the
hard drive or C:\, and the floppy drive or A:\). The place where the computer
stores the data depends on how the data is being used. The computer puts the data
in one place while it is waiting to be processed and another place when it is not
needed for immediate processing. The storage of data in the computer is called
online storage while the storage of data on computer tapes, diskettes or
CD-ROMs is called offline storage.
UNDERSTANDING COMPUTERS
11

The computer produces output. Computer output is information that has been
produced by a computer. Some examples of computer output include reports,
documents, music, graphs, and pictures. Output can be in several different
formats, such as paper, diskette, or on screen.
A computer receives data as input, processes it, stores it and
then produces output.

Activity 3
Describe, in terms of input, processing and data, the production of a letter using a
computer. What happens first? What happens last?

HOW DOES THE SOFTWARE WORK?


Software is the computerised instructions that operate the computer, execute particular
functions or tasks, and manipulate the data. For software (the instructions) to perform
various functions, it must be programmed. That is, the instructions need to be written
in a programming language that the computer can understand. Without a program, a
computer is useless.
Programming language: An artificial set of rules,
vocabulary and syntax used to instruct the computer to
execute certain tasks.
Computer program: A sequence of instructions that
can be executed by a computer to carry out a process.

Over the years, a wide range of programming languages have been developed,
including BASIC, FORTRAN, PASCAL, C++, JAVA, and so on. Each language has
a unique set of words (codes) that it understands and a special syntax for organising
program instructions.
The language the computer actually understands is called machine language, which
comprises numbers only. This language is used by the computer to understand the
programming language and translate the terms into executable instructions. Lying
between programming languages and machine languages are assembly languages.
Assembly languages have the same structure and set of commands as machine
languages but they enable a program to use names instead of numbers.
UNDERSTANDING COMPUTERS
12

Please note: most people who use computers today do not need to worry about
programming, machine, or assembly languages. This is because the software being
used today is written in a highly user-friendly manner and in a way that does not
require knowledge of the computer languages which were used to create and use it.
User friendly: Computer software or hardware that is
simple to set up, run and use.

There are two kinds of software, systems software and applications software.
Systems software includes the operating system and all the utilities that enable the
computer to function. The most important program that runs on a computer is the
operating system. Every general-purpose computer must have an operating system in
order to run other programs. This includes controlling functions such as the

coordination of the hardware and applications software, allocating storage facilities,


controlling the input and output devices and managing time sharing for linked or
networked computers. In many respects an operating system works like an air traffic
controller to coordinate activities within the computer. Examples of operating
systems are Windows NT, DOS and OS/2. The Windows family of operating systems
includes a Graphical User Interface (GUI) that makes the software user friendly.
Operating system: A collection of software that allows
a computer to function.

Applications software includes programs that users access to carry out work. They
include applications for the following functions.
Word processing is the most common applications software. The great advantage
of word processing over using a typewriter is that you can make changes without
retyping the entire document. Word processors make it easy to manipulate and
format documents.
Spreadsheets are computer programs that let people electronically create and
manipulate spreadsheets (tables of values arranged in rows and columns with
predefined relationships to each other). Spreadsheets are used for mathematical
calculations such as accounts, budgets, statistics and so on.
Database management applications are computer programs that let people create
and manipulate data in a database. A database is a collection of related
information that can be manipulated and used to sort information, conduct
statistical analyses or generate reports.
Presentation packages and graphics are computer programs that enable users to
create highly stylised images for slide presentations and reports. They can also be
used to produce various types of charts and graphs. Many software applications
include graphics components including: paint programs, desktop publishing
applications and so on.
Communications applications typically include software to enable people to send
faxes and emails and dial into other computers.

Software programs are continually being written or upgraded to undertake certain tasks. As a
result the software can become obsolete quickly.

Software can be either proprietary (also called closed) or open. Proprietary


software is privately owned and controlled. A proprietary software design or
technique is one that is owned by a company, which will usually not divulge
specifications that would allow other companies to duplicate the product.
Increasingly, proprietary software is seen as a disadvantage in many organisations;
users prefer to use open software, which is software designed using specifications
that are publicly accessible. The great advantage of open software is that anyone can
create add-on products for it because they can understand how it was designed.
People using open software can mix and match products from different manufacturers.
By making software public, however, a manufacturer allows others to duplicate its
product, which many manufacturers do not want.
Activity 4
Choose a computer and switch it on. What operating system does it use? What
version? What software applications are being run on the computer? For help, look
at the computer and software manuals and have a friend or colleague work with you.

PERFORMANCE SHEET

LETS DO THIS!
Prepare important information or details of our schools Senior High Schools Course
Offerings.

HOW DOES A COMPUTER PROCESS INFORMATION?


When data is input into a computer, the numbers or words we understand are
translated into a binary numbers system. Binary is the language of computers.
Everything you type, input, output, send, retrieve, draw and so on is, in the end,
converted to the computers native language: binary.
Binary number system: A numerical system wherein
each digit stands for a power of two. The binary
system uses only two symbols, 0 and 1, to represent
values.
UNDERSTANDING COMPUTERS
14

In the decimal system, commonly used in most countries, each digit represents a value
of 10. For example, the number 103 would break down as follows:
1 x 100 = 100
0 x 10 = 0
3x1=3
103 = 103

In the binary system, each digit position represents a value of 2. Because computers
use the binary system, powers of 2 play an important role. This is why everything in
computers seems to come in 8s (2 to the 3rd power), 64s (2 to the 6th power), 128s (2
to the 7th power), and 256s (2 to the 8th power). Therefore, in the binary system, the
number 103 would break down as follows:
1 x 64 = 64
1 x 32 = 32
0 x 16 = 0
0x8=0
1x4=4
1x2=2
1x1=1
1100111 = 103
The values in a binary system -- the 0s and 1s -- are called binary digits or bits.
Binary digit (bit): A digit within the binary number
system. A bit is the smallest unit of information held in
a computer.

The computers electronic circuits have only two states, on or off, and therefore can
only understand 0s and 1s, which may represent such opposites as on or off, yes or no,
or up or down. This is why all computers use the binary system. In order to make the
bits useful, they are combined into bytes of information.
UNDERSTANDING COMPUTERS
15

Byte: A combination of bits that represent one


character. A byte is usually composed of 8 bits.

Computer programmers have developed codes for various bytes of information, so


that they may be read by different computer programs. For example, one code might
define the letter A as 11000001 and the letter B as 11000010. The number 6 might
be defined as 11110110 and the number 8 as 11111000. When the person entering
data strikes the A key on the keyboard, the computer registers it as 11000001. When
he or she enters the B, the computer reads it as 11000010. Similarly, the number 6
is understood by the computer as 11110110 and the number 8 as 1111100. In this
way, the computer can store words and numbers as binary digits and then retrieve
them and convert them back into words or numbers as required.
As discussed earlier, this work of manipulating, storing and processing the data takes
place in the Central Processing Unit, the computers main memory. The CPU consists
of an arithmetic and logic unit, or ALU, a control unit, and a set of registers.
The arithmetic and logic unit is the portion of the CPU where arithmetic and
logical operations take place.
The control unit is the part of the CPU that supervises the general operations of
the computer.
The registers are devices that hold data inside the computers memory long
enough to execute a particular function, such as indexing, calculating, sorting or
otherwise manipulating data. They are the CPUs own internal memory.
Data travels from one part of the computer to another through a kind of path known as
a bus.
Bus: The channel or path that lets the parts of a
computer communicate with each other.

Similar to a school bus for school children, a computer data bus picks up a load of
data from one of the components on the main computer board and then transfers the
data to another component on the main computer board. The main circuit board of a
microcomputer is also known as the motherboard. The motherboard is the principal
board that has connectors for attaching devices to the bus. Typically, it contains the
CPU, memory and basic controllers for the system. The data bus is really a series of
electrical circuits that connect the various electrical elements on the main board.
The data are input into the computer and processed in the CPU. They travel along the
bus to be stored in the computers memory. The amount of memory available is
described in bytes of information, referring to the combination of bits representing
characters. The higher the number of bytes the more memory the computer has.
Todays computers hold megabytes or even gigabytes of data. A megabyte is a
unit of one million bytes; a gigabyte is one billion bytes, and a terabyte is one trillion
bytes. If a computer has a memory of 64 megabytes, then it can hold 64 million bytes

of information.

UNDERSTANDING COMPUTERS
16

Data can be stored so that it is readable again only using the software with which it
was created, or it can be stored in other formats, so that it may be transferred or used
by other software programs. There is a standard character code used to store data so
that it may be used by other software programs; this code is called ASCII or American
Standard Code for Information Interchange. The ASCII code assigns a specific
pattern of bits to each character, as described above. Another code that may be found,
especially in IBM-brand mainframe computers, is EBCDIC, or Extended Binary
Coded Decimal Interchange Code. The important point to remember about these
codes is that their main value is to store information so that it is readable by other
computers. By using ASCII or EBCDIC, it is possible for people to retrieve and use
someone elses data using a different type of hardware or software. The main
disadvantage of using ASCII or EBCDIC is that the formatting or other special
qualities of computerised information may be lost.

WHAT IS COMPUTER MEMORY?


As defined earlier, memory refers to the temporary internal storage areas within a
computer. The term memory is usually used as shorthand for physical memory,
which refers to the actual chips capable of holding data. Some computers also use
virtual memory, which expands physical memory onto a hard drive.
The main type of memory and the most familiar to users is random access memory
(RAM). RAM is the same as main memory. A computer can both write data into
RAM and read data from RAM.
Every time a user turns on his or her computer, a set of operating instructions is
copied from the hard disk into RAM. These instructions, which help control basic
computer functions, remain in RAM until the computer is turned off. Most RAM is
volatile, which means that it requires a steady flow of electricity to maintain its
contents. As soon as the power is turned off, whatever data was in RAM disappears.
The contents of RAM are necessary for the computer to process data. The results of
the processing are kept temporarily in RAM until they are needed again or until they
are saved onto the hard disk or other storage device.
Today the storage capacity of RAM is measured in megabytes (MB). PCs
(microcomputers) typically have between 16 and 64 MB of RAM, which means they
can hold between 16 and 64 million bytes of data (a standard A4 page of text typically
holds about 2,000 bytes or characters of text).
Other types of memory include
ROM (read only memory): unlike RAM, ROM is non-volatile and only permits
the user to read data. Computers almost always contain a small amount of
read-only memory that holds instructions for starting up the computer.
UNDERSTANDING COMPUTERS
17

PROM (programmable read-only memory): a PROM is a memory chip on which


you can store a program. Once the PROM has been used, you cannot wipe it clean
and use it to store something else. Like ROMs, PROMs are non-volatile.
EPROM (erasable programmable read-only memory): an EPROM is a special type
of PROM that can be erased by exposing it to ultraviolet light.
EEPROM (electrically erasable programmable read-only memory): an EEPROM
is a special type of PROM that can be erased by exposing it to an electrical charge.
Activity 5
Ask the person or persons responsible for computer management in your organisation
how much random access memory (RAM) your organisations computer has. Find
out if they think the computer has enough RAM and why or why not.

HOW ARE DATA STORED?


It is very important to distinguish between memory, which refers to the circuitry that
has a direct link to the computer processor, and the storage, which refers to media
such as disks that are not directly linked to the processor. Remember, a storage device
is anything that is used to store computer data. Floppy disks, hard disks, optical disks,

CDs and magnetic tapes are all types of storage device.


Physical storage refers to how data are actually kept on the storage disk. The most
commonly used medium for storage is magnetic storage. With magnetic storage the
computer stores data on disks and tape by magnetising selected particles of an
oxide-based surface coating. The particles retain their magnetic orientation until that
orientation is changed. Thus magnetic disks and tapes are modifiable storage media.
The two most popular types of magnetic storage media are hard disks and diskettes.
Magnetic tape provides a third type of magnetic storage, and optical disk is a new
storage medium. Following is a discussion of each; the definitions included earlier
are repeated.
Hard drive or hard disk storage provides faster access to files than a diskette.
Hard drive: The storage area within the computer
itself, where megabytes of space are available to store
bits of information. Also known as a hard disk.

A hard disk platter is a flat, rigid disk made of aluminium or glass and coated with a
magnetic oxide. A hard disk consists of one or more platters and their read-write
heads. A read-write head is the device that reads the data from the disk platter into the
computer. It also records (or writes) data onto the platters. Hard disk platters in
UNDERSTANDING COMPUTERS
18

microcomputers are typically 3 inches (about 10 centimetres) in diameter: the same


size as the circular mylar disk in a diskette. However, the storage capacity of a hard
disk far exceeds that of a floppy disk. Also, the access time of a hard disk is
significantly faster than a diskette. Unlike diskettes, which begin to rotate when one
requests data, hard disks are continually in motion, so there is no delay as the disk
spins up to speed. Like diskettes, hard disks provide random access to files by
positioning the read-write head over the sector that contains the requested data.
Diskette. A small, removable, flexible mylar plastic
disk covered with a thin layer of a magnetisable
substance, onto which digital data can be recorded and
stored. Also known as a floppy disk.

Diskettes get another name floppy disk from the thin mylar disk. If one cuts open
the disk casing (not recommended because the disk will be ruined) one would see that
the mylar disk inside is thin and floppy. Diskettes are also called floppies.
Although todays microcomputers typically use 3 inch (about 10 centimetre) disks,
you may still find 5 inch (about 15 centimetre) disks that were popular many years
ago. Finding a disk drive to read 5 inch disks may be very difficult.
Diskettes are generally used for transporting or shipping data files or for making
duplicate copies of data files for back-up purposes. The storage capacity of a diskette
varies but is considerably smaller than that of a hard drive.
Since the 1960s, magnetic tape has been a popular form of mainframe computer
storage.
Magnetic tape: A continuous plastic strip covered with
magnetic oxide; the tape is divided into parallel tracks
onto which data may be recorded by selectively
magnetising parts of the surface, or spots, in each of
the tracks. The data can then be stored and reused.

When IBM introduced its first microcomputer in 1981, the legacy of tape storage
continued in the form of a cassette tape drive, similar to those used for audio
recording and playback. Using tape as a primary storage device, however, instead of a
hard disk is slow and inconvenient because tape requires sequential access rather than
random access.
Sequential access means that data is stored and read as a sequence of bytes along the
length of the tape. To find a file stored on a microcomputer tape storage device, one
has to advance the tape to the appropriate location of the file, then wait for the
computer to slowly read each byte until it finds the beginning of the file. Like an
audio cassette, for example, a user must go through the tape in sequence to find the
part he or she wants.
Microcomputer users quickly abandoned tape storage for the convenience and speed
of random access disk drives. Recently, however, tape storage for microcomputers
has experienced a revival, not as a principal storage device but for making backup
copies of the data stored on hard disks. The data on magnetic storage can be easily
UNDERSTANDING COMPUTERS

19

destroyed, erased, or otherwise lost. Protecting the data on the hard disk is of
particular concern to users because it contains so much data, which could be difficult
and time consuming to reconstruct. This is why backups are so important.
Back up: To copy a computer file or collection of files
to a second medium, usually on a diskette or magnetic
tape, so that the data are safe in case the original file is
damaged or lost. Backups are usually copied to storage
devices that can be removed from the computer and
kept separately from the original.

A tape backup is a copy of the data from a hard disk, stored on magnetic tape and used
to recover lost data. A tape backup is relatively inexpensive and can rescue an
organisation from the overwhelming task of trying to reconstruct lost data.
Backing up electronic data is critical to protecting it from
loss or damage.
For more information on backing up data and
protecting information, see Automating Records
Services and Emergency Planning for Records and
Archives Services.

The most popular types of tape drives for microcomputers also use tape cartridges, but
there are several tape specifications and cartridge sizes. A tape cartridge is a
removable magnetic tape module similar to a sound or video cassette tape. Quarter
inch tape, called QIC, is a tape cartridge that contains inch (approximately
centimetre) wide tape. Depending on tape length, QIC tape capacities range from 340
MB to 2 gigabytes. Digital audio tape, called DAT, was originally an audio recording
format, but is now also used for data storage. The 4mm wide DAT tape format
storage capacity ranges from 2 gigabytes to 12 gigabytes.
In addition to magnetic storage, there is also optical storage.
Optical disk: A storage device that uses reflecting
surfaces and laser technology to read and write data on
a disk. Also known as a laser disk.

With optical storage, data is burned into the storage medium using beams of laser
light. The burns form patterns of small pits in the disk surface to represent data. The
pits on optical media are permanent, so the data cannot be changed. Optical media are
very durable, but they do not provide the flexibility of magnetic media for changing
the data once they are stored.
There are three types of optical disks.
CD-ROMs are the most popular type of optical storage. CD-ROM stands for
Compact Disc Read Only Memory. A computer CD-ROM disk, like its audio
counterpart, contains data that has been stamped on the disk surface as a series of
pits. To read the data on a CD-ROM an optical read head distinguishes the
patterns of pits that represent bytes. CD-ROM disks provide tremendous storage
capacity. CD-ROMs usually come with data already written onto them. These
days most applications software is provided on CD-ROM.
It is now possible for computer users to write data to an optical disk. These are
known as WORM disks, which stands for Write Once Read Many. A single CD
holds up to 680 megabytes, equivalent to over 300,000 pages of text in character
format, and these disks are quite durable. These CDs are know as CD
re-recordable (CD-R). There are other types of WORM disks, although there is no
standard for these.
There is a third type of optical disk which can be erased and use to rewrite new
information. These are sometimes known as EO (erasable optical) disks and
CD-RW (CD rewritable).
Magneto-optical disks combine magnetic disk and CD-ROM technologies. Like
magnetic media they can read and written to and like floppy disks they are removable.
They can store over 200 MB of data, and speed of access to this data is faster than a
floppy but slower than a hard drive. There is no universal standard for these yet.
CD-ROMs and magnet-optical disks are very useful for storing images. These take up
much more storage space than data in character format, such as in word-processed
files.
Activity 6
Are there procedures for backing up data in your organisation? If so, how often are

backups done? What are the data stored on? If the computer stopped working, would
the organisation be able to retrieve the data?

THE IMPORTANCE OF DOCUMENTATION


The computer hardware, software and peripherals will be accompanied by
documentation, which explains how the various systems or programs operate.
Documentation: Information needed to develop, use or
maintain computer hardware and software and to
permit access and retrieval of the data.

Although documentation usually comes in the form of printed manuals, guide books,
it may also come in electronic form, such as in help screens contained within the
computer software or documentation in data dictionaries and so on. Often,
documentation is created when a specific computer application is used. For example,
if a government office creates a data base of employees in order to administer payroll,
documentation may be created describing how the database was established, what it is
to be used for and what data fields have been created. This documentation can be
critical to understanding the database system, particularly if it is being managed in an
archival environment long after the creators of the system have left.
Documentation should always be retained.

Disposing of documentation can cause problems in the future, particularly if you have
to reload software from the beginning. Documentation can also contain licences for
the legitimate use of the software. Therefore it is critical to protect documentation and
ensure it is readily available.

1.3 Plan a task to ensure that OHS guidelines and


procedures are followed

INFORMATION SHEET 2. 1. 5

Lesson 2 LO 1: Plan and prepared for the Task undertaken: Apply required data security

guidelines in accordance with existing procedures.

Purpose
The purpose of this Guideline is to establish a framework for classifying institutional data based on its level of
sensitivity, value and criticality to the University as required by the Universitys Information Security Policy.
Classification of data will aid in determining baseline security controls for the protection of data.

Applies To
This Policy applies to all faculty, staff and third-party Agents of the University as well as any other University
affiliate who is authorized to access Institutional Data. In particular, this Guideline applies to those who are
responsible for classifying and protecting Institutional Data, as defined by the Information Security Roles and
Responsibilities.

Definitions
Confidential Data is a generalized term that typically represents data classified as Restricted, according to the
data classification scheme defined in this Guideline. This term is often used interchangeably with sensitive
data.
A Data Steward is a senior-level employee of the University who oversees the lifecycle of one or more sets of
Institutional Data. See the Information Security Roles and Responsibilities for more information.
Institutional Data is defined as all data owned or licensed by the University.
Non-public Information is defined as any information that is classified as Private or Restricted Information
according to the data classification scheme defined in this Guideline.
Sensitive Data is a generalized term that typically represents data classified as Restricted, according to the data
classification scheme defined in this Guideline. This term is often used interchangeably with confidential data.
Back to Top

Data Classification
Data classification, in the context of information security, is the classification of data based on its level of
sensitivity and the impact to the University should that data be disclosed, altered or destroyed without
authorization. The classification of data helps determine what baseline security controls are appropriate for
safeguarding that data. All institutional data should be classified into one of three sensitivity levels, or
classifications:
A
.

Restricted Data
Data should be classified as Restricted when the unauthorized disclosure, alteration or
destruction of that data could cause a significant level of risk to the University or its affiliates.
Examples of Restricted data include data protected by state or federal privacy regulations
and data protected by confidentiality agreements. The highest level of security controls
should be applied to Restricted data.

B
.

Private Data
Data should be classified as Private when the unauthorized disclosure, alteration or
destruction of that data could result in a moderate level of risk to the University or its
affiliates. By default, all Institutional Data that is not explicitly classified as Restricted or
Public data should be treated as Private data. A reasonable level of security controls should
be applied to Private data.

C
.

Public Data
Data should be classified as Public when the unauthorized disclosure, alteration or
destruction of that data would results in little or no risk to the University and its affiliates.
Examples of Public data include press releases, course information and research
publications. While little or no controls are required to protect the confidentiality of Public
data, some level of control is required to prevent unauthorized modification or destruction of
Public data.

Classification of data should be performed by an appropriate Data Steward. Data Stewards are senior-level
employees of the University who oversee the lifecycle of one or more sets of Institutional Data. See Information
Security Roles and Responsibilities for more information on the Data Steward role and associated
responsibilities.
Back to Top

Data Collections
Data Stewards may wish to assign a single classification to a collection of data that is common in purpose or
function. When classifying a collection of data, the most restrictive classification of any of the individual data
elements should be used. For example, if a data collection consists of a students name, address and social
security number, the data collection should be classified as Restricted even though the students name and
address may be considered Public information.
Back to Top

Reclassification
On a periodic basis, it is important to reevaluate the classification of Institutional Data to ensure the assigned
classification is still appropriate based on changes to legal and contractual obligations as well as changes in the
use of the data or its value to the University. This evaluation should be conducted by the appropriate Data
Steward. Conducting an evaluation on an annual basis is encouraged; however, the Data Steward should
determine what frequency is most appropriate based on available resources. If a Data Steward determines that
the classification of a certain data set has changed, an analysis of security controls should be performed to
determine whether existing controls are consistent with the new classification. If gaps are found in existing
security controls, they should be corrected in a timely manner, commensurate with the level of risk presented by
the gaps.
Back to Top

Calculating Classification
The goal of information security, as stated in the Universitys Information Security Policy, is to protect the
confidentiality, integrity and availability of Institutional Data. Data classification reflects the level of impact to
the University if confidentiality, integrity or availability is compromised.
Unfortunately there is no perfect quantitative system for calculating the classification of a particular data
element. In some situations, the appropriate classification may be more obvious, such as when federal laws
require the University to protect certain types of data (e.g. personally identifiable information). If the
appropriate classification is not inherently obvious, consider each security objective using the following table as
a guide. It is an excerpt from Federal Information Processing Standards (FIPS) publication 199 published by
the National Institute of Standards and Technology, which discusses the categorization of information and
information systems.
POTENTIAL IMPACT
Security Objective

LOW

MODERATE

HIGH

Confidentiality
Preserving authorized
restrictions on
information access and
disclosure, including
means for protecting
personal privacy and
proprietary
information.

The unauthorized
disclosure of
information could be
expected to have a
limited adverse effect
on organizational
operations,
organizational assets,
or individuals.

The unauthorized
disclosure of
information could be
expected to have a
serious adverse effect
on organizational
operations,
organizational assets,
or individuals.

The unauthorized
disclosure of
information could be
expected to have a
severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.

Integrity
Guarding against
improper information
modification or
destruction, and
includes ensuring
information nonrepudiation and
authenticity.

The unauthorized
modification or
destruction of
information could be
expected to have a
limited adverse effect
on organizational
operations,
organizational assets,
or individuals.

The unauthorized
modification or
destruction of
information could be
expected to have a
serious adverse effect
on organizational
operations,
organizational assets,
or individuals.

The unauthorized
modification or
destruction of
information could be
expected to have a
severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.

Availability
Ensuring timely and
reliable access to and
use of information.

The disruption of
access to or use of
information or an
information system
could be expected to
have a limited
adverse effect on
organizational
operations,
organizational assets,
or individuals.

The disruption of
access to or use of
information or an
information system
could be expected to
have a serious
adverse effect on
organizational
operations,
organizational assets,
or individuals.

The disruption of
access to or use of
information or an
information system
could be expected to
have a severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.

As the total potential impact to the University increases from Low to High, the classification of data should
become more restrictive moving from Public to Restricted. If an appropriate classification is still unclear after
considering these points, contact the Information Security Office for assistance.
Back to Top

Additional Information
If you have any questions or comments related to this Guideline, please send email to the University
Information Security Office at iso@andrew.cmu.edu.
Additional information can also be found using the following resources:

Information Security Policy


http://www.cmu.edu/iso/governance/policies/information-security.html

Information Security Roles and Responsibilities


http://www.cmu.edu/iso/governance/roles/index.html

Policy on Student Privacy Rights


http://www.cmu.edu/policies/documents/StPrivacy.html

Gramm-Leach-Bliley Information Security Program


http://www.cmu.edu/policies/documents/ISP.htm

Federal Information Processing Standards Publication 199: Standards for Security


Categorization
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf

Internal Revenue Service Publication 1075: Tax Information Security Guidelines


http://www.irs.gov/pub/irs-pdf/p1075.pdf
Back to Top

Appendix A - Predefined Types of Restricted Information


The Information Security Office and the Office of General Counsel have defined several types of Restricted
data based on state and federal regulatory requirements. They're defined as follows:
1. Authentication Verifier
An Authentication Verifier is a piece of information that is held in confidence by an individual
and used to prove that the person is who they say they are. In some instances, an
Authentication Verifier may be shared amongst a small group of individuals. An
Authentication Verifier may also be used to prove the identity of a system or service.
Examples include, but are not limited to:

Passwords
Shared secrets

Cryptographic private keys

2. Covered Financial Information

See the University's Gramm-Leach-Bliley Information Security Program.


3. Electronic Protected Health Information ("EPHI")
EPHI is defined as any Protected Health Information ("PHI") that is stored in or transmitted by
electronic media. For the purpose of this definition, electronic media includes:

Electronic storage media includes computer hard drives and any removable and/or
transportable digital memory medium, such as magnetic tape or disk, optical disk, or
digital memory card.

Transmission media used to exchange information already in electronic storage


media. Transmission media includes, for example, the Internet, an extranet (using
Internet technology to link a business with information accessible only to collaborating
parties), leased lines, dial-up lines, private networks and the physical movement of
removable and/or transportable electronic storage media. Certain transmissions,
including of paper, via facsimile, and of voice, via telephone, are not considered to be
transmissions via electronic media because the information being exchanged did not
exists in electronic form before the transmission.

4. Export Controlled Materials

Export Controlled Materials is defined as any information or materials that are subject to United States
export control regulations including, but not limited to, the Export Administration Regulations (EAR)
published by the U.S. Department of Commerce and the International Traffic in Arms Regulations
(ITAR) published by the U.S. Department of State. See the Office of Research Integrity and
Compliance's FAQ on Export Control for more information.
5. Federal Tax Information ("FTI")
FTI is defined as any return, return information or taxpayer return information that is
entrusted to the University by the Internal Revenue Services. See Internal Revenue Service
Publication 1075 Exhibit 2 for more information.
6. Payment Card Information
Payment card information is defined as a credit card number (also referred to as a primary
account number or PAN) in combination with one or more of the following data elements:

Cardholder name
Service code

Expiration date

CVC2, CVV2 or CID value

PIN or PIN block

Contents of a credit cards magnetic stripe

7. Personally Identifiable Education Records


Personally Identifiable Education Records are defined as any Education Records that contain
one or more of the following personal identifiers:

Name of the student


Name of the students parent(s) or other family member(s)

Social security number

Student number

A list of personal characteristics that would make the students identity easily

traceable

Any other information or identifier that would make the students identity easily
traceable

See Carnegie Mellons Policy on Student Privacy Rights for more information on what constitutes an
Education Record.
8. Personally Identifiable Information
For the purpose of meeting security breach notification requirements, PII is defined as a
persons first name or first initial and last name in combination with one or more of the
following data elements:

Social security number


State-issued drivers license number

State-issued identification card number

Financial account number in combination with a security code, access code or


password that would permit access to the account

Medical and/or health insurance information

9. Protected Health Information ("PHI")


PHI is defined as "individually identifiable health information" transmitted by electronic
media, maintained in electronic media or transmitted or maintained in any other form or
medium by a Covered Component, as defined in Carnegie Mellons HIPAA Policy. PHI is
considered individually identifiable if it contains one or more of the following identifiers:

Name
Address (all geographic subdivisions smaller than state including street address, city,
county, precinct or zip code)

All elements of dates (except year) related to an individual including birth date,
admissions date, discharge date, date of death and exact age if over 89)

Telephone numbers

Fax numbers

Electronic mail addresses

Social security numbers

Medical record numbers

Health plan beneficiary numbers

Account numbers

Certificate/license numbers

Vehicle identifiers and serial numbers, including license plate number

Device identifiers and serial numbers

Universal Resource Locators (URLs)

Internet protocol (IP) addresses

Biometric identifiers, including finger and voice prints

Full face photographic images and any comparable images

Any other unique identifying number, characteristic or code that could indentify an
individual

Per Carnegie Mellons HIPAA Policy, PHI does not include education records or treatment records covered
by the Family Educational Rights and Privacy Act or employment records held by the University in its role
as an employer.
1 Controlled Technical Information ("CTI")
0.
Controlled Technical Information means "technical information with military or space
application that is subject to controls on the access, use, reproduction, modification,
performance, display, release, disclosure, or dissemination" per DFARS 252.204-7012.

Back to Top

Revision History
Version

Published

Author

Description

0.1

07/02/2008

Doug Markiewicz

Original draft

0.2

09/25/2008

Doug Markiewicz

Replaced Categorization section with Data


Collections and added sections on
Reclassification and Calculating Classifications.

0.3

10/20/2008

Doug Markiewicz

Rewrote section on Calculating Classifications


due to flaws in original system. Updated
Purpose, Applies To and Definitions.

0.4

11/04/2008

Doug Markiewicz

Removed equation, made a minor update to the


definition of Public Data and updated Additional
Information. Sorted Appendix A so that terms
appear in alphabetical order and added Covered
Financial Information as a term.

0.5

02/20/2009

Doug Markiewicz

Added a missing bullet to the last identifier


listed in Appendix A Definition G. The definition
itself was not modified.

0.6

02/26/2009

Doug Markiewicz

Various uopdates based on Feedback. Major


changes include adding 'Data Steward' to the
Definitions, adding references to Information
Security Roles & Responsibilities and adding
Federal Tax Information to Appendix A.

0.7

03/18/2009

Doug Markiewicz

Updated definition of PHI in Appendix A to


reference the HIPAA Information Security Policy.
Added Authentication Verifier to Appendix A.

0.8

09/17/2009

Doug Markiewicz

Updated Applied To for consistency with related


publications. Removed Education Records from
Appendix A per the recommendation of General

Counsel. Updated Personally Identifiable


Education Records in Appendix A to reference
the Policy on Student Privacy Rights.

0.9

01/22/2010

Doug Markiewicz

Updated Appendix A to include Export


Controlled Materials.

1.0

09/15/2011

Doug Markiewicz

Updated definition of Protected Health


Information to align with the new HIPAA Policy.
Removed DRAFT designation.

1.1

04/07/2015

Laura Raderman

Updated Appendix A to include Controlled


Technical Information.

Application security is the use of software, hardware, and procedural methods to protect applications from
external threats.
Once an afterthought in software design, security is becoming an increasingly important concern during
development as applications become more frequently accessible over networks and are, as a result, vulnerable
to a wide variety of threats. Security measures built into applications and a sound application security routine
minimize the likelihood that unauthorized code will be able to manipulate applications to access, steal, modify,
or delete sensitive data.
Actions taken to ensure application security are sometimes called countermeasures. The most basic software
countermeasure is an application firewall that limits the execution of files or the handling of data by specific
installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an
individual computer from being directly visible on the Internet. Other countermeasures include conventional
firewalls, encryption/decryption programs, anti-virus programs, spyware detection/removal programs and
biometric authentication systems.
Application security can be enhanced by rigorously defining enterprise assets, identifying what each application
does (or will do) with respect to these assets, creating a security profile for each application, identifying and
prioritizing potential threats and documenting adverse events and the actions taken in each case. This process is
known as threat modeling. In this context, a threat is any potential or actual adverse event that can compromise
the assets of an enterprise, including both malicious events, such as a denial-of-service (DoS) attack, and
unplanned events, such as the failure of a storage device.

applicationfirewall
ThisdefinitionispartofourEssentialGuide:Enterprisefirewallprotection:Whereitstands,whereit'sheaded
Postedby:MargaretRouse
WhatIs.com
Anapplicationfirewallisanenhancedfirewallthatlimitsaccessbyapplicationstotheoperatingsystem(OS)ofa
computer.Conventionalfirewallsmerelycontroltheflowofdatatoandfromthecentralprocessingunit(CPU),
examiningeachpacketanddeterminingwhetherornottoforwardittowardaparticulardestination.Anapplication
firewalloffersadditionalprotectionbycontrollingtheexecutionoffilesorthehandlingofdatabyspecificapplications.

For best performance, a conventional firewall must be configured by the user. The user must know which ports
unwanted data is likely to enter or leave through. An application firewall prevents the execution of programs or
DLL (dynamic link library) files which have been tampered with. Thus, even though an intruder might get past
a conventional firewall and gain entry to a computer, server, or network, destructive activity can be forestalled
because the application firewall does not allow any suspected malicious code to execute.

This was last updated in September 2006


Next Steps
Read about the latest advancements in Web application firewall technology and learn more about deploying,
managing and supporting WAFs in the enterprise. Then read our expert advice to determine if a WAF is suitable
for your organization, discover the most important questions to ask before buying a WAF, and get a comparision
of the best WAF products on the market.
An application firewall is an enhanced firewall that limits access by applications to the operating system (OS)
of a computer. Conventional firewalls merely control the flow of data to and from the central processing unit
(CPU), examining each packet and determining whether or not to forward it toward a particular destination. An
application firewall offers additional protection by controlling the execution of files or the handling of data by
specific applications.

Download this free guide

Download Our Guide to Agile


How can you speed deployment and boost ROI? Its not easier said than done. Learn the latest techniques
allowing companies to eliminate barriers between development, testing and deployment.
For best performance, a conventional firewall must be configured by the user. The user must know which ports
unwanted data is likely to enter or leave through. An application firewall prevents the execution of programs or
DLL (dynamic link library) files which have been tampered with. Thus, even though an intruder might get past
a conventional firewall and gain entry to a computer, server, or network, destructive activity can be forestalled
because the application firewall does not allow any suspected malicious code to execute.
This was last updated in September 2006

Next Steps
Read about the latest advancements in Web application firewall technology and learn more about deploying,
managing and supporting WAFs in the enterprise. Then read our expert advice to determine if a WAF is suitable
for your organization, discover the most important questions to ask before buying a WAF, and get a comparision
of the best WAF products on the market.
Continue Reading About application firewall

According to this SearchApplicationSecurity.com article, 'Web application firewalls critical


piece of the app security puzzle.'

Also from SearchApplicationSecurity.com, here are 'Application firewall tips and tricks.'

The Web Application Security Consortium has developed evaluation criteria for application
firewalls.

F5 Networks offers an application firewall and describes how it works.

PERFORMANCE TASK
HANDS ON:

Direction: Research and finding s and Discussion

Port hub /Port is a connector on the back of a computer or other device. A port is either a serial
port or a parallel port.
Modem - (Modulator-Demodulator) The modem is a device that allows a given computer to share
data or otherwise a device which let computers exchange information
USB (Universal Serial Port)
Scanner- is an input device that read text or illustration printed on paper, translates the
information into a form that a computer can use.
Printer - is a piece of hardware that produces a paper copy (also known as hardcopy) of the
information generated by the computer.
Flash drive a portable storage device which is plug directly to the USB port.
Network a group of computers and associated devices that are connected by communications
facilities.
OS (Operating system) software that controls the allocation and use of programs and data that a
computer uses.
Software programs and data that a computer uses.
Maintenance - is the testing and cleaning of equipment.
Planning is both the organizational process of creating and maintaining a plan; and the
psychological process of thinking about the activities required to create a desired future on some
scale
Computer System - The complete computer made up of the CPU, memory and related electronics
(main cabinet), all the peripheral devices connected to it and its operating system. Computer
systems fall into two broad divisions: clients and servers. Client machines fall into three
categories from low to high end: laptop, desktop and workstation. Servers range from small to
large: low-end servers, midrange servers and mainframes.
Defragmentation the process of reorganizing and rewriting files so that they occupy one large
continuous area on your hard disk.
CRT (Cathode Ray Tube) A display device used in computer monitors and television sets.

Boot sector The part of the formatted disk containing the operating system loading a program.
Virus A program intended to damage your computer system without your knowledge and
permission.

Direction : Multiple Choice:


1. A type of maintenance procedure that pertains to updating master files.
a. Hardware Maintenance
d. Disk Maintenance

b. Information Maintenance

c. Software Maintenance

2. A type of Power Protective Device that serves as an emergency power supply during
blockout.
a. AVR

b. UPS

c. PCO

d. ICT

3. Cleaning your computer inside out is performed _____ basis.


a. Monthly

b. Weekly

c. Daily

d. Yearly

4.Regular updating virus software is performed ______ basis.


a. Monthly

b. Weekly

c. Daily

d. Yearly

5. A destructive executable program that infects other programs.


a. Virus

b. Software c. patch

d. OS

6. A type of virus that replicates then execute itself.


a. Direct Action b. Resident c. Overwrite d. Clone
7. A type of virus that dwells in the memory.
a. Direct Action b. Resident c. Overwrite d. Clone
8. A type of virus that can delete files.
a. Direct Action b. Resident c. Overwrite d. Clone
9. A software use to remove computer viruses.
a. Worm

b. Format

c. Anti-static d. Anti-virus software

10.An equipment used to clean the system unit using pressurized air.
a. Cloth

b. Contact Cleaner c. Canned air

d. Tester

4. B

10.C

Answer keys:

1. B

2.B

3.A

5.A

6.C

7.B

8.A

9.D

Task Sheet 2-1.5

Virus removal
Equipment and Materials:
Equipment: System unit, Monitor, Keyboard and Mouse
Materials: Anti-virus Software (Any Anti-virus software)
Virus removal

Provided with the necessary equipment and materials troubleshoot the virus infected area.
You can work in teams of 3
You will be assessed using the following criteria

Evaluation:
CRITERIA

Passed

Failed

1.Periodic maintenance is observed


2. Safety precautions are observed.
3. Appropriate materials are used in virus removal.
4. Computers Normal function is confirmed.

Software Inspection
Given the following materials, perform software inspection.

Check for the ff:


1. Viruses
2. Unnecessary software
3. Drivers are installed
Network Inspection

Given the following tools, perform network inspection.


Check the ff:
1. File and printer sharing
2. Internet connection
3. Proper cable connection
You will be assessed using the following criteria

Evaluation:
CRITERIA
1. Sequence of steps.
2. Observance safety precautions.
3. Proper inspection of hardware components.
4. Proper inspection of the power supply.
Network and Internet Inspection
You will be assessed using the following criteria
Evaluation:

Passed

Failed

CRITERIA

Passed

Failed

Passed

Failed

1. Sequence of steps.
2. Observance of safety precautions.
3. Proper inspection of network components.
4. Proper inspection of network connection.

Software Inspection
You will be assessed using the following criteria
Evaluation:
CRITERIA
1. Sequence of steps.
2. Observance of safety precautions.
3. Proper inspection of operating system.
4. Proper virus removal.

After the inspection, the student will create an accomplishment report to be


submitted to the teacher.
Accomplishment report

`
Area to be Inspected

HARDWARE

SOFTWARE

NETWORK

Good
running
condition

Bad running
condition

Remarks

Information Sheet 2.2.1


Performing Computer Operations: Input Data into Computer

Types of Application Software

Learning Objectives:
After reading this information sheet, you must be able to:
Enter the data into the computer using appropriate program/application in accordance
with company procedures.
Data - the quantities, characters, or symbols on which operations are performed by a computer
Data Processing - a series of operations on data, especially by a computer, to retrieve, transform, or classify
information.
Applications software - (also called end-user programs) include such things as word processors and Web
browsers .
Word Processing - the production, storage, and manipulation of text on a computer or word processor

Types of Word Processing Software

Abiword

AbiWord is a free and open


source software word processor
written in C++.

Apple Text Edit

Apple TextEdit is a simple, open


source word processor and text
editor. It is now distributed with
OS X since Apple company.

Word Perfect

WordPerfect (WP) is a word


processing application owned by
Corel with a long history on
multiple
personal
computer
platforms

Open Office

Apache OpenOffice is the


leading
open-source
office
software
suite
for
word
processing,
spreadsheets,
presentations,
graphics,
databases and more. It is
available in many languages and
works on all common computers

MS Office Word

Microsoft Word of MS-Word


(often called Word) is a graphical
word processing program that
users can type with. It is made
by the computer company
Microsoft
Types of Web Browser

Browser - a software application used to locate and display Web pages

Internet Explorer

Internet Explorer is a discontinued series of


graphical web browsers developed by Microsoft
and included as part of the Microsoft Windows
line of operating systems, starting in 1995

Google Chrome

Google Chrome is a freeware web browser


developed by Google

Mozilla Fire Fox

Firefox is the independent, people-first browser


made by Mozilla

Safari

Safari is a web browser developed by Apple

Opera

Opera is a web browser developed by Opera


Software and began in 1994.

Task Sheet 2.2.1


Performing Computer Operations: Input Data into Computer

Data Entry

After performing this task sheet, students must be able to:


1. use any word processing any internet browser software for data
processing

Equipment:
Computer units with installed word processing software and internet
connection

A. Using available word processor/s and web browser/s in your computer


with internet connection, input or type this data :

Steps:
o Open any available word processor/s in your computer.
o Type your name, grade level and section. Highlight text, choose
align text center.
o Open any internet browser installed in your computer
o In the search box of the browser type;
What is the commonly used word processor?
o Press the Enter key in the keyboard
o Copy the information that you have got from the Internet which is
displayed in the browser page.
o Paste the information you have copied from the browser in the
word processor.
o Save your work in the desktop
Assessment Method:
Performance Criteria Checklist 2.2.1

Did you .

Yes

No

Open word processor


Type your name, grade level and section
Open internet browser
Copy the information youve got from the
internet
Paste the information in the word processor
Save your work in the desktop

Self-Check 2.2.1
Performing Computer Operations: Input Data into Computer

A. Identification:
_________________________1.

a software application used to locate and display Web pages

_________________________2. the quantities, characters, or symbols on which operations are


performed by a computer.

_________________________3. the production, storage, and manipulation of text on a computer.


_________________________4. also called an end-user programs.
_________________________5. a series of operations on data, especially by a computer, to
retrieve, transform, or classify information.

B. Matching Type
Match Column A with Column B, and Column B with Column C

A
____1. a graphical word processing

B.

C.

____A. Abiword

____B. Apple Text Edit

ii

program that users can type with. It


is made by the computer company
Microsof

____2. a discontinued series of

graphical web browsers developed

by Microsoft and included as part of


the Microsoft Windows line of
operating systems, starting in 1995

____3. a free and open source

____C. Wor Perfect

iii

____D. MS Office Word

iv

____E. Open Office

____F. Safari

vi

____G. Google Chrome

vii

software word processor written in


C++.

____4. a freeware web browser

developed by Google

____5. the leading open-source

office software suite for word


processing, spreadsheets,
presentations, graphics, databases
and more. It is available in many
languages and works on all common
computers
____6. the independent, people-first

browser made by Mozilla

____7. a simple, open source word

processor and text editor. It is now

distributed with OS X since Apple


company

____8. a web browser developed by

____H. Mozilla Firefox

viii

Apple

____9. a word processing application ____I. Internet Explorer

ix

owned by Corel with a long history


on multiple personal computer
platforms

____10. a web browser developed

by Opera Software and began in


1994

Answer Key

Identification:
1.) web browsers
2.) data

____J. Opera

3.) word processing


4. application software
5.) data processing

Matching Type:

1.)

2.)

viii

3.)

vi

4.)

ii

5.)

iv

6.)

iii

7.)

vii

8.)

9.)

ix

10.) J

Information Sheet No. 2.3


Lesson 2 : Performing Computer Operations [PCO]
LO2

: Input data into a computer

Performance
Objective

: Perform work within ergonomic guidelines

Ergonomics - fitting a job to a person to help lessen muscle fatigue,


increases productivity and reduces the number and severity of work-related
MSDs.
1) How will the computer be used?
Who will be using the computer?
How long will people be using the computer?

2) What kind of computer will be used?


Many ergonomic guidelines for workstation arrangements assume that you
will be using a desktop system where the computer screen is separate from
the keyboard.
3) What furniture will you use?
Make sure that the computer (monitor, keyboard, mouse) is placed on a
stable working surface (nothing that wobbles) with adequate room for proper
arrangement. If the work surface is going to be used for writing on paper and
computer use, the flat surface should be between 28 to 30 inches above the
floor (suitable for most adults).
4) What chair will be used
Choose a comfortable chair for the user to sit in. If only one person is using
this the chair can even be at a fixed height providing that it is comfortable to
sit on and has a good backrest that provides lumbar support. If more than one
person will be using the computer, consider buying and a chair with several
ergonomic features.
5) What kind of work will the computer be used for?
Word processing: arranging the best keyboard/mouse position is high priority.
Surfing the net, graphic design: arranging the best mouse position is high
priority.
Data entry: arranging the best numeric keypad/keyboard is a high priority.
Games: arranging the best keyboard/mouse/game pad is a high priority.
6) What can you see?
Make sure that any paper documents that you are reading are placed as
close to the computer monitor as possible and that these are at a similar angle
- use a document holder when possible.
The computer monitor should be placed:
Directly in front of you and facing you, not angled to the left or right. This
helps eliminate too much neck twisting. Also, whatever the user is working
with, encourage him/her to use the screen scroll bars to ensure that what is
being viewed most is in the center of the monitor rather than at the top or
bottom of the screen.
Center the monitor on the user so that the body and/or neck isn't twisted
when looking at the screen.
Put the monitor at a comfortable height that doesn't make the user tilt their
head up to see it or bend their neck down to see it. When seated comfortably,
the user's eyes should be in line with a point on the screen about 2-3 inches
below the top of the monitor casing.
Viewing distance. The monitor should be at a comfortable horizontal distance
for viewing, which usually is around an arms length (sit back in your chair and
raise your arm and your fingers should touch the screen). At this distance you
should be able to see the viewing area of the monitor without making head
movements. If text looks too small then either use a larger font or magnify
the screen image in the software rather than sitting closer to the monitor.
7) Posture, posture posture!
Good posture is the basis of good workstation ergonomics. Good posture is
the best way to avoid a computer-related injury. To ensure good user posture:
Make sure that the user can reach the keyboard keys with their wrists as flat
as possible (not bent up or down) and straight (not bent left or right).
Make sure that the user's elbow angle (the angle between the inner surface of
the upper arm and the forearm) is at or greater than 90 degrees to avoid
nerve compression at the elbow.
Make sure that the upper arm and elbow are as close to the body and as

relaxed as possible for mouse use - avoid overreaching. Also make sure that
the wrist is as straight as possible when the mouse is being used.
Make sure the user sits back in the chair and has good back support. Also
check that the feet can be placed flat on the floor or on a footrest.
Make sure the head and neck are as straight as possible.
Make sure the posture feels relaxed for the user.
8) Keep it close!
Make sure that those things the user uses most frequently are placed closest
to the user so that they can be conveniently and comfortably reached.
Make sure that the user is centered on the alphanumeric keyboard. Most
modern keyboards are asymmetrical in design (the alphanumeric keyboard is
to the left and a numeric keypad to the right). If the outer edges of the
keyboard are used as landmarks for centering the keyboard and monitor, the
users hands will be deviated because the alphanumeric keys will be to the left
of the user's midline. Move the keyboard so that the center of the
alphanumeric keys (the B key, is centered on the mid-line of the user).
Make sure that the phone is also close to you if you frequently use it.
9) A good workstation ergonomic arrangement will allow any computer user
to work in a neutral, relaxed, ideal typing posture that will minimize the risk of
developing any injury.
10)
Where will the computer be used?
Think about the following environmental conditions where the computer will be
used:
Lighting - make sure that the lighting isn't too bright. You shouldn't see any
bright light glare on the computer screen. If you do, move the screen, lower
the light level, use a good quality, glass anti-glare screen. Also make sure
that the computer monitor screen isn't backed to a bright window or facing a
bright window so that there's the screen looks washed out (use a shade or
drapes to control window brightness).
Ventilation - make sure that you use your computer somewhere that has
adequate fresh-air ventilation and that has adequate heating or cooling so
that you feel comfortable when you're working.
Take a break! All Ergonomists agree that it's a good idea to take frequent, brief
rest breaks: Practice the following:
Eye breaks
Micro-breaks
Rest breaks
Exercise breaks

Self-Check:
1) Cite two [2] ergonomic guidelines in computer operation.
2) Explain briefly each or give an example

Activity Sheet No. 2.3


Title: Ergonomic Guidelines in Computer Operation

Direction: List down 5 ergonomic guidelines and explain each briefly [3pts. each].
1.
2.
3.
4.
5.

____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

Assessment Rubric
CRITERIA

RATING

Ergonomic guideline is stated and is clearly


explained

Ergonomic guideline is stated and but is not clearly


explained

Ergonomic guideline is simply stated

Information Sheet No. 2.4


Lesson 2 : Performing Computer Operations [PCO]
LO2

: Input data into a computer

Performance
Objective

Store inputted data in storage media according to


requirements

Step-by-step instructions in save a data in a storage media:


Step 1: Open your document.
Step 2: Click File in the top left-hand corner of the screen.

or

3) Step 3: From the menu, choose Save.

4) Step 4: A Save dialogue box will come up. At the top and at the left-hand
side in the list of folder options, it will show the folder where youll be saving
the document. If you wish to change this folder, navigate through the folders
on the left-hand side of the dialogue box to choose the one where you want to
save your document.

5) Step 5: Type the indicated filename in the File name box .

6) Step 6: Once you have typed in the name of your document, click Save.

7) Step 7: Your document will now have a name, which will be shown at the very
top of your document screen.
8) Step 8: The Save As menu the link to which is on the left-hand side of the
File dialogue box, beneath Save is used to save an existing document
under another name. This is helpful if youve made changes to your document
and then want to save the changes, but also keep the original document in its
original format and under its original name.

Self-Check:
1) List down two [2] salient features in saving a document.
2) Explain the difference between Save & Save As

Activity Sheet No. 2.4


Title: Storing Data in a Storage Media

Instructions:
1) create a document containing a paragraph with 5 sentences.
2) save it inside ICT11 folder.
3) The performance will be rated according to the following:

Performance Criteria
CRITERIA

RATING

The document has the required no. of sentences


and is stored in the appropriate media and folder

The document lacks one sentence but is stored in


the appropriate media and folder

The document lacks two sentences but is stored in


the appropriate media and folder

The document lacks two sentences and is not


stored in the appropriate media and folder

The document has only a sentence and is not stored


in the appropriate media and folder

Job Sheet No. 2.4


Title

: Creating & Saving a Document

Performance
Objective

Supplies/Materials

: Performance Checklist

Equipment

: PC Unit/s

Store inputted data in storage media according to


requirements

SKILLS/ITEMS

PERFORMED

NOT
PERFORMED

Have you. . . .
1) created a document in Microsoft

Word 2007?

2) created a paragraph with 5

sentences?

3) applied basic text formatting?


4) saved the document using act001 as

filename?
5) saved the document inside ICT11

folder?
6) saved as the document inside the

flashdrive?
7) observed proper posture?
8) taken a short break?

INFORMATIONSHEET23.1
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Select
correctProgram/applicationsbasedonjobrequirements.
ApplicationSoftwareBasics

GoogleDriveLogo

CommercialSoftwareMicrosoftOffice
Applicationsoftwareallowsyoutodoanythingonthecomputer,suchasplayinggames,orwatchingTV.
Anyoneandeveryoneusingacomputershouldbefamiliarwiththedifferentapplicationsavailabletothem
andhowtoproperlyutilizesaidprograms.Forinstanceoneofthemostwidelyusedapplicationsoftwareis
MicrosoftWord.[1]MicrosoftWordallowsyoutocreate,edit,saveandprintdigitaldocumentsonyour

computer.Whileitisnottheonlywordprocessoroutthere,itisthemostpopular.OtherswouldincludeWordPerfect, [2]Googledrive,
[3]
andiWork.[4]YoucouldalsocreatespreadsheetsthroughExcel,[5]createapresentationthroughKeynote,[6]andeveneditmusic
thoughAudacity.[7]Allofthesewillbediscussedingreaterdetailaswemoveoninthissection.

Installedvs.Webbased
Dropboxisawebbasedsoftware
Therearetwodifferenttypesofapplicationsoftware:installedsoftwareandwebbasedsoftware.
Installedsoftwaremustfirstbeinstalledtothecomputerbeforeitcanbeused.Whenyoupurchasean
installedsoftware,thecompanycaneithersendyouaphysicalcopyofthesoftware,usuallyinthe
formofaCD,oryoumightalsohavetheoptionofdownloadingthesoftwarefromthecompanies
webpage.Webbasedsoftwareissoftwarethatremainsontheinternetwhichyoucanuseatanon
demandbasis.WebbasedsoftwareisalsoreferredtoasSoftwareasaServiceorCloudware.Somewebbasedsoftwaresinclude
GoogleDocs,Dropbox,Prezi,andmanyothers.[8]

AdvantagesandDisadvantages
Webbasedsoftwarehasrecentlybecomeamorepopularalternativetoinstalledsoftware,however,ithasitsadvantagesand
disadvantages.OneoftheadvantagesofwebbasedsoftwareisthataslongasyouhaveanInternetconnection,youcanaccessyour
files.Thisallowsforyoutoaccessthesamefilesfrommanydifferentdeviceincludingdesktops,laptops,tablets,andmobiledevices.
Also,thisallowsforuserstobeworkingononesharedfileratherthancontinuouslysendingeditedfilesbackandforthtoeachother.
Withwebbasedsoftware,onlyonefileexists,soitavoidsconfusionandevenallowsformultipleuserstobeworkingononefileat
thesametime.Also,insteadofhavingtocontinuouslyinstallsoftwareupdates,webbasedsoftwarestaysupdatedonlinebywhatever
companyownsthesoftware.[9]Someofthedisadvantagesofsoftwareincludefilesizelimits.Theamountoffilesaswellasthesizeof
eachfilearedependentuponhowmuchcloudstoragetheapplicationscompanyallowsonitsservers.Manycompaniessuchas
Google,Apple,andDropbox,chargemonthlyorannualfeesifuserswantmorestoragespace.Withinstalledsoftware,theamountof
storageyouhaveisonlydependentonhowmuchstoragespaceyouhaveonyourcomputer.Ifyouknowthatyouregoingtousealot
ofstoragespace,itwouldbebettertohaveaninstalledsoftwaresothatyoucanavoidpayinglargefeesfortakingupserverspace.
Anotherdisadvantagetowebbasedsoftwareisslowerspeeds.BecausetheapplicationsarebeingusedthroughtheInternet,ittakes
moretimetoaccessthefiles.Also,usershavetodealwithloginsandsecurityprecautionssuchascreatingpasswords,linkingemails
toanaccount,andansweringquestionsifyouforgetyourpassword.[10]

CreatingApplicationSoftware
Thankstotherevolutionthatisthesmartphone,applicationshavebecomeincrediblypopularthattherearecountlessofthemoutthere
andthenumberisstillgrowing.Therecanpotentiallybeanapplicationforeverything.Howeverinorderfortheretobeanapplication
foreverything,theyhavetobecreatedfirstandinordertodosoonemustlearntocode.Dependingonthetypeofapplicationyou
wanttocreate,youmustlearndifferenttypesofprogramminglanguages.Themorecomplicatedyourapplications,frommobileapps
tofullonvideogames,themorecomplicatedthecoding.Mostmobileapplicationscanbecreatedbyonepersonbutmore
complicatedprogramssuchasvideogamesareusuallycreatedbyateamofprogrammers.

Youmustlearntocodeinordertomakeapplicaions
ThetwomostpopularsoftwaremarketplacesasofrightnowarethatofApplesAppStoreandGooglesPlayStore.Inordertocreate
appsfortheAppStore,onemusthaveaMaccomputertoruntheprogrammingtools.OnemustthenpayAppletosignusasa

developerinordertodownloadthosetools.TheprogramminglanguageusedinthoseappsiscalledObjectiveC.Tocreateappsfor
thePlayStore,onemusthaveeitheraWindows,Mac,orLinuxcomputer.Thesoftwaredevelopmentkitisfreetodownloadandyou
willneedtoknowtheprogramminglanguagecalledJava.[11]

SoftwareOwnership
Afteranapplicationsoftwareprogramisdeveloped,theauthorhaswhatiscalledownershiprights.Theserightsspecifyexactlyhow
theprogramcanandcannotbeused.Forexample,ownershiprightsallowtheauthortodecideonwhetherornottheprogramcanbe
sold,shared,ordistributed.Theownershiprightsvarydependingonthetypeofsoftware.Typesofsoftwareincludecommercial,
shareware,freeware,andpublicdomain.[12]Commercialsoftwareissoftwarethatiscreatedandthensoldforprofit.Forexample,
MicrosoftOfficeSuiteiscommercialsoftware.Sharewareisanothertypeofsoftwarethatcanmakeprofit,however,sharewareis
initiallyfreeandthenrequestspaymentafteracertainamountoftime.Forexample,acomputergamemighthaveatendayfreetrial,
butafterthetrialisoverthedeveloperwillaskforapayment.Thispaymentwouldallowthegamertoplaythecomputergameona
regularbasis.Freewareisatypeofsoftwarethatisavailablefornochargebythedeveloper.Anexampleoffreewarewouldbe
InternetExplorerandmostotherwebbrowsers.Publicdomainsoftwareissimilartofreeware,butshouldnotbeconfused.While
freewareiscopyrighted,publicdomainsoftwareisnt.Becausepublicdomainsoftwareisntcopyrighted,peopleareabletocopy,
modify,anddistributethesoftware.[13]

SoftwareSuites

ThelogoforAdobeCreativeSuitev6.0,oneexampleofasoftwaresuite.
Asoftwaresuiteisagroupofrelatedprogramsthatinteracttogetherandarepurchasedtogether.Themostwellknownexampleis
MicrosoftOffice,whichincludesExcel(spreadsheets),Word(documents),PowerPoint(slideshow),andOutlook(email).Thereare
twoprimarybenefitsofsoftwaresuites.First,theymakeiteasierfortheusertoworkonmultiplerelatedprojectsatonce:someone
can,forexample,makeaspreadsheetinExcelandthenbringitintoWord,keepingalloftheformattingintactmuchmoreeasilythan
iftheyusedanunrelatedspreadsheetprogramandtexteditingprogram.Second,theysavemoney:purchasingtheentireOfficesuiteis
muchcheaperthanpurchasingExcel,Word,PowerPoint,andOutlookseparately.However,ausermaynotneedalloftheprogramsin
agivensuite,sobuyingtheentiresuitewhenonlyoneortwoprogramsareneededisasignificantwasteofmoney;aprospectivesuite
consumershouldlookindetailatwhichprogramsareincludedandmakesuretheyneedallofthem.Ifnotalloftheprogramsare
needed,thenitwouldbemoreprudenttopurchaseindividuallyonlythoseprogramswhichareneeded. [14]

WordProcessing
ExplanationofWordProcessing
Awordprocessorisasoftwareprogramthatisusedtocreateadocument,storeitelectronically,displayitonascreen,modifyitusing
commandsandcharacters,andprintitonaprinter.Italsoprocessesparagraphindentation,marginsize,fonttype,fontsize,fontcolor,
andspacingwithinthedocumentbeingcreated.Wordprocessorshavereplacedtypewriterssincetheyallowtheusertomakeachange
anywhereinthedocumentwithouthavingtoretypetheentirepage.Wordprocessorsalsocomeequippedwith"spellcheck"functions
eliminatingtheneedformultipleeditorsandprovideanimmediatetoolforgrammaticalcorrection.Somecommonwordprocessors
includeMicrosoftWord,AbiWord,WordPerfect,andOpenOffice.[15]


SpellCheck

ConstructingaWordProcessingScript
Whenconstructingaworddocumentthereareafewthingstokeepinmind;characterformatting,paragraphformatting,andpage
formatting.Thesethreebasicfunctionslaythefoundationformostofthecustomizationthatisneededtocreatemanyword
documents.Characterformattingchangestheappearanceofindividualcharactersandrelatestothesize,font,color,andoverallstyle
ofthelettersornumbersbeingused.Characterformattingalsoinvolvesunderlining,italicizing,andmakingboldthosecharacters
beingused.Thisisgreatformakingawordstandoutorforunderliningbooktitles.Paragraphformattingadjuststhespacing,
alignment,andindentationoftheparagraphsbeingformed.Spacingreferstotheamountoflinesleftblankinbetweenthelinesbeing
processed.Agoodexampleofthisisdoublespacingwhichiscommonlyusedinaneducationalsettingwhereastudenthastowritea
paperforaspecificinstructor.Commonlydoublespacingisusedsothattheinstructorcanmakecorrectionstothedocumentwithout
havingtomarkovertheactualwordsonthepaper.Alignmentreferstothewaytheparagraphispositionedinregardstotheleftand
rightmargins.Aleftalignmentismostcommonlyusedwhencreatingaworddocumentandthissettingalignsthewordsbeingformed
tobeflushwiththeleftmargin.Acenteralignmentisusuallyusedfortitlingapaper.Pageformattingreferstothewidthofthe
margins,thesizeofthepaperbeingused,andtheorientationofthepage.Thestandardmarginis1.25inchesonboththeleftandright
butthesecanbecustomizedtosuitneedandpreference.Thepapersizeoptionsreflectwhatcanbeusedintheprinter,andthe
orientationindicateswhetherthedocumentwillusethetraditionalorlandscapepositioningonthatpaper.Traditionalorientationis8.5
incheswideby11inchestallwhereaslandscapeistheexactoppositeat11incheswideby8.5inchestall.[16]

AbiWordWordProcessor

WordProcessingTools

BusinessIDTemplate
Someofthebasictoolsthatareemployedinwordprocessingprogramsthathelptomaketheapplicationmoreuserfriendlyaretables,
graphics,andtemplates.Thesetoolsallowforminimaleffortandexcellentresultswhenaddingfeatureslikethesetoaword
document.Tablesareusedfororganizinginformationandarecomposedofrowsandcolumnsinwhichdataisplaced.Thisisgreatfor
comparingandcontrastinginformationasit'scondensedandpresentedinastraightforwardfashion.Tablescanalsobeusedfor
layingoutentiredocuments,suchasaresume,whereinformationissectionedofffromoneanother.Inthisexample,theentirereport
isformulatedtoatableinsteadofasmallsectionasmentionedearlier.Graphicsarepictures,drawings,clipart,orotherimagesthat
canbeinsertedintoadocumentfromotherprogramsorfromstoreddataonacomputer.Thismakesforeasyillustrationswherea
picture,orpictures,wouldsufficebetterthanwordsortablestohighlightapoint.Graphicstoolsalsoallowtheusertomanipulatethe
imagesthathavebeenimportedbychangingthecolor,contrast,brightness,andsizeoftheimage,amongotherthings.The

customizationprocessoftheseimagesinawordprocessorprovideforaneasyandquickavenueofexplanationconcerningthetopics
athand.AnotherusefultoolareTemplates.Thesearepreprogrammedarrangementsofideasand/orillustrationsthatareknownto
serveapurposeandarealreadyorganizedfortheusertointeractwith.Mostoftenthismeans"fillingintheblanks"andsomecommon
templatesthatshouldberecognizedareresumes,businesscards,identificationcards,faxcoversheets,memos,invoices,and
newsletterstonameafew.[17]

MicrosoftWord2013Icon
Alongwithtemplates,somedocumentsarerequiredtolookdifferentlydependingontheuse;asaresultofthiswechangetheformat
ofourdocuments.Anychangeinformatinadocumentisachangeintheoverallappearance.Examplesofformattingdocumentscan
rangefromMLAtoAPAformat,requiringdifferentsizedmargins,fonts,etc.Inordertodothis,Wordhastabsthatmakenavigating
aroundyourdocumenteasyandefficient.WordincludesaHelpCenterconvenientforuserstoreceiveassistancewhetheritislive
onlinehelporoffline.InthisHelpCenter,toolssuchaswhereandhowcontentsareorganizedarelistedinauserfriendlymanner.
WhileWordprocessingissimplycreating,editing,saving,andprinting,thecreationandeditionaremadeeasybyWordforavariety
ofendresultsintheoverallappearanceofdocuments.Inthetimeoftypewriters,thecarriagereturnwasusedwhenalineoftext
neededtomovetothenextlinetocontinue.WithpresentdayWord,thisisdoneautomaticallyandisaprocesscalledWord
Wrapping.[18]OthertoolsthatWordofferswhichwerenotavailablearetheabilitytocontainvariousfonts,editproportions,and
spacingisalsomademoreefficient.

Database
<gallery>

Adatabaseisanorganizedcollectionoffactsandinformationsuchastextandnumbers,andoftencanholdstillimages,soundsand
videosorfilmclips.[29]Itisorganizingdatainsuchawaythatacomputerprogramcanquicklyselectdesiredpiecesofinformation.A
databasecanalsobereferredtoasanelectronicfilingsystem.Forexample,libraries,ratherthanhaveafilecabinet,provideaccessto
academicdatabasesforuseinscholarlyprojects.RegularPCdatabasesareorganizedbyfields,records,tables,andfiles.Afield
(column)isasinglepieceofinformationlikelastname,address,phonenumber,andsuch.Arecord(row)isaonecompletesetof
fields.Atableisacollectionofrecords.Lastly,afileisacollectionofrelatedtables. [30]Adatabasefileiscreatedfirst,thentablesthat
canbecreatedineitherdatasheetordesignview.[31]Therearedifferentkindsofdatabases,suchasactive,cloud,deductive,
distributed,graph,hypertext,etc.Forexample,inhypertextdatabase,anyobjectcanbelinkedtoanotherobject;thisisusefulfor
organizingalotofinformation.ADBMSisdatabasemanagementsoftwarethatallowsthedefinition,creation,querying,update,and
administrationofdatabases.[32]CommondatabasemanagementsoftwareisMicrosoftAccess.Sincemanydatabasesstoreconfidential
andimportantinformation,theyrequirepasswordsandothersecurityfeaturesinordertoaccesstheinformation. [33]

QueriesandReports

Query
Queriesandreportsareusedtoretrieveinformationfromdatabases. [34]Aqueryisalmostlikeasearchtoolfortheuserofthedatabase
tofindspecificinformationlikeanitem,number,name,etc.Likeotherdocumentsmade,aqueryhastobemadeandsavedaswell,
foruserstobeabletocomebackandsearchitagain.Aquerycontainscriteriathatmustbemetforarecordorrowtobeshowninthe
endingresultsofthespecificquery.Queriescanalsobemadetoshowmultiplecolumnsorrowsatasingletime,insteadofjustone
roworcolumn.Forexample,acustomerinsiststobuyasetofglassesforunder$20atCrateandBarrel. [35]Theemployeecanthen

inquireglassesunder$20andbeabletotellthecustomerwhichkindtospecificallylookat.Areportisusedwhenacquiringa
formaloutput.Thiscanbeacompanylogoorgraphicwithapagecolumnheading.ThesecanbecreatedwiththeReportWizard
buttonontheCreatetabfromtheRibbon.Reportsaremostlyusedwithdatabasetablesorqueries.Databasescanbeusedmore
efficientlyforcustomersshoppingviatheInternet.Today,onlineshoppingisthenewestsensation.Forexample,aspecificdresscan
befoundonLordandTaylors[36]websiteforwomen,priortogoingtothestorebytypinginthesearchbar.Examplesofpopular
databasesusedareMicrosoftSQLServer,MicrosoftAccess,Oracle,MySQL,andIBMDB2.[37]

MicrosoftAccess2013logo

DecidingWhichDatabasetoUse
Howdoesoneknowwhichkindofdatabasetouse?Tosomeonenotfamiliarwiththiskindofthing,itcouldbeasituationwhereone
doesnotevenknowwheretobegin.Somethingonemustfirstconsideriswhattheywillbeusingthedatabasefor.DatabaseManaging
Systemscanbebrokenupintotwocategories;serverdatabasesordesktopdatabases.Desktopdatabasesaretypicallygearedtowarda
singleuser,whereasserverdatabasesmustaccommodatemultiusersandlargeamountsofdata.SomefamiliartypesofDesktopDB
areMicrosoftAccess,FoxPro,FileManager,orParadox.DesktopDBsarefitforstoringlesscomplexdataandarelessexpensive
thenserverDBs,typicallyaroundonehundreddollars.Theyarealsoveryuserfriendlyandhavewebfunctionalitythatallowsthe
usertopublishdataontheweb.Serverdatabasesontheotherhandareequippedtostoreandmanagemuchlargeramountsofdataand
allowformanyuserstohaveaccesstothatdataatthesametime.SomepopularServerDBsareMicrosoftSQL,OracleorIBMDB2.
Duetotheircomplexfunctionality,thesedatabasesaremuchmoreexpensive,ranginginthethousandsandup.ServerDBsare
equippedwithApplicationProgrammerInterfaces(APIs)thatallowforcustomprogrammingandapplications.Theyareextremely
powerful,beingabletoaccommodateclusterserversandmultiplehighspeedprocessors.Theyarealsoabletoadaptwelltothe
constantadditionofusersanddata.Afterevaluatingthesetwotypesofdatabases,oneshouldhaveabetterideaofwhichonewillbest
suittheirneeds.[38]

Databaseprotection

DB2ClientConnections
Thedatabaseisoneofthemostessentialpartsofabusinessprocess.Theabilitytoaccessandtooperatedataisanecessarycondition
fortherunningcompany.Permanentdatalossputsthebusinessinseriousdanger.Accordingtosomeresearchers,aboutahalfofthe
companiesaffectedbydisastersandmajorlossofcorporatedata,havenotbeenabletocontinuetheiractivities.Therearefewmost
commonreasonsfordatabasedestruction:equipmentfailures,physicalimpactonthehardwareofthedatabase,errorsofauthorized
users,databaseoroperatingsystembugsanderrorsinapplicationprograms,intentionalactsunauthorizedusersorprograms.The
primaryprotectiontoolssuchtheusersidentification,thegrantingofdifferentrightsofaccesstodatabaseobjectse.g.reading,
adding,deleting,andchangingalongwithdataandprogramsencryptioncanprovidetheacceptablesecuritylevel.Note,thatthe
securitymodel,basedonthebasicmechanismsofauthorizationandauthenticationdoesnotsolveproblemssuchasstolenuserIDs
andpasswordsormaliciousactionsofsomeuserswiththeauthority.[39]

PresentationGraphics
IntrotoPresentationSoftware

Justbecausethephrasingiscornydoesn'tmakethemessageanylesstrue!
U.S.Navyusespresentationgraphicstoeducate
Everyonehasdifferentstylesoflearning.Therearesomestudentswhoretaininformationbetterwhentheycanbehandson,while
otherscanhearalecturefromtheirteacheronetimeandrememberalltheimportantpointswithouthavingtoopentheirschoolbook
once.Nomatteryourlearningstyle,thereisonetypeofsoftwarethathasbeenproven,timeandagain,tobeagreatmethodofsharing
lotsofkeyinformationinanorganizedandrelativelyentertainingfashion.Thesuccessfulsoftwareinquestionispresentation
software.[40]Presentationsoftwareallowstheusertocreatemultipleslideswhichtheycanpiecetogetherintoaslideshow.Itisagreat
waytoorganizeandrefinelargeamountsofinformationintoonlythemostimportantpartsbecauseeachslidehaslimitedspaceand
youtypicallyarelimitedintimewhenresponsibleforapresentation.Whetheryou'representinginformationtoaclassroomora
businessmeeting,themethodoforganizinginformationinafluidmannerremainsthesame.Toaddentertainmentvalue,thereare
manyvariableswithineachexampleofsoftwarethatcanbemanipulated,fromtextsizeandcolortoslidetransitions.Theexpert
presentationsoftwareuserscanevendaretoaddphotosandmusictotheirpresentations.Twoofthemostwidelyusedexamplesof
presentationsoftwaretodayare:MicrosoftPowerpointandPrezi.

Achartofthe2002IranianEconomyusingAppleKeynote
Presentationgraphicsisatypeofsoftwarethatallowsuserstocreatestylizedaudioandvisualaids(soundeffects,animation,etc.)
typicallyforslideshows,reports,andpublicinformationalspeeches.Itincorporatestoolsforinsertingvarioustypesofdrawings,text
andbackgroundschemesinawidevarietyoffonts,colors,andpatterns.Mostsystemscanalsoimportspecificdatafroma
spreadsheetapplicationtogeneratecustomizedchartsandgraphs.Presentationprogramscanbedividedintotwocategories
businessgraphicssoftwareandgeneralmultimediaauthoringtools.Thoughsomeproductsareblended,thelayoutofbusiness
presentationsoftwareemphasizesfastlearningandeaseofuse,whilemultimediasoftwareoffersamoresophisticatedpresentation
thatwilllikelyrequireahigherleveloftechnologicalunderstanding.Popularpresentationsoftware,suchasMicrosoft'sPowerpointor
Apple'sKeynote,maybepurchasedindependentlyoraspartofanofficesuite.UniversallycompatibleproductsincludeAdobe
Persuasion,CorelPresentations,HarvardGraphics,andLotusFreelanceGraphics.FreeproductsincludeGoogleSlides,Prezi,
PowToon,andAcademicPresenter.Allfunctionsimilarlyandprovidenearlyidenticalcapabilities.Uponcompletion,thefile(s)are
usuallysavedtoacomputer,externalstoragedevice,orthecloud.Duringapresentation,usersareabletoviewminiatureimagesof
slidesonadevicesscreen,andeditordirecttheirlayoutastheyaresimultaneouslyprojectedontoalargerscreenorLCDprojection
panelforotherstoview.[41]

Powerpoint
USNavy040605N6633C002CommanderNavalReserveForce,ViceAdm.JohnG.Cotton,issilhouettedinfrontofaPowerpoint
slidemappingouttheNavalReserveForce'sfuture
PowerpointisaMicrosoftOfficesoftwareusedtopresentinformationandworkasavisualaide.Certainoptionsmakeiteasyto
organizeandpresentinformationinavisuallyappealingway.Charts,pictures,tables,videoclips,andsoundscanallbeaddedtothe

presentation.Designsandcolorthemescomereadytousesothepresenterjusthastoaddtheinformationanditisreadytogo!The
slidesthemselvescomewithseveraloptionsofpreloadedlayouts,usingfeaturessuchasbulletpoints,pictures,captions,andtitles.
Theyareeasytodraganddroptomakerearrangingveryeasy.[42]Thewholeideaofadigitalvisualis,inconcept,morebeneficialto
thepresentersandtheaudiencetoavoidcopiesofhandouts.Onefeaturethatcomesinhandy,however,istheabilitytoprinttheslides
soeitherthepresenteroraudiencecanbeinformedaheadoftimeofwhattoexpect.Slidescanchangewithasimpleclickofabutton.
However,presenterscanoftenloseeyecontactfromtheaudienceandbeginreadingstraightfromtheslides,insteadofusingitasa
guide.Teachers,employers,andcomputerusersallovertheworldhavenowbecomeaccustomedtousingPowerPointastheirgoto
visualaide.Theimageontherightshowsapresenterusingapowerpointasavisualaide.

APowerPointPresentationslideshowisprojectedonalargescreenfortheaudience.
ThePowerPointpresentationgraphicsprogramprovidestheuserwithseveralassortmenttoolsandoperationsforcreatingandediting
slides.Withthosetools,oneisabletoaddnewordeleteoldslidesthatarepreviewedintheslidethumbnailtabarea,usuallyfoundon
theleftsideofthescreen.Oneisalsoabletoswitchtotheslideoutlinetab,whichcontainsonlythetitleandthemaintextincludedin
theslide.Ifdesired,usingtheInserttab,theusercanperformadditionaloperationslikeexportingimages,alongwithadding
formattedtables,shapes,symbols,charts,andmuchmoretobetterexpresstheirmessage.Additionally,tocustomizethePowerPoint
tomakeitevenmoredynamicandpresentable,textcanbeanimated,andauniquetransitioncanbeaddedtotheslides.With
animation,textcanbesettoappearinaspecificwayintheslideduringaslideshow.Tonsofspecialeffectsareprovidedfortheuser,
includinganimationstomakethetexttofly,dissolve,fly,float,orbouncein.Similarly,oneisalsoabletoapplyspecialeffectsto
specificslidestotransitionfromoneslidetoanotherinaspecificmanner.Additionally,MicrosoftPowerPointallowsrecorded
narrationtobeplayedbackastheslideshowisbeingpresented,alongwithspeakernotes.Furthermore,mostpresentationgraphics
programsalsoallowtheusertoprintthosespeakernotesforthetargetedaudiencesconvenience.[43]

PERFORMANCE SHEET 2-3.1


HANDS ON:

IDENTIFY AND GIVE THE FUNCTION OF THE FOLLOWING:

1.

______________________________________________________________________________
____
2.

__________________________________________________________________________________

3.

__________________________________________________________________________________

4.

__________________________________________________________________________________

TASK SHEET

Directions:
Identify and write the correct answer of the following.

1.A_____isacollectionofworksheetssavedinasinglespreadsheetfile.
2.A_____isacollectionofrelateddatathatisstoredinamannerenablinginformationtoberetrievedasneeded.
3.Witha(n)_____program,thesourcecodefortheprogramismadeavailabletothepublicandsocanbemodifiedbyothers.
4.TrueorFalse.Changingthefontsizeinadocumentisanexampleofaformattingoperation.
5.A_____isacollectionofrelatedfieldsinadatabase.Alsocalledarow.
6.Softwarethatisnotcopyrightedandmaybeusedwithoutrestrictionis_____.
7.TrueorFalse.Softwarecanbeinstalledonbothpersonalcomputersandservers.
8.Thelocationattheintersectionofarowandcolumnonaworksheetintowhichdatacanbetypedisa_____.
9.TrueorFalse.MicrosoftOfficeisoneexampleofasoftwaresuite.
10.Copyrightedsoftwarethatisdistributedonthehonorsystem;consumershouldeitherpayforitoruninstallitafterthetrialperiod
is_____.
AnswersKeys:
1.

Workbook2.Database3.OpenSource4.True5.Record6.PublicDomainSoftware7.True8.Cell9.True10.Shareware

INFORMATIONSHEET23.2
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Accessprogram/
applicationcontainingtheinformationrequiredaccordingtocompanyprocedure.

ApplicationofComputers
Various

kinds of jobs that are done using computers:


SCIENTIFIC COMPUTATIONS

PC

HARDWARESERVICING
KEEPING TRACK OF INFORMATION
Example: Banking, Railways or Airlines Reservations
PREPARATION OF DOCUMENTS AND MULTIMEDIA PRESENTATIONS
Examples:Power point Presentations inmeetings and seminars.
Video presentation of films and footages
SIMULATION OF REAL OR IMAGINARY WORLD SCENES Example:
Virtual Reality, Computer Games

STORING AND SHARING INFORMATION Example:World Wide


Web(Internet)Web Casting

Spreadsheets
WhatisaSpreadsheet?

PoppitSpreadsheet
}
"Aspreadsheetisagroupofvaluesandotherdataorganizedintorowsandcolumnssimilartotheruledpaperworksheetstraditionally
usedbybookkeepersandaccountants."Thespreadsheetsoftwareismandatorytocreatecomputerizedspreadsheets.MicrosoftExcel
isaformofaspreadsheet.Therearemanytermsonemusthavetoknowtocreateaspreadsheet.Aworksheetisthesinglespreadsheet
document.Aworkbookallowsmultipleworksheetstobesavedtogetherinasinglespreadsheetfile.Worksheetsaredividedintorows
andcolumns.Theintersectionofarowiscalledacell.Onemustentercontentintotheactivecell,orcurrentcell;ithasaborder
aroundittomakeitbeeasilyidentified.Dataisentereddirectlyintoworksheetcellsbyclickingacelltomakeittheactivecell.
Labels,constantvalues,formulas,andfunctionsarethedatathatisenteredintoacell.Beforeoneentersaformulaorfunctionintoa
cell,onemustbeginwithsometypeofmathematicalsymbol,usuallytheequalsign(=). [19]Spreadsheetsaregreatlyusedin
businesses.Theyareusedtoorganizefinances,projects,statistics,etc.[20]Itisessentialtoknowhowtousespreadsheetsforschooland
one'sjob.

Tables,Graphics,andTemplates

TableMicrosoftExcel
Tables,graphics,andtemplatesareallavailabletoauserwithapplicationsoftware,suchasMicrosoftWord,MicrosoftExcel,and
PowerPoint.Tablesarewaysausercanorganizedataandinformationattheirconvenience.AccordingtoMicrosoftWord,thereare
nowmanydifferentavailableoptionsforuserswhoarelookingforvariouskindsoftables.Thesedifferentoptionsincludethe
following:theGraphicGrid,InsertTable,DrawTable,insertaneworexistingExcelSpreadsheettable,andQuickTables.The
conceptofusingtablesfordatainputisrelativelysimple.Inorderforausertoinsertatable,theusermustfirstopenMicrosoftWord.
Oncetheyhavedonethis,theymustclickthe"table"buttontocustomizethetabletoachievetheirneeds.Theoverallformatfora
tableconsistsofalarge(orsmall)gridthatcanbealteredbytheamountofinformationtheuserhas,ex.fourcolumnsfiverows.Next,
theusermustinsertthetableintotheworddocumentbyselecting"inserttable"fromthedropdownmenu. [21]GraphicsinMicrosoft
Wordarepictures,orclipartthatareabletobeinsertedintoaMicrosoftWorddocument,ExcelSpreadsheet,PowerPointslide,orany
otherOfficeapplication.GraphicsareinsertedintotheseOfficeApplicationstoenhancetheinformationpresentedinaWord
Document,Excelworksheet,orPowerPointslide.Ausercaninserttheirownpicturethroughtheirofficedocuments;addclipart,
shapes,SmartArt,screenshot,orWordArt.[22]Templatesarepreconstructeddocumentlayoutswhoseprimaryuseistoassistauserin
creatingaspecifictypeofdocumentinaconvenientamountoftime.Thedifferentoptionsoftemplatesvary,butafewofthe
followingarecommononesusedeveryday:agendas,brochures,calendars,flyers,faxcovers,andmanymore.Templatesareusedto
saveausertime,andconfusionincreatingtheirdocument.[23]

HowtouseaSpreadsheet

Whenusingaspreadsheetapplication,theusercanusevariousconceptstocomputethedataenteredintothecellsinthespreadhseet.
Thesedifferentconceptsareprovidedwithintheprogram.Someverycommonconceptsthatareutilizedarecharts,functions,
formulas,andcellreferencing.

Charts
Achartcanbecreatedasitsownobjectorembeddedwithinthesheetitself.[24]Thisishelpfulwhenauserneedstoanalyzedataor
representchangingdata.

AchartgeneratedusingExcel.

Functions
Afunctionisapreprogrammedmathematicalformulatoallowtheusertomakecalcuationsbasedonthedatainput.Thefunctions
underspreadsheetsaretheretoperformasimplecalculationbyusingacertainvalue,calledarguments.Iftheuserwishestocreatehis
ownformula,VisualBasiccanbeusedtowriteaformulaandthenthespreadsheetprogramcaninputthevaluesintothenewly
writtenformula,reportingthedatabackintothesheet.Therearemanydifferentreasonstohavefunctionsonspreadsheets.Onewould
beforarithmeticfunctionstoprocessnumericaldata.Thenextwouldbestatisticalfunctionsthatuseanalysistoolsandaveraging
tools.Thiswouldbeusefulforfindingtheaverageofthenumbersinacertainrow/columnonaspreadsheet.Thenextfunctionisdate
thatprocessesandconvertsdates.Thisfunctioncouldbeusedtoputthesequentialdatesinorderonthespreadsheet.Thenext
functionislogicfunctionsthatprocesslogicdata.AnexampleoflogicdatawouldbeanAND/ORfunction.Iftherewassomething
thatneededtobemarkedyesifitisabove5andmarkednoifitisbelow5thenthatwouldbealogicfunction.Thelastoneis
financialfunctionsthatprocessmonetarydata.Theyallmuststartwithanequalsign,thenameofthefunction,parenthesisopening
andclosing.Inthefunctionacommaorsemicolonisusedasthedelimiter,dependingonwhatsettingsarethereinthespreadsheet
woulddependonwhichonetouse.Anexamplewouldbe=SUM(A1:A4),thisfunctionwouldfindthesuminthosecells.Someofthe
mostcommonfunctionsareSUM,AVERAGE,IF,COUNT,MAXandMIN.

AfunctionbeingedittedusingVBinExcel.

Formulas
Aformulaidentifiesthecalculationneededtoplacetheresultinthecellitiscontainedwithin.Thismeansacellhastwodisplay
components;theformulaitselfandtheresultingvalue.[25]Typically,aformulaconsistsoffiveexpressions:value,references,
arithmeticoperations,relationoperations,andfunctions.Byusingtheseexpressions,formulascanhelptomaketables,solvemath
problems,calculateamortgage,figureoutaccountingtasks,andmanyotherbusinessrelatedtasksthatusetobedonetediouslyon
paper.[26]
Aformulaalwaysstartswithanequalssign(=),followedbyaconstant,afunctionorareference,thenfollowedbyanoperator,and
thenfollowedbyanotherconstant,functionorreference.Aconstantisavaluethatneverchanges;thisincludesnumbers,dates,titles
andothertextinput.Referencesrepresentacertaincell,suchasA2.Anoperatorisusuallyamathsymbol,suchas+or*which
tellsthecomputerhowtocompute(addormultiply,respectively)thegivenconstantsorfunctionsgivenintheformula.Itisgoodto
becarefulthatoneknowsthedifferencebetweenaconstantandareference.Iftheconstant30isinputintocellA3,andtheformula
says=30+2,thenifA3svaluechanges,theexpressionoftheformulawillnotchangeunlesstheformulaitselfchanges.Ifone
wishestohaveaformulathatreturnsthevalueofacell,thentheformulashouldread=A3+2.Anotherthingtonoteisthatthe
operatorswillfollowthebasicrulesofcalculation.Forexample,theformula=3+2*4willadd3toproductof2and4,ratherthan
add3and2,thenmultiplythesumtimes4.(Parenthesiscanbeusedtochangetheorder:(3+2)*4wouldaddfirst,thenmultiply.)
Operatorsarenotalwaysarithmetic,theycanalsobecomparison,textconcatenation,andreferenceoperators.Comparisonincludes

greaterthan,lesserthan,greaterthanorequalto,andlesserthanorequalto.Toconnecttwovaluesintoonevalue,atext
concatenation(theandsigni.e.&)isused.Thesignsusedasreferenceoperatorsarethefollowing:acolonisusedtoreference
twocellsandallthecellsbetweenthem(i.e.B1:B10);acommaisusedtocombinemultiplereferencesintoonereference(i.e.
B1:B10,C1:C10);andaspaceisusedasanintersectionoperator. [27]

UsingaformulainExcel.

SpreadsheetGraphics

CellReferencing
Cellreferencingreferstotheabilitytocallonothercells.Therearetwowaysofdoingthis:relativeandabsolutecellreferencing.A
relativecellreferencewilladjustastheformulaiscopiedfromanothercellwhiteanabsolutewillnotadjust.Itisalsoimportantto
notethatausercanreferenceboththesamesheetandothersheetsinabookusingthisconcept.

PivotTables
OnethemostpowerfulfeaturesavailableintheMicrosoftOfficespreadsheetprogramExcel,ispivottables.Pivottablesallowyouto
manipulatelargeamountsofrawdata.[28]Itmakesiteasytoanalyzethedataindifferentways,withasimpleclickanddrag.Vast
quantitiesofdatacanbesummarizedinavarietyofways.Calculationscanbeperformedbyroworcolumn.Datacanbefilteredor
sortedautomaticallybyanyorallofthefields.Excelcanevenrecommendabasiclayoutofapivottablebasedonthetypeofdata
selected.Awizardisavailabletoassistinthecreationofthetable.Animportantthingtorememberwhenusingpivottables,isthat
anytimetheoriginaldatasourceismodified,thedatamustberefreshedinthepivot.

SamplePivotTable
Oncethepivottablehasbeencreatedandthedatahasbeenanalyzedinameaningfulway,itcanthenberepresentedgraphicallyusing
pivotcharts.AllthebasiccharttypesavailableinExcelareavailableinthepivotchartmenu.Muchlikethepivottablestheyarebuilt
on,theycanalsobemanipulatedwithease.Theycanbefilteredtodisplayonlytherelevantinformationformthemaindatasource.

PERFORMANCE TASK

HANDS ON: Explore

1. Explore the spreadsheet software and list down the advantages for using it .
2. What are the uses of the different kinds of chart in our business world?
3. Draw the different chart and level its function.

ACTIVITY

Hands on:
1. Create a Spreadsheet (file)
a. Using graph
b. With formulas and functions
c. Cell referencing
d. Pivot tables

INFORMATIONSHEET23.1
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Select,openandclose
desktopfornavigationpurposes.

How to navigate Windows using a keyboard?


NavigatingMicrosoftWindowsusingthekeyboardformanycommonlyperformedtaskscandramaticallyincreaseyourproductivity.
Also,asituationmayarisewhenthemousestopsfunctioningoryouneedtoworkonacomputerwithoutone.Thefollowingsections
containmanykeycombinationsusedtonavigateWindowsusingyourkeyboard.Youcannavigatethisdocumentbyclickingonone
ofthelinksbelow,oryoucanscrollthroughtheentiredocumentandlearnallofthemethodsindividually.
Note:SomeofthesekeycombinationshavedifferenteffectsornotworkthesamewayforWindows8and8.1
Openingthestartbutton
Openingaprogramonthedesktop

Closing,minimizing,maximizing,ormovingawindow
Closingorchangingtabs
Movingbetweenopenwindowsandapplications
Navigatingbetweenfieldsandbuttonsonawindow
Manipulatingandmovingthroughtext
Scrollinginawindow
RightclickinganiconorotherelementofWindows

Opening the Start menu


Tostartoff,youcanaccesstheMicrosoftWindowsStartbuttonandStartmenubypressingtheWindowsKeyonthekeyboardorby
pressingtheCtrlandEsckeysatthesametime.
Note:BecauseWindows8doesnothaveaStartmenu,pressingtheWindowskeyorCtrl+EsckeysshowstheWindowsStartscreen
orgototheWindowsdesktop.
IntheStartmenu,youcanusethearrowkeysonthekeyboardtomoveup,down,left,orrightwithintheStartmenu.Onceyou've
locatedtheprogramyouwanttorun,presstheEnterkey.

Opening a program on the desktop


Ifthereisaprogramyouwanttorunthathasanicon(shortcut)onthedesktop,youcanmovetothedesktopbypressingyourtabkey
onyourkeyboard.Pressingtabwhileonthedesktopwillswitchbetweenthedesktop,theStartbutton,andeachoftheitemsonthe
taskbar.Youcandeterminewhatareayou'recurrentlyatbylookingforanitemthatisselected.Anitemthatisselectedwilleitherbe
highlightedorhaveaborderofdots.
Insomecases,youmayhavetopresstabseveraltimesbeforegettingtothedesktopicons.Onceoneofthedesktopiconshasbeen
selected,youcanmovetoothericonsbyusingyourarrowkeys.
Oncetheicononthedesktopyouwanttorunisselected,presstheEnterkeytoopenthatprogram.

Closing, minimizing, maximizing, or moving a window


Closingawindow
PresstheCtrlandF4keysonthekeyboardatthesametimetoclosethecurrentopenprogramorwindow.
UsersmayalsopresstheAltandspacebarkeysatthesametime,thenarrowdowntotheCloseorExitoptioninthemenuandpress
Enter.
Minimizingorshrinkawindow
Tominimizeawindow,presstheWindowskeyanddownarrowatthesametime(sometimestwice).
Maximizingawindow
Tomaximizeawindow,presstheWindowskeyanduparrowatthesametime.
Movingawindow
Beforeyoucanmoveanywindow,itmustnotbemaximized.Tomakethewindowappearinwindowedmode,presstheAltand
spacebarkeysatthesametime,movetotherestoreoption,andpressEnter.Onceinwindowedmode,youcanmoveawindowby
pressingAltandspacebaratthesametime,navigatetothemoveoption,pressEnter,andthenmovethewindowusingyourarrow
keys.

Closing or changing tabs


Closingatab
Inmostprograms,pressingtheCtrlandF4keysatthesametimeclosesatab.
Switchingtabs

Tomovelefttorightbetweentabsinthecurrentlyselectedwindow,presstheCtrlandTabkeysatthesametime.
Tomoverighttoleftbetweentabsinthecurrentlyselectedwindow,presstheCtrl,Shift,andTabkeysatthesametime.

Moving between open windows and applications


Tomovebetweenanyopenprogramsonyourcomputer,pressandholdtheAltkey,thenpresstheTabkey.Ifthisisdone
successfully,awindowappearsthatdisplayseachoftheopenprogramsonyourcomputer.RepeatedlypressingTabwhilecontinuing
toholdAltmovesbetweeneachoftheopenprograms.Whentheprogramyouwanttoswitchtoisselected,letgoofbothkeysto
makeityourcurrentwindow.

Navigating between fields and buttons on a window


Tomoveyourcursorbetweenobjectsoffieldswithinawindow(suchasadialogbox),you'lloftenusetheTab,spacebar,arrow,and
theEnterkeys.Tabisusuallythedefault,butifitdoesnotwork,tryusingthearrowkeys.Ifyouneedtopressabutton,suchasOKor
Cancel,pressthespacebarorEnterkey.

Manipulating and moving through text


Belowarethedifferentmethodsofhowyoucanmovethroughtextinadocumentwithouttheaidofamouse.Notonlydoesthishelp
userswhodonothaveaccesstoamouse,itcanalsosaveyouagreatdealoftimewhenworkingwithtextdocuments.
ArrowkeysUsingthearrowkeysonthekeyboardwillmovethecursorup,down,left,orrightinthedocument.
CTRLandArrowkeysHoldingdowntheCtrlkeywhilepressingtheleftorrightarrowkeyswillmovethecursoronewordata
time.Thisismuchfasterthanonlyusingthearrowkeys.HoldingCtrlwhilepressingupordownmovesthrougheachofthe
paragraphsinthedocument.
EndandHomekeysPressingtheEndkeytakesyoutotheendofalineordocument,whilepressingtheHomekeywillmoveyou
tothebeginning.
ShiftkeyTheShiftkeyallowsyoutohighlighttext.Forexample,holdingdowntheshiftkeywhileusingtherightorleftarrowkeys
willhighlightthetexttotheleftorright.Ifyouholddownshiftwhilepressingthedownarrowkeys,youwillhighlightonelineata
timeinthatdirection.
Finally,youcanusetheShiftkeyincombinationwiththeotheraboverecommendations.Forexample,pressingandholdingShiftand
Ctrlandusingthearrowswillhighlightawordatatime.HoldingdownShiftandpressingtheEndkeywillhighlightfromthecurrent
cursorpositiontotheendofthelineordocument.

PERFORMANCETASK
HANDSON:
How to navigate Windows using a keyboard
Opening the Start menu
Opening a program on the desktop
Closing, minimizing, maximizing, or moving a window
Closing or changing tabs
Navigating between fields and buttons on a window
Manipulating and moving through text

Information Sheet 3.4

LESSON 2: PERFORMING COMPUTER OPERATIONS (PCO)


LO 3. Access Information Using Computer
3.4 Carry out Keyboard Techniques in line with OHS requirements

A computer keyboard is an input device used to enter characters and functions into the computer
system by pressing buttons, or keys. It is the primary device used to enter text. A keyboard typically
contains keys for individual letters, numbers and special characters, as well as keys for
specific functions.
The keyboard has many keys that make typing and layout easier. Here is a list with a short explanation of useful keys:
Esc - this means escape and is what you press to escape from any control key you have pressed.
Tab this makes indents [a bigger than normal space between the text and the margin.]
Caps Lock if you press this key a green light will appear on the right hand side of the keyboard and any typing you do
will be in capital letters. This is useful for headings.
Shift this button shifts you into a capital letter when you just want to use it briefly for example to start a sentence. Press
shift and the key you want to use. It is also useful when you want to put in the punctuation marks or other symbols that are
on top on the keys of the numbers and some of the punctuation keys on the keyboard. So, if you need a question mark
you will need to press the shift key and the key with the ? on it.
Home if you press this you will get to the first letter of the line you are typing. If you press CTRL [control] and Home at
the same time you will get to the first letter of the first word of your document. This is useful if you have typed a long
document and want to make a change in the first paragraph.
End takes you to the end of a line. Ctrl and End at the same time takes you to the very end of the whole document.
Delete this is an eraser it erases or deletes any letter or word, or line or paragraph you decide you dont want
anymore. If it is a letter, use the mouse to go to the letter and click on the letter. Then press delete the letter in front of
the cursor will be deleted. Some times it is easier and quicker to use the
Backspace arrow just above the Enter button can be used if you want to delete the last letter you have typed. The letter
should disappear. If it is a whole word, or line or paragraph then use your mouse to go to the beginning of the part you
want to delete. Keep your finger clicked down on the left hand mouse button and drag it over the whole bit you want to
delete. This is called HIGHLIGHTING a section and the screen shows this by making the section black and the typing
white. Then press delete and the whole bit will disappear.
Page Up and Page Down - take you to the top and bottom of the page you are currently busy on.
Arrows - Use the arrows on the right hand side of the letters to move the cursor (line on the screen showing your position
- where the next letter will be typed) up, down or sideways. You can also use the mouse to do this. If you want to add or
delete something, move your cursor to the right place and then either delete or add letters.

KEYBOARD TECHNIQUES

Learn How To Touch Type


Touch typing is all about the idea that each finger has its own area on the keyboard. Thanks to that
fact you can type without looking at the keys. Practice regularly and your fingers will learn their
location on the keyboard through muscle memory.

Homecase Position

Curve your fingers a little and put them on the ASDF and JKL; keys which are located in the
middle row of the letter keys. This row is called HOMECASE because you always start from these
keys and always return to them.
F and J keys under your index fingers should have a raised line on them to aide in finding these
keys without looking.

Typing Speed

Do not rush when you just started learning. Speed up only when your fingers hit the right
keys out of habit.

Take your time when typing to avoid mistakes. The speed will pick up as you progress.

Always scan the text a word or two in advance.

Pass all typing lessons at a time. It will help you to get above the average typing speed.

SHORTCUT KEYS

Shortcut keys help provide an easier and usually quicker method of navigating and using
computer software programs. Shortcut keys are commonly accessed by using Alt, Ctrl or Shift in
conjunction with a single letter.

Occupational Health and Safety Procedure (OHS)


Proper Keyboarding Posture

Ergonomics is the science concerned with designing safe and comfortable machines for humans.
Following these rules will increase your speed and accuracy at the computer.

Proper Height of Your Keyboard. If it is too high, you will have trouble reaching some of the keys.
If it is too low, your shoulders and arms will become tired.
Proper Distance from the Keyboard. Known as hand-span. Hand-span tells you how far you
should sit away from your keyboard. If you sit too far away, you will not be able to reach the keys
above homerow. If you sit too close, you will not be able to reach the keys below homerow.
Feet Flat on the Floor. They help balance your body for keyboarding. Crossing your ankles or
knees puts a strain on your spine.
Sitting Up Straight. By doing this, it helps you keep your spine straight and comfortable as well
as provide balance.
Proper Wrist Position. Dont raise your palms so much that your wrists arch. Maintaining proper
wrist
position helps avoid fatigue in your hands. If you wrists rest on your keyboard, this will cause you
to make typing mistakes.
Elbows In. Keeping your elbows close to your sides prevents your fingers from coming off home
row. When your fingers come off home row, you then have trouble striking the other keys from home
position.
Eyes on Copy. If you dont keep your eyes on what you are typing, you will lose time from speed,
you may also type the wrong line, skip words or even repeat a line.
Fingers Anchored. While typing, you need to keep your fingers anchored on the home row
keys. When you reach for a key on the top or bottom row, you need to remember to bring your
fingers back to the home row position.

KEYBOARD CARE AND MAINTENANCE


How to clean your computer keyboard
Computer Keyboards can get dirty very easily especially in an office environment.
To keep your keyboard in top condition the moderate cleaning could be done weekly and the more
thorough cleaning could be done every 2 months.
What you will need:

lint free cloth.


dry cloth or duster.

suitable cleaning fluid (isopropyl alcohol).

cotton buds.

can of compressed air or vacuum cleaner.

flat tip screwdriver (optional for thorough clean

Remove Loose Debris


1.
2.

Shut down your computer. If you're using a wired desktop keyboard, unplug it.
Tilt the keyboard upside down and shake it to remove any loose debris. If you have a can of
compressed air, you can spray it in between the keys as well.

3.
4.

Clean the sides of the keys with a cotton swab dipped in isopropyl alcohol.
For a more thorough cleaning, remove all of the keys. Do this by gently prying up each key with
a small screwdriver or a similar lever. When the keys have been removed, blow out any debris with
compressed air. With a moist (but not wet) cloth, lightly swab all surfaces. Do not allow any type of
fluid to enter the keyboard.

5.

Clean the individual keys and place them back in the keyboard.

Task Sheet 3.4


Name
: _______________________
Year & Section : _______________________

Score : _____________

Type of Test: Enumeration


Direction: A. Identify the different parts of Keyboard.
(1-10)
1.)
2.)
3.)

6.)
7.)
8.)

4.)
5.)

9.)
10.)

B. Enumerate the Proper Keyboarding Postures. (1-5)


1.)
2.)
3.)
4.)
5.)
C. Enumerate the different ways in removing debris in the keyboard. ( 1-5)
1.)
2.)
3.)
4.)
5.)

Performance Task 3.4

1. Open a Typing Master.


2. Do Typing Lesson 1.1 1.5 .
3. Find out by accomplishing the Performance Criteria honestly and sincerely.
Remember it is your learning at stake.

Performance Criteria 3.4

Criteria

Points

Score

1. Accuracy

50

2. Word per Minute

25

3. Key per Minute

25

Total

100

Information Sheet 4.1

LESSON 2: PERFORMING COMPUTER OPERATIONS (PCO)


LO 4. Produce output/ data using computer system
4.1 Process entered data using appropriate software commands

There are two main types of software: systems software and application software.
Systems software includes the programs that are dedicated to managing the computer itself, such
as the operating system, file management utilities, and disk operating system (or DOS).
System software is a type of computer program that is designed to run a computer's hardware and
application programs. If we think of the computer system as a layered model, the system software is the
interface between the hardware and user applications.

What does Application Software mean?


Application software is a program or group of programs designed for end users. These programs are
divided into two classes: system software and application software. While system software consists
of low-level programs that interact with computers at a basic level, application software resides
above system software and includes database programs, word processors, spreadsheets, etc.
Application software may be grouped along with system software or published alone.
Application software may simply be referred to as an application.
What are the example of application software?
Specific examples of application software include Microsoft Office, Excel and Outlook, Google
Chrome, Mozilla Firefox and Skype. Games and mobile applications such as "Clash of Clans,"
SoundCloud, Spotify and Uber, are also considered application software. Other specific examples

include Steam, "Minecraft," Adobe Reader and Photoshop.


What can you use MSWORD for?
MSWORD program is called a word-processing package. This means that it is useful for typing and
storing letters, articles and anything that consists mainly of words. It is basically a fancy typewriter
with a built in filing-system.

How to use MS WORD


Switch on your computer and wait until a whole lot of picture symbols appear with a Start button
on the bottom left of the screen. Use the left button on the mouse to click on the Start button. Then
click on program and then double-click on the MSWORD program. Some computers have a
MSWORD symbol that will come up when your computer is on and you do not have to go to start
simply double click the left button of the mouse on the symbol.
The Microsoft word program will appear on the screen.
There will be a blank screen called Document 1. Every thing you type is called a document. Above
the blank screen there are various terms and signs you should know about.

The first line has a list of titles called commands - File, Edit, View, etc
The second and third lines are called the toolbar and have different blocks that you can use
to give quicker commands to the computer.

The fourth line [if there is one] shows your page margins it is called the ruler.

The File title

To start a new document (click on new) You can use the block with a folder on it on the
toolbar to do this more quickly. Use your mouse to click on it.)
To open an old document (click on open) and then click on the name of the document you
want to open
To close a document. The computer will ask you if you want to save it before you close it and
then you click on Yes or No.

The next section is to do with saving documents.


If you press save, the document will be saved under its heading in the general folder called My
Documents. You can do this with the block on the toolbar showing stiffy disk. Click on it with your
mouse.
Save As allows you to save a document under a new name in the folder of your choice. When you
click on Save as, a new box will open on screen. First go to the Save In square. It should say My
Documents. In the block below yellow folders will appear if you have made them. (See Step 2 in
Using MSWORD as an Office) Click on the folder you want to save the document in. Click on Open.
Then check that you like the name of the document. If you like it press save. If you dont like it
delete the file name and type a new name. Then click save.
If your document is an update of an old document but you want to save it as a new version click
on Version in the Save box under file. Type in your comments and click Save. (I dont use this much
as I just give the document a new date and use Save As to save it under a new name.)

The next section is to do with how the document looks (Page Set Up) and Print Preview and to print
documents.
Page set up allows you to change the margins of the page so that you can get more (or less) typing
on a page. If you click on Paper Size it allows you to change the page into Portrait (normal A4) or
Landscape (sideways A4)
Print preview allows you to see what the document will look like on a printed page. You can also to
this by using the block on the toolbar with a page and magnifying glass on it.
Print allows you to print the document if your computer is connected to a printer. You can also
print quickly by using the block with a printer on your toolbar.

Task Sheet 4.1


Name
: _______________________
Year & Section : _______________________

Score : _____________

Direction: Read and understand the instructions, use your quiz notebook in answering the
questions.

A. Identify the 2 types of Software? (5 points)


B. Give an example of each software? (5 points)
C. Enumerate the process on how to create a document using MS Word?
(10 points)

Perfromance Task 4.1

Hands-on:
Using MS word application program:

a. Create a document that stated your personal information and personal


background
b. Save the document in your flash drive.

Performance Criteria 4.1

How Well Did You Perform?


Find out by accomplishing the Scoring Rubric honestly and sincerely.
Remember it is your learning at stake!
Interpretation of Scores

3
2
1
0

Excellent
Good
Fair
Poor

Information Sheet 4.2


LESSON 2: PERFORMING COMPUTER OPERATIONS (PCO)
LO 4.2. Print Out data as required using computer hardware/peripheral devices in
accordance with Standard Operating Procedures.

How to print a document


To print a document, your computer needs to be connected to a printer. Being able to print is
not necessary in order to use Word, but if you want to send a letter in the post or print out a
poster, youll need to have access to a printer.
This guide explains how to print a document in Microsoft Word 2010. Earlier versions of
Word may use slightly different steps.

Youll need:

A computer with Microsoft Word installed.

A printer set up and connected to your computer.


Follow these step-by-step instructions to print a document from Microsoft Word

Step 1: Open an existing Word document or start a new document and type your text.
Step 2: Once youve completed your document and are ready to print, click File in the top
left-hand corner of your document.

Alternatively, some versions of Word may have an Office button instead of a File button its a
round Office icon in the top left-hand corner of the screen. Click on this if you have one.

Step 3: Move down and click Print in the menu. This will bring up the Print
dialogue box.

Step 4: Choose how many copies of your document you need.

Step 5: Depending on your printer options, you can choose other printing features such as whether
you want to print all pages or only certain pages. You can also change the orientation of the print
from portrait to landscape and tell your computer and printer whether youre printing on a certain
size of paper. Youll also see, on the right, a preview of your printed document will look like.
Step 6: When youre happy with your settings, click Print. The document will now start printing on
your printer.

Task Sheet 4.2


Name
: _______________________
Year & Section : _______________________

Score : _____________

Direction: Read and understand the instructions, use your quiz notebook in answering the
questions.

Enumerate the step-by-step instructions to print a document from Microsoft Word.


1.
2.
3.
4.
5.
6.

Perfromance Task 4.2

Hands-on:
a. Create a document in MS word.

b. Follow the step-by-step instructions to print.

Performance Criteria 4.2

How Well Did You Perform?


Find out by accomplishing the Scoring Rubric honestly and sincerely.
Remember it is your learning at stake!
Interpretation of Scores

3
2
1
0

Excellent
Good
Fair
Poor

Information Sheet 5.5.1


INFORMATION REQUIREMENTS FOR INTERNET SEARCH

You can do all of this by connecting a computer to the Internet, which is also called going online. When
someone says a computer is online, it's just another way of saying it's connected to the Internet.

What is the Web?


The World Wide Webusually called the Web for shortis a collection of different websites you can access
through the Internet. A website is made up of related text, images, and other resources. Websites can resemble
other forms of medialike newspaper articles or television programsor they can be interactive in a way that's
unique to computers.
The purpose of a website can be almost anything: a news platform, an advertisement, an online library, a forum
for sharing images, or an educational site like us!
Once you are connected to the Internet, you can access and view websites using a type of application called a
web browser. Just keep in mind that the web browser itself is not the Internet; it only displays websites that are
stored on the Internet.
How does the Internet work?
At this point you may be wondering, how does the Internet work? The exact answer is pretty complicated and
would take a while to explain. Instead, let's look at some of the most important things you should know.
It's important to realize that the Internet is a global network of physical cables, which can include copper
telephone wires, TV cables, and fiber optic cables. Even wireless connections like Wi-Fi and 3G/4G rely on
these physical cables to access the Internet.
When you visit a website, your computer sends a request over these wires to a server. A server is where
websites are stored, and it works a lot like your computer's hard drive. Once the request arrives, the server
retrieves the website and sends the correct data back to your computer. What's amazing is that this all happens
in just a few seconds!
Self Check 5.5.1
INFORMATION REQUIREMENTS FOR INTERNET SEARCH
Direction:

_____________1. access and view websites using a type of application called


_____________2. include copper telephone wires, TV cables, and fiber optic cables
_____________3. computer sends a request over these wires to a
_____________4. made up of related text, images, and other resources
_____________5. where websites are being stored

Answer Key 5.5.1

1.
2.
3.
4.
5.

web browser
physical cables
server
website
serve

Information Sheet 5.5.2


LAUNCH BROWSER
A web browser is a type of software that allows you to find and view websites on
the Internet. Even if you didn't know it, you're using a web browser right now to read this
page! There are many different web browsers, but some of the most common ones
include Google Chrome, Internet Explorer, Safari, and Mozilla Firefox.
No matter which web browser you use, you'll want to learn the basics of browsing
the Web. In this lesson, we'll talk about navigating to different websites, using tabbed
browsing, creating bookmarks, and more.
Keep in mind that your browser may look and act a bit differently, but all web
browsers work in basically the same way.
Tabbed browsing
Many browsers allow you to open links in a new tab. You can open as many links as you
want, and they'll stay in the same browser window instead of cluttering your screen
with multiple windows.
Your browser will also keep a history of every site you visit. This is another good way to
find a site you visited previously. To view your history, open your browser settings
usually by clicking the icon in the upper-right cornerand select History.
Check 5.5.2
LAUNCH BROWSER

Give what is asked


1.
2.
3.
4.

Many browsers allow you to open links in a new_______________


Is a type of software that allows you to find and view websites _____________
Keep a history of every site you visit______________
Navigating to different websites__________________

5-8 Give the most common web browser


Self Check 5.5.2
1.
2.
3.
4.
5.
6.
7.
8.

Tab
Web browser
Browser
Tabbed browsing
Google Chrome
Internet Explorer
Safari
Mozilla Firefox

Information Sheet 2.5.3


LOAD SEARCH ENGINE
You do not always have to know a websites address in order to use the Internet. It is important
to know how to search for information. One of the best methods to search is to use a search
engine. A search engine is a software system on the Internet that will conduct a search of its own
database of websites based on terms you have entered. As a result, you will be shown a list of
web addresses that contain the term you were looking to find. An example of a popular search
engine is www.google.com.

How to Use Google


First you will need to open Internet Explorer then enter www.google.com in the address
bar. Here is what www.google.com looks like:

Back to top
To conduct the search, point and click your mouse in the search textbox. Type in the
textbox the words or words you would like to search. Then point and click your mouse on
the Google Search button below the search textbox.

Back to top
As an example, the word flowers was entered into the Google textbox and after clicking on
the Google Search button these are the results:

Every phrase in either blue with an underline may be clicked on to visit that particular site.
These are hyperlinks to websites. The websites deemed most fitting for the search are found
at the near the top of the list. There are also paid sponsors found at the top (shaded) and to
the right of the screen that you may visit if you wish. You can see actual web addresses in
green text.
In addition, notice the results area:

Back to top
These results are found on the top right of the page. 233,000,000 would be impossible to go
through therefore you will need to learn ways to reduce the amount of results. To continue
reviewing the search results pages, scroll to the bottom of the Google webpage until you see:

Click on the number 2 or on the blue arrow to the right to continue through the search
results.

Self-Check No. 2.5.3


I. True or False: Read carefully each statement below. Write the letter T on the space before
the number if the statement is TRUE and letter F if the statement is FALSE.
_________1. A search engine is a software system on the Internet that will conduct a search of its
own database of websites based on terms you have entered.
_________2. To conduct the search, point and click your mouse in the Google Search.
_________3. One of the best methods to search is to use a search engine.
_________4. One of the best methods to search is to use a search engine.
_________5. Google search is an example of search engine.

Answer Key
1. T
2. F
3. T

4. T
5. F

TASK SHEET No. 2.5.3a


Title: LOAD SEARCH ENGINE
Performance Objective:
Given all the materials and supplies, you should be able to follow the
correct procedures and guidelines in loading search engine according
to standards.
Supplies/Materials:
Internet Connection
Equipment:
Computer System
Computer tables and chair
Server
Hub/Switch
Modem
Steps/Procedure:

Step 1: Go To Google (But Which Google?)


Step 2: Go To Google Via A Toolbar
Step 3: Enter Your Search Terms
Step 4: Review Your Search Results
Step 5: Preview Your Answers
Step 6: Refine Your Google Search
Assessment Method:
Demonstration, Performance Criteria checklist

Performance Criteria Checklist No. 2.5.3a


CRITERIA

YES

Did you.
1. Go to Google?

NO

2. Go to Google via a toolbar?


3. Enter your search terms?
4. Review your search results?
5. Preview your answers?
6. Refine your Google Search?

Information Sheet 2.5.4


ENTER APPROPRIATE SEARCH CRITERIA/URL OF SITE

Understanding URLs

Every time you click a link on a website or type a web address into your browser, its a URL.
URL stands for Uniform Resource Locator. Think of it like a street address, with each
portion of the URL as different parts of the address, and each giving you different
information. Lets examine each component of a URL and what we can learn from it.

Scheme
Every URL begins with the scheme. This tells your browser what type of address it is so the
browser connects to it correctly. There are many types of schemes, but for typical web
browsing you will mostly see http and https. Your browser usually wont show the scheme
in the address bar, and usually you dont need to type the scheme when typing a web
address; instead, you can just begin with the domain name. The scheme is still always part
of the URL; it just isnt being displayed.

Domain name
The domain name is the most prominent part of a web address. Typically, different pages
on the same site will continue to use the same domain name. For example, all pages on
this site share the GCFLearnFree.org domain name.

Each segment of the domain name separated by a period is called a domain. The domain
on the right is called a top-level domain, with the domain to the left of it called the
second-level domain, then third-level domain, and so on.

You can often learn something about the site from the domains. One of the domains
usually identifies the organization, while the top-level domain may give you more general
information on what kind of site it is. For example, in the domain name ferry.ncdot.gov, the

.gov domain means it is a government website in the United States, the ncdot domain
identifies it as the website of the North Carolina Department of Transportation (NCDOT),
and the ferry domain means this particular page is about ferries operated by the NCDOT.
In most URLs, the www domain can be omitted. GCFLearnFree.org and
www.GCFLearnFree.org lead to the same page. However, other subdomains cannot be
omitted. For example, all pages under classes.GCFLearnFree.org require the classes
domain in the URL.

File path
The file pathoften just called the pathtells your browser to load a specific page. If you
dont specify a path and only enter a domain name, your browser is still loading a specific
page; its just loading a default page, which usually will help you navigate to other pages.

URLs that end with the domain name without a file path usually will load a homepage or
an index page that's designed to help you navigate to specific pages on the site. Often, if you
cant remember the file path for a specific page, you can go to the homepage and search for
it.

Parameters
Some URLs include a string of characters after the pathbeginning with a question mark
called the parameter string. You have probably noticed this part of a URL appear in your
address bar after performing a search on Google or YouTube. The parameter string can be
clear or confusing to a human user, but it is critical information for the server.

Anchor
Also appearing after the path, the anchor tells your browser to scroll to or load a specific
part of the page. Usually the anchor begins with a hashtag and is used to direct your
browser to a specific part of a very long page, much like a bookmark. Different anchors
dont load different pages; they simply tell the browser to display different parts of the page.

A whole URL
When combined, these elements make up a URL, although not all URLs will have all five
parts.

Keep in mind that these are the most common components of a URL. There are many other
parts, but these are the five you will see most often and that can usually give you the most
information.

Self-Check No. 2.5.4

I. Identification: Identify the parts of a URL. Write your answers on your answer sheet.

http://en.wikipedia.org/w/index.php?title=Burrito#Breakfast_burrito

TASK SHEET No. 2.5.4a


Title: ENTER APPROPRIATE SEARCH CRITERIA/URL OF SITE
Performance Objective:
Given all the materials and supplies, you should be able to follow the
correct procedures and guidelines in entering appropriate search
criteria or URL of site.
Supplies/Materials:
Internet Connection
Equipment:
Computer System
Computer tables and chair
Server
Hub/Switch
Modem
Steps/Procedure:
1. Once you have accessed the Internet Channel, select the "WWW" icon
from the start page.

2. The keyboard menu will appear. Use the Wii Remote to point at the
letter you wish to enter, and press the A Button. You can also use a
compatible USB keyboard to type in the URL you wish to access. You do
not need to type "http://". However, to manually enter a secure site
("https//:") you will need to enter the full URL.
3. Click "OK" when finished. The Internet Channel will then attempt to
access the URL you have entered.
Assessment Method:
Demonstration, Performance Criteria checklist

Information Sheet 2.5.5


FOLLOW RELEVANT LINKS TO LOCATE REQUIRED INFORMATION

Understanding hyperlinks
Have you ever noticed that certain words on the Web look a little bit different? Whenever
you see a word or phrase that's underlined in blue, it's probably a hyperlink, or link for
short. You might already know how links work, even if you've never thought about them
much before. For example, try clicking the link below.
Hey, I'm a link! Click me!
Link are used to navigate the Web. When you click a link, it will take you to a different
webpage. In the example below, we're clicking a link to learn more about the DuPont Circle
neighborhood.

You may also notice that your cursor changes into a hand icon whenever you hover over a
link.

If you see this icon, it means you've found a link. You'll find other types of links this way
too. For example, many websites actually use images as links, so you can just click the
image to navigate to another page. In the example below, we're clicking the picture of the
deer-shaped salt and pepper shakers to open a page with more information about them.

Links don't always go to another website. In some cases, they allow you to download a file.
When you click a link like this, the file will be downloaded to your computer. In the example
below, we're downloading an installation file for a new application.

As you can see, links are an important part of using the Web. They allow you to navigate
between different webpages, download files, and do a whole lot more.

INFORMATION SHEET 2.5.6


5.6 Use basic functions of a www- browser to locate information

Bookmark

1. When referring to an Internet browser,


a bookmark or electronic bookmark is a
method of saving a web page's address.
While using most browsers, pressing Ctrl +
D will bookmark the page you are viewing.
Users running Microsoft Internet Explorercan
think of a bookmark as a favorite, which is
what Microsoft uses to describe a bookmark.

2. When referring to the Internet and HTML,


a bookmark link or anchor is a clickableobject that moves to a certain spot on a web
page. Bookmark links are comprised if the HTML <a> tag, as well as
the href and id attributes. See our page on how to create links to sections on the same
page (bookmarks) in HTML for further information and examples.

Categories: Movies | Music | News | Shopping | Productivity | Learning | Social |Search |


Online Privacy | Browsing | Finance | Books | Software | Files

Movies

News

Shopping

Productivity

Learni
ng

Music

Spotify

Reddit

Ebay

Gmail

TED

Pandora

Google

CraigsList

Amazon Prime
Instant Video

AlJezeera

Etsy

Microsoft On
Line

KHAN
Academy

HackerNew
s

New Egg

Rotten
Tomatoes

Think Greek

LiveStation

Task Sheet 2.5.6

1. Explore the following web browser

SoundClo
ud
iTunes

Coursera

LastFM

DouLingo

Youtube

1. Assign each student a bookmark and let him/her classify the chosen
bookmark

Performance Task 2.5.6


Bookmark related activity
1.
2.
3.
4.

Creating Internet favorites or bookmarks.


Drag your favorite page to your bookmarks bar.
Print desired bookmarks.
Submit hardcopy.

Bookmark
Title, author,
genre, and
your name
Enter
description

Outstanding Good

Satisfactory

Needs
Improvement

Unsatisfactory

Brief
description of
bookmark
Grammar and
spelling
Overall
appearance

Assessment Method:
Hands on, Internet related activity
Performance Criteria Checklist

Information Sheet 2.6.1

LESSON 2:

LO 6. Maintain computer equipment and systems

6.1 Implement basic file maintenance procedures in line with the standards operating
procedures

Focus: Computer maintenance


GUIDE QUESTIONS:
Why are file systems?
Why do we need to understand the different file systems?
In computing, a file system (or filesystem) is used to control how data is stored and retrieved. Without a file
system, information placed in a storage area would be one large body of data with no way to tell where one piece
of information stops and the next begins. By separating the data into pieces and giving each piece a name, the
information is easily isolated and identified. Taking its name from the way paper-based information systems are
named, each group of data is called a "file". The structure and logic rules used to manage the groups of
information and their names is called a "file system".

Different File System

FAT File System


FAT stands for "File Allocation Table" . The file allocation table is used by the
operating system to locate files on a disk. A file may be divided into many sections and
scattered around the disk due to fragmentation. FAT keeps track of all pieces of a file. In
DOS systems, FAT is stored after boot sector. The file system has been used since the
advent of PC.

Features of FAT File System


Some important features of the FAT File System are as follows.

Naming convention
FAT file system used by MS-DOS provides file name of only 8 characters long.
FAT file system used by Windows 2000 supports long file name. The full path of file

including filename can be up to 255 characters long.


File names can contain any character except / \ [] = , ^ ?a
File names should begin with alphanumeric characters.
File names can contain spaces and multiple periods. The characters after the last
period are treated as file extension.

Security
FAT does not support local and folder security. A user logged on a computer locally has
full access to the files and folders in FAT partitions of the computer.

Quick Access to files


FAT provides quick access to files. The speed of file access depends on file type, file size,
partition size, fragmentation and number of files in a folder.

FAT32 File System


FAT32 is an advanced version of FAT file system. It can be used on drives from 512 MB to
2TB in size. One of the most important features of FAT and FAT32 is that they offer
compatibility with operating systems other than Windows 2000 also.

Features of FAT32 File System


FAT32 has the following features.

Partition size
FAT32 increases the number of bits used to address cluster. A cluster is a set of sectors.
It reduces the size of each cluster. It supports larger disk (up to 2TB) and better storage
efficiency.

Access Speed
FAT32 provides good file access in partition sizes less than 500 MB or greater than 2 GB.
It provides better disk space utilization.

NTFS File System


NTFS stands for "New Technology File System".Windows 2000 professional fully
supports NTFS. It has the following characteristics.

Features of NTFS File System


The following are some of the main features of NTFS File System.

Naming Conventions
File names can be up to 255 characters
File names can contain most characters except / \ * | :
File names are not case sensitive

Security
NTFS provides file and folder security. Files and folders are safer than FAT. Security is
maintained by assigning NTFS permissions to files and folders. Security is maintained at
the local level and the network level. The permissions can be assigned to individual files
and folders. Each file or folder in an NTFS partition has an Access Control List. It contains
the users and group security identifier (SID) and the privileges granted to them.

Partition Size
The NTFS partition and file sizes are much bigger than FAT partitions and files. The
maximum size of an NTFS partition or file can be 16 Exabyte. However, the practical
limitation is two Terabytes. The file size can be in the range of 4GB to 64GB.

File compression
NTFS provides file compression of as much as 50%.

High reliability
NTFS is highly reliable. It is recoverable file system. It uses transaction logs to update the
file and folders logs automatically. The system also has a great amount of fault tolerance.
It means that if transaction fails due to power or system failure, the logged transactions
are used to recover the data.

Bad cluster Mapping


NTFS supports bad-cluster mapping. It means that file system detects bad clusters or
areas of disk with errors. If there is any data in those clusters, it is retrieved and stored
on another area. The bad clusters are marked to prevent data storage in those areas in
futre.

PERFORMING DISK CHECK


1. THE chkdsk command

-press windows key logo type in cmd and run as administrator


-in cmd, type chkdsk(space)drive letter of the disk you want to check: /r or /f
-wait windows to finish the work
2. THE sfc/runnow command

-press windows key logo type in cmd and run as administrator


-in cmd, type sfc/scannow
-wait windows to finish the work
PERFORMING CLEAN DISK COMMAND
1. You can let windows detect unwanted files by:
-pressing windows key logo then type disk cleanup
-wait for windows to detect files which are okay to delete
-tick the folders or file group you wanted to delete

Task Sheet 6.2


Instruction: Complete the matrix below by writing the similarities and differences
of NTFS and FAT file systems.
SIMILARITIES

DIFFERENCES

Criteria

OUTPUT

RATE

Cited 6 and above similarities and differences

15

Cited 4-5 similarities and differences

12

Cited 3 and below similarities and differences

10
0

No output

Performance Task 6.2

Instructions: With Bandicam recording the desktop activities:


1. Perform the check disk command
2. Perform the System File Checker

3. Perform disk clean up

OUTPUT

Performed tasks
accurately/precisely
Performed tasks
within the time
limit
Performed tasks
independently

Information Sheet 2.6.2

LESSON 2:

LO 6. Maintain computer equipment and systems

6.2 Implement basic file maintenance procedures in line with the standards operating
procedures

Focus: File maintenance


Why is backing up data important?
Backing data is important for one to be prepared in case of data loss or system failures which leads to
data corruption.

Back up refers to a data copy stored in a strategic/secure storage or drive for future use.
Backing up refers to the copying and archiving of computer data so it may be used to restore the original after
a data loss event. The verb form is to back up in two words, whereas the noun is backup.
Unwanted files are wastes, unwanted or undesired wastes, litters or trashes (computing), a way in which operating
systems dispose of unwanted files
Update/Patch is a piece of software designed to update a computer program or its supporting data, to fix or improve

it.[1] This includes fixing security vulnerabilities[1] and other bugs, with such patches usually called bugfixes or bug
fixes,[2] and improving the usability or performance. Although meant to fix problems, poorly designed patches can
sometimes introduce new problems (see software regressions). In some special cases updates may knowingly
break the functionality, for instance, by removing components for which the update provider is no longer licensed or
disabling a device.
Updating is the process of injecting fixes of computer programs or software to address bugs or errors.

HOW TO BACK UP FILES IN WINDOWS 7

There are several ways how to backup files in windows 7. Below are some of them.
1.

Select the Start button, then select Control Panel > System and Maintenance > Backup and Restore.

2.

Do one of the following:

If you've never used Windows Backup before, or recently upgraded your version of Windows, selectSet
up backup, and then follow the steps in the wizard.

If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you
can manually create a new backup by selecting Back up now.

If youve created a backup before, but want to make a new, full backup rather than updating the old
one, select Create new, full backup, and then follow the steps in the wizard.

Note
Do not back up files to the same hard disk that Windows is installed on. For example, do not back up files to a
recovery partition. Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place
to prevent unauthorized people from having access to your files; a fireproof location separate from your
computer is recommended. You might also consider encrypting the data on your backup.

To make a system image

System images contain all of the info on your PC at a particular state


1.

Right-click the Start button, then select Control Panel > System and
Maintenance > Backup and Restore.

2.

In the left pane, choose Create a system image, and then follow the steps in the
wizard.
If you're prompted for an administrator password or confirmation, type the password or
provide confirmation.

Note
To create a system image of a drive, it must be formatted to use the NTFS file system. If you save the
system image on a hard drive or USB flash drive, it must be formatted to use the NTFS file system.

Keeping different versions of system images


You can keep several versions of system images. On internal and external hard drives, older
system images will be deleted when the drive runs out of space. To help conserve disk
space, delete older system images.

If you're saving your system images in a network location, you can only keep the most
current system image for each computer. System images are saved in the format of
drive\WindowsImageBackup\computer name\. If you have an existing system image for a
computer and are creating a new one for the same computer, the new system image will
overwrite the existing one.

If you want to keep the existing system image, you can copy it to a different location before
creating the new system image by following these steps.

1.

Navigate to the location of the system image.

2.

Copy the WindowsImageBackup folder to a new location.

Create a restore point


You can use a restore point to restore your computer's system files to an earlier point in
time. Restore points are automatically created each week by System Restore and
when your PC detects change, like when you install an app or driver.
Here's how to create a restore point.
1.

Right-click the Start button, then select Control Panel > System and
Maintenance > System.

2.

In the left pane, select System protection.

3.

Select the System Protection tab, and then select Create.

4.

In the System Protection dialog box, type a description, and then select Create.
Restore

1.

Right-click the Start button, then select Control Panel > System and
Maintenance > Backup and Restore.

2.

Do one of the following:

To restore your files, choose Restore my files.

To restore the files of all users, choose Restore all users' files.

3.

Do one of the following:

To look through the contents of the backup, select Browse for files or Browse
for folders. When you're browsing for folders, you won't be able to see the individual files in
a folder. To view individual files, use the Browse for files option.

To search the contents of the backup, select Search, type all or part of a file
name, and then selectSearch.

Tips
If you're searching for files or folders associated with a specific user account, you can improve search
results by typing the location of the file or folder in the Search for box. For example, to search for all JPG
files that were backed up, typeJPG in the Search for box. To only search for JPG files associated with the
user Bill, type C:\Users\Bill\JPG in the Search for box.
You can use wildcard characters such as *.jpg to search for all JPG files that were backed up.

Restore a backup made on another computer


You can restore files from a backup that was created on another computer running Windows
Vista or Windows 7.
1.

Select the Start button, then select Control Panel > System and Maintenance
> Backup and Restore.

2.

Choose Select another backup to restore files from, and then follow the steps in
the wizard.
If you're prompted for an administrator password or confirmation, type the password or
provide confirmation.

Find files that were restored from a backup made on another computer
If you're restoring files from a backup that was made on another computer, the files will be
restored in a folder under the user name that was used to create the backup. If the user
names are different, you'll need to navigate to the folder where the files are restored. For
example, if your user name was Molly on the computer that the backup was made on but
your user name is MollyC on the computer that the backup is being restored on, the
restored files will be saved in a folder labeled Molly.
You can find the restored files by following these steps.
1.

Select the Start button, then select Computer.

2.

Double-click the icon of the drive that the files are saved on, for example C:\.

3.

Double-click the Users folder. You will see a folder for each user account.

4.

Double-click the folder for the user name that was used to create the backup. The
restored files will be in the various folders based on where they were located originally.

Restore files from a file backup after restoring your computer from a system image
backup
After you restore your computer from a system image backup, there may be
newer versions of some of your files in a file backup that you want to
restore.
To restore files from a file backup that was created after the system image
backup was created, follow these steps.
1.

Select the Start button, then select Control Panel > System and
Maintenance >Backup and Restore.
2.
Choose Select another backup to restore files from.

If you're prompted for an administrator password or confirmation, type the password or


provide confirmation.
3.

In Backup Period, select the date range of the backup that contains the files that you
want to restore, and then follow the steps in the wizard.

Task Sheet 6.2


Instruction: Given the hand out, complete the matrix with respect to the titles/tasks
cited.

STEPS

MAKING BACK
UP

CREATING
SYSTEM
IMAGE

CREATING
RESTORE
POINT

RESTORING
DATA(via
Restore Point)

1
2
3
4
5
6
7
8

Performance Task 6.2


Instructions: With Bandicam recording the desktop activities:
1. Create backup of desired folder in partition D;
2. Create a restore point naming it to your liking, and;
3. Create system image
Performance Criteria
OUTPUT
Performed tasks
accurately/precisely
Performed tasks
within the time
limit
Performed tasks
independently

Anda mungkin juga menyukai