Activity 1.1.1
Store
Store
1.
2.
3.
4.
5.
Points
5(5)
4-3(3)
15(10)
14-8(7)
15(10)
14-8(7)
10
Get involved1.1.1
Directions: You are the computer technician in your area. One day, your neighbor ask you to
repair his personal computer. After, your thorough examination of his computer unit you found
out that the mouse and keyboard of his PC needs replacement. Likewise, as a technician you
have to convinced him to buy the defective peripherals thus, you prepare a canvass of the price,
specs/features and even list the name of the stores and its location/address where to buy the
product using Microsoft Excel. (Note: Browse the internet in finding possible store selling the item
and use the given table as your sample template in Microsoft Excel).
Store Number 1
Name of Store:
1. Mouse
Specificati
on
Unit
Cost
2.
Specificati
Keyboard
on
Unit
Cost
Location:
Brand
Brand
Store Number 2
Name of Store:
1. Mouse
Specificati
on
Unit
Location:
Brand
Cost
2.
Keyboard
Unit
Cost
Specificati
on
Brand
Store Number 3
Name of Store:
1. Mouse
Specificati
on
Unit
Cost
2.
Specificati
Keyboard
on
Unit
Cost
Location:
Brand
Brand
Point System
Incomplete
Complete
(Lacking 1
store
information
)
3
3
3
3
3
3
3
7
4
4
4
4
5
4
5
10
Figure 1.1.2
2. Quotation
3. Delivery note
This is used to record any unused materials which are returned to stores.
Activity 1.1.2
Directions: Match column A with Column B and write your answer on a separate
sheet of paper.
Column A
1. Goods received note
3. Materials Requisition
Note
4. Quotation
6. Supplier
7.Delivery Note
8. Document
9. Inventory Form
Column B
A form that records the transfer of material from one
accounting code to another
a commercial document and first official offer issued
by a buyer to a seller, indicating types, quantities,
and agreed prices for products or services.
A document that accompanies a goods shipment and
lists details about the goods delivered
A person or entity that is the source for goods or
services
A detailed, itemized list, report, or record of things in
one's possession, especially a periodic survey of all
goods and materials in stock
A written, drawn, presented or recorded
representation of thoughts
A record of the cost of materials acquired, the cost of
materials issued and the cost of the inventory
A record any unused materials which are returned to
stores
A receipt given to the supplier to confirm delivery or
acceptance of goods by the customer
A lists the items to be picked from inventory and
used in the production process or in the provision of
a service to a customer, usually for a specific job
I
A
J
G
H
6. D
7. C
8. F
9. E
10. B
Points
54
54
54
54
54
54
3
3
3
3
3
3
2
2
2
2
2
2
1
1
1
1
1
1
Get involved1.1.2
Directions: You are the computer technician in a certain company. One day, your Manager wants
you to prepare an inventory of all the issued tools and equipment in your area using LibreOffice
as shown in the give figure below. Moreover, your manager gave you only an hour to complete
the assigned job. (Note: Read the Tags attached of the tools/equipment to determine the history
of inventory).
Inventory Form Sample
Counted Sheet Number:
Item Number
Item Description
Location
Date of Inventory:
Quantity
Remarks
Performed
Have listed at least 10 tools/equipment
Have written the correct item number of each tools/equipment
Have
Have
Have
Have
Quality
Checker
Condition
Activity 1.1.3
Directions: Sequence the steps in receiving materials. Write your answer on a
separate sheet of paper.
_______ Match the packing slip to the items received and ensures that the materials are
destined on tour department.
_______That you are receiving the materials indicated on the purchase order with regard
to quantity and discount.
_______That the materials are in acceptable condition.
_______That terms regarding installation and/ or set-up of equipment are met.
Quality
Checker
Have
Have
Have
Have
Have
Have
5
5
5
5
5
5
Get involved1.1.3
Directions: Directions: You are assigned to be the Quality checker for the Month of July. Make a
Log Report using the following data below. Make sure you will record all the items listed and if
they were in good condition or not. Write your answer on a sheet of paper.
Assessment of Materials Received
Quality Checker:
Item Number
Date:
Total Number in Good
Condition
Comments
Points
10
Have
Have
Have
Have
Have
10
10
10
5
10
Record and/or report defects and any identified causes to the supervisor concerned in accordance with workplace
procedures
OHS or Occupational Health and Safety refers to the legislation, policies, procedures and activities that
aim to protect the health, safety and welfare of all people at the workplace.
1.
Do not work alone so that there's someone who can take care of you in case of emergency.
2.
Always power off the computer and unplug the computer before working on it.
3.
Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
4.
5.
Always ground or discharge yourself before touching any part of the computer.
6.
Do not use excessive force if things don't quite slip into place.
7.
Clean the area before and after using it to maintain sanitation and prevent accidents.
8.
Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
9.
10.
Make sure that the pins are properly aligned when connecting a cable connector.
11.
Contingency measures during workplace accidents, fire and other emergencies are
recognized.
12.
Source: http://www.the12list.com/2014/06/12-ohs-procedures-for-computer-hardware.html
Task Sheet
Activity: Show scenarios or pictures having errors and let them identify the error based on the
OHS in the laboratory given to them.
1.
Working alone
3.
True or False:
___F___ 1. Working while the computer is on
Liquid in the working Area
is safe.
___T___ 2. Do not work alone so that there is
someone to help you.
2.
Tools3.damaging
the laptop
___F___
Leaving your
tools after working is
fine.
___F___ 4. Use excessive force while in
installing hardware parts is always advisable.
___T___ 5. Holding the components on the
edge to not touch the IC is okay.
Title
Performance Objective:
Record and/ or report defects and any identified causes/hazards in accordance with workplace
procedures
Steps/Procedure:
1. The teacher will set up hazards in the lab and let the students identify it.
2. The teacher will call student/s to share ideas/s about the topic (summarize)
3. The teacher will group the class, each will present ideas/learning (relevant)
to the topic (Guide questions will be flash on the screen)
* What hazards do you see?
*how can you correct these hazards?
*How can we make our workplace safe?
Assessment Method
: Oral Questioning
Rubric for Skit
Criteria
Cooperation
Presentatio
n
weight
Task Description:
30%
30%
Exceptional
Admirable
Acceptable
Attempted
Accepts ideas
of others; able
to compromise
All members
contribute
Accepts most
ideas without
negative
comments;
able to
compromise
Some
members
contribute
Unwilling to
compromise
Few
members
contribute
Group does
not work
together
One person
does all the
work
Shows
confidence
Informative
Entertaining;
engages
audience
Speaks loudly
and clearly
Appropriate
use of body
language
Shows some
confidence
Presents
some
information
Engages
audience
Can be heard
Some use of
body
language
Unsure of
responsibility
Somewhat
informative
Engages
audience
intermittently
Hard to hear
Some
movement
Portrayal
stalls
Lacks
information
Audience
bored
Mumbles
Body
language is
lacking;
inappropriate
Beyond/Bonus ______________
Final Score
2.
Appreciate the importance of using documents relative to quality within the prescribed standard
3.
4.
Concepts:
1. A document is
piece of written, printed or electronic matter that provides information or evidence or that serves as
an official record. In general, a document (noun) is a record or the capturing of some event or thing so that the
information will not be lost. Usually, a document is written, but a document can also be made with pictures and sound.
A document usually adheres to some convention based on similar or previous documents or specified requirements.
Examples of documents are sales invoices, wills and deeds, newspaper issues, individual newspaper stories, oral
history recordings, executive orders, and product specifications.
a form of information . A document can be put into an electronic form and stored in a computer as one or more file s.
Often a single document becomes a single file. An entire document or individual parts may be treated as
individual data items. As files or data, a document may be part of a database . Electronic Document Management
( EDM ) deals with the management of electronically-stored documents. When using certain computer application
programs such as a word processor , a document is the unit of saved work. Each document is saved as a uniquely
named file.
In the computer industry, documentation is the information provided to a customer or other users about a product or
the process of preparing it.
To document (verb) a fact, event, or other thing is to record or annotate it, meaning to put it into some relatively
permanent form so that it can be retrieved later.
Service manuals - An owner's manual (also called an instruction manual) is an instructional book or
booklet that is supplied with almost all technologically advanced consumer products such as vehicles,
home appliances and computer peripherals.
b.
Operations manual / Manufacturers instruction manual - The operations manual is the authoritative
guidebook of how things are done in your business. It gives you an effective way of communicating
policy and procedures, and gives your employees the independence and security they need
to operate in their jobs for maximum results.
c.
d.
Type approval certification - is granted to a product that meets a minimum set of regulatory, technical
and safety requirements. Generally, type approval is required before a product is allowed to be sold in
a particular country, so the requirements for a given product will vary around the world.
e.
Organization work procedures A set of policies are principles, rules, and guidelines formulated or
adopted
by
typically published in
a booklet or
other form that is widely accessible. Policies and procedures are designed to influence and determine
all major decisions and actions, and all activities take place within the boundaries set by them.
Procedures are the specific methods employed to express policies in action in day-to-day operations of
the organization. Together, policies and procedures ensure that a point of view held by the governing
body of an organization is translated into steps that result in an outcome compatible with that view.
f.
g.
Forms - is piece of written, printed or electronic matter that provides information or evidence or that
serves as an official record and to be fill in or accomplish.
Manuals
1.
2.
Look for specific sections detailing the type of service or repair you are
going to perform.
3.
4.
Look in the Index for key words or phrases related to the specific task you
intend to perform if it is not covered in the Table of Contents.
5.
Read the section which describes the task you are undertaking before you
actually start.
6.
7.
Look
for
references
to
specific
tools,
gauges,
or
other
specialized
Try using other, "outside" resources mentioned in the manual for repairs or
problems that the maintenance manual does not thoroughly cover.
9.
10. Follow instructions carefully when performing any maintenance until you
are familiar with the procedure.
11. Put a tab or bookmark on pages that you refer to frequently.
o
Tips
Make sure you pre-read the manual before doing the actual work.
If you need to, highlight sections that may be critical (such as safety issues).
Be careful to use the correct measurements and sizes. SAE and metric units can appear similar
in text but are often radically different.
Make sure all tools you have used are accounted for when you're done. Leaving a tool in the
Tips
Wear appropriate safety equipment when performing maintenance, including eye and hearing
protection, gloves, and respirator.
References:
o
http://whatis.techtarget.com/definition/document
https://en.wikipedia.org/wiki/Owner%27s_manual
https://en.wikipedia.org/wiki/Certification
https://en.wikipedia.org/wiki/Type_approval
http://www.businessdictionary.com/definition/policies-and-procedures.html#ixzz4EyNhazRk
Title
Standard
Performance Objective : *Define the term document
*Identify related documents
*Use documents/documentation relative to quality standards
Supplies/Materials
Equipment
Steps/Procedure
:
1. The teacher will call student/s to share ideas/s about the topic (summarize)
2. The teacher will group the class, each will present ideas/learning (relevant)
to the topic (Guide questions will be flash on the screen)
* What is a document?
*What are some related documents? and describe each
*How to use the related documents relative to quality standards?
*What is the importance of using documents/documentation relative
to quality within the prescribed standard
Assessment Method
Conclusion:
Standard
Performance Objective : Able to explain the concept of documentation relative to quality within the
prescribed standard through role play
Supplies/Materials
Equipment
Steps/Procedure
Assessment Method
Criteria
Understanding
of Topic
Cooperation
Presentatio
n
weight
40%
30%
30%
Exceptional
Admirable
Acceptable
Attempted
Factual
information is
accurate
Indicates a
clear understanding
of topic
Factual
information is
mostly accurate
Good
understanding of
topic
Factual
information is
somewhat accurate
Fair
understanding of
topic
Information is
inaccurate
Presentation is off
topic
Accepts ideas of
others; able to
compromise
All members
contribute
Unwilling to
compromise
Few members
contribute
Shows confidence
Informative
Entertaining;
engages audience
Speaks loudly and
clearly
Appropriate use of
body language
Shows some
confidence
Presents some
information
Engages audience
Can be heard
Some use of body
language
Unsure of
responsibility
Somewhat
informative
Engages audience
intermittently
Hard to hear
Some movement
Portrayal stalls
Lacks information
Audience bored
Mumbles
Body language is
lacking;
inappropriate
SELF-ASSESSMENT
Test I. Write QN if the statement affects the quantity of work and QL if the statement affects the
quality of work. Write your answer on the space provided before each number.
(Do this Individually)
______ 1. Poor scheduling of work
______ 2. Failure to meet expectations for product quality, cost or service
______ 3. Customer/client dissatisfaction
______
______
______
______
______
______
4.
5.
6.
7.
8.
9.
Test II. Cite two (2) examples for work behaviour given that can cause performance
problem.
1. Inappropriate behaviour.
2. Resistance to change.
3. Inappropriate interpersonal relations.
4. Inappropriate physical behaviour.
QN
QL
QL
QN
QN
QN
QN
QL
QL
Test II.
1.
2.
3.
4.
C. Return of Merchandise
When merchandise is received which is incomplete or defective, the supervisor will return
the materials to the supplier or to the store where it was bought and make arrangements with
the vendor for replacement.
The quality of a product or service refers to the perception of the degree to which the
product or service meets the customer's expectations. Quality has no specific meaning
unless related to a specific function and/or object. Quality is a perceptual, conditional
and somewhat subjective attribute.
The dimensions of quality refer to the attributes that quality achieves in Operations
Management:
Quality <-> Dependability <-> Speed <-> Flexibility <-> Cost
quality.
that all the asset files listed in the product specification document have been produced;
that files are correctly named;
that files are the correct byte size or near the projected file
(examining the file-sizes in a directory listing can be helpful
identifying problem files which are either much too large or
too small);
size
in
much
that files are the correct resolution (screen-size and bitthe case of graphics; duration, sampling frequency and bitthe case of sound files);
depth in
depth in
that the quality of files displaying on the target monitor or heard on target listening
equipment is acceptable.
Title:
condition.
Classify tools and testing devices using a check sheet to determine their
Performance Objective: Provided with the needed tools, testing devices and materials
in improving quality processes, classify them using a check sheet to determine their condition
Supplies/Materials
Equipment
Steps/Procedure:
Assessment Method:
Accomplish Check Sheet
Provided with the needed tools, testing devices and materials in improving quality
processes, classify them using a check sheet to determine their condition.
CONDITION
Tools
1.
2
3
Testing devices
1.
2
3
Materials
1.
2.
Good
Defective
3.
Title:
Performance Objective :
Given some inputs/lectures on PDCA, form
groups and certain situations where PDCA cycle is
observable
Supplies/Materials
Equipment
Steps/Procedure:
Assessment Method:
CRITERIA
Ye
s
NO
Organization of the
Role play clearly describes PDCA
Participation of every character
CHECK SHEETS
Check sheets help organize data by category. They show how many times each
particular value occurs, and their information is increasingly helpful as more data are
collected. More than 50 observations should be available to be charted for this tool to be
really useful. Check sheets minimize clerical work since the operator merely adds a mark
to the tally on the prepared sheet rather than writing out a figure (Figure 3). By showing
the frequency of a particular defect (e.g., in a molded part) and how often it occurs in a
specific location, check sheets help operators spot problems. The check sheet example
shows a list of molded part defects on a production line covering a week's time. One can
easily see where to set priorities based on results shown on this check sheet. Assuming
the production flow is the same on each day, the part with the largest number of defects
carries the highest priority for correction.
track
Figure-3. Because it clearly organizes data, a check sheet is the easiest way to
information.
PARETO DIAGRAMS
The Pareto diagram is named after Vilfredo Pareto, a 19th-century Italian
economist. are caused by 20% of the potential sources.
A Pareto diagram puts data in a hierarchical
order (Figure 4), which allows the most significant
problems to be corrected first. The Pareto
analysis technique is used primarily to identify
and evaluate nonconformities, although it can
summarize all types of data. It is perhaps the
diagram most often used in management
presentations.
To create a Pareto diagram, the operator collects
random data, regroups the categories in order of
frequency, and creates a bar graph based on the
results.
diagram
identifies
and
ranks
A fish bone diagram displays all contributing factors and their relationships to the
outcome to identify areas where data should be collected and analyzed. The major areas
of potential causes are shown as the main bones, Later, the subareas are depicted.
Thorough analysis of each cause can eliminate causes one by one, and the most
probable root cause can be selected for corrective action. Quantitative information can
also be used to prioritize means for improvement, whether it be to machine, design, or
operator.
HISTOGRAMS
The histogram plots data in a frequency distribution table. What
distinguishes the histogram from a check sheet is that its data are grouped into rows so
that the identity of individual values is lost. Commonly used to present quality
improvement data, histograms work best with small amounts of data that vary
considerably. When used in process capability studies, histograms can display
specification limits to show what portion of the data does
not meet the specifications.
Figure 6.
histogram
of
the
SCATTER DIAGRAMS
A scatter diagram shows how two
are related and is thus used to test for
effect relationships. It cannot prove that
variable causes the change in the other,
a relationship exists and how strong it
scatter diagram, the horizontal (x) axis
the measurement values of one
and the vertical (y) axis represents the
variables
cause and
one
only that
is. In a
represents
variable,
measurements of the second variable. Figure 7 shows part clearance values on the x-axis
and the corresponding quantitative measurement values on the y-axis.
CONTROL CHARTS
A control chart displays statistically determined upper and
lower limits drawn on either side of a process average.
This chart shows if the collected data are within upper
and lower limits previously determined through statistical
calculations of raw data from earlier trials (Figure 8).
In preparing a control chart, the mean upper control limit
(UCL) and lower control limit (LCL) of an approved process
and its data are calculated. A blank control chart with
mean UCL and LCL with no data points is created; data
points are added as they are statistically calculated from
the raw data.
TASK SHEET 1.3.3
Title:
different chart
JOB
Performance Objective:
Given sample charts, the trainees should be
able to analyze orally charts based on given data.
Supplies/Materials
Equipment
Steps/Procedure:
1. Post charts on Walls or Projector
2. Let students examine relationships of variables on the charts
presented
3. Let them share possible factors affecting the relationships
Assessment Method:
Observations
SHEETS 1.3.3
TEST I.Direction: Write TRUE if the statement is correct and FALSE if it is wrong. Write
your answer in a separate sheet of paper.
Safe working procedure should not identify the tasks which are to
be undertaken.
Quality assurance does not cover all the activities from design and
development, up to documentation.
1
0
The durability of the work does not depend on the skills of those
who install it.
1. Quality
___________________________________________________
___________________________________________________
___________________________________________________
2. Flow Chart
___________________________________________________
___________________________________________________
___________________________________________________
PRE-TEST/POST-TEST
1. TRUE
2. FALSE
3. TRUE
4. TRUE
5. FALSE
6. TRUE
7. FALSE
8. TRUE
9. FALSE
10.FALSE
3. Check Sheet
___________________________________________________
___________________________________________________
___________________________________________________
4. Pareto Diagram
___________________________________________________
___________________________________________________
___________________________________________________
TEST 1
1.TRUE
2.FALSE
3.TRUE
4.TRUE
5.FALSE
6.TRUE
TEST II.
1. Quality is the characteristics of a product that bear on its ability to satisfy or implied
needs.
2. Flowchart describes a process by graphically displaying the steps in proper sequence.
3. Check Sheet helps organize data by category.
4. Pareto Diagram puts data in hierarchical order which allows the most significant problems
to be corrected first.
PRE-TEST/POST-TEST
11.TRUE
12.FALSE
13.TRUE
14.TRUE
15.FALSE
16.TRUE
17.FALSE
18.TRUE
19.FALSE
20.FALSE
Date
Received
O.R. #
Item
Name
Quantity
Signature
Quality
Checker
that files are the correct byte size or near the projected file size (examining the
file-sizes in a directory listing can be helpful in identifying problem files which are
either much too large or much too small);
that files are the correct resolution (screen-size and bit-depth in the case of
graphics; duration, sampling frequency and bit-depth in the case of sound files);
that the quality of files displaying on the target monitor or heard on target listening
equipment is acceptable.
Methodology
The teacher will be the assessor. You and other students will be
randomly assigned: 1.) one will act as Quality Checker; 2.) others will be
responsible for monitoring and coordinating the checking arrangements
and;
3.)
others
must
generate
reports
when
receiving
the
equipments/materials.
The Quality checker will record the date of receipt, name of materials
purchased, quantity, and official receipt number, signature of the person
who received the materials and signed his name afterwards. The Quality
Date:
Total no. in
Item Name
Good
Condition
Total no.
of Errors
Comments
Lesson 2 LO 1: Plan and prepared for the Task undertaken: Follow the client specific guidelines and
procedures.
Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and
activities that aim to protect the health, safety and welfare of all people at the workplace.
Every worker has a right to healthy and safe work and to a work environment that enables
them to live a socially and economically productive life. Safety practices should be learned early
and always adhered to when working with any electrical device including personal computers
and peripherals.
Here are some safety precautions to take before working with any computer devices:
Before doing anything, listen to your teachers instruction to prevent accidents or any
unwanted events that may occur on your workplace.
Do not work on computer when you are wet because you might get electrocuted.
Do not remove internal devices of the computer when it is turned on.
Be sure not to mix electronic components and water.
Avoid playing or running while inside the room.
Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole,
anti-static wrist strap, etc.
Ask for assistance from your teacher when it comes on dealing with computer devices.
Applying safety measure when handling tools and equipment are necessary to avoid
certain damages.
The student is further expected to maintain good health, to be neat in personal appearance
and to practice safe working procedures at all time with appropriate equipment.
In the school as a computer teacher you must be aware of how your students behave when they are working in the computer
laboratory, as well as implementing a safe way of accomplishing every task. Safety practices should be learned
early and always adhered to when working with any electrical device, including personal computers and peripherals. This
is for the protection of not only the people working with them, but also for the devices themselves. The basis
for this process begins with your Occupational Health and Safety Policies.
Personal Safety While Working Along With PCs Computer equipment can be dangerous, and you or others
can be injured or even killed if you dont follow proper safety guidelines when working along PCs.
The following are some precautionary measures to take before working with any computer equipment:
Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or seriously
injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove all jewelry when working inside any computer related equipment.
It refers to protective clothing, helmets, goggles, or other gear designed to protect the wearer's body or clothing from injury by
electrical hazards, heat, chemicals, and infection, for job-related occupational safety and health purposes. PPE can also be
used to protect the working environment from pesticide application, pollution or infection from the worker (for example in a
microchip factory). Students even teacher during their laboratory period should require to use of personal protective
equipment. Some of these are:
SafetyandAntiStaticRules
Whenpossible,trytoavoidworkingincarpetedareas.Carpetinggreatlyincreasesstaticbuildupwithinyour
body.
Alwaysuseanantistaticwriststrapwhenworkingonacomputer(exceptwhenworkingonmonitors
AlwaysdisconnectacomputerfromtheACpowerandfromanypoweredperipheralswhileyouareworkingon
it.
Alwaysgraspametalpartofthecomputerchassiswithyourbarehandbeforeyoutouchanythinginside.Dothis
evenifyouarewearinganantistaticwristband.
Alwayshandleelectroniccomponentsbyanonconducting(nonmetallic)edge.Don'ttouchthepinsorother
connectors.
NeverpluganATXpowersupplyintoACpowerunlessitisconnectedeithertoacomputer'smotherboardortoa
dummytestload.
AlwaysuseaULapprovedsurgeprotectororanUninterruptiblePowerSupplythatincorporatessurgeandspike
protection.
Nevereat,drink,orsmokewhileworkingonacomputer.
1.
2.
3.
ACTIVITYSHEET21.4
Directions:
Theclasswillbedividedintofivegroups.Eachgrouphastheirownrespectiveleader.
Thegroupwillprepareaskitregardingpersonalprotectiveequipment.Aftertheactivitythey
willbegradedthruthegivenPerformanceScoreCardbelow:
PERFORMANCESCORECARD
Score
1
ExcellentlyPerformed
VerySatisfactorilyPerformed
SatisfactorilyPerformed
FairlyPerformed
PoorlyPerformed
INFORMATION SHEET
LESSON 2: PERFORMING COMPUTER OPERATIONS (PCO)
1.1: Determine requirements of task in accordance with the required output.
OCCUPATIONAL HEALTH AND SAFETY PROCEDURE (OHSP)
TASK SHEET
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify whether each
statement is true or false. Gather picture evidences that make it true or false. On the
third column, show the effects of not following the safety precautions through a picture
presentation.
Example:
Turn off the power and unplug equipment before opening the case and performing
service.
Answer
Picture Presentation
Evidence
Effect
True
TRUE OR
FALSE
1. A safe workplace is
EVIDENCE
Effect
2.
3.
4.
5.
6.
PERFORMANCE SHEET
Research and Investigate
Directions: Form a group of five members and research on the different safety
precautions used in computer laboratory. Interview/Observe a practitioner while lending
a quality service in computer hardware servicing. Use a video camera to record the
event stressing the safety guidelines and procedures in the laboratory. You will be rated
according to the following rubrics:
Video Documentation of Computer Laboratory Safety Precautions
Criteria
Poor (70-75)
Content/Informa
tion (50%)
The provided
information was
not necessary or
not sufficient to
the computer
laboratory safety
precautions.
Technically
sound
information
Coherence of
information
Quality of Video
(30%)
Clarity and
cohesiveness of
the video
Organization
and coherence
of ideas
Interview on
practitioner
(20%)
Excellent
(86- 100)
The provided
The provided
information was, information was
for the most part, necessary and
necessary and
sufficient to the
sufficient to the
computer
computer
laboratory
laboratory safety safety
precautions.
precautions.
Good (76-85)
It lacks clarity
Most part is well
and/or does not
organized, clear
present ideas in a and presents
coherent way.
ideas in a
coherent way.
Questions were
not congruent
with the topic
All of the
questions were
congruent with
Most of the
questions were
congruent with
Congruency of
questions to
the topic
Clarity of
questions
ANSWER KEY
1. A safe workplace is
clean, organized and
well-lit.
2. Before opening the
case and performing
services, one must
unplug the power from
the source.
3. It is a best practice
that a fire extinguisher
and first aid kit be
available in the
workplace.
4. You are allowed to
open the power supply
or a monitor.
5. You can eat inside the
laboratory.
6. You should contact
emergency services
immediately for help.
TRUE OR
FALSE
TRUE
TRUE
TRUE
FALSE
FALSE
TRUE
EVIDENCE
Effect
WHAT IS A COMPUTER?
A computer allows users to store and process information quickly and automatically.
Computers can be generally classified by size and power, although there can be
considerable overlap. Following are descriptions of several different types of computers.
Mainframe computers are large-sized, powerful multi-user computers that can
support concurrent programs. That means, they can perform different actions or
processes at the same time. Mainframe computers can be used by as many as
hundreds or thousands of users at the same time. Large organisations may use a
mainframe computer to execute large-scale processes such as processing the
organisations payroll.
Mini-computers are mid-sized multi-processing computers. Again, they can perform
several actions at the same time and can support from 4 to 200 users simultaneously.
In recent years the distinction between mini-computers and small mainframes has
become blurred. Often the distinction depends upon how the manufacturer wants to
market its machines. Organisations may use a mini-computer for such tasks as
managing the information in a small financial system or maintaining a small database
of information about registrations or applications.
Workstations are powerful, single-user computers. They have the capacity to store
and process large quantities of data, but they are only used by one person at a time.
However, workstations are typically linked together to form a computer network
called a local area network, which means that several people, such as staff in an office,
can communicate with each other and share electronic files and data.
Computer network: A grouping of computers and peripherals connected together by
telecommunications links to enable a group of users to share and exchange information.
Networks are discussed in more detail later in this module.
A workstation is similar to a personal computer but is more powerful and often comes
with a higher-quality monitor. In terms of computing power, workstations lie in
between personal computers and mini-computers. Workstations commonly support
applications that require relatively high-quality graphics capabilities and a lot of
memory, such as desktop publishing, software development and engineering
applications.
Personal computers (PCs), also called microcomputers, are the most popular type of
computer in use today. The PC is a small-sized, relatively inexpensive computer
designed for an individual user. Today, the world of PCs is basically divided between
IBM-compatible and Macintosh-compatible machines, named after the two computer
TASK SHEET
Activity 1
If your office has computers, find out the type or types. Are they mainframe computers,
mini-computers, workstations or personal computers? What processes or actions are
the computers used for? Write a brief description of the types of computers in place and
their main uses. If your office has more than one type of computer, find out why? What
different tasks are the different computers intended to do?
If your office does not have computers, try to contact a colleague or friend who has a
computer and ask him or her what type he or she has and what primary functions it is
used for.
Central processing unit (CPU): The chip or chips at the heart of a computer that enable it to
process data. Also known as a processor.
memory
Memory: An area within a computer system that holds data waiting to be processed.
storage device
input devices : the devices that allow data and instructions to enter a computer (such
as a keyboard, mouse, scanner)
Input: Any resource required for the functioning of a process, in the course of which it will be
transformed into one or more outputs.
output devices: the devices that allow information to be represented (that is, given
out) to the user, such as a display screen or printer)
Output: The product of the transformation of inputs by a process.
Printers, scanners and external disk drives that may be connected to the computer are
also sometimes called peripheral devices.
Peripheral device: Any piece of equipment in a computer system that is not actually inside the
computer itself.
The central processing unit (CPU) is the heart of the computer. It carries out all of the
instructions given in a program, such as a word processing or spreadsheet program.
The CPU consists of one or more chips (another name for integrated circuits).
Chip: A small piece of semi-conducting material (such as silicon) about 1 centimetre ( inch)
square on which an integrated circuit is embedded. An integrated circuit is a number of
electronic components joined together to form a path for electricity. Central processing unit chips
contain the circuits representing the CPU.
A microprocessor is a particular type of chip. The original IBM personal computer used
the Intel 8088 microprocessor. Most of todays microcomputers are designed around a
microprocessor from one of two product families: x86 or Power. The 80286, 80386, and
80486 models that followed were referred to by the last three digits, 286, 386, and 486.
For the next generation, however, Intel broke with tradition and introduced the Pentium
in 1993. In 1997, it introduced the Pentium II to address
multi-media applications, and most recently the Pentium III to address the new
opportunities provided by access to large volumes of information on the world wide
Web. Other manufacturers of chips (such as Cyrix) produce chips of similar power
and capabilities.
CPUs are not all equal. Some process data faster than others. A computer contains a
system clock that emits pulses to establish the timing of all systems operations. The
system clock operates at a speed quite different from a clock that keeps track of the
time of the day. The system clock determines the speed at which the computer can
execute an instruction, and therefore limits the number of instructions the computer
can complete within a specific amount of time. The time to complete an instruction
execution cycle is measured in megahertz (MHz) or millions of cycles per second.
Although some instructions require multiple cycles to complete, the processor speed
should be thought of in terms of the number of instructions the processor can execute
in one second. Today, microprocessor speeds exceed 300 MHz. If all other
specifications are identical, then higher megahertz ratings means faster processing.
When determining what type of computer you are using or considering what type of
computer to acquire, it is important to know that these terms 286, 386, 486, Pentium
refer to the type of processor in the computer. Newer computers will come with
Pentium microprocessors (or the equivalent from other manufacturers); older ones
with microprocessors from the x86 family.
It is important to know the type of processor in your computer. Some newer computer
programs will not run on older processors, and some newer processors are too
sophisticated for older software.
The faster the processor in a computer, the more quickly the computer will perform operations.
The most common type of memory that most users are familiar with is main memory
or RAM (random-access memory).
Random access memory (RAM): An area in the computer system unit that temporarily holds a
users data, operating system instructions and program instructions.
The word main is used to distinguish it from external mass storage devices such as
the hard drive or disk drives. Note that the term mass storage refers to various
techniques and devices for storing large amounts of data; mass storage is distinct from
memory because it retains data even when the computer is turned off. Thus mass
storage is sometimes referred to as auxiliary storage. Following are definitions of
common storage devices:
Magnetic tape: A continuous plastic strip covered with magnetic oxide; the tape is divided into
parallel tracks onto which data may be recorded by selectively magnetising parts of the surface,
or spots, in each of the tracks. The data can then be stored and reused.
TASK SHEET
Activity 2
If your office has a microcomputer, look at the manuals that come with it. Review the
manuals to find out what type of microprocessor is in the computer. Look also at the
computer screen when the computer is turned on to see if information about the
computer is shown there. Then examine two types of software used by your
organisation. What are the minimum requirements for a microprocessor for each type
of software? Does the computer meet the minimum requirements for the software?
Does it exceed the requirements (that is, is the computers microprocessor newer or
more powerful than the software requires)? Again, look in the software manuals for
information, or ask a friend or colleague to help you. Do not remove the back from
the computer or try to unload or reload the software.
examples of input include the words and symbols in a document, numbers for a
calculation, instructions for completing a process, pictures, and so on.
The computer performs useful operations, manipulating the data in many ways.
This manipulation is called processing. Examples of processing include
performing calculations, sorting lists of words or numbers, modifying documents
and pictures according to user instructions, and drawing graphs. A computer
processes data in the CPU.
Process: A systematic series of actions a computer uses
to manipulate data.
The computer stores data. A computer must store data so that it is available for
processing. Most computers have more than one location for storing data (the
hard drive or C:\, and the floppy drive or A:\). The place where the computer
stores the data depends on how the data is being used. The computer puts the data
in one place while it is waiting to be processed and another place when it is not
needed for immediate processing. The storage of data in the computer is called
online storage while the storage of data on computer tapes, diskettes or
CD-ROMs is called offline storage.
UNDERSTANDING COMPUTERS
11
The computer produces output. Computer output is information that has been
produced by a computer. Some examples of computer output include reports,
documents, music, graphs, and pictures. Output can be in several different
formats, such as paper, diskette, or on screen.
A computer receives data as input, processes it, stores it and
then produces output.
Activity 3
Describe, in terms of input, processing and data, the production of a letter using a
computer. What happens first? What happens last?
Over the years, a wide range of programming languages have been developed,
including BASIC, FORTRAN, PASCAL, C++, JAVA, and so on. Each language has
a unique set of words (codes) that it understands and a special syntax for organising
program instructions.
The language the computer actually understands is called machine language, which
comprises numbers only. This language is used by the computer to understand the
programming language and translate the terms into executable instructions. Lying
between programming languages and machine languages are assembly languages.
Assembly languages have the same structure and set of commands as machine
languages but they enable a program to use names instead of numbers.
UNDERSTANDING COMPUTERS
12
Please note: most people who use computers today do not need to worry about
programming, machine, or assembly languages. This is because the software being
used today is written in a highly user-friendly manner and in a way that does not
require knowledge of the computer languages which were used to create and use it.
User friendly: Computer software or hardware that is
simple to set up, run and use.
There are two kinds of software, systems software and applications software.
Systems software includes the operating system and all the utilities that enable the
computer to function. The most important program that runs on a computer is the
operating system. Every general-purpose computer must have an operating system in
order to run other programs. This includes controlling functions such as the
Applications software includes programs that users access to carry out work. They
include applications for the following functions.
Word processing is the most common applications software. The great advantage
of word processing over using a typewriter is that you can make changes without
retyping the entire document. Word processors make it easy to manipulate and
format documents.
Spreadsheets are computer programs that let people electronically create and
manipulate spreadsheets (tables of values arranged in rows and columns with
predefined relationships to each other). Spreadsheets are used for mathematical
calculations such as accounts, budgets, statistics and so on.
Database management applications are computer programs that let people create
and manipulate data in a database. A database is a collection of related
information that can be manipulated and used to sort information, conduct
statistical analyses or generate reports.
Presentation packages and graphics are computer programs that enable users to
create highly stylised images for slide presentations and reports. They can also be
used to produce various types of charts and graphs. Many software applications
include graphics components including: paint programs, desktop publishing
applications and so on.
Communications applications typically include software to enable people to send
faxes and emails and dial into other computers.
Software programs are continually being written or upgraded to undertake certain tasks. As a
result the software can become obsolete quickly.
PERFORMANCE SHEET
LETS DO THIS!
Prepare important information or details of our schools Senior High Schools Course
Offerings.
In the decimal system, commonly used in most countries, each digit represents a value
of 10. For example, the number 103 would break down as follows:
1 x 100 = 100
0 x 10 = 0
3x1=3
103 = 103
In the binary system, each digit position represents a value of 2. Because computers
use the binary system, powers of 2 play an important role. This is why everything in
computers seems to come in 8s (2 to the 3rd power), 64s (2 to the 6th power), 128s (2
to the 7th power), and 256s (2 to the 8th power). Therefore, in the binary system, the
number 103 would break down as follows:
1 x 64 = 64
1 x 32 = 32
0 x 16 = 0
0x8=0
1x4=4
1x2=2
1x1=1
1100111 = 103
The values in a binary system -- the 0s and 1s -- are called binary digits or bits.
Binary digit (bit): A digit within the binary number
system. A bit is the smallest unit of information held in
a computer.
The computers electronic circuits have only two states, on or off, and therefore can
only understand 0s and 1s, which may represent such opposites as on or off, yes or no,
or up or down. This is why all computers use the binary system. In order to make the
bits useful, they are combined into bytes of information.
UNDERSTANDING COMPUTERS
15
Similar to a school bus for school children, a computer data bus picks up a load of
data from one of the components on the main computer board and then transfers the
data to another component on the main computer board. The main circuit board of a
microcomputer is also known as the motherboard. The motherboard is the principal
board that has connectors for attaching devices to the bus. Typically, it contains the
CPU, memory and basic controllers for the system. The data bus is really a series of
electrical circuits that connect the various electrical elements on the main board.
The data are input into the computer and processed in the CPU. They travel along the
bus to be stored in the computers memory. The amount of memory available is
described in bytes of information, referring to the combination of bits representing
characters. The higher the number of bytes the more memory the computer has.
Todays computers hold megabytes or even gigabytes of data. A megabyte is a
unit of one million bytes; a gigabyte is one billion bytes, and a terabyte is one trillion
bytes. If a computer has a memory of 64 megabytes, then it can hold 64 million bytes
of information.
UNDERSTANDING COMPUTERS
16
Data can be stored so that it is readable again only using the software with which it
was created, or it can be stored in other formats, so that it may be transferred or used
by other software programs. There is a standard character code used to store data so
that it may be used by other software programs; this code is called ASCII or American
Standard Code for Information Interchange. The ASCII code assigns a specific
pattern of bits to each character, as described above. Another code that may be found,
especially in IBM-brand mainframe computers, is EBCDIC, or Extended Binary
Coded Decimal Interchange Code. The important point to remember about these
codes is that their main value is to store information so that it is readable by other
computers. By using ASCII or EBCDIC, it is possible for people to retrieve and use
someone elses data using a different type of hardware or software. The main
disadvantage of using ASCII or EBCDIC is that the formatting or other special
qualities of computerised information may be lost.
A hard disk platter is a flat, rigid disk made of aluminium or glass and coated with a
magnetic oxide. A hard disk consists of one or more platters and their read-write
heads. A read-write head is the device that reads the data from the disk platter into the
computer. It also records (or writes) data onto the platters. Hard disk platters in
UNDERSTANDING COMPUTERS
18
Diskettes get another name floppy disk from the thin mylar disk. If one cuts open
the disk casing (not recommended because the disk will be ruined) one would see that
the mylar disk inside is thin and floppy. Diskettes are also called floppies.
Although todays microcomputers typically use 3 inch (about 10 centimetre) disks,
you may still find 5 inch (about 15 centimetre) disks that were popular many years
ago. Finding a disk drive to read 5 inch disks may be very difficult.
Diskettes are generally used for transporting or shipping data files or for making
duplicate copies of data files for back-up purposes. The storage capacity of a diskette
varies but is considerably smaller than that of a hard drive.
Since the 1960s, magnetic tape has been a popular form of mainframe computer
storage.
Magnetic tape: A continuous plastic strip covered with
magnetic oxide; the tape is divided into parallel tracks
onto which data may be recorded by selectively
magnetising parts of the surface, or spots, in each of
the tracks. The data can then be stored and reused.
When IBM introduced its first microcomputer in 1981, the legacy of tape storage
continued in the form of a cassette tape drive, similar to those used for audio
recording and playback. Using tape as a primary storage device, however, instead of a
hard disk is slow and inconvenient because tape requires sequential access rather than
random access.
Sequential access means that data is stored and read as a sequence of bytes along the
length of the tape. To find a file stored on a microcomputer tape storage device, one
has to advance the tape to the appropriate location of the file, then wait for the
computer to slowly read each byte until it finds the beginning of the file. Like an
audio cassette, for example, a user must go through the tape in sequence to find the
part he or she wants.
Microcomputer users quickly abandoned tape storage for the convenience and speed
of random access disk drives. Recently, however, tape storage for microcomputers
has experienced a revival, not as a principal storage device but for making backup
copies of the data stored on hard disks. The data on magnetic storage can be easily
UNDERSTANDING COMPUTERS
19
destroyed, erased, or otherwise lost. Protecting the data on the hard disk is of
particular concern to users because it contains so much data, which could be difficult
and time consuming to reconstruct. This is why backups are so important.
Back up: To copy a computer file or collection of files
to a second medium, usually on a diskette or magnetic
tape, so that the data are safe in case the original file is
damaged or lost. Backups are usually copied to storage
devices that can be removed from the computer and
kept separately from the original.
A tape backup is a copy of the data from a hard disk, stored on magnetic tape and used
to recover lost data. A tape backup is relatively inexpensive and can rescue an
organisation from the overwhelming task of trying to reconstruct lost data.
Backing up electronic data is critical to protecting it from
loss or damage.
For more information on backing up data and
protecting information, see Automating Records
Services and Emergency Planning for Records and
Archives Services.
The most popular types of tape drives for microcomputers also use tape cartridges, but
there are several tape specifications and cartridge sizes. A tape cartridge is a
removable magnetic tape module similar to a sound or video cassette tape. Quarter
inch tape, called QIC, is a tape cartridge that contains inch (approximately
centimetre) wide tape. Depending on tape length, QIC tape capacities range from 340
MB to 2 gigabytes. Digital audio tape, called DAT, was originally an audio recording
format, but is now also used for data storage. The 4mm wide DAT tape format
storage capacity ranges from 2 gigabytes to 12 gigabytes.
In addition to magnetic storage, there is also optical storage.
Optical disk: A storage device that uses reflecting
surfaces and laser technology to read and write data on
a disk. Also known as a laser disk.
With optical storage, data is burned into the storage medium using beams of laser
light. The burns form patterns of small pits in the disk surface to represent data. The
pits on optical media are permanent, so the data cannot be changed. Optical media are
very durable, but they do not provide the flexibility of magnetic media for changing
the data once they are stored.
There are three types of optical disks.
CD-ROMs are the most popular type of optical storage. CD-ROM stands for
Compact Disc Read Only Memory. A computer CD-ROM disk, like its audio
counterpart, contains data that has been stamped on the disk surface as a series of
pits. To read the data on a CD-ROM an optical read head distinguishes the
patterns of pits that represent bytes. CD-ROM disks provide tremendous storage
capacity. CD-ROMs usually come with data already written onto them. These
days most applications software is provided on CD-ROM.
It is now possible for computer users to write data to an optical disk. These are
known as WORM disks, which stands for Write Once Read Many. A single CD
holds up to 680 megabytes, equivalent to over 300,000 pages of text in character
format, and these disks are quite durable. These CDs are know as CD
re-recordable (CD-R). There are other types of WORM disks, although there is no
standard for these.
There is a third type of optical disk which can be erased and use to rewrite new
information. These are sometimes known as EO (erasable optical) disks and
CD-RW (CD rewritable).
Magneto-optical disks combine magnetic disk and CD-ROM technologies. Like
magnetic media they can read and written to and like floppy disks they are removable.
They can store over 200 MB of data, and speed of access to this data is faster than a
floppy but slower than a hard drive. There is no universal standard for these yet.
CD-ROMs and magnet-optical disks are very useful for storing images. These take up
much more storage space than data in character format, such as in word-processed
files.
Activity 6
Are there procedures for backing up data in your organisation? If so, how often are
backups done? What are the data stored on? If the computer stopped working, would
the organisation be able to retrieve the data?
Although documentation usually comes in the form of printed manuals, guide books,
it may also come in electronic form, such as in help screens contained within the
computer software or documentation in data dictionaries and so on. Often,
documentation is created when a specific computer application is used. For example,
if a government office creates a data base of employees in order to administer payroll,
documentation may be created describing how the database was established, what it is
to be used for and what data fields have been created. This documentation can be
critical to understanding the database system, particularly if it is being managed in an
archival environment long after the creators of the system have left.
Documentation should always be retained.
Disposing of documentation can cause problems in the future, particularly if you have
to reload software from the beginning. Documentation can also contain licences for
the legitimate use of the software. Therefore it is critical to protect documentation and
ensure it is readily available.
INFORMATION SHEET 2. 1. 5
Lesson 2 LO 1: Plan and prepared for the Task undertaken: Apply required data security
Purpose
The purpose of this Guideline is to establish a framework for classifying institutional data based on its level of
sensitivity, value and criticality to the University as required by the Universitys Information Security Policy.
Classification of data will aid in determining baseline security controls for the protection of data.
Applies To
This Policy applies to all faculty, staff and third-party Agents of the University as well as any other University
affiliate who is authorized to access Institutional Data. In particular, this Guideline applies to those who are
responsible for classifying and protecting Institutional Data, as defined by the Information Security Roles and
Responsibilities.
Definitions
Confidential Data is a generalized term that typically represents data classified as Restricted, according to the
data classification scheme defined in this Guideline. This term is often used interchangeably with sensitive
data.
A Data Steward is a senior-level employee of the University who oversees the lifecycle of one or more sets of
Institutional Data. See the Information Security Roles and Responsibilities for more information.
Institutional Data is defined as all data owned or licensed by the University.
Non-public Information is defined as any information that is classified as Private or Restricted Information
according to the data classification scheme defined in this Guideline.
Sensitive Data is a generalized term that typically represents data classified as Restricted, according to the data
classification scheme defined in this Guideline. This term is often used interchangeably with confidential data.
Back to Top
Data Classification
Data classification, in the context of information security, is the classification of data based on its level of
sensitivity and the impact to the University should that data be disclosed, altered or destroyed without
authorization. The classification of data helps determine what baseline security controls are appropriate for
safeguarding that data. All institutional data should be classified into one of three sensitivity levels, or
classifications:
A
.
Restricted Data
Data should be classified as Restricted when the unauthorized disclosure, alteration or
destruction of that data could cause a significant level of risk to the University or its affiliates.
Examples of Restricted data include data protected by state or federal privacy regulations
and data protected by confidentiality agreements. The highest level of security controls
should be applied to Restricted data.
B
.
Private Data
Data should be classified as Private when the unauthorized disclosure, alteration or
destruction of that data could result in a moderate level of risk to the University or its
affiliates. By default, all Institutional Data that is not explicitly classified as Restricted or
Public data should be treated as Private data. A reasonable level of security controls should
be applied to Private data.
C
.
Public Data
Data should be classified as Public when the unauthorized disclosure, alteration or
destruction of that data would results in little or no risk to the University and its affiliates.
Examples of Public data include press releases, course information and research
publications. While little or no controls are required to protect the confidentiality of Public
data, some level of control is required to prevent unauthorized modification or destruction of
Public data.
Classification of data should be performed by an appropriate Data Steward. Data Stewards are senior-level
employees of the University who oversee the lifecycle of one or more sets of Institutional Data. See Information
Security Roles and Responsibilities for more information on the Data Steward role and associated
responsibilities.
Back to Top
Data Collections
Data Stewards may wish to assign a single classification to a collection of data that is common in purpose or
function. When classifying a collection of data, the most restrictive classification of any of the individual data
elements should be used. For example, if a data collection consists of a students name, address and social
security number, the data collection should be classified as Restricted even though the students name and
address may be considered Public information.
Back to Top
Reclassification
On a periodic basis, it is important to reevaluate the classification of Institutional Data to ensure the assigned
classification is still appropriate based on changes to legal and contractual obligations as well as changes in the
use of the data or its value to the University. This evaluation should be conducted by the appropriate Data
Steward. Conducting an evaluation on an annual basis is encouraged; however, the Data Steward should
determine what frequency is most appropriate based on available resources. If a Data Steward determines that
the classification of a certain data set has changed, an analysis of security controls should be performed to
determine whether existing controls are consistent with the new classification. If gaps are found in existing
security controls, they should be corrected in a timely manner, commensurate with the level of risk presented by
the gaps.
Back to Top
Calculating Classification
The goal of information security, as stated in the Universitys Information Security Policy, is to protect the
confidentiality, integrity and availability of Institutional Data. Data classification reflects the level of impact to
the University if confidentiality, integrity or availability is compromised.
Unfortunately there is no perfect quantitative system for calculating the classification of a particular data
element. In some situations, the appropriate classification may be more obvious, such as when federal laws
require the University to protect certain types of data (e.g. personally identifiable information). If the
appropriate classification is not inherently obvious, consider each security objective using the following table as
a guide. It is an excerpt from Federal Information Processing Standards (FIPS) publication 199 published by
the National Institute of Standards and Technology, which discusses the categorization of information and
information systems.
POTENTIAL IMPACT
Security Objective
LOW
MODERATE
HIGH
Confidentiality
Preserving authorized
restrictions on
information access and
disclosure, including
means for protecting
personal privacy and
proprietary
information.
The unauthorized
disclosure of
information could be
expected to have a
limited adverse effect
on organizational
operations,
organizational assets,
or individuals.
The unauthorized
disclosure of
information could be
expected to have a
serious adverse effect
on organizational
operations,
organizational assets,
or individuals.
The unauthorized
disclosure of
information could be
expected to have a
severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.
Integrity
Guarding against
improper information
modification or
destruction, and
includes ensuring
information nonrepudiation and
authenticity.
The unauthorized
modification or
destruction of
information could be
expected to have a
limited adverse effect
on organizational
operations,
organizational assets,
or individuals.
The unauthorized
modification or
destruction of
information could be
expected to have a
serious adverse effect
on organizational
operations,
organizational assets,
or individuals.
The unauthorized
modification or
destruction of
information could be
expected to have a
severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.
Availability
Ensuring timely and
reliable access to and
use of information.
The disruption of
access to or use of
information or an
information system
could be expected to
have a limited
adverse effect on
organizational
operations,
organizational assets,
or individuals.
The disruption of
access to or use of
information or an
information system
could be expected to
have a serious
adverse effect on
organizational
operations,
organizational assets,
or individuals.
The disruption of
access to or use of
information or an
information system
could be expected to
have a severe or
catastrophic adverse
effect on
organizational
operations,
organizational assets,
or individuals.
As the total potential impact to the University increases from Low to High, the classification of data should
become more restrictive moving from Public to Restricted. If an appropriate classification is still unclear after
considering these points, contact the Information Security Office for assistance.
Back to Top
Additional Information
If you have any questions or comments related to this Guideline, please send email to the University
Information Security Office at iso@andrew.cmu.edu.
Additional information can also be found using the following resources:
Passwords
Shared secrets
Electronic storage media includes computer hard drives and any removable and/or
transportable digital memory medium, such as magnetic tape or disk, optical disk, or
digital memory card.
Export Controlled Materials is defined as any information or materials that are subject to United States
export control regulations including, but not limited to, the Export Administration Regulations (EAR)
published by the U.S. Department of Commerce and the International Traffic in Arms Regulations
(ITAR) published by the U.S. Department of State. See the Office of Research Integrity and
Compliance's FAQ on Export Control for more information.
5. Federal Tax Information ("FTI")
FTI is defined as any return, return information or taxpayer return information that is
entrusted to the University by the Internal Revenue Services. See Internal Revenue Service
Publication 1075 Exhibit 2 for more information.
6. Payment Card Information
Payment card information is defined as a credit card number (also referred to as a primary
account number or PAN) in combination with one or more of the following data elements:
Cardholder name
Service code
Expiration date
Student number
A list of personal characteristics that would make the students identity easily
traceable
Any other information or identifier that would make the students identity easily
traceable
See Carnegie Mellons Policy on Student Privacy Rights for more information on what constitutes an
Education Record.
8. Personally Identifiable Information
For the purpose of meeting security breach notification requirements, PII is defined as a
persons first name or first initial and last name in combination with one or more of the
following data elements:
Name
Address (all geographic subdivisions smaller than state including street address, city,
county, precinct or zip code)
All elements of dates (except year) related to an individual including birth date,
admissions date, discharge date, date of death and exact age if over 89)
Telephone numbers
Fax numbers
Account numbers
Certificate/license numbers
Any other unique identifying number, characteristic or code that could indentify an
individual
Per Carnegie Mellons HIPAA Policy, PHI does not include education records or treatment records covered
by the Family Educational Rights and Privacy Act or employment records held by the University in its role
as an employer.
1 Controlled Technical Information ("CTI")
0.
Controlled Technical Information means "technical information with military or space
application that is subject to controls on the access, use, reproduction, modification,
performance, display, release, disclosure, or dissemination" per DFARS 252.204-7012.
Back to Top
Revision History
Version
Published
Author
Description
0.1
07/02/2008
Doug Markiewicz
Original draft
0.2
09/25/2008
Doug Markiewicz
0.3
10/20/2008
Doug Markiewicz
0.4
11/04/2008
Doug Markiewicz
0.5
02/20/2009
Doug Markiewicz
0.6
02/26/2009
Doug Markiewicz
0.7
03/18/2009
Doug Markiewicz
0.8
09/17/2009
Doug Markiewicz
0.9
01/22/2010
Doug Markiewicz
1.0
09/15/2011
Doug Markiewicz
1.1
04/07/2015
Laura Raderman
Application security is the use of software, hardware, and procedural methods to protect applications from
external threats.
Once an afterthought in software design, security is becoming an increasingly important concern during
development as applications become more frequently accessible over networks and are, as a result, vulnerable
to a wide variety of threats. Security measures built into applications and a sound application security routine
minimize the likelihood that unauthorized code will be able to manipulate applications to access, steal, modify,
or delete sensitive data.
Actions taken to ensure application security are sometimes called countermeasures. The most basic software
countermeasure is an application firewall that limits the execution of files or the handling of data by specific
installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an
individual computer from being directly visible on the Internet. Other countermeasures include conventional
firewalls, encryption/decryption programs, anti-virus programs, spyware detection/removal programs and
biometric authentication systems.
Application security can be enhanced by rigorously defining enterprise assets, identifying what each application
does (or will do) with respect to these assets, creating a security profile for each application, identifying and
prioritizing potential threats and documenting adverse events and the actions taken in each case. This process is
known as threat modeling. In this context, a threat is any potential or actual adverse event that can compromise
the assets of an enterprise, including both malicious events, such as a denial-of-service (DoS) attack, and
unplanned events, such as the failure of a storage device.
applicationfirewall
ThisdefinitionispartofourEssentialGuide:Enterprisefirewallprotection:Whereitstands,whereit'sheaded
Postedby:MargaretRouse
WhatIs.com
Anapplicationfirewallisanenhancedfirewallthatlimitsaccessbyapplicationstotheoperatingsystem(OS)ofa
computer.Conventionalfirewallsmerelycontroltheflowofdatatoandfromthecentralprocessingunit(CPU),
examiningeachpacketanddeterminingwhetherornottoforwardittowardaparticulardestination.Anapplication
firewalloffersadditionalprotectionbycontrollingtheexecutionoffilesorthehandlingofdatabyspecificapplications.
For best performance, a conventional firewall must be configured by the user. The user must know which ports
unwanted data is likely to enter or leave through. An application firewall prevents the execution of programs or
DLL (dynamic link library) files which have been tampered with. Thus, even though an intruder might get past
a conventional firewall and gain entry to a computer, server, or network, destructive activity can be forestalled
because the application firewall does not allow any suspected malicious code to execute.
Next Steps
Read about the latest advancements in Web application firewall technology and learn more about deploying,
managing and supporting WAFs in the enterprise. Then read our expert advice to determine if a WAF is suitable
for your organization, discover the most important questions to ask before buying a WAF, and get a comparision
of the best WAF products on the market.
Continue Reading About application firewall
Also from SearchApplicationSecurity.com, here are 'Application firewall tips and tricks.'
The Web Application Security Consortium has developed evaluation criteria for application
firewalls.
PERFORMANCE TASK
HANDS ON:
Port hub /Port is a connector on the back of a computer or other device. A port is either a serial
port or a parallel port.
Modem - (Modulator-Demodulator) The modem is a device that allows a given computer to share
data or otherwise a device which let computers exchange information
USB (Universal Serial Port)
Scanner- is an input device that read text or illustration printed on paper, translates the
information into a form that a computer can use.
Printer - is a piece of hardware that produces a paper copy (also known as hardcopy) of the
information generated by the computer.
Flash drive a portable storage device which is plug directly to the USB port.
Network a group of computers and associated devices that are connected by communications
facilities.
OS (Operating system) software that controls the allocation and use of programs and data that a
computer uses.
Software programs and data that a computer uses.
Maintenance - is the testing and cleaning of equipment.
Planning is both the organizational process of creating and maintaining a plan; and the
psychological process of thinking about the activities required to create a desired future on some
scale
Computer System - The complete computer made up of the CPU, memory and related electronics
(main cabinet), all the peripheral devices connected to it and its operating system. Computer
systems fall into two broad divisions: clients and servers. Client machines fall into three
categories from low to high end: laptop, desktop and workstation. Servers range from small to
large: low-end servers, midrange servers and mainframes.
Defragmentation the process of reorganizing and rewriting files so that they occupy one large
continuous area on your hard disk.
CRT (Cathode Ray Tube) A display device used in computer monitors and television sets.
Boot sector The part of the formatted disk containing the operating system loading a program.
Virus A program intended to damage your computer system without your knowledge and
permission.
b. Information Maintenance
c. Software Maintenance
2. A type of Power Protective Device that serves as an emergency power supply during
blockout.
a. AVR
b. UPS
c. PCO
d. ICT
b. Weekly
c. Daily
d. Yearly
b. Weekly
c. Daily
d. Yearly
b. Software c. patch
d. OS
b. Format
10.An equipment used to clean the system unit using pressurized air.
a. Cloth
d. Tester
4. B
10.C
Answer keys:
1. B
2.B
3.A
5.A
6.C
7.B
8.A
9.D
Virus removal
Equipment and Materials:
Equipment: System unit, Monitor, Keyboard and Mouse
Materials: Anti-virus Software (Any Anti-virus software)
Virus removal
Provided with the necessary equipment and materials troubleshoot the virus infected area.
You can work in teams of 3
You will be assessed using the following criteria
Evaluation:
CRITERIA
Passed
Failed
Software Inspection
Given the following materials, perform software inspection.
Evaluation:
CRITERIA
1. Sequence of steps.
2. Observance safety precautions.
3. Proper inspection of hardware components.
4. Proper inspection of the power supply.
Network and Internet Inspection
You will be assessed using the following criteria
Evaluation:
Passed
Failed
CRITERIA
Passed
Failed
Passed
Failed
1. Sequence of steps.
2. Observance of safety precautions.
3. Proper inspection of network components.
4. Proper inspection of network connection.
Software Inspection
You will be assessed using the following criteria
Evaluation:
CRITERIA
1. Sequence of steps.
2. Observance of safety precautions.
3. Proper inspection of operating system.
4. Proper virus removal.
`
Area to be Inspected
HARDWARE
SOFTWARE
NETWORK
Good
running
condition
Bad running
condition
Remarks
Learning Objectives:
After reading this information sheet, you must be able to:
Enter the data into the computer using appropriate program/application in accordance
with company procedures.
Data - the quantities, characters, or symbols on which operations are performed by a computer
Data Processing - a series of operations on data, especially by a computer, to retrieve, transform, or classify
information.
Applications software - (also called end-user programs) include such things as word processors and Web
browsers .
Word Processing - the production, storage, and manipulation of text on a computer or word processor
Abiword
Word Perfect
Open Office
MS Office Word
Internet Explorer
Google Chrome
Safari
Opera
Data Entry
Equipment:
Computer units with installed word processing software and internet
connection
Steps:
o Open any available word processor/s in your computer.
o Type your name, grade level and section. Highlight text, choose
align text center.
o Open any internet browser installed in your computer
o In the search box of the browser type;
What is the commonly used word processor?
o Press the Enter key in the keyboard
o Copy the information that you have got from the Internet which is
displayed in the browser page.
o Paste the information you have copied from the browser in the
word processor.
o Save your work in the desktop
Assessment Method:
Performance Criteria Checklist 2.2.1
Did you .
Yes
No
Self-Check 2.2.1
Performing Computer Operations: Input Data into Computer
A. Identification:
_________________________1.
B. Matching Type
Match Column A with Column B, and Column B with Column C
A
____1. a graphical word processing
B.
C.
____A. Abiword
ii
iii
iv
____F. Safari
vi
vii
developed by Google
viii
Apple
ix
Answer Key
Identification:
1.) web browsers
2.) data
____J. Opera
Matching Type:
1.)
2.)
viii
3.)
vi
4.)
ii
5.)
iv
6.)
iii
7.)
vii
8.)
9.)
ix
10.) J
Performance
Objective
relaxed as possible for mouse use - avoid overreaching. Also make sure that
the wrist is as straight as possible when the mouse is being used.
Make sure the user sits back in the chair and has good back support. Also
check that the feet can be placed flat on the floor or on a footrest.
Make sure the head and neck are as straight as possible.
Make sure the posture feels relaxed for the user.
8) Keep it close!
Make sure that those things the user uses most frequently are placed closest
to the user so that they can be conveniently and comfortably reached.
Make sure that the user is centered on the alphanumeric keyboard. Most
modern keyboards are asymmetrical in design (the alphanumeric keyboard is
to the left and a numeric keypad to the right). If the outer edges of the
keyboard are used as landmarks for centering the keyboard and monitor, the
users hands will be deviated because the alphanumeric keys will be to the left
of the user's midline. Move the keyboard so that the center of the
alphanumeric keys (the B key, is centered on the mid-line of the user).
Make sure that the phone is also close to you if you frequently use it.
9) A good workstation ergonomic arrangement will allow any computer user
to work in a neutral, relaxed, ideal typing posture that will minimize the risk of
developing any injury.
10)
Where will the computer be used?
Think about the following environmental conditions where the computer will be
used:
Lighting - make sure that the lighting isn't too bright. You shouldn't see any
bright light glare on the computer screen. If you do, move the screen, lower
the light level, use a good quality, glass anti-glare screen. Also make sure
that the computer monitor screen isn't backed to a bright window or facing a
bright window so that there's the screen looks washed out (use a shade or
drapes to control window brightness).
Ventilation - make sure that you use your computer somewhere that has
adequate fresh-air ventilation and that has adequate heating or cooling so
that you feel comfortable when you're working.
Take a break! All Ergonomists agree that it's a good idea to take frequent, brief
rest breaks: Practice the following:
Eye breaks
Micro-breaks
Rest breaks
Exercise breaks
Self-Check:
1) Cite two [2] ergonomic guidelines in computer operation.
2) Explain briefly each or give an example
Direction: List down 5 ergonomic guidelines and explain each briefly [3pts. each].
1.
2.
3.
4.
5.
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
Assessment Rubric
CRITERIA
RATING
Performance
Objective
or
4) Step 4: A Save dialogue box will come up. At the top and at the left-hand
side in the list of folder options, it will show the folder where youll be saving
the document. If you wish to change this folder, navigate through the folders
on the left-hand side of the dialogue box to choose the one where you want to
save your document.
6) Step 6: Once you have typed in the name of your document, click Save.
7) Step 7: Your document will now have a name, which will be shown at the very
top of your document screen.
8) Step 8: The Save As menu the link to which is on the left-hand side of the
File dialogue box, beneath Save is used to save an existing document
under another name. This is helpful if youve made changes to your document
and then want to save the changes, but also keep the original document in its
original format and under its original name.
Self-Check:
1) List down two [2] salient features in saving a document.
2) Explain the difference between Save & Save As
Instructions:
1) create a document containing a paragraph with 5 sentences.
2) save it inside ICT11 folder.
3) The performance will be rated according to the following:
Performance Criteria
CRITERIA
RATING
Performance
Objective
Supplies/Materials
: Performance Checklist
Equipment
: PC Unit/s
SKILLS/ITEMS
PERFORMED
NOT
PERFORMED
Have you. . . .
1) created a document in Microsoft
Word 2007?
sentences?
filename?
5) saved the document inside ICT11
folder?
6) saved as the document inside the
flashdrive?
7) observed proper posture?
8) taken a short break?
INFORMATIONSHEET23.1
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Select
correctProgram/applicationsbasedonjobrequirements.
ApplicationSoftwareBasics
GoogleDriveLogo
CommercialSoftwareMicrosoftOffice
Applicationsoftwareallowsyoutodoanythingonthecomputer,suchasplayinggames,orwatchingTV.
Anyoneandeveryoneusingacomputershouldbefamiliarwiththedifferentapplicationsavailabletothem
andhowtoproperlyutilizesaidprograms.Forinstanceoneofthemostwidelyusedapplicationsoftwareis
MicrosoftWord.[1]MicrosoftWordallowsyoutocreate,edit,saveandprintdigitaldocumentsonyour
computer.Whileitisnottheonlywordprocessoroutthere,itisthemostpopular.OtherswouldincludeWordPerfect, [2]Googledrive,
[3]
andiWork.[4]YoucouldalsocreatespreadsheetsthroughExcel,[5]createapresentationthroughKeynote,[6]andeveneditmusic
thoughAudacity.[7]Allofthesewillbediscussedingreaterdetailaswemoveoninthissection.
Installedvs.Webbased
Dropboxisawebbasedsoftware
Therearetwodifferenttypesofapplicationsoftware:installedsoftwareandwebbasedsoftware.
Installedsoftwaremustfirstbeinstalledtothecomputerbeforeitcanbeused.Whenyoupurchasean
installedsoftware,thecompanycaneithersendyouaphysicalcopyofthesoftware,usuallyinthe
formofaCD,oryoumightalsohavetheoptionofdownloadingthesoftwarefromthecompanies
webpage.Webbasedsoftwareissoftwarethatremainsontheinternetwhichyoucanuseatanon
demandbasis.WebbasedsoftwareisalsoreferredtoasSoftwareasaServiceorCloudware.Somewebbasedsoftwaresinclude
GoogleDocs,Dropbox,Prezi,andmanyothers.[8]
AdvantagesandDisadvantages
Webbasedsoftwarehasrecentlybecomeamorepopularalternativetoinstalledsoftware,however,ithasitsadvantagesand
disadvantages.OneoftheadvantagesofwebbasedsoftwareisthataslongasyouhaveanInternetconnection,youcanaccessyour
files.Thisallowsforyoutoaccessthesamefilesfrommanydifferentdeviceincludingdesktops,laptops,tablets,andmobiledevices.
Also,thisallowsforuserstobeworkingononesharedfileratherthancontinuouslysendingeditedfilesbackandforthtoeachother.
Withwebbasedsoftware,onlyonefileexists,soitavoidsconfusionandevenallowsformultipleuserstobeworkingononefileat
thesametime.Also,insteadofhavingtocontinuouslyinstallsoftwareupdates,webbasedsoftwarestaysupdatedonlinebywhatever
companyownsthesoftware.[9]Someofthedisadvantagesofsoftwareincludefilesizelimits.Theamountoffilesaswellasthesizeof
eachfilearedependentuponhowmuchcloudstoragetheapplicationscompanyallowsonitsservers.Manycompaniessuchas
Google,Apple,andDropbox,chargemonthlyorannualfeesifuserswantmorestoragespace.Withinstalledsoftware,theamountof
storageyouhaveisonlydependentonhowmuchstoragespaceyouhaveonyourcomputer.Ifyouknowthatyouregoingtousealot
ofstoragespace,itwouldbebettertohaveaninstalledsoftwaresothatyoucanavoidpayinglargefeesfortakingupserverspace.
Anotherdisadvantagetowebbasedsoftwareisslowerspeeds.BecausetheapplicationsarebeingusedthroughtheInternet,ittakes
moretimetoaccessthefiles.Also,usershavetodealwithloginsandsecurityprecautionssuchascreatingpasswords,linkingemails
toanaccount,andansweringquestionsifyouforgetyourpassword.[10]
CreatingApplicationSoftware
Thankstotherevolutionthatisthesmartphone,applicationshavebecomeincrediblypopularthattherearecountlessofthemoutthere
andthenumberisstillgrowing.Therecanpotentiallybeanapplicationforeverything.Howeverinorderfortheretobeanapplication
foreverything,theyhavetobecreatedfirstandinordertodosoonemustlearntocode.Dependingonthetypeofapplicationyou
wanttocreate,youmustlearndifferenttypesofprogramminglanguages.Themorecomplicatedyourapplications,frommobileapps
tofullonvideogames,themorecomplicatedthecoding.Mostmobileapplicationscanbecreatedbyonepersonbutmore
complicatedprogramssuchasvideogamesareusuallycreatedbyateamofprogrammers.
Youmustlearntocodeinordertomakeapplicaions
ThetwomostpopularsoftwaremarketplacesasofrightnowarethatofApplesAppStoreandGooglesPlayStore.Inordertocreate
appsfortheAppStore,onemusthaveaMaccomputertoruntheprogrammingtools.OnemustthenpayAppletosignusasa
developerinordertodownloadthosetools.TheprogramminglanguageusedinthoseappsiscalledObjectiveC.Tocreateappsfor
thePlayStore,onemusthaveeitheraWindows,Mac,orLinuxcomputer.Thesoftwaredevelopmentkitisfreetodownloadandyou
willneedtoknowtheprogramminglanguagecalledJava.[11]
SoftwareOwnership
Afteranapplicationsoftwareprogramisdeveloped,theauthorhaswhatiscalledownershiprights.Theserightsspecifyexactlyhow
theprogramcanandcannotbeused.Forexample,ownershiprightsallowtheauthortodecideonwhetherornottheprogramcanbe
sold,shared,ordistributed.Theownershiprightsvarydependingonthetypeofsoftware.Typesofsoftwareincludecommercial,
shareware,freeware,andpublicdomain.[12]Commercialsoftwareissoftwarethatiscreatedandthensoldforprofit.Forexample,
MicrosoftOfficeSuiteiscommercialsoftware.Sharewareisanothertypeofsoftwarethatcanmakeprofit,however,sharewareis
initiallyfreeandthenrequestspaymentafteracertainamountoftime.Forexample,acomputergamemighthaveatendayfreetrial,
butafterthetrialisoverthedeveloperwillaskforapayment.Thispaymentwouldallowthegamertoplaythecomputergameona
regularbasis.Freewareisatypeofsoftwarethatisavailablefornochargebythedeveloper.Anexampleoffreewarewouldbe
InternetExplorerandmostotherwebbrowsers.Publicdomainsoftwareissimilartofreeware,butshouldnotbeconfused.While
freewareiscopyrighted,publicdomainsoftwareisnt.Becausepublicdomainsoftwareisntcopyrighted,peopleareabletocopy,
modify,anddistributethesoftware.[13]
SoftwareSuites
ThelogoforAdobeCreativeSuitev6.0,oneexampleofasoftwaresuite.
Asoftwaresuiteisagroupofrelatedprogramsthatinteracttogetherandarepurchasedtogether.Themostwellknownexampleis
MicrosoftOffice,whichincludesExcel(spreadsheets),Word(documents),PowerPoint(slideshow),andOutlook(email).Thereare
twoprimarybenefitsofsoftwaresuites.First,theymakeiteasierfortheusertoworkonmultiplerelatedprojectsatonce:someone
can,forexample,makeaspreadsheetinExcelandthenbringitintoWord,keepingalloftheformattingintactmuchmoreeasilythan
iftheyusedanunrelatedspreadsheetprogramandtexteditingprogram.Second,theysavemoney:purchasingtheentireOfficesuiteis
muchcheaperthanpurchasingExcel,Word,PowerPoint,andOutlookseparately.However,ausermaynotneedalloftheprogramsin
agivensuite,sobuyingtheentiresuitewhenonlyoneortwoprogramsareneededisasignificantwasteofmoney;aprospectivesuite
consumershouldlookindetailatwhichprogramsareincludedandmakesuretheyneedallofthem.Ifnotalloftheprogramsare
needed,thenitwouldbemoreprudenttopurchaseindividuallyonlythoseprogramswhichareneeded. [14]
WordProcessing
ExplanationofWordProcessing
Awordprocessorisasoftwareprogramthatisusedtocreateadocument,storeitelectronically,displayitonascreen,modifyitusing
commandsandcharacters,andprintitonaprinter.Italsoprocessesparagraphindentation,marginsize,fonttype,fontsize,fontcolor,
andspacingwithinthedocumentbeingcreated.Wordprocessorshavereplacedtypewriterssincetheyallowtheusertomakeachange
anywhereinthedocumentwithouthavingtoretypetheentirepage.Wordprocessorsalsocomeequippedwith"spellcheck"functions
eliminatingtheneedformultipleeditorsandprovideanimmediatetoolforgrammaticalcorrection.Somecommonwordprocessors
includeMicrosoftWord,AbiWord,WordPerfect,andOpenOffice.[15]
SpellCheck
ConstructingaWordProcessingScript
Whenconstructingaworddocumentthereareafewthingstokeepinmind;characterformatting,paragraphformatting,andpage
formatting.Thesethreebasicfunctionslaythefoundationformostofthecustomizationthatisneededtocreatemanyword
documents.Characterformattingchangestheappearanceofindividualcharactersandrelatestothesize,font,color,andoverallstyle
ofthelettersornumbersbeingused.Characterformattingalsoinvolvesunderlining,italicizing,andmakingboldthosecharacters
beingused.Thisisgreatformakingawordstandoutorforunderliningbooktitles.Paragraphformattingadjuststhespacing,
alignment,andindentationoftheparagraphsbeingformed.Spacingreferstotheamountoflinesleftblankinbetweenthelinesbeing
processed.Agoodexampleofthisisdoublespacingwhichiscommonlyusedinaneducationalsettingwhereastudenthastowritea
paperforaspecificinstructor.Commonlydoublespacingisusedsothattheinstructorcanmakecorrectionstothedocumentwithout
havingtomarkovertheactualwordsonthepaper.Alignmentreferstothewaytheparagraphispositionedinregardstotheleftand
rightmargins.Aleftalignmentismostcommonlyusedwhencreatingaworddocumentandthissettingalignsthewordsbeingformed
tobeflushwiththeleftmargin.Acenteralignmentisusuallyusedfortitlingapaper.Pageformattingreferstothewidthofthe
margins,thesizeofthepaperbeingused,andtheorientationofthepage.Thestandardmarginis1.25inchesonboththeleftandright
butthesecanbecustomizedtosuitneedandpreference.Thepapersizeoptionsreflectwhatcanbeusedintheprinter,andthe
orientationindicateswhetherthedocumentwillusethetraditionalorlandscapepositioningonthatpaper.Traditionalorientationis8.5
incheswideby11inchestallwhereaslandscapeistheexactoppositeat11incheswideby8.5inchestall.[16]
AbiWordWordProcessor
WordProcessingTools
BusinessIDTemplate
Someofthebasictoolsthatareemployedinwordprocessingprogramsthathelptomaketheapplicationmoreuserfriendlyaretables,
graphics,andtemplates.Thesetoolsallowforminimaleffortandexcellentresultswhenaddingfeatureslikethesetoaword
document.Tablesareusedfororganizinginformationandarecomposedofrowsandcolumnsinwhichdataisplaced.Thisisgreatfor
comparingandcontrastinginformationasit'scondensedandpresentedinastraightforwardfashion.Tablescanalsobeusedfor
layingoutentiredocuments,suchasaresume,whereinformationissectionedofffromoneanother.Inthisexample,theentirereport
isformulatedtoatableinsteadofasmallsectionasmentionedearlier.Graphicsarepictures,drawings,clipart,orotherimagesthat
canbeinsertedintoadocumentfromotherprogramsorfromstoreddataonacomputer.Thismakesforeasyillustrationswherea
picture,orpictures,wouldsufficebetterthanwordsortablestohighlightapoint.Graphicstoolsalsoallowtheusertomanipulatethe
imagesthathavebeenimportedbychangingthecolor,contrast,brightness,andsizeoftheimage,amongotherthings.The
customizationprocessoftheseimagesinawordprocessorprovideforaneasyandquickavenueofexplanationconcerningthetopics
athand.AnotherusefultoolareTemplates.Thesearepreprogrammedarrangementsofideasand/orillustrationsthatareknownto
serveapurposeandarealreadyorganizedfortheusertointeractwith.Mostoftenthismeans"fillingintheblanks"andsomecommon
templatesthatshouldberecognizedareresumes,businesscards,identificationcards,faxcoversheets,memos,invoices,and
newsletterstonameafew.[17]
MicrosoftWord2013Icon
Alongwithtemplates,somedocumentsarerequiredtolookdifferentlydependingontheuse;asaresultofthiswechangetheformat
ofourdocuments.Anychangeinformatinadocumentisachangeintheoverallappearance.Examplesofformattingdocumentscan
rangefromMLAtoAPAformat,requiringdifferentsizedmargins,fonts,etc.Inordertodothis,Wordhastabsthatmakenavigating
aroundyourdocumenteasyandefficient.WordincludesaHelpCenterconvenientforuserstoreceiveassistancewhetheritislive
onlinehelporoffline.InthisHelpCenter,toolssuchaswhereandhowcontentsareorganizedarelistedinauserfriendlymanner.
WhileWordprocessingissimplycreating,editing,saving,andprinting,thecreationandeditionaremadeeasybyWordforavariety
ofendresultsintheoverallappearanceofdocuments.Inthetimeoftypewriters,thecarriagereturnwasusedwhenalineoftext
neededtomovetothenextlinetocontinue.WithpresentdayWord,thisisdoneautomaticallyandisaprocesscalledWord
Wrapping.[18]OthertoolsthatWordofferswhichwerenotavailablearetheabilitytocontainvariousfonts,editproportions,and
spacingisalsomademoreefficient.
Database
<gallery>
Adatabaseisanorganizedcollectionoffactsandinformationsuchastextandnumbers,andoftencanholdstillimages,soundsand
videosorfilmclips.[29]Itisorganizingdatainsuchawaythatacomputerprogramcanquicklyselectdesiredpiecesofinformation.A
databasecanalsobereferredtoasanelectronicfilingsystem.Forexample,libraries,ratherthanhaveafilecabinet,provideaccessto
academicdatabasesforuseinscholarlyprojects.RegularPCdatabasesareorganizedbyfields,records,tables,andfiles.Afield
(column)isasinglepieceofinformationlikelastname,address,phonenumber,andsuch.Arecord(row)isaonecompletesetof
fields.Atableisacollectionofrecords.Lastly,afileisacollectionofrelatedtables. [30]Adatabasefileiscreatedfirst,thentablesthat
canbecreatedineitherdatasheetordesignview.[31]Therearedifferentkindsofdatabases,suchasactive,cloud,deductive,
distributed,graph,hypertext,etc.Forexample,inhypertextdatabase,anyobjectcanbelinkedtoanotherobject;thisisusefulfor
organizingalotofinformation.ADBMSisdatabasemanagementsoftwarethatallowsthedefinition,creation,querying,update,and
administrationofdatabases.[32]CommondatabasemanagementsoftwareisMicrosoftAccess.Sincemanydatabasesstoreconfidential
andimportantinformation,theyrequirepasswordsandothersecurityfeaturesinordertoaccesstheinformation. [33]
QueriesandReports
Query
Queriesandreportsareusedtoretrieveinformationfromdatabases. [34]Aqueryisalmostlikeasearchtoolfortheuserofthedatabase
tofindspecificinformationlikeanitem,number,name,etc.Likeotherdocumentsmade,aqueryhastobemadeandsavedaswell,
foruserstobeabletocomebackandsearchitagain.Aquerycontainscriteriathatmustbemetforarecordorrowtobeshowninthe
endingresultsofthespecificquery.Queriescanalsobemadetoshowmultiplecolumnsorrowsatasingletime,insteadofjustone
roworcolumn.Forexample,acustomerinsiststobuyasetofglassesforunder$20atCrateandBarrel. [35]Theemployeecanthen
inquireglassesunder$20andbeabletotellthecustomerwhichkindtospecificallylookat.Areportisusedwhenacquiringa
formaloutput.Thiscanbeacompanylogoorgraphicwithapagecolumnheading.ThesecanbecreatedwiththeReportWizard
buttonontheCreatetabfromtheRibbon.Reportsaremostlyusedwithdatabasetablesorqueries.Databasescanbeusedmore
efficientlyforcustomersshoppingviatheInternet.Today,onlineshoppingisthenewestsensation.Forexample,aspecificdresscan
befoundonLordandTaylors[36]websiteforwomen,priortogoingtothestorebytypinginthesearchbar.Examplesofpopular
databasesusedareMicrosoftSQLServer,MicrosoftAccess,Oracle,MySQL,andIBMDB2.[37]
MicrosoftAccess2013logo
DecidingWhichDatabasetoUse
Howdoesoneknowwhichkindofdatabasetouse?Tosomeonenotfamiliarwiththiskindofthing,itcouldbeasituationwhereone
doesnotevenknowwheretobegin.Somethingonemustfirstconsideriswhattheywillbeusingthedatabasefor.DatabaseManaging
Systemscanbebrokenupintotwocategories;serverdatabasesordesktopdatabases.Desktopdatabasesaretypicallygearedtowarda
singleuser,whereasserverdatabasesmustaccommodatemultiusersandlargeamountsofdata.SomefamiliartypesofDesktopDB
areMicrosoftAccess,FoxPro,FileManager,orParadox.DesktopDBsarefitforstoringlesscomplexdataandarelessexpensive
thenserverDBs,typicallyaroundonehundreddollars.Theyarealsoveryuserfriendlyandhavewebfunctionalitythatallowsthe
usertopublishdataontheweb.Serverdatabasesontheotherhandareequippedtostoreandmanagemuchlargeramountsofdataand
allowformanyuserstohaveaccesstothatdataatthesametime.SomepopularServerDBsareMicrosoftSQL,OracleorIBMDB2.
Duetotheircomplexfunctionality,thesedatabasesaremuchmoreexpensive,ranginginthethousandsandup.ServerDBsare
equippedwithApplicationProgrammerInterfaces(APIs)thatallowforcustomprogrammingandapplications.Theyareextremely
powerful,beingabletoaccommodateclusterserversandmultiplehighspeedprocessors.Theyarealsoabletoadaptwelltothe
constantadditionofusersanddata.Afterevaluatingthesetwotypesofdatabases,oneshouldhaveabetterideaofwhichonewillbest
suittheirneeds.[38]
Databaseprotection
DB2ClientConnections
Thedatabaseisoneofthemostessentialpartsofabusinessprocess.Theabilitytoaccessandtooperatedataisanecessarycondition
fortherunningcompany.Permanentdatalossputsthebusinessinseriousdanger.Accordingtosomeresearchers,aboutahalfofthe
companiesaffectedbydisastersandmajorlossofcorporatedata,havenotbeenabletocontinuetheiractivities.Therearefewmost
commonreasonsfordatabasedestruction:equipmentfailures,physicalimpactonthehardwareofthedatabase,errorsofauthorized
users,databaseoroperatingsystembugsanderrorsinapplicationprograms,intentionalactsunauthorizedusersorprograms.The
primaryprotectiontoolssuchtheusersidentification,thegrantingofdifferentrightsofaccesstodatabaseobjectse.g.reading,
adding,deleting,andchangingalongwithdataandprogramsencryptioncanprovidetheacceptablesecuritylevel.Note,thatthe
securitymodel,basedonthebasicmechanismsofauthorizationandauthenticationdoesnotsolveproblemssuchasstolenuserIDs
andpasswordsormaliciousactionsofsomeuserswiththeauthority.[39]
PresentationGraphics
IntrotoPresentationSoftware
Justbecausethephrasingiscornydoesn'tmakethemessageanylesstrue!
U.S.Navyusespresentationgraphicstoeducate
Everyonehasdifferentstylesoflearning.Therearesomestudentswhoretaininformationbetterwhentheycanbehandson,while
otherscanhearalecturefromtheirteacheronetimeandrememberalltheimportantpointswithouthavingtoopentheirschoolbook
once.Nomatteryourlearningstyle,thereisonetypeofsoftwarethathasbeenproven,timeandagain,tobeagreatmethodofsharing
lotsofkeyinformationinanorganizedandrelativelyentertainingfashion.Thesuccessfulsoftwareinquestionispresentation
software.[40]Presentationsoftwareallowstheusertocreatemultipleslideswhichtheycanpiecetogetherintoaslideshow.Itisagreat
waytoorganizeandrefinelargeamountsofinformationintoonlythemostimportantpartsbecauseeachslidehaslimitedspaceand
youtypicallyarelimitedintimewhenresponsibleforapresentation.Whetheryou'representinginformationtoaclassroomora
businessmeeting,themethodoforganizinginformationinafluidmannerremainsthesame.Toaddentertainmentvalue,thereare
manyvariableswithineachexampleofsoftwarethatcanbemanipulated,fromtextsizeandcolortoslidetransitions.Theexpert
presentationsoftwareuserscanevendaretoaddphotosandmusictotheirpresentations.Twoofthemostwidelyusedexamplesof
presentationsoftwaretodayare:MicrosoftPowerpointandPrezi.
Achartofthe2002IranianEconomyusingAppleKeynote
Presentationgraphicsisatypeofsoftwarethatallowsuserstocreatestylizedaudioandvisualaids(soundeffects,animation,etc.)
typicallyforslideshows,reports,andpublicinformationalspeeches.Itincorporatestoolsforinsertingvarioustypesofdrawings,text
andbackgroundschemesinawidevarietyoffonts,colors,andpatterns.Mostsystemscanalsoimportspecificdatafroma
spreadsheetapplicationtogeneratecustomizedchartsandgraphs.Presentationprogramscanbedividedintotwocategories
businessgraphicssoftwareandgeneralmultimediaauthoringtools.Thoughsomeproductsareblended,thelayoutofbusiness
presentationsoftwareemphasizesfastlearningandeaseofuse,whilemultimediasoftwareoffersamoresophisticatedpresentation
thatwilllikelyrequireahigherleveloftechnologicalunderstanding.Popularpresentationsoftware,suchasMicrosoft'sPowerpointor
Apple'sKeynote,maybepurchasedindependentlyoraspartofanofficesuite.UniversallycompatibleproductsincludeAdobe
Persuasion,CorelPresentations,HarvardGraphics,andLotusFreelanceGraphics.FreeproductsincludeGoogleSlides,Prezi,
PowToon,andAcademicPresenter.Allfunctionsimilarlyandprovidenearlyidenticalcapabilities.Uponcompletion,thefile(s)are
usuallysavedtoacomputer,externalstoragedevice,orthecloud.Duringapresentation,usersareabletoviewminiatureimagesof
slidesonadevicesscreen,andeditordirecttheirlayoutastheyaresimultaneouslyprojectedontoalargerscreenorLCDprojection
panelforotherstoview.[41]
Powerpoint
USNavy040605N6633C002CommanderNavalReserveForce,ViceAdm.JohnG.Cotton,issilhouettedinfrontofaPowerpoint
slidemappingouttheNavalReserveForce'sfuture
PowerpointisaMicrosoftOfficesoftwareusedtopresentinformationandworkasavisualaide.Certainoptionsmakeiteasyto
organizeandpresentinformationinavisuallyappealingway.Charts,pictures,tables,videoclips,andsoundscanallbeaddedtothe
presentation.Designsandcolorthemescomereadytousesothepresenterjusthastoaddtheinformationanditisreadytogo!The
slidesthemselvescomewithseveraloptionsofpreloadedlayouts,usingfeaturessuchasbulletpoints,pictures,captions,andtitles.
Theyareeasytodraganddroptomakerearrangingveryeasy.[42]Thewholeideaofadigitalvisualis,inconcept,morebeneficialto
thepresentersandtheaudiencetoavoidcopiesofhandouts.Onefeaturethatcomesinhandy,however,istheabilitytoprinttheslides
soeitherthepresenteroraudiencecanbeinformedaheadoftimeofwhattoexpect.Slidescanchangewithasimpleclickofabutton.
However,presenterscanoftenloseeyecontactfromtheaudienceandbeginreadingstraightfromtheslides,insteadofusingitasa
guide.Teachers,employers,andcomputerusersallovertheworldhavenowbecomeaccustomedtousingPowerPointastheirgoto
visualaide.Theimageontherightshowsapresenterusingapowerpointasavisualaide.
APowerPointPresentationslideshowisprojectedonalargescreenfortheaudience.
ThePowerPointpresentationgraphicsprogramprovidestheuserwithseveralassortmenttoolsandoperationsforcreatingandediting
slides.Withthosetools,oneisabletoaddnewordeleteoldslidesthatarepreviewedintheslidethumbnailtabarea,usuallyfoundon
theleftsideofthescreen.Oneisalsoabletoswitchtotheslideoutlinetab,whichcontainsonlythetitleandthemaintextincludedin
theslide.Ifdesired,usingtheInserttab,theusercanperformadditionaloperationslikeexportingimages,alongwithadding
formattedtables,shapes,symbols,charts,andmuchmoretobetterexpresstheirmessage.Additionally,tocustomizethePowerPoint
tomakeitevenmoredynamicandpresentable,textcanbeanimated,andauniquetransitioncanbeaddedtotheslides.With
animation,textcanbesettoappearinaspecificwayintheslideduringaslideshow.Tonsofspecialeffectsareprovidedfortheuser,
includinganimationstomakethetexttofly,dissolve,fly,float,orbouncein.Similarly,oneisalsoabletoapplyspecialeffectsto
specificslidestotransitionfromoneslidetoanotherinaspecificmanner.Additionally,MicrosoftPowerPointallowsrecorded
narrationtobeplayedbackastheslideshowisbeingpresented,alongwithspeakernotes.Furthermore,mostpresentationgraphics
programsalsoallowtheusertoprintthosespeakernotesforthetargetedaudiencesconvenience.[43]
1.
______________________________________________________________________________
____
2.
__________________________________________________________________________________
3.
__________________________________________________________________________________
4.
__________________________________________________________________________________
TASK SHEET
Directions:
Identify and write the correct answer of the following.
1.A_____isacollectionofworksheetssavedinasinglespreadsheetfile.
2.A_____isacollectionofrelateddatathatisstoredinamannerenablinginformationtoberetrievedasneeded.
3.Witha(n)_____program,thesourcecodefortheprogramismadeavailabletothepublicandsocanbemodifiedbyothers.
4.TrueorFalse.Changingthefontsizeinadocumentisanexampleofaformattingoperation.
5.A_____isacollectionofrelatedfieldsinadatabase.Alsocalledarow.
6.Softwarethatisnotcopyrightedandmaybeusedwithoutrestrictionis_____.
7.TrueorFalse.Softwarecanbeinstalledonbothpersonalcomputersandservers.
8.Thelocationattheintersectionofarowandcolumnonaworksheetintowhichdatacanbetypedisa_____.
9.TrueorFalse.MicrosoftOfficeisoneexampleofasoftwaresuite.
10.Copyrightedsoftwarethatisdistributedonthehonorsystem;consumershouldeitherpayforitoruninstallitafterthetrialperiod
is_____.
AnswersKeys:
1.
Workbook2.Database3.OpenSource4.True5.Record6.PublicDomainSoftware7.True8.Cell9.True10.Shareware
INFORMATIONSHEET23.2
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Accessprogram/
applicationcontainingtheinformationrequiredaccordingtocompanyprocedure.
ApplicationofComputers
Various
PC
HARDWARESERVICING
KEEPING TRACK OF INFORMATION
Example: Banking, Railways or Airlines Reservations
PREPARATION OF DOCUMENTS AND MULTIMEDIA PRESENTATIONS
Examples:Power point Presentations inmeetings and seminars.
Video presentation of films and footages
SIMULATION OF REAL OR IMAGINARY WORLD SCENES Example:
Virtual Reality, Computer Games
Spreadsheets
WhatisaSpreadsheet?
PoppitSpreadsheet
}
"Aspreadsheetisagroupofvaluesandotherdataorganizedintorowsandcolumnssimilartotheruledpaperworksheetstraditionally
usedbybookkeepersandaccountants."Thespreadsheetsoftwareismandatorytocreatecomputerizedspreadsheets.MicrosoftExcel
isaformofaspreadsheet.Therearemanytermsonemusthavetoknowtocreateaspreadsheet.Aworksheetisthesinglespreadsheet
document.Aworkbookallowsmultipleworksheetstobesavedtogetherinasinglespreadsheetfile.Worksheetsaredividedintorows
andcolumns.Theintersectionofarowiscalledacell.Onemustentercontentintotheactivecell,orcurrentcell;ithasaborder
aroundittomakeitbeeasilyidentified.Dataisentereddirectlyintoworksheetcellsbyclickingacelltomakeittheactivecell.
Labels,constantvalues,formulas,andfunctionsarethedatathatisenteredintoacell.Beforeoneentersaformulaorfunctionintoa
cell,onemustbeginwithsometypeofmathematicalsymbol,usuallytheequalsign(=). [19]Spreadsheetsaregreatlyusedin
businesses.Theyareusedtoorganizefinances,projects,statistics,etc.[20]Itisessentialtoknowhowtousespreadsheetsforschooland
one'sjob.
Tables,Graphics,andTemplates
TableMicrosoftExcel
Tables,graphics,andtemplatesareallavailabletoauserwithapplicationsoftware,suchasMicrosoftWord,MicrosoftExcel,and
PowerPoint.Tablesarewaysausercanorganizedataandinformationattheirconvenience.AccordingtoMicrosoftWord,thereare
nowmanydifferentavailableoptionsforuserswhoarelookingforvariouskindsoftables.Thesedifferentoptionsincludethe
following:theGraphicGrid,InsertTable,DrawTable,insertaneworexistingExcelSpreadsheettable,andQuickTables.The
conceptofusingtablesfordatainputisrelativelysimple.Inorderforausertoinsertatable,theusermustfirstopenMicrosoftWord.
Oncetheyhavedonethis,theymustclickthe"table"buttontocustomizethetabletoachievetheirneeds.Theoverallformatfora
tableconsistsofalarge(orsmall)gridthatcanbealteredbytheamountofinformationtheuserhas,ex.fourcolumnsfiverows.Next,
theusermustinsertthetableintotheworddocumentbyselecting"inserttable"fromthedropdownmenu. [21]GraphicsinMicrosoft
Wordarepictures,orclipartthatareabletobeinsertedintoaMicrosoftWorddocument,ExcelSpreadsheet,PowerPointslide,orany
otherOfficeapplication.GraphicsareinsertedintotheseOfficeApplicationstoenhancetheinformationpresentedinaWord
Document,Excelworksheet,orPowerPointslide.Ausercaninserttheirownpicturethroughtheirofficedocuments;addclipart,
shapes,SmartArt,screenshot,orWordArt.[22]Templatesarepreconstructeddocumentlayoutswhoseprimaryuseistoassistauserin
creatingaspecifictypeofdocumentinaconvenientamountoftime.Thedifferentoptionsoftemplatesvary,butafewofthe
followingarecommononesusedeveryday:agendas,brochures,calendars,flyers,faxcovers,andmanymore.Templatesareusedto
saveausertime,andconfusionincreatingtheirdocument.[23]
HowtouseaSpreadsheet
Whenusingaspreadsheetapplication,theusercanusevariousconceptstocomputethedataenteredintothecellsinthespreadhseet.
Thesedifferentconceptsareprovidedwithintheprogram.Someverycommonconceptsthatareutilizedarecharts,functions,
formulas,andcellreferencing.
Charts
Achartcanbecreatedasitsownobjectorembeddedwithinthesheetitself.[24]Thisishelpfulwhenauserneedstoanalyzedataor
representchangingdata.
AchartgeneratedusingExcel.
Functions
Afunctionisapreprogrammedmathematicalformulatoallowtheusertomakecalcuationsbasedonthedatainput.Thefunctions
underspreadsheetsaretheretoperformasimplecalculationbyusingacertainvalue,calledarguments.Iftheuserwishestocreatehis
ownformula,VisualBasiccanbeusedtowriteaformulaandthenthespreadsheetprogramcaninputthevaluesintothenewly
writtenformula,reportingthedatabackintothesheet.Therearemanydifferentreasonstohavefunctionsonspreadsheets.Onewould
beforarithmeticfunctionstoprocessnumericaldata.Thenextwouldbestatisticalfunctionsthatuseanalysistoolsandaveraging
tools.Thiswouldbeusefulforfindingtheaverageofthenumbersinacertainrow/columnonaspreadsheet.Thenextfunctionisdate
thatprocessesandconvertsdates.Thisfunctioncouldbeusedtoputthesequentialdatesinorderonthespreadsheet.Thenext
functionislogicfunctionsthatprocesslogicdata.AnexampleoflogicdatawouldbeanAND/ORfunction.Iftherewassomething
thatneededtobemarkedyesifitisabove5andmarkednoifitisbelow5thenthatwouldbealogicfunction.Thelastoneis
financialfunctionsthatprocessmonetarydata.Theyallmuststartwithanequalsign,thenameofthefunction,parenthesisopening
andclosing.Inthefunctionacommaorsemicolonisusedasthedelimiter,dependingonwhatsettingsarethereinthespreadsheet
woulddependonwhichonetouse.Anexamplewouldbe=SUM(A1:A4),thisfunctionwouldfindthesuminthosecells.Someofthe
mostcommonfunctionsareSUM,AVERAGE,IF,COUNT,MAXandMIN.
AfunctionbeingedittedusingVBinExcel.
Formulas
Aformulaidentifiesthecalculationneededtoplacetheresultinthecellitiscontainedwithin.Thismeansacellhastwodisplay
components;theformulaitselfandtheresultingvalue.[25]Typically,aformulaconsistsoffiveexpressions:value,references,
arithmeticoperations,relationoperations,andfunctions.Byusingtheseexpressions,formulascanhelptomaketables,solvemath
problems,calculateamortgage,figureoutaccountingtasks,andmanyotherbusinessrelatedtasksthatusetobedonetediouslyon
paper.[26]
Aformulaalwaysstartswithanequalssign(=),followedbyaconstant,afunctionorareference,thenfollowedbyanoperator,and
thenfollowedbyanotherconstant,functionorreference.Aconstantisavaluethatneverchanges;thisincludesnumbers,dates,titles
andothertextinput.Referencesrepresentacertaincell,suchasA2.Anoperatorisusuallyamathsymbol,suchas+or*which
tellsthecomputerhowtocompute(addormultiply,respectively)thegivenconstantsorfunctionsgivenintheformula.Itisgoodto
becarefulthatoneknowsthedifferencebetweenaconstantandareference.Iftheconstant30isinputintocellA3,andtheformula
says=30+2,thenifA3svaluechanges,theexpressionoftheformulawillnotchangeunlesstheformulaitselfchanges.Ifone
wishestohaveaformulathatreturnsthevalueofacell,thentheformulashouldread=A3+2.Anotherthingtonoteisthatthe
operatorswillfollowthebasicrulesofcalculation.Forexample,theformula=3+2*4willadd3toproductof2and4,ratherthan
add3and2,thenmultiplythesumtimes4.(Parenthesiscanbeusedtochangetheorder:(3+2)*4wouldaddfirst,thenmultiply.)
Operatorsarenotalwaysarithmetic,theycanalsobecomparison,textconcatenation,andreferenceoperators.Comparisonincludes
greaterthan,lesserthan,greaterthanorequalto,andlesserthanorequalto.Toconnecttwovaluesintoonevalue,atext
concatenation(theandsigni.e.&)isused.Thesignsusedasreferenceoperatorsarethefollowing:acolonisusedtoreference
twocellsandallthecellsbetweenthem(i.e.B1:B10);acommaisusedtocombinemultiplereferencesintoonereference(i.e.
B1:B10,C1:C10);andaspaceisusedasanintersectionoperator. [27]
UsingaformulainExcel.
SpreadsheetGraphics
CellReferencing
Cellreferencingreferstotheabilitytocallonothercells.Therearetwowaysofdoingthis:relativeandabsolutecellreferencing.A
relativecellreferencewilladjustastheformulaiscopiedfromanothercellwhiteanabsolutewillnotadjust.Itisalsoimportantto
notethatausercanreferenceboththesamesheetandothersheetsinabookusingthisconcept.
PivotTables
OnethemostpowerfulfeaturesavailableintheMicrosoftOfficespreadsheetprogramExcel,ispivottables.Pivottablesallowyouto
manipulatelargeamountsofrawdata.[28]Itmakesiteasytoanalyzethedataindifferentways,withasimpleclickanddrag.Vast
quantitiesofdatacanbesummarizedinavarietyofways.Calculationscanbeperformedbyroworcolumn.Datacanbefilteredor
sortedautomaticallybyanyorallofthefields.Excelcanevenrecommendabasiclayoutofapivottablebasedonthetypeofdata
selected.Awizardisavailabletoassistinthecreationofthetable.Animportantthingtorememberwhenusingpivottables,isthat
anytimetheoriginaldatasourceismodified,thedatamustberefreshedinthepivot.
SamplePivotTable
Oncethepivottablehasbeencreatedandthedatahasbeenanalyzedinameaningfulway,itcanthenberepresentedgraphicallyusing
pivotcharts.AllthebasiccharttypesavailableinExcelareavailableinthepivotchartmenu.Muchlikethepivottablestheyarebuilt
on,theycanalsobemanipulatedwithease.Theycanbefilteredtodisplayonlytherelevantinformationformthemaindatasource.
PERFORMANCE TASK
1. Explore the spreadsheet software and list down the advantages for using it .
2. What are the uses of the different kinds of chart in our business world?
3. Draw the different chart and level its function.
ACTIVITY
Hands on:
1. Create a Spreadsheet (file)
a. Using graph
b. With formulas and functions
c. Cell referencing
d. Pivot tables
INFORMATIONSHEET23.1
Lesson2:PreparedComputerOperations:AccessInformationusingComputer:Select,openandclose
desktopfornavigationpurposes.
Closing,minimizing,maximizing,ormovingawindow
Closingorchangingtabs
Movingbetweenopenwindowsandapplications
Navigatingbetweenfieldsandbuttonsonawindow
Manipulatingandmovingthroughtext
Scrollinginawindow
RightclickinganiconorotherelementofWindows
Tomovelefttorightbetweentabsinthecurrentlyselectedwindow,presstheCtrlandTabkeysatthesametime.
Tomoverighttoleftbetweentabsinthecurrentlyselectedwindow,presstheCtrl,Shift,andTabkeysatthesametime.
PERFORMANCETASK
HANDSON:
How to navigate Windows using a keyboard
Opening the Start menu
Opening a program on the desktop
Closing, minimizing, maximizing, or moving a window
Closing or changing tabs
Navigating between fields and buttons on a window
Manipulating and moving through text
A computer keyboard is an input device used to enter characters and functions into the computer
system by pressing buttons, or keys. It is the primary device used to enter text. A keyboard typically
contains keys for individual letters, numbers and special characters, as well as keys for
specific functions.
The keyboard has many keys that make typing and layout easier. Here is a list with a short explanation of useful keys:
Esc - this means escape and is what you press to escape from any control key you have pressed.
Tab this makes indents [a bigger than normal space between the text and the margin.]
Caps Lock if you press this key a green light will appear on the right hand side of the keyboard and any typing you do
will be in capital letters. This is useful for headings.
Shift this button shifts you into a capital letter when you just want to use it briefly for example to start a sentence. Press
shift and the key you want to use. It is also useful when you want to put in the punctuation marks or other symbols that are
on top on the keys of the numbers and some of the punctuation keys on the keyboard. So, if you need a question mark
you will need to press the shift key and the key with the ? on it.
Home if you press this you will get to the first letter of the line you are typing. If you press CTRL [control] and Home at
the same time you will get to the first letter of the first word of your document. This is useful if you have typed a long
document and want to make a change in the first paragraph.
End takes you to the end of a line. Ctrl and End at the same time takes you to the very end of the whole document.
Delete this is an eraser it erases or deletes any letter or word, or line or paragraph you decide you dont want
anymore. If it is a letter, use the mouse to go to the letter and click on the letter. Then press delete the letter in front of
the cursor will be deleted. Some times it is easier and quicker to use the
Backspace arrow just above the Enter button can be used if you want to delete the last letter you have typed. The letter
should disappear. If it is a whole word, or line or paragraph then use your mouse to go to the beginning of the part you
want to delete. Keep your finger clicked down on the left hand mouse button and drag it over the whole bit you want to
delete. This is called HIGHLIGHTING a section and the screen shows this by making the section black and the typing
white. Then press delete and the whole bit will disappear.
Page Up and Page Down - take you to the top and bottom of the page you are currently busy on.
Arrows - Use the arrows on the right hand side of the letters to move the cursor (line on the screen showing your position
- where the next letter will be typed) up, down or sideways. You can also use the mouse to do this. If you want to add or
delete something, move your cursor to the right place and then either delete or add letters.
KEYBOARD TECHNIQUES
Homecase Position
Curve your fingers a little and put them on the ASDF and JKL; keys which are located in the
middle row of the letter keys. This row is called HOMECASE because you always start from these
keys and always return to them.
F and J keys under your index fingers should have a raised line on them to aide in finding these
keys without looking.
Typing Speed
Do not rush when you just started learning. Speed up only when your fingers hit the right
keys out of habit.
Take your time when typing to avoid mistakes. The speed will pick up as you progress.
Pass all typing lessons at a time. It will help you to get above the average typing speed.
SHORTCUT KEYS
Shortcut keys help provide an easier and usually quicker method of navigating and using
computer software programs. Shortcut keys are commonly accessed by using Alt, Ctrl or Shift in
conjunction with a single letter.
Ergonomics is the science concerned with designing safe and comfortable machines for humans.
Following these rules will increase your speed and accuracy at the computer.
Proper Height of Your Keyboard. If it is too high, you will have trouble reaching some of the keys.
If it is too low, your shoulders and arms will become tired.
Proper Distance from the Keyboard. Known as hand-span. Hand-span tells you how far you
should sit away from your keyboard. If you sit too far away, you will not be able to reach the keys
above homerow. If you sit too close, you will not be able to reach the keys below homerow.
Feet Flat on the Floor. They help balance your body for keyboarding. Crossing your ankles or
knees puts a strain on your spine.
Sitting Up Straight. By doing this, it helps you keep your spine straight and comfortable as well
as provide balance.
Proper Wrist Position. Dont raise your palms so much that your wrists arch. Maintaining proper
wrist
position helps avoid fatigue in your hands. If you wrists rest on your keyboard, this will cause you
to make typing mistakes.
Elbows In. Keeping your elbows close to your sides prevents your fingers from coming off home
row. When your fingers come off home row, you then have trouble striking the other keys from home
position.
Eyes on Copy. If you dont keep your eyes on what you are typing, you will lose time from speed,
you may also type the wrong line, skip words or even repeat a line.
Fingers Anchored. While typing, you need to keep your fingers anchored on the home row
keys. When you reach for a key on the top or bottom row, you need to remember to bring your
fingers back to the home row position.
cotton buds.
Shut down your computer. If you're using a wired desktop keyboard, unplug it.
Tilt the keyboard upside down and shake it to remove any loose debris. If you have a can of
compressed air, you can spray it in between the keys as well.
3.
4.
Clean the sides of the keys with a cotton swab dipped in isopropyl alcohol.
For a more thorough cleaning, remove all of the keys. Do this by gently prying up each key with
a small screwdriver or a similar lever. When the keys have been removed, blow out any debris with
compressed air. With a moist (but not wet) cloth, lightly swab all surfaces. Do not allow any type of
fluid to enter the keyboard.
5.
Clean the individual keys and place them back in the keyboard.
Score : _____________
6.)
7.)
8.)
4.)
5.)
9.)
10.)
Criteria
Points
Score
1. Accuracy
50
25
25
Total
100
There are two main types of software: systems software and application software.
Systems software includes the programs that are dedicated to managing the computer itself, such
as the operating system, file management utilities, and disk operating system (or DOS).
System software is a type of computer program that is designed to run a computer's hardware and
application programs. If we think of the computer system as a layered model, the system software is the
interface between the hardware and user applications.
The first line has a list of titles called commands - File, Edit, View, etc
The second and third lines are called the toolbar and have different blocks that you can use
to give quicker commands to the computer.
The fourth line [if there is one] shows your page margins it is called the ruler.
To start a new document (click on new) You can use the block with a folder on it on the
toolbar to do this more quickly. Use your mouse to click on it.)
To open an old document (click on open) and then click on the name of the document you
want to open
To close a document. The computer will ask you if you want to save it before you close it and
then you click on Yes or No.
The next section is to do with how the document looks (Page Set Up) and Print Preview and to print
documents.
Page set up allows you to change the margins of the page so that you can get more (or less) typing
on a page. If you click on Paper Size it allows you to change the page into Portrait (normal A4) or
Landscape (sideways A4)
Print preview allows you to see what the document will look like on a printed page. You can also to
this by using the block on the toolbar with a page and magnifying glass on it.
Print allows you to print the document if your computer is connected to a printer. You can also
print quickly by using the block with a printer on your toolbar.
Score : _____________
Direction: Read and understand the instructions, use your quiz notebook in answering the
questions.
Hands-on:
Using MS word application program:
3
2
1
0
Excellent
Good
Fair
Poor
Youll need:
Step 1: Open an existing Word document or start a new document and type your text.
Step 2: Once youve completed your document and are ready to print, click File in the top
left-hand corner of your document.
Alternatively, some versions of Word may have an Office button instead of a File button its a
round Office icon in the top left-hand corner of the screen. Click on this if you have one.
Step 3: Move down and click Print in the menu. This will bring up the Print
dialogue box.
Step 5: Depending on your printer options, you can choose other printing features such as whether
you want to print all pages or only certain pages. You can also change the orientation of the print
from portrait to landscape and tell your computer and printer whether youre printing on a certain
size of paper. Youll also see, on the right, a preview of your printed document will look like.
Step 6: When youre happy with your settings, click Print. The document will now start printing on
your printer.
Score : _____________
Direction: Read and understand the instructions, use your quiz notebook in answering the
questions.
Hands-on:
a. Create a document in MS word.
3
2
1
0
Excellent
Good
Fair
Poor
You can do all of this by connecting a computer to the Internet, which is also called going online. When
someone says a computer is online, it's just another way of saying it's connected to the Internet.
1.
2.
3.
4.
5.
web browser
physical cables
server
website
serve
Tab
Web browser
Browser
Tabbed browsing
Google Chrome
Internet Explorer
Safari
Mozilla Firefox
Back to top
To conduct the search, point and click your mouse in the search textbox. Type in the
textbox the words or words you would like to search. Then point and click your mouse on
the Google Search button below the search textbox.
Back to top
As an example, the word flowers was entered into the Google textbox and after clicking on
the Google Search button these are the results:
Every phrase in either blue with an underline may be clicked on to visit that particular site.
These are hyperlinks to websites. The websites deemed most fitting for the search are found
at the near the top of the list. There are also paid sponsors found at the top (shaded) and to
the right of the screen that you may visit if you wish. You can see actual web addresses in
green text.
In addition, notice the results area:
Back to top
These results are found on the top right of the page. 233,000,000 would be impossible to go
through therefore you will need to learn ways to reduce the amount of results. To continue
reviewing the search results pages, scroll to the bottom of the Google webpage until you see:
Click on the number 2 or on the blue arrow to the right to continue through the search
results.
Answer Key
1. T
2. F
3. T
4. T
5. F
YES
Did you.
1. Go to Google?
NO
Understanding URLs
Every time you click a link on a website or type a web address into your browser, its a URL.
URL stands for Uniform Resource Locator. Think of it like a street address, with each
portion of the URL as different parts of the address, and each giving you different
information. Lets examine each component of a URL and what we can learn from it.
Scheme
Every URL begins with the scheme. This tells your browser what type of address it is so the
browser connects to it correctly. There are many types of schemes, but for typical web
browsing you will mostly see http and https. Your browser usually wont show the scheme
in the address bar, and usually you dont need to type the scheme when typing a web
address; instead, you can just begin with the domain name. The scheme is still always part
of the URL; it just isnt being displayed.
Domain name
The domain name is the most prominent part of a web address. Typically, different pages
on the same site will continue to use the same domain name. For example, all pages on
this site share the GCFLearnFree.org domain name.
Each segment of the domain name separated by a period is called a domain. The domain
on the right is called a top-level domain, with the domain to the left of it called the
second-level domain, then third-level domain, and so on.
You can often learn something about the site from the domains. One of the domains
usually identifies the organization, while the top-level domain may give you more general
information on what kind of site it is. For example, in the domain name ferry.ncdot.gov, the
.gov domain means it is a government website in the United States, the ncdot domain
identifies it as the website of the North Carolina Department of Transportation (NCDOT),
and the ferry domain means this particular page is about ferries operated by the NCDOT.
In most URLs, the www domain can be omitted. GCFLearnFree.org and
www.GCFLearnFree.org lead to the same page. However, other subdomains cannot be
omitted. For example, all pages under classes.GCFLearnFree.org require the classes
domain in the URL.
File path
The file pathoften just called the pathtells your browser to load a specific page. If you
dont specify a path and only enter a domain name, your browser is still loading a specific
page; its just loading a default page, which usually will help you navigate to other pages.
URLs that end with the domain name without a file path usually will load a homepage or
an index page that's designed to help you navigate to specific pages on the site. Often, if you
cant remember the file path for a specific page, you can go to the homepage and search for
it.
Parameters
Some URLs include a string of characters after the pathbeginning with a question mark
called the parameter string. You have probably noticed this part of a URL appear in your
address bar after performing a search on Google or YouTube. The parameter string can be
clear or confusing to a human user, but it is critical information for the server.
Anchor
Also appearing after the path, the anchor tells your browser to scroll to or load a specific
part of the page. Usually the anchor begins with a hashtag and is used to direct your
browser to a specific part of a very long page, much like a bookmark. Different anchors
dont load different pages; they simply tell the browser to display different parts of the page.
A whole URL
When combined, these elements make up a URL, although not all URLs will have all five
parts.
Keep in mind that these are the most common components of a URL. There are many other
parts, but these are the five you will see most often and that can usually give you the most
information.
I. Identification: Identify the parts of a URL. Write your answers on your answer sheet.
http://en.wikipedia.org/w/index.php?title=Burrito#Breakfast_burrito
2. The keyboard menu will appear. Use the Wii Remote to point at the
letter you wish to enter, and press the A Button. You can also use a
compatible USB keyboard to type in the URL you wish to access. You do
not need to type "http://". However, to manually enter a secure site
("https//:") you will need to enter the full URL.
3. Click "OK" when finished. The Internet Channel will then attempt to
access the URL you have entered.
Assessment Method:
Demonstration, Performance Criteria checklist
Understanding hyperlinks
Have you ever noticed that certain words on the Web look a little bit different? Whenever
you see a word or phrase that's underlined in blue, it's probably a hyperlink, or link for
short. You might already know how links work, even if you've never thought about them
much before. For example, try clicking the link below.
Hey, I'm a link! Click me!
Link are used to navigate the Web. When you click a link, it will take you to a different
webpage. In the example below, we're clicking a link to learn more about the DuPont Circle
neighborhood.
You may also notice that your cursor changes into a hand icon whenever you hover over a
link.
If you see this icon, it means you've found a link. You'll find other types of links this way
too. For example, many websites actually use images as links, so you can just click the
image to navigate to another page. In the example below, we're clicking the picture of the
deer-shaped salt and pepper shakers to open a page with more information about them.
Links don't always go to another website. In some cases, they allow you to download a file.
When you click a link like this, the file will be downloaded to your computer. In the example
below, we're downloading an installation file for a new application.
As you can see, links are an important part of using the Web. They allow you to navigate
between different webpages, download files, and do a whole lot more.
Bookmark
Movies
News
Shopping
Productivity
Learni
ng
Music
Spotify
Ebay
Gmail
TED
Pandora
CraigsList
Amazon Prime
Instant Video
AlJezeera
Etsy
Microsoft On
Line
KHAN
Academy
HackerNew
s
New Egg
Rotten
Tomatoes
Think Greek
LiveStation
SoundClo
ud
iTunes
Coursera
LastFM
DouLingo
Youtube
1. Assign each student a bookmark and let him/her classify the chosen
bookmark
Bookmark
Title, author,
genre, and
your name
Enter
description
Outstanding Good
Satisfactory
Needs
Improvement
Unsatisfactory
Brief
description of
bookmark
Grammar and
spelling
Overall
appearance
Assessment Method:
Hands on, Internet related activity
Performance Criteria Checklist
LESSON 2:
6.1 Implement basic file maintenance procedures in line with the standards operating
procedures
Naming convention
FAT file system used by MS-DOS provides file name of only 8 characters long.
FAT file system used by Windows 2000 supports long file name. The full path of file
Security
FAT does not support local and folder security. A user logged on a computer locally has
full access to the files and folders in FAT partitions of the computer.
Partition size
FAT32 increases the number of bits used to address cluster. A cluster is a set of sectors.
It reduces the size of each cluster. It supports larger disk (up to 2TB) and better storage
efficiency.
Access Speed
FAT32 provides good file access in partition sizes less than 500 MB or greater than 2 GB.
It provides better disk space utilization.
Naming Conventions
File names can be up to 255 characters
File names can contain most characters except / \ * | :
File names are not case sensitive
Security
NTFS provides file and folder security. Files and folders are safer than FAT. Security is
maintained by assigning NTFS permissions to files and folders. Security is maintained at
the local level and the network level. The permissions can be assigned to individual files
and folders. Each file or folder in an NTFS partition has an Access Control List. It contains
the users and group security identifier (SID) and the privileges granted to them.
Partition Size
The NTFS partition and file sizes are much bigger than FAT partitions and files. The
maximum size of an NTFS partition or file can be 16 Exabyte. However, the practical
limitation is two Terabytes. The file size can be in the range of 4GB to 64GB.
File compression
NTFS provides file compression of as much as 50%.
High reliability
NTFS is highly reliable. It is recoverable file system. It uses transaction logs to update the
file and folders logs automatically. The system also has a great amount of fault tolerance.
It means that if transaction fails due to power or system failure, the logged transactions
are used to recover the data.
DIFFERENCES
Criteria
OUTPUT
RATE
15
12
10
0
No output
OUTPUT
Performed tasks
accurately/precisely
Performed tasks
within the time
limit
Performed tasks
independently
LESSON 2:
6.2 Implement basic file maintenance procedures in line with the standards operating
procedures
Back up refers to a data copy stored in a strategic/secure storage or drive for future use.
Backing up refers to the copying and archiving of computer data so it may be used to restore the original after
a data loss event. The verb form is to back up in two words, whereas the noun is backup.
Unwanted files are wastes, unwanted or undesired wastes, litters or trashes (computing), a way in which operating
systems dispose of unwanted files
Update/Patch is a piece of software designed to update a computer program or its supporting data, to fix or improve
it.[1] This includes fixing security vulnerabilities[1] and other bugs, with such patches usually called bugfixes or bug
fixes,[2] and improving the usability or performance. Although meant to fix problems, poorly designed patches can
sometimes introduce new problems (see software regressions). In some special cases updates may knowingly
break the functionality, for instance, by removing components for which the update provider is no longer licensed or
disabling a device.
Updating is the process of injecting fixes of computer programs or software to address bugs or errors.
There are several ways how to backup files in windows 7. Below are some of them.
1.
Select the Start button, then select Control Panel > System and Maintenance > Backup and Restore.
2.
If you've never used Windows Backup before, or recently upgraded your version of Windows, selectSet
up backup, and then follow the steps in the wizard.
If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you
can manually create a new backup by selecting Back up now.
If youve created a backup before, but want to make a new, full backup rather than updating the old
one, select Create new, full backup, and then follow the steps in the wizard.
Note
Do not back up files to the same hard disk that Windows is installed on. For example, do not back up files to a
recovery partition. Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place
to prevent unauthorized people from having access to your files; a fireproof location separate from your
computer is recommended. You might also consider encrypting the data on your backup.
Right-click the Start button, then select Control Panel > System and
Maintenance > Backup and Restore.
2.
In the left pane, choose Create a system image, and then follow the steps in the
wizard.
If you're prompted for an administrator password or confirmation, type the password or
provide confirmation.
Note
To create a system image of a drive, it must be formatted to use the NTFS file system. If you save the
system image on a hard drive or USB flash drive, it must be formatted to use the NTFS file system.
If you're saving your system images in a network location, you can only keep the most
current system image for each computer. System images are saved in the format of
drive\WindowsImageBackup\computer name\. If you have an existing system image for a
computer and are creating a new one for the same computer, the new system image will
overwrite the existing one.
If you want to keep the existing system image, you can copy it to a different location before
creating the new system image by following these steps.
1.
2.
Right-click the Start button, then select Control Panel > System and
Maintenance > System.
2.
3.
4.
In the System Protection dialog box, type a description, and then select Create.
Restore
1.
Right-click the Start button, then select Control Panel > System and
Maintenance > Backup and Restore.
2.
To restore the files of all users, choose Restore all users' files.
3.
To look through the contents of the backup, select Browse for files or Browse
for folders. When you're browsing for folders, you won't be able to see the individual files in
a folder. To view individual files, use the Browse for files option.
To search the contents of the backup, select Search, type all or part of a file
name, and then selectSearch.
Tips
If you're searching for files or folders associated with a specific user account, you can improve search
results by typing the location of the file or folder in the Search for box. For example, to search for all JPG
files that were backed up, typeJPG in the Search for box. To only search for JPG files associated with the
user Bill, type C:\Users\Bill\JPG in the Search for box.
You can use wildcard characters such as *.jpg to search for all JPG files that were backed up.
Select the Start button, then select Control Panel > System and Maintenance
> Backup and Restore.
2.
Choose Select another backup to restore files from, and then follow the steps in
the wizard.
If you're prompted for an administrator password or confirmation, type the password or
provide confirmation.
Find files that were restored from a backup made on another computer
If you're restoring files from a backup that was made on another computer, the files will be
restored in a folder under the user name that was used to create the backup. If the user
names are different, you'll need to navigate to the folder where the files are restored. For
example, if your user name was Molly on the computer that the backup was made on but
your user name is MollyC on the computer that the backup is being restored on, the
restored files will be saved in a folder labeled Molly.
You can find the restored files by following these steps.
1.
2.
Double-click the icon of the drive that the files are saved on, for example C:\.
3.
Double-click the Users folder. You will see a folder for each user account.
4.
Double-click the folder for the user name that was used to create the backup. The
restored files will be in the various folders based on where they were located originally.
Restore files from a file backup after restoring your computer from a system image
backup
After you restore your computer from a system image backup, there may be
newer versions of some of your files in a file backup that you want to
restore.
To restore files from a file backup that was created after the system image
backup was created, follow these steps.
1.
Select the Start button, then select Control Panel > System and
Maintenance >Backup and Restore.
2.
Choose Select another backup to restore files from.
In Backup Period, select the date range of the backup that contains the files that you
want to restore, and then follow the steps in the wizard.
STEPS
MAKING BACK
UP
CREATING
SYSTEM
IMAGE
CREATING
RESTORE
POINT
RESTORING
DATA(via
Restore Point)
1
2
3
4
5
6
7
8