51/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 COMPUTER FAN A computer fan is any fan inside a computer case used for cooling purposes, and may refer to fans that draw cooler air into the case from the outside, expel warm air from inside, or move air across a heatsink to cool a particular component. The use of fans to cool a computer is an example of active cooling. LAPTOP COOLER A laptop/notebook cooler, cooler pad or chill mat is an accessory for laptop computers that helps reduce their operating temperature. Normally used when the laptop's fan device is unable to sufficiently cool the laptop, a cooling pad may house active or passive cooling methods and rests beneath the laptop. Active coolers move air or liquid to direct heat away from the laptop quickly, while passive methods may rely on thermally conductive materials or increasing passive airflow. TV Tuner or TV Video Capture A TV tuner card is a computer component that allows television signals to be received by a computer. Most TV tuners also function as video capture cards, allowing them to record television programs onto a hard disk. SUPPORT HARDWARE Covered the basic hardware that makes up a computer. There are, however, additional components needed to support safe computer operation. In this lesson, we look at several devices that protect and enhance the value of a computer. In addition to the devices that support a computer's data-processing functions, there are others that enhance its operation and performance. The following table lists some of these devices.
52/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 DEVICE DESCRIPTION Power supply Converts a local power source (typically 110 volts AC in the United States) to 3.3, 5, or 12 volts DC. Most power supplies also perform some basic line conditioning and surge-protection functions. Surge suppressor Used to prevent large power spikes (for instance, lightning) from damaging a computer. UPS Uninterruptible power supply. Acts as both a surge suppresser (to prevent high-power spikes) and a power leveler to provide the computer with a constant source of power. Can even provide power during a power failure or interruption (although the duration depends on the UPS and the computer's power consumption) so that the user can safely save data before shutting down. CASE The box that houses most of the system must provide an environment that minimizes electrical interference to other electronic devices in the area. It should provide a proper heat level for safe operation and bays and connections for drives, circuit boards, and I/O devices. Don't let the term support hardware lead you to underestimate the importance of these components. How important are roads to commerce, or water to a city? Without a reliable power source, modern PCs would not exist. The internal power supply keeps a clean current running to the system.
53/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Self-Check 5.1-2 Directions: Write True if the Statement is Correct and False if it is not correct. 1. The central processing unit (CPU) is the heart and brain of the computer. 2. Data Bus is a group of computer chips or integrated circuits (ICs) that, when working together, manage and control the computer system. 3. Clock establishes the maximum speed at which the processor can execute commands. 4. Scanner generates a "hard copy" of information. Includes dot matrix, ink jet, and laser varieties. 5. Modem allows communication between computers over long and short distances. 6. An expansion card that allows several computers to connect to each other and share information and programs. Also called network interface card (NIC). 7. USB cable are both ways to connect a disk drive to a computer and use the one that matches your computer mother board. 8. Computer fan is a protective device that absorbs and dissipates the excess heat generated by a system. 9. Automatic voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. 10. Case is a box that houses most of the system must provide an environment that minimizes electrical interference to other electronic devices in the area.
54/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 ANSWER KEY 5.1-2 1. True 2. False 3. True 4. False 5. True 6. True 7. False 8. False 9. True 10. True
55/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Information Sheet 5.1-3 LO1. Plan and prepare for task to be undertaken Learning Objectives: In an electronics shop scenario, the trainee will be able to plan and prepare for task to be undertaken. Common Types of Computer Software Computer Software is the languages of the computer. And like the human languages, there are many different computer languages. Essentially, Computer software can be divided into three main groups depending on their use and application these are: 1. System software or Operating System software Is the software used by the computer to translate inputs from various sources into a language which a machine can understand? Basically, the System software or the operating system software coordinates the different hardware components of a computer. There are many OS in the market. The most popular OS are from the stable of Windows, Microsoft has migrated to Vista, its latest offering in the market. It may come as a surprise to some ` that there are other operating systems used by others. Among these UNIX is use for large office setups with extensive networking. XENIX is software which has now become redundant. HP –UX and AIX are some operating system used by HP computers. Apache OS is quite popular with web servers. IBM is still using proprietary operating system for its main frames. Proprietary systems are generally built with the help of a variant of UNIX operating system. 2. Application software A normal user rarely gets to see the operating system or to work with it. But all of us are familiar with application software which we must use to interact with computer. Popular example of application software is the Microsoft office suite which include word, excel, and PowerPoint. We have used this application extensively. Internet explorer, Mozilla Firefox is two applications software used to access the internet. Application Software - also provides support to the physical components of computers. System software coordinates all external devices of computer system like printer, keyboard, displays etc. Application software is used for commercial purpose. The application software is widely used in educational, business and medical fields. Computer games are the most popular forms of application software. Industrial
56/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 automation, databases, business software and medical software prove to be of great help in the respective fields. Educational software is widely used in educational institutes across the globe. 3. Programming Languages; Programmers use the programming software to develop the programming languages necessary to run computer software. Compliers, interpreters, linkers and text editors are some of the basic tools used in programming software. Programming program or Programming Languages Now this a kind of computer software which is used exclusively by computer programmers. Unless we are also programmers, we are unlikely to come across programming languages. A simple way to understand programming languages is to think of them as bricks which can be used to create application and operating system. C++, Java and SIMLAB are some popular programming languages. Generally, java is used for internet application. C++ is a language of a professional developers and used extensively in developing operating system. PHP is another language used for internet applications. There is a new class of languages which are utilized for mobiles. These are light weight, modular languages which are used to design mobile application. Computer software fall under three basic categories; system software or operating system software, application software, and Programming languages. We usually use application on a day-to-day basis. These applications are themselves created using programming languages. OTHER TYPES OF SOFTWARE There are many different types of software, which can be a little confusing for the uninitiated. Following is a brief definition of each type, and the differences between them. Retail software: This type of software is sold off the shelves of retail stores. It includes expensive packaging designed to catch the eye of shoppers and, as such, is generally more expensive. An advantage of retail software is that it comes with printed manuals and installation instructions, missing in hardcopy form from virtually every other category of software. However, when hardcopy manuals and instructions are not required, a downloadable version off the Internet will be less expensive, if available. OEM software: OEM stands for "Original Equipment Manufacturer" and refers to software sold in bulk to resellers, designed to be bundled with hardware. For example, Microsoft has contracts with various companies
57/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 including Dell Computers, Toshiba, Gateway and others. Microsoft sells its operating systems as OEM software at a reduced price, minus retail packaging, manuals and installation instructions. Resellers install the operating system before systems are sold and the OEM CD is supplied to the buyer. The "manual" consists of the Help menu built into the software itself. OEM software is not legal to buy unbundled from its original hardware system. Shareware: This software is downloadable from the Internet. Licenses differ, but commonly the user is allowed to try the program for free, for a period stipulated in the license, usually thirty days. At the end of the trial period, the software must be purchased or uninstalled. Some shareware incorporates an internal clock that disables the program after the trial period unless a serial number is supplied. Other shareware designs continue to work with "nag" screens, encouraging the user to purchase the program. Cripple ware: This software is similar to shareware except that key features will cease to work after the trial period has ended. For example, the "save" function, the print function, or some other vital feature necessary to use the program effectively may become unusable. This "cripples" the program. Other types of cripple ware incorporate crippled functions throughout the trial period. A purchase is necessary to unlock the crippled features. Demo software: Demo software is not intended to be a functioning program, though it may allow partial functioning. It is mainly designed to demonstrate what a purchased version is capable of doing, and often works more like an automated tutorial. If a person wants to use the program, they must buy a fully functioning version. Adware: This is free software that is supported by advertisements built into the program itself. Some adware requires a live Internet feed and uses constant bandwidth to upload new advertisements. The user must view these ads in the interface of the program. Disabling the ads is against the license agreement. Adware is not particularly popular. Spyware: Spyware software is normally free, but can be shareware. It clandestinely "phones home" and sends data back to the creator of the spyware, most often without the user's knowledge. For example, a multimedia player might profile what music and video files the software is called upon to play. This information can be stored with a unique identification tag associated with the specific program on a user's machine, mapping a one-to-one relationship. The concept of spyware is very unpopular, and many programs that use spyware protocols were forced to disclose this to users and offer a means to turn off reporting functions. Other spyware programs divulge the protocols in their licenses, and make acceptance of the spyware feature a condition of agreement for using the software.
58/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Freeware: Freeware is also downloadable off the Internet and free of charge. Often freeware is only free for personal use, while commercial use requires a paid license. Freeware does not contain spyware or adware. If it is found to contain either of these, it is reclassified as such. Public domain software: This is free software, but unlike freeware, public domain software does not have a specific copyright owner or license restrictions. It is the only software that can be legally modified by the user for his or her own purposes. People are encouraged to read licenses carefully when installing software, as they vary widely. GENERAL SECURITY, PRIVACY LEGISLATION AND COPYRIGHT The security of software is threatened at various points throughout its life cycle, both by inadvertent and intentional choices and actions taken by ―insiders‖— individuals closely affiliated with the organization that is producing, deploying, operating, or maintaining the software, and thus trusted by that organization— and by ―outsiders‖ who have no affiliation with the organization. The software’s security can be threatened: • during its development: A developer may corrupt the software— intentionally or unintentionally—in ways that will compromise the software’s dependability and trustworthiness when it is operational. • during its deployment (distribution and installation): If those responsible for distributing the software fail to tamperproof the software before shipping or uploading, or transmit it over easily intercepted communications channels, they leave the software vulnerable to intentional or unintentional corruption. Similarly, if the software’s installer fails to ―lock down‖ the host platform, or configures the software insecurely, the software is left vulnerable to access by attackers. during its operation: Once COTS and open-source software has gone operational, vulnerabilities may be discovered and publicized; unless security patches and updates are applied and newer supported versions (from which the root causes of vulnerabilities have been eliminated) are adopted, such software will become increasingly vulnerable. Noncommercial software and open-source software (OSS) may also be vulnerable, especially as it may manifest untrustworthy behaviors over time due to changes in its environment that stress the software in ways that were not anticipated and simulated during its testing. Any software system that runs on a networkconnected platform has its vulnerabilities exposed during its operation. The level of exposure will vary depending on whether the network is public or private, Internet-connected or not, and whether the software’s environment has been configured to minimize its exposure. But even in highly controlled networks and ―locked down‖ environments, the software may be threatened by malicious insiders (users, administrators, etc.).
59/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 • during its sustainment: If those responsible for addressing discovered vulnerabilities in released software fail to issue patches or updates in a timely manner, or fail to seek out and eliminate the root causes of the vulnerabilities to prevent their perpetuation in future releases of the software, the software will become increasingly vulnerable to threats over time. Also, the software’s maintainer may prove to be a malicious insider, and may embed malicious code, exploitable flaws, etc., in updated versions of the code. Both research and real-world experience indicate that correcting weaknesses and vulnerabilities as early as possible in the software’s life cycle is far more cost-effective over the lifetime of the software than developing and releasing frequent security patches for deployed software. Software Assurance The main objective of software assurance is to ensure that the processes, procedures, and products used to produce and sustain the software conform to all requirements and standards specified to govern those processes, procedures, and products. Software security and secure software are often discussed in the context of software assurance. Software assurance in its broader sense refers to the assurance of any required property of software. For software practitioners at the National Aeronautics and Space Administration (NASA), software assurance refers to the assurance of safety as a property of software. Similarly, in other communities, software assurance may refer to assurance of reliability or quality. In the context of this article, software assurance is concerned with assuring the security of software. An increasingly agreed-upon approach for assuring the security of software is the software security assurance case, which is intended to provide justifiable confidence that the software under consideration (1) is free of vulnerabilities; (2) functions in the ―intended manner, ‖ and this ―intended manner‖ does not compromise the security or any other required properties of the software, its environment, or the information it handles; and (3) can be trusted to continue operating dependably under all anticipated circumstances, including anomalous and hostile environmental and utilization circumstances—which means that those who build the software need to anticipate such circumstances and design and implement the software to be able to handle them gracefully. Such circumstances include • the presence of unintentional faults in the software and its environment • the exposure of the operational software to accidental events that threaten its security
60/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 • the exposure of the software to intentional choices or actions that threaten its security during its development, deployment, operation, or sustainment Software is more likely to be assuredly secure when security is a key factor in the following aspects of its development and deployment: • Development principles and practices: The practices used to develop the software and the principles that governed its development are expressly intended to encourage and support the consideration and evaluation of security in every phase of the software’s development life cycle. Some secure development principles and practices for software are suggested later in this article. • Development tools: The programming language(s), libraries, and development tools used to design and implement the software are evaluated and selected for their ability to avoid security vulnerabilities and to support secure development practices and principles. • Testing practices and tools: The software is expressly tested to verify its security, using tools that assist in such testing. • Acquired components: Commercial off-the-shelf (COTS) and OSS components are evaluated to determine whether they contain vulnerabilities, and if so whether the vulnerabilities can be remediated through integration to minimize the risk they pose to the software system. • Deployment configuration: The installation configuration of the software minimizes the exposure of any residual vulnerabilities it contains. • Execution environment: Protections are provided by the execution environment that can be leveraged to protect the higher-level software that operates in that environment. Practitioner knowledge: The software’s analysts, designers, developers, testers, and maintainers are provided with the necessary information (e.g., through training and education) to give them sufficient security awareness and knowledge to understand, appreciate, and effectively adopt the principles and practices that will enable them to produce secure software.
61/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 SELF-CHECK 5.1-2 MULTIPLE CHOICE Direction: Read the statement carefully and choose the letter of the best answer. 1. The software used by the computer to translate inputs from various sources into a language which a machine can understand. a. Windows b. System software or Operating System software c. System software 2. It incorporates an internal clock that disables the program after the trial period unless a serial number is supplied. a. Cripple ware b. Shareware c. Demo Software 3. It clandestinely "phones home" and sends data back to the creator of the spyware, most often without the user's knowledge. a. Adware b. Spyware c. Freeware 4. The languages of the computer. a. System Software b. Computer Software c. Operating Software 5. It is widely used in educational, business and medical fields. a. Microsoft b. Applications c. Application Software
62/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 ANSWER KEY 5.1-2 1. b 2. b 3. b 4. b 5. c
63/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Outcome 2 INPUT DATA INTO COMPUTER CONTENTS: • Basic ergonomics of keyboard and computer use • Main types of computers and basic features of different operating systems • Main parts of a computer • Storage devices and basic categories of memory • Relevant types of software • General security • Viruses • OH & S principles and responsibilities • Calculating computer capacity • Reading skills required to interpret work instruction • Communication skills CONDITIONS: Students/trainees must be provided with the following: • Computer hardware with peripherals • Appropriate software EQUIPMENT TOOLS AND ACCESSORIES ● OHP ● TV, LCD ● Working Table ● Anti-static wrist rap ● Hand Gloves ● Goggles SUPPLIES AND MATERIALS LEARNING MATERIALS • Pentel Pens • Eraser • Paper • Alcohol • White Board • White Board Marker • Handouts • Paper-based assessment form. • Assessment record book. • Visual Aids • Related textbooks • CDs for related film show • CBLM
64/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 METHODOLOGIES: • Modular • Film showing • Computer- based training (e-learning) • Project method • On the job training ASSESSMENT METHODS: • Demonstration & questioning • Observation & questioning • Third party report • Assessment of output product • Portfolio • Computer- based assessment
65/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Experiences Learning Outcome 2 INPUT DATA INTO COMPUTER Learning Activities Special Instructions 1. Read Information Sheet 5.2-1 on Different Parts of Computer Keyboards 2. Answer Self-Check 5.2-1 Compare answer with Answer Key 5.2-1 3. Read Information Sheet 5.2-2 on Parts of a Computer Mouse
66/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 INFORMATION SHEET 5.2-1 DIFFERENT PARTS OF A COMPUTER KEYBOARDS Learning Objectives: In an electronics shop scenario, the trainee will be able to Input data into computer. DIFFERENT PARTS OF A COMPUTER KEYBOARD The computer keyboard works much like a mouse; many keyboard shortcuts can eliminate the need for a mouse. Keys are split into different parts of the keyboard, each providing a specific function. Function Keys key is composed of the letter F and a number, ranging from F1 to F12. Each of the Function Keys performs a specific operation based upon what software is being used. Numeric Keypad Numeric Keypad. This consists of the numbers 1 through 9, an asterisk, a slash, a dash, a plus sign, an enter key and a period. There is also is a "Num Lock" key, which is used to turn on and off the Numeric Keypad. Navigation Keys through documents and websites. Examples of Navigation Keys are the up, down, left and right arrows.
67/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Typewriter Keyboard includes letters and numbers. Most typing is done with these keys. Special Keys key (used to insert the curser) and the Shift key (used to make capital letters or symbols that are located on the number keys). Escape -hand corner of the keyboard. It is used to cancel operations. KEYBOARD BASICS Keyboards differ by manufacturer and the operating system they are designed for. A keyboard's primary function is to act as an input device. Using a keyboard, a person can type a document, use keystroke shortcuts, access menus, play games and perform a variety of other tasks. Keyboards can have different keys depending on the manufacturer, the operating system they're designed for, and whether they are attached to a desktop computer or part of a laptop. But for the most part, these keys, also called keycaps, are the same size and shape from keyboard to keyboard. They're also placed at a similar distance from one another in a similar pattern, no matter what language or alphabet the keys represent. Most keyboards have between 80 and 110 keys, including: • Typing keys • A numeric keypad • Function keys • Control keys
68/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 The TYPING KEYS include the letters of the alphabet, generally laid out in the same pattern used for typewriters. According to legend, this layout, known as QWERTY for its first six letters, helped keep mechanical typewriters' metal arms from colliding and jamming as people typed. Some people question this story -- whether it's true or not, the QWERTY pattern had long been a standard by the time computer keyboards came around. Keyboards can also use a variety of other typing key arrangements. The most widely known is Dvorak, named for its creator, August Dvorak. The Dvorak layout places all of the vowels on the left side of the keyboard and the most common consonants on the right. The most commonly used letters are all found along the home row. The home row is the main row where you place your fingers when you begin typing. People who prefer the Dvorak layout say it increases their typing speed and reduces fatigue. Other layouts include ABCDE, XPeRT, QWERTZ and AZERTY. Each is named for the first keys in the pattern. The QWERTZ and AZERTY arrangements are commonly used in Europe. The numeric keypad is a more recent addition to the computer keyboard. As the use of computers in business environments increased, so did the need for speedy data entry. Since a large part of the data was numbers, a set of 17 keys, arranged in the same configuration found on adding machines and calculators, was added to the keyboard. The Apple keyboard's control keys include the "Command" key. Other common control keys include: • Home • End • Insert • Delete • Page Up • Page Down • Control (Ctrl) • Alternate (Alt) • Escape (Esc)
69/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 The Windows keyboard adds some extra control keys: two Windows or Start keys, and an Application key. Apple keyboards, on the other hand, have Command (also known as "Apple") keys. A keyboard developed for Linux users features Linux-specific hot keys, including one marked with "Tux" the penguin - the Linux logo/mascot. INSIDE THE KEYBOARD A keyboard is a lot like a miniature computer. It has its own processor and circuitry that carries information to and from that processor. A large part of this circuitry makes up the key matrix. The microprocessor and controller circuitry of a keyboard The key matrix is a grid of circuits underneath the keys. In all keyboards (except for capacitive models, which we'll discuss in the next section), each circuit is broken at a point below each key. When you press a key, it presses a switch, completing the circuit and allowing a tiny amount of current to flow through. The mechanical action of the switch causes some vibration, called bounce, which the processor filters out. If you press and hold a key, the processor recognizes it as the equivalent of pressing a key repeatedly. When the processor finds a circuit that is closed, it compares the location of that circuit on the key matrix to the character map in its read-only memory (ROM). A character map is basically a comparison chart or lookup table. It tells the processor the position of each key in the matrix and what each keystroke or combination of keystrokes represents. For example, the character map lets the processor know that pressing the a key by itself corresponds to a small letter "a," but the Shift and a keys pressed together correspond to a capital "A." The key matrix
70/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 A computer can also use separate character maps, overriding the one found in the keyboard. This can be useful if a person is typing in a language that uses letters that don't have English equivalents on a keyboard with English letters. People can also set their computers to interpret their keystrokes as though they were typing on a Dvorak keyboard even though their actual keys are arranged in a QWERTY layout. In addition, operating systems and applications have keyboard accessibility settings that let people change their keyboard's behavior to adapt to disabilities. KEYBOARD SWITCHES Keyboards use a variety of switch technologies. Capacitive switches are considered to be non-mechanical because they do not physically complete a circuit like most other keyboard technologies. Instead, current constantly flows through all parts of the key matrix. Each key is spring-loaded and has a tiny plate attached to the bottom of it. When you press a key, it moves this plate closer to the plate below it. As the two plates move closer together, the amount of current flowing through the matrix changes. The processor detects the change and interprets it as a key press for that location. Capacitive switch keyboards are expensive, but they have a longer life than any other keyboard. Also, they do not have problems with bounce since the two surfaces never come into actual contact. All of the other types of switches used in keyboards are mechanical in nature. Each provides a different level of audible and tactile response -- the sounds and sensations that typing creates. Mechanical key switches include: • Rubber dome • Membrane • Metal contact • Foam element
71/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 This keyboard uses rubber dome switches Rubber dome switches are very common. They use small, flexible rubber domes, each with a hard carbon center. When you press a key, a plunger on the bottom of the key pushes down against the dome, and the carbon center presses against a hard, flat surface beneath the key matrix. As long as the key is held, the carbon center completes the circuit. When the key is released, the rubber dome springs back to its original shape, forcing the key back up to its at-rest position. Rubber dome switch keyboards are inexpensive, have pretty good tactile response and are fairly resistant to spills and corrosion because of the rubber layer covering the key matrix. Rather than having a switch for each key, membrane keyboards use a continuous membrane that stretches from one end to another. A pattern printed in the membrane completes the circuit when you press a key. Some membrane keyboards use a flat surface printed with representations of each key rather than keycaps. Membrane keyboards don't have good tactile response, and without additional mechanical components they don't make the clicking sound that some people like to hear when they're typing. However, they're generally inexpensive to make. Metal contact and foam element keyboards are increasingly less common. Metal contact switches simply have a spring-loaded key with a strip of metal on the bottom of the plunger. When the key is pressed, the metal strip connects the two parts of the circuit. The foam element switch is basically the same design but with a small piece of spongy foam between the bottom of the plunger and the metal strip, providing a better tactile response. Both technologies have good tactile response, make satisfyingly audible "clicks," and are inexpensive to produce. The problem is that the contacts tend to wear out or corrode faster than on keyboards that use other technologies. Also, there is no barrier that prevents dust or liquids from coming in direct contact with the circuitry of the key matrix. FROM THE KEYBOARD TO THE COMPUTER As you type, the processor in the keyboard analyzes the key matrix and determines what characters to send to the computer. It maintains these characters in its memory buffer and then sends the data.
72/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 A PS/2 type keyboard connector. Many keyboards connect to the computer through a cable with a PS/2 or USB (Universal Serial Bus) connector. Laptops use internal connectors. Regardless of which type of connector is used, the cable must carry power to the keyboard, and it must carry signals from the keyboard back to the computer. Wireless keyboards, on the other hand, connect to the computer through infrared (IR), radio frequency (RF) or Bluetooth connections. IR and RF connections are similar to what you'd find in a remote control. Regardless of which sort of signal they use, wireless keyboards require a receiver, either built in or plugged in to the USB port, to communicate with the computer. Since they don't have a physical connection to the computer, wireless keyboards have an AC power connection or use batteries for power. Microsoft wireless keyboard This Microsoft wireless keyboard is battery powered. Whether it's through a cable or wireless, the signal from the keyboard is monitored by the computer's keyboard controller. This is an integrated circuit (IC) that processes all of the data that comes from the keyboard and forwards it to the operating system. When the operating system (OS) is notified that there is data from the keyboard, it checks to see if the keyboard data is a system level command. A good example of this is Ctrl-Alt-Delete on a Windows computer, which reboots the system. Then, the OS passes the keyboard data on to the current application.
73/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 The application determines whether the keyboard data is a command, like Altf, which opens the File menu in a Windows application. If the data is not a command, the application accepts it as content, which can be anything from typing a document to entering a URL to performing a calculation. If the current application does not accept keyboard data, it simply ignores the information. This whole process, from pressing the key to entering content into an application, happens almost instantaneously. THE MAGIC BEHIND KEYBOARDING There really is no "magic" or secret about good typing ability. It just takes time and lots and lots of practice. However, there are some important things that will help you in the process:
74/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 **NOTE It is also important to strike the keys with a short quick stroke. TIPS AND TRICKS Please Read the following: Learning to keyboard is not easy. It will take lots of self-discipline and patience. Sometimes it takes weeks to show just small improvements. If you look at keyboarding as a skill that can be mastered with lots of practice you will do fine. One key factor to mastering keyboarding is good technique. Correct technique is the most important skill any beginning typist can learn. Speed and accuracy are all built around good technique. List of the keyboard shortcuts that are available in Windows XP General keyboard shortcuts 1. CTRL+C (Copy) 2. CTRL+X (Cut) 3. CTRL+V (Paste) 4. CTRL+Z (Undo) 5. DELETE (Delete) 6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) 7. CTRL while dragging an item (Copy the selected item) 8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) 9. F2 key (Rename the selected item) 1. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) 2. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) 3. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) 4. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) 5. CTRL+SHIFT with any of the arrow keys (Highlight a block of text) 6. SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) 7. CTRL+A (Select all) F3 key (Search for a file or a folder)
75/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 8. ALT+ENTER (View the properties for the selected item) 9. ALT+F4 (Close the active item, or quit the active program) 10. ALT+ENTER (Display the properties of the selected object) 11. ALT+SPACEBAR (Open the shortcut menu for the active window) 12. CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously) 13. ALT+TAB (Switch between the open items) 14. ALT+ESC (Cycle through items in the order that they had been opened) 15. F6 key (Cycle through the screen elements in a window or on the desktop) 16. F4 key (Display the Address bar list in My Computer or Windows Explorer) 17. SHIFT+F10 (Display the shortcut menu for the selected item) 18. ALT+SPACEBAR (Display the System menu for the active window) 19. CTRL+ESC (Display the Start menu) 20. ALT+ Underlined letter in a menu name (Display the corresponding menu) 21. Underlined letter in a command name on an open menu (Perform the corresponding command) 22. F10 key (Activate the menu bar in the active program) 23. RIGHT ARROW (Open the next menu to the right, or open a submenu) 24. LEFT ARROW (Open the next menu to the left, or close a submenu) 25. F5 key (Update the active window) 26. BACKSPACE (View the folder one level up in My Computer or Windows Explorer) 27. ESC (Cancel the current task) 28. SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) 29. CTRL+SHIFT+ESC (Open Task Manager) Dialog box keyboard shortcuts If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control.
76/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 • CTRL+TAB (Move forward through the tabs) • CTRL+SHIFT+TAB (Move backward through the tabs) • TAB (Move forward through the options) • SHIFT+TAB (Move backward through the options) • ALT+Underlined letter (Perform the corresponding command or select the corresponding option) • ENTER (Perform the command for the active option or button) SPACEBAR (Select or clear the check box if the active option is a check box) • Arrow keys (Select a button if the active option is a group of option buttons) • F1 key (Display Help) • F4 key (Display the items in the active list) • BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) Microsoft natural keyboard shortcuts • Windows Logo (Display or hide the Start menu) • Windows Logo+BREAK (Display the System Properties dialog box) • Windows Logo+D (Display the desktop) • Windows Logo+M (Minimize all of the windows) • Windows Logo+SHIFT+M (Restore the minimized windows) • Windows Logo+E (Open My Computer) • Windows Logo+F (Search for a file or a folder) • CTRL+Windows Logo+F (Search for computers) • Windows Logo+F1 (Display Windows Help) • Windows Logo+ L (Lock the keyboard) • Windows Logo+R (Open the Run dialog box) • Windows Logo+U (Open Utility Manager) Accessibility keyboard shortcuts • Right SHIFT for eight seconds (Switch FilterKeys either on or off) • Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) • Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) • SHIFT five times (Switch the StickyKeys either on or off) • NUM LOCK for five seconds (Switch the ToggleKeys either on or off) • Windows Logo +U (Open Utility Manager)
77/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Windows Explorer keyboard shortcuts • END (Display the bottom of the active window) • HOME (Display the top of the active window) • NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) • NUM LOCK+Plus sign (+) (Display the contents of the selected folder) • NUM LOCK+Minus sign (-) (Collapse the selected folder) • LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) • RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) • Shortcut keys for Character Map After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts: • RIGHT ARROW (Move to the right or to the beginning of the next line) • LEFT ARROW (Move to the left or to the end of the previous line) • UP ARROW (Move up one row) • DOWN ARROW (Move down one row) • PAGE UP (Move up one screen at a time) • PAGE DOWN (Move down one screen at a time) • HOME (Move to the beginning of the line) • END (Move to the end of the line) • CTRL+HOME (Move to the first character) • CTRL+END (Move to the last character) • SPACEBAR (Switch between Enlarged and Normal mode when a character is selected) Microsoft Management Console (MMC) main window keyboard shortcuts • CTRL+O (Open a saved console) • CTRL+N (Open a new console) • CTRL+S (Save the open console) • CTRL+M (Add or remove a console item) • CTRL+W (Open a new window) • F5 key (Update the content of all console windows) • ALT+SPACEBAR (Display the MMC window menu) • ALT+F4 (Close the console)
78/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 • ALT+A (Display the Action menu) • ALT+V (Display the View menu) • ALT+F (Display the File menu) • ALT+O (Display the Favorites menu) Microsoft Internet Explorer navigation • CTRL+B (Open the Organize Favorites dialog box) • CTRL+E (Open the Search bar) • CTRL+F (Start the Find utility) • CTRL+H (Open the History bar) • CTRL+I (Open the Favorites bar) • CTRL+L (Open the Open dialog box) • CTRL+N (Start another instance of the browser with the same Web address) CTRL+O (Open the Open dialog box, the same as CTRL+L) • CTRL+P (Open the Print dialog box) • CTRL+R (Update the current Web page) • CTRL+W (Close the current window)
79/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 SELF-CHECK 5.2-1 Directions: Give the Shortcuts of the Following: 1. Close the active item, or quit the active program 2. Cancel the current task 3. Open Task Manager 4. Display Help 5. Minimize all of the windows 6. Search for computers 7. Restore the minimized windows 8. Open the Run dialog box 9. Copy 10. Paste
80/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 ANSWER KEY 5.2-1 1. ALT+F4 2. ESC 3. CTRL+SHIFT+ESC 4. F1 5. WINDOW LOGO+M 6. CTRL+WINDOW LOGO+F 7. WINDOW LOGO+SHIFT+M 8. WINDOW LOGO+R 9. CTRL+C 10. CTRL+V
81/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 INFORMATION SHEET 5.2-2 PART OF A COMPUTER MOUSE MOUSE In computing, a mouse is a pointing device that functions by detecting two dimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons. (Although traditionally a button is typically round or square, modern mice have spring-loaded regions of their top surface that operate switches when pressed down lightly.) It sometimes features other elements, such as "wheels", which allow the user to perform various system-dependent operations, or extra buttons or features that can add more control or dimensional input. The mouse's motion typically translates into the motion of a cursor on a display, which allows for fine control of a graphical user interface.
82/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 CONNECTIVITY AND COMMUNICATION PROTOCOLS To transmit their input, typical cabled mice use a thin electrical cord terminating in a standard connector, such as RS-232C, PS/2, ADB or USB. Cordless mice instead transmit data via infrared radiation (see IrDA) or radio (including Bluetooth), although many such cordless interfaces are themselves connected through the aforementioned wired serial buses. While the electrical interface and the format of the data transmitted by commonly available mice is currently standardized on USB, in the past it varied between different manufacturers. A bus mouse used a dedicated interface card for connection to an IBM PC or compatible computer. Serial interface and protocol Standard PC mice once used the RS-232C serial port via a D-subminiature connector, which provided power to run the mouse's circuits as well as data on mouse movements. The Mouse Systems Corporation version used a five-byte protocol and supported three buttons. The Microsoft version used an incompatible three-byte protocol and only allowed for two buttons. Due to the incompatibility, some manufacturers sold serial mice with a mode switch: "PC" for MSC mode, "MS" for Microsoft mode.[29] PS/2 interface and protocol For more details on this topic, see PS/2 connector. With the arrival of the IBM PS/2 personal-computer series in 1987, IBM introduced the eponymous PS/2 interface for mice and keyboards, which other manufacturers rapidly adopted. The most visible change was the use of a round 6-pin mini-DIN, in lieu of the former 5-pin connector. In default mode (called stream mode) a PS/2 mouse communicates motion, and the state of each button, by means of 3-byte packets.[30] For any motion, button press or button release event, a PS/2 mouse sends, over a bi-directional serial port, a sequence of three bytes, with the following format:
83/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 Byte 1 Byte 2 Byte 3 YV XV YS XS 1 MB RB LB X movement Y movement Here, XS and YS represent the sign bits of the movement vectors, XV and YV indicate an overflow in the respective vector component, and LB, MB and RB indicate the status of the left, middle and right mouse buttons (1 = pressed). PS/2 mice also understand several commands for reset and self-test, switching between different operating modes, and changing the resolution of the reported motion vectors. In Linux, a PS/2 mouse is detected as a /dev/psaux device. For 3-D (or 6-degree-of-freedom) input, vendors have made many extensions both to the hardware and to software. In the late 90's Logitech created ultrasound-based tracking which gave 3D input to a few millimeters accuracy, which worked well as an input device but failed as a profitable product. In 2008, Motion4U introduced its "OptiBurst" system using IR tracking for use as a Maya (graphics software) plugin. USB The industry-standard USB protocol and its connector have become widely used for mice; it's currently among the most popular types.[33] Cordless or Wireless Cordless or wireless mice transmit data via infrared radiation (see IrDA) or radio (including Bluetooth). The receiver is connected to the computer through a serial or USB port. The newer nano receivers were designed to be small enough to remain connected in a laptop or notebook computer during transport.[34]
84/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Outcome 3 ACCESS INFORMATION USING COMPUTER CONTENTS: • Basic ergonomics of keyboard and computer use • Main types of computers and basic features of different operating systems • Main parts of a computer • Storage devices and basic categories of memory • Relevant types of software • General security • Viruses • OH & S principles and responsibilities • Calculating computer capacity • Reading skills required to interpret work instruction • Communication skills CONDITIONS: Students/trainees must be provided with the following: • Computer hardware with peripherals • Appropriate software EQUIPMENT TOOLS AND ACCESSORIES ● OHP ● TV, LCD ● Working Table ● Anti-static wrist rap ● Hand Gloves ● Goggles SUPPLIES AND MATERIALS LEARNING MATERIALS ● Pentel Pens ● Eraser ● Paper ● Alcohol ● White Board ● White Board Marker ● Handouts ● Paper-based assessment form. • Assessment record book. • Visual Aids • Related textbooks • CDs for related film show • CBLM
85/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 METHODOLOGIES: • Modular • Film showing • Computer- based training (e-learning) • Project method • On the job training ASSESSMENT METHODS: • Demonstration & questioning • Observation & questioning • Third party report • Assessment of output product • Portfolio • Computer- based assessment
86/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Experiences Learning Outcome 3 ACCESS INFORMATION USING COMPUTER Learning Activities Special Instructions 1. Read Information Sheet 5.3-1 on Common Computer Applications used in Performing Computer related duties 2. Answer Self-Check 5.3-1 Compare answer with Answer Key 5.3-1
87/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 INFORMATION SHEET 5.3-1 COMMON COMPUTER APPLICATIONS USED IN PERFORMING COMPUTER RELATED DUTIES MICROSOFT OFFICE APPLICATION MS Office application is a package application developed by Microsoft and is intended to be used in offices and schools. MS Word A word processing application used for creating documents such as letters, brochures, activity programs and learning activities. MS Excel MS Excel is a spreadsheet program ideal for entering, calculating and analyzing numeric data such as sales figures, sales taxes and students’ grades. MS PowerPoint MS PowerPoint is a presentation tool that uses graphical approach to presentation in the form of slides. Its primary function is to help a presenter deliver its presentation effectively. WEB BROWSERS Web browser is an application used to access information on the World Wide Web. Web browsers interpret and display HTML web pages, applications, JavaScript and other content hosted on web servers in the form of text, pictures, audio and video. Below are some of the commonly used web browsers. • Google Chrome • Mozilla Firefox • Microsoft Edge • Apple Safari
88/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 SEARCH ENGINES Search engine is a program that enables the users to search for documents or information on the World Wide Web. How to search information on the World Wide Web? 1. Click a browser that you want to use – Chrome, Firefox or Edge. 2. Type the search engine that you want to use in the web browser’s URL (Uniform Resource Locator) and press the ENTER key. Use the search tab of your search engine to find information on the web.
89/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 SELF-CHECK 5.3-1 Explain the following: a. Microsoft Office Application. b. How to search information on the World Wide Web?
90/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 ANSWER KEY 5.3-1 a. Microsoft Office Application. MS Word A word processing application used for creating documents such as letters, brochures, activity programs and learning activities. MS Excel MS Excel is a spreadsheet program ideal for entering, calculating and analyzing numeric data such as sales figures, sales taxes and students’ grades. MS PowerPoint MS PowerPoint is a presentation tool that uses graphical approach to presentation in the form of slides. Its primary function is to help a presenter deliver its presentation effectively. b. How to search information on the World Wide Web? How to search information on the World Wide Web? 1. Click a browser that you want to use – Chrome, Firefox or Edge. 2. Type the search engine that you want to use in the web browser’s URL (Uniform Resource Locator) and press the ENTER key. 3. Use the search tab of your search engine to find information on the web.
91/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Outcome 4 PRODUCE/OUTPUT DATA USING COMPUTER SYSTEM CONTENTS: • Basic ergonomics of keyboard and computer use • Main types of computers and basic features of different operating systems • Main parts of a computer • Storage devices and basic categories of memory • Relevant types of software • General security • Viruses • OH & S principles and responsibilities • Calculating computer capacity • Reading skills required to interpret work instruction • Communication skills CONDITIONS: Students/trainees must be provided with the following: • Computer hardware with peripherals • Appropriate software EQUIPMENT TOOLS AND ACCESSORIES ● OHP ● TV, LCD ● Working Table ● Anti-static wrist rap ● Hand Gloves ● Goggles SUPPLIES AND MATERIALS LEARNING MATERIALS ● Pentel Pens ● Eraser ● Paper ● Alcohol ● White Board ● White Board Marker ● Handouts ● Paper-based assessment form. • Assessment record book. • Visual Aids • Related textbooks • CDs for related film show • CBLM
92/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 METHODOLOGIES: • Modular • Film showing • Computer- based training (e-learning) • Project method • On the job training ASSESSMENT METHODS: • Demonstration & questioning • Observation & questioning • Third party report • Assessment of output product • Portfolio • Computer- based assessment
93/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Experiences Learning Outcome 4 PRODUCE/OUTPUT DATA USING COMPUTER SYSTEM Learning Activities Special Instructions 1. Read Information Sheet 5.4-1 on Simple Block Diagram of a Computer System 2. Answer Self-Check 5.4-1 Compare answer with Answer Key 5.4-1
94/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 INFORMATION SHEET 5.4-1 SIMPLE BLOCK DIAGRAM OF A COMPUTER SYSTEM INPUT DEVICES Input devices are hardware used to enter data to be processed by the computer in the processing unit.
95/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 OUTPUT DEVICES Output devices are computer hardware that shows or provides processed data. DATA STORAGE Data storage is a device capable of holding information either temporarily or permanently. It is also known as digital storage, storage, storage media, or storage medium. Two Types of Storage 1. Primary Storage – Ex. RAM 2. Secondary Storage – Ex. Hard Drive
96/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 A secondary storage can be removable, internal or external storage.
97/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1
98/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Self-Check 5.4-1 Fill-up all requirement of the following: a. b.
99/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 ANSWER KEY 5.4-1 a. b.
100/121 CBLM IN BPP NC II COMMON COMPETENCY “Performing Computer Operations” Date Developed: August 2022 Date Revised: April 2023 Document No. 2022-UC5 of UC5 Issued by: GSTAACI Developed by: RIENA CLAIRE M. BENITEZ REVISION # O1 Learning Outcome 5 MAINTAIN COMPUTER EQUIPMENT AND SYSTEMS CONTENTS: • Basic ergonomics of keyboard and computer use • Main types of computers and basic features of different operating systems • Main parts of a computer • Storage devices and basic categories of memory • Relevant types of software • General security • Viruses • OH & S principles and responsibilities • Calculating computer capacity • Reading skills required to interpret work instruction • Communication skills CONDITIONS: Students/trainees must be provided with the following: • Computer hardware with peripherals • Appropriate software EQUIPMENT TOOLS AND ACCESSORIES ● OHP ● TV, LCD ● Working Table ● Anti-static wrist rap ● Hand Gloves ● Goggles SUPPLIES AND MATERIALS LEARNING MATERIALS • Pentel Pens • Eraser • Paper • Alcohol • White Board • White Board Marker • Handouts • Paper-based assessment form. • Assessment record book. • Visual Aids • Related textbooks • CDs for related film show • CBLM