Professional Documents
Culture Documents
Sector: Electronics
If you have questions, don’t hesitate to ask your teacher for assistance.
You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o Already have completed training in this area.
Inside this module you will find the activities for you to complete followed
by relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.
LIST OF COMPETENCIES
Module Descriptor: This unit covers the knowledge, skills, (and) attitudes
and values needed to perform computer operations
which include inputting, accessing, producing and
transferring data using the appropriate hardware and
software
ASSESSMENT CRITERIA:
CONDITIONS:
Learning Outcome 1
The Act
The Act sets out the key principles, duties and rights in relation to
occupational health and safety. The general nature of the duties imposed by
the Act means that they cover a very wide variety of circumstances, do not
readily date and provide considerable flexibility for a duty holder to determine
what needs to be done to comply.
The Regulations
The Occupational Health and Safety Regulations 2007 are made under the Act.
They specify the ways duties imposed by the Act must be performed, or
prescribe procedural or administrative matters to support the Act, such as
requiring licenses for specific activities, keeping records, or notifying certain
matters.
Guidance
Policy
6 Important Elements
People
People are the most important element of a computer system. They run and
operate the computers.
Procedure
Procedures are step by step instructions to follow when using software and
data. The procedures are normally written in manuals of hardware and
software manufacturers.
Software
Hardware
Data includes texts and numbers, sounds, images and video that we input into
the computer for processing.
Connectivity
Supercomputer
Supercomputer is a broad term for one of the fastest computers currently
available. Supercomputers are very expensive and are employed for specialized
applications that require immense amounts of mathematical calculations
(number crunching). For example, weather forecasting requires a
supercomputer. Other uses of supercomputers scientific simulations,
(animated) graphics, fluid dynamic calculations, nuclear energy research,
electronic design, and analysis of geological data (e.g. in petrochemical
prospecting). Perhaps the best known supercomputer manufacturer is Cray
Research.
Minicomputer
It is a midsize computer. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the
distinction between small minicomputers and workstations. But in general, a
minicomputer is a multiprocessing system capable of supporting from up to
200 users simultaneously.
Workstation
It is a type of computer used for engineering applications (CAD/CAM), desktop
publishing, software development, and other types of applications that require
a moderate amount of computing power and relatively high quality graphics
capabilities. Workstations generally come with a large, high-resolution graphics
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 13 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
screen, at large amount of RAM, built-in network support, and a graphical user
interface. Most workstations also have a mass storage device such as a disk
drive, but a special type of workstation, called a diskless workstation, comes
without a disk drive. The most common operating systems for workstations are
UNIX and Windows NT. Like personal computers, most workstations are single-
user computers. However, workstations are typically linked together to form a
local-area network, although they can also be used as stand-alone systems.
N.B.: In networking, workstation refers to any computer connected to a local-
area network. It could be a workstation or a personal computer.
Personal computer:
It can be defined as a small, relatively inexpensive computer designed for an
individual user. In price, personal computers range anywhere from a few
hundred pounds to over five thousand pounds. All are based on the
microprocessor technology that enables manufacturers to put an entire CPU on
one chip. Businesses use personal computers for word processing, accounting,
desktop publishing, and for running spreadsheet and database management
applications. At home, the most popular use for personal computers is for
playing games and recently for surfing the Internet.
Personal computers first appeared in the late 1970s. One of the first and most
popular personal computers was the Apple II, introduced in 1977 by Apple
Computer. During the late 1970s and early 1980s, new models and competing
operating systems seemed to appear daily. Then, in 1981, IBM entered the fray
with its first personal computer, known as the IBM PC. The IBM PC quickly
became the personal computer of choice, and most other personal computer
manufacturers fell by the wayside. P.C. is short for personal computer or IBM
PC. One of the few companies to survive IBM's onslaught was Apple Computer,
Desktop model
A computer designed to fit comfortably on top of a desk, typically with the
monitor sitting on top of the computer. Desktop model computers are broad
and low, whereas tower model computers are narrow and tall. Because of their
shape, desktop model computers are generally limited to three internal mass
Notebook computer
An extremely lightweight personal computer. Notebook computers typically
weigh less than 6 pounds and are small enough to fit easily in a briefcase.
Aside from size, the principal difference between a notebook computer and a
personal computer is the display screen. Notebook computers use a variety of
techniques, known as flat-panel technologies, to produce a lightweight and
non-bulky display screen. The quality of notebook display screens varies
considerably. In terms of computing power, modern notebook computers are
nearly equivalent to personal computers. They have the same CPUs, memory
capacity, and disk drives. However, all this power in a small package is
expensive. Notebook computers cost about twice as much as equivalent
regular-sized computers. Notebook computers come with battery packs that
enable you to run them without plugging them in. However, the batteries need
to be recharged every few hours.
Subnotebook computer
A portable computer that is slightly lighter and smaller than a full-sized
notebook computer. Typically, subnotebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.
Palmtop
A small computer that literally fits in your palm. Compared to full-size
computers, palmtops are severely limited, but they are practical for certain
functions such as phone books and calendars. Palmtops that use a pen rather
than a keyboard for input are often called hand-held computers or PDAs.
Because of their small size, most palmtop computers do not include disk
drives. However, many contain PCMCIA slots in which you can insert disk
drives, modems, memory, and other devices. Palmtops are also called PDAs,
hand-held computers and pocket computers.
PDA
Short for personal digital assistant, a handheld device that combines
computing, telephone/fax, and networking features. A typical PDA can function
as a cellular phone, fax sender, and personal organizer. Unlike portable
Operating Systems
For hardware functions such as input and output and memory allocation, the
operating system acts as an intermediary between programs and the computer
hardware, although the application code is usually executed directly by the
hardware and will frequently make a system call to an OS function or be
Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. Real-time operating systems often use
specialized scheduling algorithms so that they can achieve a deterministic
nature of behavior. The main objective of real-time operating systems is their
quick and predictable response to events. They have an event-driven or time-
sharing design and often aspects of both. An event-driven system switches
between tasks based on their priorities or external events while time-sharing
operating systems switch tasks based on clock interrupts.
Multi-user
A multi-user operating system allows multiple users to access a computer
system at the same time. Time-sharing systems and Internet servers can be
classified as multi-user systems as they enable multiple-user access to a
computer through the sharing of time. Single-user operating systems have only
one user but may allow multiple programs to run at the same time.
Multi-tasking vs. single-tasking
A multi-tasking operating system allows more than one program to be running
at the same time, from the point of view of human time scales. A single-tasking
system has only one running program. Multi-tasking can be of two types: pre-
emptive and co-operative. In pre-emptive multitasking, the operating system
slices the CPU time and dedicates one slot to each of the programs. Unix-like
operating systems such as Solaris and Linux support pre-emptive
multitasking, as does AmigaOS. Cooperative multitasking is achieved by
relying on each process to give time to the other processes in a defined
manner. 16-bit versions of Microsoft Windows used cooperative multi-
tasking. 32-bit versions of both Windows NT and Win9x, used pre-emptive
multi-tasking. Mac OS prior to OS X used to support cooperative multitasking.
Distributed
The Keyboard
The Keyboard is used to type data into the computer. It is one way of telling the
computer what to do. You can type in words using the keyboard. You can type
in numbers. You can type in commands and programs.
The Mouse
The mouse is a pointing device. The mouse is used to enter data and
commands into the computer. The mouse moves the pointer on the monitor
screen. When you move the mouse the pointer also moves. You can point
things on the screen using the mouse.
The Speaker
The Speaker is a computer part that converts electrical signal to sound. The
speaker allows you to hear music from the computer. Other sounds can also be
heard when the computer is working.
The Printer
The printer is a machine that takes what you have created on your computer
and puts them on paper. The printer will print your letters or pictures on
paper.
If you use a desktop computer, you might already know that there isn't any
single part called the "computer." A computer is really a system of many parts
working together. The physical parts, which you can see and touch, are
collectively called hardware. (Software, on the other hand, refers to the
instructions, or programs, that tell the hardware what to do.)
Almost every other part of your computer connects to the system unit using
cables. The cables plug into specific ports (openings), typically on the back of
the system unit. Hardware that is not part of the system unit is sometimes
called a peripheral device or device.
DVD drives can do everything that CD drives can, plus read DVDs. If you have
a DVD drive, you can watch movies on your computer. Many DVD drives can
record data onto blank DVDs.
Mouse
A mouse is a small device used to point to and select items on your computer
screen. Although mice come in many shapes, the typical mouse does look a bit
like an actual mouse. It's small, oblong, and connected to the system unit by a
long wire that resembles a tail. Some newer mice are wireless.
A mouse usually has two buttons: A primary button (usually the left button)
and a secondary button. Many mice also have a wheel between the two
buttons, which allows you to scroll smoothly through screens of information.
When you move the mouse with your hand, a pointer on your screen moves in
the same direction. (The pointer's appearance might change depending on
where it's positioned on your screen.) When you want to select an item, you
point to the item and then click (press and release) the primary button.
Pointing and clicking with your mouse is the main way to interact with your
computer.
Keyboard
A keyboard is used mainly for typing text into your computer. Like the
keyboard on a typewriter, it has keys for letters and numbers, but it also has
special keys:
You can also use your keyboard to perform many of the same tasks you can
perform with a mouse.
Monitor
There are two basic types of monitors: CRT (cathode ray tube) monitors and
the newer LCD (liquid crystal display) monitors. Both types produce sharp
images, but LCD monitors have the advantage of being much thinner and
lighter.
Printer
A printer transfers data from a computer onto paper. You don't need a printer
to use your computer, but having one allows you to print e-mail, cards,
invitations, announcements, and other material. Many people also like being
able to print their own photos at home.
Speakers are used to play sound. They can be built into the system unit or
connected with cables. Speakers allow you to listen to music and hear sound
effects from your computer.
Modem
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data is to be
processed and instructions required for processing are stored.
The memory is divided into large number of small parts. Each part is called
cell. Each location or cell has a unique address, which varies from zero to
memory size minus one.
For example, if computer has 64k words, then this memory unit has 64 *
1024=65536 memory location. The address of these locations varies from 0 to
65535.
Cache Memory
Primary Memory/Main Memory
Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory, which can speed
up CPU. It acts as a buffer between the CPU and main memory.
It is used to hold those parts of data and program which are most frequently
used by CPU. The parts of data and programs are transferred from disk to
cache memory by operating system, from where CPU can access them.
ADVANTAGE
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
DISADVANTAGE:
Cache memory has limited capacity.
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 32 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
It is very expensive.
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is
slower than main memory. These are used for storing Data/Information
permanently.
CPU directly does not access these memories, instead they are accessed via
input-output routines. Contents of secondary memories are first transferred to
main memory and then CPU can access it. For example, disk, CD-ROM, DVD,
etc.
Mac OS
Mac OS is operating series for Macintosh computer. Macintosh is a series of
computer made by Apple Inc.
Linux
Linux is an operating system that runs on most computers, it is a free software
and can be downloaded from the internet.
Word Processing
It is a Word processor. Word Processlor allows the user to create
a change documents, letters, reports, memos and other
documents
Spreadsheets
Programs are rows and columns of data organized and often calculations are
performed.
Organizer Software
A program that includes an adress book, calendar of
appointments, notes and other information you want
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 40 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
to manage and access when needed.
Presentation Software
Software that used to convey information, ideas, message or products to a
target group of persons.
Database Programs
Programs created lto organized data and linformation in a manner desired by
the user or in a format for its convenient recovery and access.
Graphics Software
Programs for drawing and coloring. They can also edit pictures.
Video Software
Programs to create, modify and enhance, add and remove segments and other
effects a user may want to apply to video files
Back up your data and store backups in a different location from your
computer. (It's no accident that this tops the list. One of the single
biggest security problems is that data were not backed up.)
Guard your laptop when you travel. Laptop thefts in airports are on the
rise. Don't lose sight of your laptop, especially during airport security
check-in.
Physically secure your computer if it's not in a secure area. Be aware
that processor and memory chip thefts are becoming a bigger problem.
Contact security@isc.upenn.edu for information on how to deter chip
theft.
Don't be surprised that e-mail can be easily forged. If you receive an
uncharacteristic message, consider the possibility of forgery. If you
suspect forgery, save the message and contact security@isc.upenn.edu.
Many forgeries can be traced.
Don't use e-mail for confidential matters. Unless you take special
precautions, there is not much more privacy in e-mail than there is when
you send a postcard through the mail.
Be alert for scams. Con-artists try all kinds of techniques to get people's
passwords. Systems administrators would not ask you for your
password, so if you get a request asking you for your password or asking
you to change your password to a specific value, red flags should go up.
Also, be wary of unsolicited offers for technical computer help. Don't
allow just anyone to type commands on your computer you don't
understand. For information on internet frauds, see the National Fraud
Information Center web site.
These laws are based on Fair Information Practices, first developed in the
United States in the 1970s by the Department for Health, Education and
Welfare (HEW). The basic principles of data protection are: