You are on page 1of 21

Senior High

School

Introduction to
Computers
Quarter 1

Week 3 and 4
Performing
Computer Operations

Page |1
Computer Software
Weeks 3-4
After completing this module, you will be able to:
1. Discuss computer software and explain the difference between system
software and application software
2. Identify several types of application software
3. Discuss the Internet and World Wide Web
4. Describe various types of Internet and network attacks and how to
protect against them

Software
Software, also called a program, consists of a series of related instructions,
organized for a common purpose, that tells the computer what tasks to perform
and how to perform them. You interact with a program through its user
interface. The user interface controls how you enter data and instructions and
how information is displayed on the screen.
Software today often has a graphical user interface. With a graphical user
interface (GUI pronounced gooey), you interact with the software using text,
graphics, and visual images such as icons. When you buy a computer, it
usually has some software on its hard disk. This enables you to use the
computer the first time you turn it on.
Programs also can be installed after you purchase the computer. Installing is
the process of adding software to a computer, and uninstalling is the process of
removing programs and all associated files from the hard disk. Much software
is available at retail stores and on the Web for purchase and/or download. As
an alternative, some people use a Web application, which is a Web site that
allows users to access and interact with software from any computer or device
that is connected to the Internet. Software can be divided into two categories:
system software and application software.

System Software
System software consists of programs that control the operations of the
computer and its devices. Two types of system software are operating systems
and utility programs.
An operating system is a set of programs that coordinates all the activities
among computer hardware devices. It provides a means for users to
communicate with the computer and other software. Many of today’s
computers use Microsoft Windows When a user starts a computer, portions of
the operating system are copied into memory from the computer’s hard disk.

Page |2
These parts of the operating system remain in memory while the computer is
on.
A utility program allows a user to perform maintenance-type tasks usually
related to managing a computer, its devices, or its programs. For example, you
can use a utility program to burn digital photos on an optical disc. Most
operating systems include several utility programs for managing disk drives,
printers, and other devices and media. You also can buy utility programs that
allow you to perform additional computer management functions.

Application Software

Application software consists of programs


designed to make users more productive
and/or assist them with personal tasks. These
include personal information management,
note taking, project management,
accounting, document management,
computer-aided design, desktop publishing,
paint/image editing, audio and video editing,
multimedia authoring, Web page authoring,
personal finance, legal, tax preparation, home design/landscaping, travel and
mapping, education, reference, and entertainment (e.g., games or simulations).
Software is available at stores that sell computer products and at many Web
sites.

Word processing software is used


to create, edit, format, and print
documents. A key advantage of word
processing software is that users
easily can make changes in
documents, such as correcting
spelling; changing margins; and
adding, deleting, or relocating
words, sentences, or entire
paragraphs.

Presentation software is application


software that allows users to create visual
aids for presentations to communicate ideas,
messages, and other information to a group.

Page |3
The presentations can be viewed as slides, sometimes called a slide show, that
are displayed on a large monitor or on a projection screen.

Spreadsheet software allows


users to organize data in rows
and columns and perform
calculations on the data. These
rows and columns collectively
are called a worksheet.

A database is a collection of data organized


in a manner that allows access, retrieval,
and use of that data. Database software
is application software that allows users
to create, access, and manage a
database. Using database software, you
can add, change, and delete data in a
database; sort and retrieve data from the
database; and create forms and reports using
the data in the database.

E-mail (short for electronic mail) is the transmission


of messages
and files via a computer network. Today, e-mail is a
primary communications method for both personal
and business use.

ACTIVITY 7: SOFTWARE

A. Choose the letter of the best answer.


1. Consists of a series of related instructions, organized for a common
purpose, that tells the computer what tasks to perform and how to
perform them.
a. Installer
b. Program
c. Utility program

Page |4
d. Hardware
2. A feature where the user interacts with the software using text, graphics,
and visual images such as icons.
a. Graphical user interface
b. Installer
c. Program
d. Antivirus
3. The process of adding software to a computer, and uninstalling is the
process of removing programs and all associated files from the hard disk.
a. Ripping
b. Downloading
c. Installing
d. Uploading
4. A Web site that allows users to access and interact with software from
any computer or device that is connected to the Internet.
a. Programs
b. Antivirus
c. Application software
d. Web application
5. It is consisting of programs that control the operations of the computer
and its devices.
a. System Software
b. Application software
c. Web applications
d. Installers
6. A set of programs that coordinates all the activities among computer
hardware devices.
a. System Software
b. Application software
c. Web applications
d. Installers
7. It provides a means for users to communicate with the computer and
other software.
a. utility program
b. application software
c. operating systems
d. word processing software
8. It allows a user to perform maintenance-type tasks usually related to
managing a computer, its devices, or its programs.
a. utility program
b. application software
c. operating systems

Page |5
d. word processing software
9. It consists of programs designed to make users more productive and/or
assist them with personal tasks.
a. utility program
b. application software
c. operating systems
d. word processing software
10. It allows users to organize data in rows and columns and perform
calculations on the data.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
11. A software is used to create, edit, format, and print documents.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
12. An application software that allows users to create visual aids for
presentations to communicate ideas, messages, and other information to
a group.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
13. A collection of data organized in a manner that allows access,
retrieval, and use of that data.
a. Database application
b. database
c. operating systems
d. word processing software
14. Short for electronic mail) is the transmission of messages
a. operating systems
b. word processing software
c. e-mail
d. database
15. antivirus software is an example of
a. utility software
b. application software
c. operating system
d. database system

Page |6
B. Give examples of software under each category.
1. Operating Systems - ___________________________________________
2. Word processing software- ___________________________________________
3. Spreadsheet software - ___________________________________________
4. Database software - ___________________________________________
5. Antivirus software - ___________________________________________
6. presentation - ___________________________________________
7. Web application - ___________________________________________
8. Installers - ___________________________________________
9. Downloading software - ___________________________________________
10. Search engines - ___________________________________________

Page |7
Security Measures
WHAT MAKES A HOME COMPUTER VULNERABLE?
 Low level of security awareness
 Increasing online activities
 Not following any standard security policies or guidelines
 Default computer and application settings
 Non or very little investment in security terms

WHAT MAKES A COMPUTER SYSTEM SECURE?

Monitor system activities such as who is accessing the data


DATA ACCESS and for what purpose
CONTROLS
Define access rules based on the system security levels

SYSTEM ACCESS Ensure that unauthorized users do not get into the system
CONTROLS Force legal users to be conscious about security

SYSTEM AND Perform regular system and security administration tasks


SECURITY such as configuring system settings, implementing security
ADMINISTRATION policies, monitoring system state, etc.

Deploy various security characteristics in system hardware


SYSTEM DESIGN and software design such as memory segmentation, privilege
isolation, etc.

BENEFITS OF COMPUTER SECURITY AWARENESS

1. Computer Security Awareness helps minimize the chance of computer


attacks.
2. It helps prevent the loss of information stored on the systems
3. It helps users to protect sensitive information and computing resources
from unauthorized access
4. It helps users to prevent cybercriminals from using their systems to launch
attacks on the other computer systems

Page |8
5. It helps users minimize losses in case of an accident that causes physical
damage to computer systems

Introduction
Today, people rely on computers to create, store, and manage critical
information. Thus, it is crucial users take measures to protect their computers
and data from loss or damage, especially for information that is transmitted
over networks. Every unprotected computer is susceptible to a
computer virus, worm, Trojan horse, and/or rootkit.
A computer virus is a potentially damaging
computer program that affects, or infects, a
computer negatively by altering the way the
computer works without the user’s knowledge or
permission. Once the virus infects the computer, it
can spread throughout and may damage files and system
software, including the operating system.
 A worm is a program that copies itself repeatedly, for example in memory or
on a network, using up resources and possibly shutting down the computer
or network.
 A Trojan horse (named after the Greek myth) is a program that hides within
or looks like a legitimate program. A certain condition or action usually
triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not
replicate itself to other computers.
 A rootkit is a program that hides in a computer and allows someone from a
remote location to take full control of the computer. Once the rootkit is
installed, the rootkit author can execute programs, change settings, monitor
activity, and access files on the remote computer.
Computer viruses, worms, Trojan horses, and rootkits are classified as
malware (short for malicious software), which are programs that act without a
user’s knowledge and deliberately alter the computer’s operations. Users can
take several precautions to protect their home and work computers and mobile
devices from these malicious infections. For example, users should install an
antivirus program and update it frequently. An antivirus program protects a
computer against viruses by identifying and removing any computer viruses
found in memory, on storage media, or on incoming files.

Page |9
Tips for Preventing Viruses and Other Malware

P a g e | 10
1. Never start a computer with removable media inserted in the drives or
plugged in the ports, unless the media are uninfected.

2. Never open an e-mail attachment unless you are expecting it and it is


from a trusted source.

3. Set the macro security in programs so that you can enable or disable
macros. Enable macros only if the document is from a trusted source and
you are expecting it.

4. Install an antivirus program on all of your computers. Update the


software and the virus signature files regularly.

5. Scan all downloaded programs for viruses and other malware.

6. If the antivirus program flags an e-mail attachment as infected, delete or


quarantine the attachment immediately.

7. Before using any removable media, scan the media for malware. Follow
this procedure even for shrink-wrapped software from major developers.
Some commercial software has been infected and distributed to
unsuspecting users.

8. Install a personal firewall program.

9. Stay informed about new virus alerts and virus hoaxes.

P a g e | 11
ACTIVITY 8: Security Measures

A. Write True if the sentence applies security measure and False if not.
____________ 1. Never open an email from an unknown source.
____________ 2. The firewall program can make the computer speed slower, it is optional.
____________ 3. Never start a computer with removable media inserted in the drives or plugged
in the ports unless the media are uninfected.
____________ 4. Be aware of the new hoax and viruses.
____________ 5. Update your antivirus software.
____________ 6. Computer security awareness helps prevent the loss of information stored on
the systems
____________ 7. To protect you data, ensure that unauthorized users do not get into the system.
____________ 8. If the antivirus program flags an e-mail attachment as infected, delete or
quarantine the attachment immediately.
____________ 9. Scan all downloaded programs for viruses and other malware.
____________ 10. You can download everything you want from the internet, you can delete it
when not needed.

B. Fill in the blanks.


1. A ________________________ is a potentially damaging computer program
that affects, or infects, a computer negatively by altering the way the
computer works without the user’s knowledge or permission.
2. A ________________ is a program that copies itself repeatedly, for example
in memory or on a network, using up resources and possibly shutting
down the computer or network.
3. A ___________________is a program that hides within or looks like a
legitimate program.
4. A ______________________is a program that hides in a computer and
allows someone from a remote location to take full control of the
computer.
5. Computer viruses, worms, Trojan horses, and rootkits are classified as
________________ which are programs that act without a user’s knowledge
and deliberately alter the computer’s operations.
6. An ______________________ protects a computer against viruses by
identifying and removing any computer viruses found in memory, on
storage media, or on incoming files.

Networks and the Internet


A network is a collection of computers and devices connected together,
often wirelessly, via communications devices and transmission media. When a
computer connects to a network, it is online.

P a g e | 12
Most business computers are networked. These networks can be
relatively small or quite extensive. A local area network (LAN) is a network
that connects computers and devices in a limited geographical area such as a
home, school computer laboratory, office building, or closely positioned group
of buildings. A wireless LAN (WLAN) is a LAN that uses no physical wires.

A wide area network (WAN) is a network that covers a large geographic area
(such as a city, country, or the world) using a communications channel that
combines many types of media such as telephone lines, cables, and radio
waves.

The Internet
The Internet is a worldwide collection of networks that links millions of
businesses, government agencies, educational institutions, and individuals.
An access provider is a business that provides individuals and
organizations access to the Internet free or for a fee. Access providers are
categorized as ISPs, online service providers, and wireless Internet service
providers. An ISP (Internet service provider) is a regional or national access
provider. A regional ISP usually provides Internet access to a specific
geographic area.

The World Wide Web


One of the more popular services on the Internet is the World Wide
Web, also called the Web, which contains billions of documents called Web
pages. A Web page can contain text, graphics, animation, audio, and video,
and has built-in connections, or links, to other documents, graphics, or other
Web pages. Web pages are stored on computers throughout the world. A Web
site is a collection of related Web pages. Visitors to a Web site access and view
Web pages using a program called a Web browser. A Web page has a unique
address, called a Web address or URL (Uniform Resource Locator).

Web page addresses begin with http://, which stands for Hypertext
Transfer Protocol, the set of rules that defines how pages transfer on the
Internet. A Web server is a computer that delivers requested Web pages to
your computer.
A social networking Web site or online social network is an online
community that encourages members to share their interests, ideas, stories,
photos, music, and videos with other registered users. A blog is an informal
Web site consisting of time-stamped articles in a diary or journal format.
E-commerce, short for electronic commerce, is a business transaction
that occurs over an electronic network such as the Internet. Anyone with

P a g e | 13
access to a computer or mobile device, an Internet connection, and a means to
pay for purchased goods or services can participate in e-commerce.

Searching the Web

The Web is a worldwide resource of information. A primary reason that


people use the Web is to search for specific information, including text,
pictures, music, and video.
Two types of search tools are search engines and subject directories. A
search engine is a program that finds Web sites, Web pages, images, videos,
news, maps, and other information related to a specific topic. A search engine
is helpful in locating information for which you do not know an exact Web
address or are not seeking a particular Web site. Search engines require that
you enter a word or phrase, called search text, that describes the item you
want to find.

ACTIVITY 9: Networks and the Internet

A. Name the uses of internet in different areas.

Uses of
Internet

B. Give 3 Internet providers in your community


_____________________, _____________________, ___________________________

C. Write the full name of the abbreviated words.

P a g e | 14
1. URL __________________________________________________________________
2. WWW ____________________________________________________________
3. LAN __________________________________________________________________
4. WAN __________________________________________________________________
5. ISP __________________________________________________________________
6. HTTP __________________________________________________________________
7. E-COMMERCE ________________________________________________________
8. RAM __________________________________________________________________
9. ROM __________________________________________________________________
10. CPU ____________________________________________________________

D. Define the following.

1. Blog
2. Web server
3. Web page
4. E-commerce
5. network

P a g e | 15
OH and S Principles and Responsibilities

Learning Objectives:
1. Explain the importance of Occupational Health and safety
2. Identify health risks present in a computing environment
3. Identify three steps to manage health and safety at work
4. Identify potential computer-related disorders.

What is Occupational Health and Safety?


- It is a planned system of working to prevent illness and
injury where your work by recognizing and identifying
hazards and risks.

- Health and safety procedure is the responsibility of all


persons in the computer and technology industries. You must identify
the hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.

There are three steps to manage health and safety at work:


(1.) Spot the Hazard (Hazard Identification),
(2.) Assess the Risk (Risk Assessment) and
(3.) Make the Changes (Risk Control).

1. Spot the Hazard


- A hazard is anything that could hurt you or someone else.
Examples of workplace hazards include:
· frayed electrical cords (could result in electrical shock)
· boxes stacked precariously (they could fall on someone)
· noisy machinery (could result in damage to your hearing)

During working hours, you must remain alert to anything that may be
dangerous. If you see, hear or smell anything odd, take note. If you think it
could be a hazard, tell someone.

2. Assess the Risk


- Assessing the risk means working out how likely it is that a hazard will
harm someone and how serious the harm could be.
Whenever you spot a hazard, assess the risk by asking yourself two questions:

P a g e | 16
· How likely is it that the hazard could harm me or someone else?
· How badly could I or someone else be harmed?

Always tell someone (your employer, your supervisor or your health and safety
representative) about hazards you can't fix yourself, especially if the hazard
could cause serious harm to anyone.
For example, (1) Ask your supervisor for instructions and training before using
equipment, (2) Ask for help moving or lifting heavy objects, and (3) Tell your
supervisor if you think a work practice could be dangerous.
If you are not sure of the safest way to do something during work experience,
always ask your supervisor.

3. Make the Changes


It is your employer's responsibility to fix hazards. Sometimes you may be
able to fix simple hazards yourself, as long as you don't put yourself or others
at risk. For example, you can pick up things from the floor and put them away
to eliminate a trip hazard.

POTENTIAL COMPUTER-RELATED DISORDERS Upper limb disorders is a


term used to describe a range of conditions affecting the fingers, hands, arms
and shoulders. Such conditions may range from mild aches and pains, through
to chronic tissue and/or muscular complaints. Repetitive strain injury (RSI) is
one such condition.
1. Eye problems result from short- or long-term computer use remains a
matter of debate. However, any form of excessive close work where the
eyes are forced to focus at a fairly fixed distance on a relatively bounded
location is likely to cause at least short-term eye strain and discomfort.
2. Stress and fatigue. This can be as a result of the involved high levels of
dextrous activity and visual concentration. As already noted these are
not a "natural" form of human activity, and hence a potential source of
stress. Some people also find computer use uncomfortable or annoying
when they are having to conform to software or hardware that constrains
how they want to get something done, or which constantly crashes or
causes them to constantly wait for actions to complete.
3. Skin problems. Such conditions can include itching, rashes on the neck,
face or hands, and dry skin. Quite why this may be is again debated,
though potentially skin complaints may be a result of electrostatic
discharges (created within laser printers and cathode ray tube (CRT)
display screens), and/or the dry air and static electricity that builds up
in offices filled with computer equipment.

P a g e | 17
RISK REDUCTION AND INFORMATION
Risk reduction requires the identification of risks via appropriate assessments
(as discussed above), followed by appropriate action if necessary to ensure
workstation compliance with the requirements listed in the previous section.
However, risk reduction also significantly involves ensuring that
users/operators are aware of possible risks that can result in computing
related disorders, and of the actions they need to take to avoid them. Risk
reduction and information provision therefore go hand-in-hand.

Appropriate information to provide to users/operators includes:


· Adjusting the work chair to assume a comfortable working position
with the forearms roughly horizontal and the top of the screen at eye
level.
· Experimenting with workspace arrangements and ensuring that
enough space is available.
· In particular, placement of the screen to avoid glare and reflections
(holding a mirror in place of the screen is a good means of locating
sources of glare and reflection).
· Ensuring appropriate leg room and provision and use of a footrest if
desired.
· Using a soft touch when keying and keeping the wrists straight.
· Provision and use of a wrist support if desired (with the gel variety
being the most popular).
· Keeping the mouse or other pointing device within easy reach with the
controlling forearm supported.
· Provision and use of an alternative pointing device (eg a tablet or
touchscreen) if mouse use is
very intensive and/or
becomes uncomfortable.
· Keeping the screen clean
(daily screen cleaning has
been found to reduce eye
strain by as much as fifty
per cent!)
· Making changes to working
position throughout the
day, as well as planning and
taking breaks from display
screen equipment activity.

P a g e | 18
ACTIVITY 10: Occupational Health and Safety

A. Give the definition and importance of Occupational Health and


Safety

Definition Importance

B. Three steps to manage health and safety at work, explain each.

C. List down some things to do if you experience the following.

Upper limb disorders


Eye problems
Stress and fatigue
Skin
problems

P a g e | 19
Limb Reduction Risk reduction Stress
Health and safety
Upper limb disorders Eye problems Stress and fatigue
procedure
Occupational Health
Assessing the risk Hazard Skin problems
and Safety
D. Choose the answer from the table above.
____________________ 1. a term used to describe a range of conditions affecting the fingers,
hands, arms and shoulders. Such conditions may range from mild
aches and pains, through to chronic tissue and/or muscular
complaints.
____________________ 2. the responsibility of all persons in the computer and technology
industries
____________________ 3. anything that could hurt you or someone else.
____________________ 4. It is a planned system of working to prevent illness and injury where
your work by recognizing and identifying hazards and risks.
____________________ 5. any form of excessive close work where the eyes are forced to focus
at a fairly fixed distance on a relatively bounded location is likely to
cause at least short-term eye strain and discomfort
____________________ 6. Such conditions can include itching, rashes on the neck, face or
hands, and dry skin
____________________ 7. means working out how likely it is that a hazard will harm someone
and how serious the harm could be.
____________________ 8. this can be as a result of the involved high levels of dextrous activity
and visual concentration.
____________________ 9. requires the identification of risks via appropriate assessments (as
discussed above), followed by appropriate action if necessary to
ensure workstation compliance with the requirements listed in the
previous section.
Answer key. Choose the answer from the table.
1. Upper limb disorders
2. Health and safety procedure
3. hazard
4. Eye problems
5. Skin problems
6. Assessing the risk
7. Stress and fatigue
8. Risk reduction

PHOTO CREDITS
1. www.downloadclipart.net
2. www.kindpng.com
3. www.gograph.com
4. www.iconfinder.com
5. www.netclipart.com
6. www.clipartkey.com

P a g e | 20
7. www.favpng.com
8. www. Quora.com
9. http://web.cse.ohio-state.edu/cse1111
10. https://www.bannersnack.com/email-headers.html
11. www.tweaklibrary.com
12. https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.act.com%2Fcustomer-database-
software&psig=AOvVaw0DX-3s3GakzewAJWkF5-
yX&ust=1597137554412000&source=images&cd=vfe&ved=0CAMQjB1qFwoTCJjwypmnkOsCFQ
AAAAAdAAAAABAD
13.
14.

RESOURCES
1. www.techopedia.com
2. https://www.slideshare.net/cupaydabu/occupational-health-and-safety-
procedures
3. https://www.explainingcomputers.com/dse.html
4. https://www.slideshare.net/joygracebagui/understanding-the-need-for-
security-measures?from_action=save

P a g e | 21

You might also like