Professional Documents
Culture Documents
EMPOWERMENT
TECHNOLOGY
CHAPTER-1
FOUNDATIONS OF MODERN
COMPUTERS
Introduction
Training Outline
Empowerment Technology II | P a g e
TABLE OF
CONTENTS
LESSON 1 ………………………………………………….1-6
EXERCISE1.1………………………………………………7
LESSON 2…………………………………………………..8-15
EXERCISE1.1………………………………………………16
HANDS-ON PRACTICE…………………………………..16
LESSON 3………………………………………………….17-23
EXERCISE 1.1……………………………………………..24
OBJECTIVES:
1. Define Computer
2. Identify the generations of computers.
3. Describe the computer systems.
Data processing refers to the transformation of raw data into meaningful output.
Data can be done manually using a pen and paper, mechanically using simple
devices example typewriter or electronically using modern data processing toolset
computers.
Data collection - involves getting the data/facts needed for processing from the
point of its origin to the computer
Data Input- the collected data is converted into machine-readable form by an input
device, and send into the machine.
Processing - is the transformation of the input data to a more meaningful form
(information) in the CPU.
Output - is the production of the required information, which may be input in future.
HARDWARE COMPONENTS
Computer hardware is the collection of all the parts you can physically touch.
SOFTWARE COMPONENTS
Computer software, on the other hand, is not something you can touch. Software is a
set of instructions for a computer to perform specific operations. You need both
hardware and software for a computer system to work.
System Software’s
These are the backbone of all software. Example of these are
Operating system, utility software and driver software.
Application Software’s
These are programs with specific function or use. Example of
these are Microsoft office, photo editing, games etc.
Answer: In most situations, yes, a computer can run without software being
installed. However, if an operating system or interpreter is not found, it either
generates an error or doesn't output any information. A computer needs an operating
system that allows both the user and software to interact with the computer
hardware.
Answer:
Most computers require at least a display, hard
drive, keyboard, memory, motherboard, processor, power supply, and video card to
function properly.
Input Devices
The following table lists some examples of devices that are used to
put information into a computer:
Keyboard
The primary input device for a computer, allowing users
to type information just as they once did on a typewriter.
Scanner
Converts printed or photographic information to digital
information that can be used by the computer. Works similar
to the scanning process of a photocopy machine.
Microphone
Works like the microphone on a tape recorder. Allows
input of voice or music to be converted to digital
information and saved to a file.
CD-ROM/DVD drive
Compact disc–read only memory: stores large
amounts of data on a CD that can be read by a
computer
OUTPUT DEVICES
These are peripherals in the computer that are used in producing results
of computer operations into understandable product or result.
Printer
Generates a "hard copy" of information. Includes dot
matrix, ink jet, and laser varieties.
Monitor
Speakers
Reproduce sound. Optional high-quality speakers can be
added to provide improved output from games and
multimedia software.
Processing
The central processing unit (CPU) is the heart and brain of the computer.
This one component, or "chip," is responsible for all primary number
crunching and data management
Motherboard
Chip Set
A group of computer chips or integrated circuits (ICs) that,
when working together, manage and control the computer
system. This set includes the CPU and other chips that
control the flow of data throughout the system.
Address Bus
An address bus is a computer bus (a series of lines
connecting two or more devices) that is used to specify
a physical address. When a processor or DMA-enabled
device needs to read or write to a memory location, it
specifies that memory location on the address bus (the
value to be read or written is sent on the data bus).
Expansion Slots
Specialized sockets that allow additional
devices called expansion cards or, less
commonly, circuit boards, to be attached to the
motherboard. Used to expand or customize a
computer, they are extensions of the computer's
bus system.
Clock
Establishes the maximum speed at which the
processor can execute commands. Not to be
confused with the clock that keeps the date and
time.
Battery
Protects unique information about the setup of the
computer against loss when electrical power fails or is
turned off. Also maintains the external date and time
(not to be confused with the CPU's clock).
Directions: Write the word TRUE if the statement is correct and write
the correct of words to make the statement correct in the space given.
OBJECTIVES:
Title your email in a way that the recipient immediately knows what the
message is about before opening it. For example, if you’re emailing
about a change of time for a meeting, you might make the subject
“Meeting time changed to 2 pm.” Or if you’re following up on a
presentation, you might write, “Quick question about your presentation.”
Use your company email address if possible. However, if you are self-
employed or using a personal email address for work-related
correspondence, set up a professional email address that is appropriate
for the workplace.
Empowerment Technology 10 | P a g e
4. Use professional greetings
Choose a salutation that is appropriate for the relationship you have with
the recipient. If you are sending an email to a coworker, a casual
greeting such as “Hello” may be appropriate. If you’re contacting
someone for the first time or if they are a professional acquaintance, use
a more formal greeting like “Dear Sarah/Ms. Atkins.” It’s recommended
to use the person’s name exactly as it’s shown too unless you know they
go by a nickname. In other words, don’t assume that Michael goes by
Mike or that Jennifer goes by Jen unless you’ve seen them refer to
themselves in that fashion.
5. Use an introduction
The benefit of using “Reply all” is that you can respond to everyone at
once to let them know an issue has been addressed. However, when in
doubt, use “Reply” to avoid inundating a list of people with unnecessary
emails.
Empowerment Technology 11 | P a g e
8. Use sentence case
9. Double-check attachments
If you can copy and paste information into an email rather than attaching
a document, do that. If not, let the recipient know in the body of your
email that you have attached a document. It’s also good etiquette to
compress or zip the attachment so it takes up less space in their inbox.
10. Proofread
Unless the recipient has used emojis when communicating with you in
the past, resist the temptation to use them yourself. They can reflect
poorly on your professionalism and even though they may seem cute,
they can easily be misinterpreted in a business setting.
12. Be positive
Empowerment Technology 12 | P a g e
13. Reply within 24 hours
Think carefully about your word choice in an email and how someone
else could read them. Avoid negativity, sarcasm and adjectives that can
cause you to sound overly emotional. Be careful when using humor too,
as it can be misinterpreted.
Always check the recipient’s name one last time before you send the
email. Pull up their LinkedIn profile or check how they’ve signed off on
emails to you and spell the name the same way. Be aware that
sometimes the autocorrect function incorrectly changes some names so
do a final proofread too.
16. Shorten URLs
Pasting a lengthy URL into your email can look messy and take up
valuable space. Use a link shortener to shorten the link or hyperlink text
within the email.
BCC stands for blind carbon copy, which is similar to CC except that the
email recipients specified in the BCC field do not appear in the header or
Empowerment Technology 13 | P a g e
to the recipients in the To or Cc fields. Using BCC is good etiquette if
you want to protect someone’s email address from being exposed to
others.
If you plan to be out of the office for an extended period of time, set up
an automated out of office reply to let people know you won’t be able to
able to respond to their emails until a specific date. Include a contact
that the individual can reach if there is an urgent matter. Include “Out of
Office” and the date in the subject line so recipients can quickly
recognize that they’ve received an automated response. It’s also helpful
to include the first line in the message as: “This is an automated
message while I am out of the office.”
Best practices
Be respectful
Respect your audience and your colleagues. Take care not to
engage in any conduct that would not be acceptable in the
workplace.
Empowerment Technology 14 | P a g e
Get your facts straight
Ensure that you are providing accurate information so that you are
not misrepresenting the colleges or the district.
Empowerment Technology 15 | P a g e
EXERCISE -1
ESSAY:
How does social media affect your activities? How can you use the
media positively? Write at least 3-5 sentences.
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
_____________________________________________________.
HANDS ON PRACTICE-1
RUBRICS
CRITERION DESCRIPTION DEVELOPING AT EXEMPLARY SCORE REMARKS
1-5 STANDARD 9-10
6-8
Accuracy Content
Organization
Speed Time Element
Output Aesthetic Appeal
Creativity
Work Habits Workmanship
Total Score
Lesson 3:
INTERNET CONCEPTS
Empowerment Technology 16 | P a g e
The Internet is the global system of
interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate
between networks and devices. It is a network of
networks that consists of private, public, academic,
business, and government networks of local to
global scope, linked by a broad array of electronic,
wireless, and optical networking technologies .
Empowerment Technology 17 | P a g e
Cable. Cable provides an internet connection through a
cable modem and operates over cable TV lines. There
are different speeds depending on if you are uploading
data transmissions or downloading. Since the coax cable
provides a much greater bandwidth over dial-up or DSL
telephone lines, you can get faster access. Cable speeds
range from 512K to 20 Mbps.
Wireless. Wireless, or Wi-Fi, as the name suggests, does not use telephone lines
or cables to connect to the internet. Instead, it uses radio frequency. Wireless is
also an always on connection and it can be accessed from just about anywhere.
Wireless networks are growing in coverage areas by the minute so when I mean
access from just about anywhere, I really mean it. Speeds will vary, and the range is
between 5 Mbps to 20 Mbps.
Empowerment Technology 18 | P a g e
Cellular. Cellular technology provides wireless Internet access through
cell phones. The speeds vary depending on the provider, but the most
common are 3G and 4G speeds. A 3G is a term that describes a
3rd generation cellular network obtaining mobile speeds of around 2.0
Mbps. 4G is the fourth generation of cellular wireless standards. The
goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality
is about 21 Mbps currently.
Empowerment Technology 19 | P a g e
11 Types of Networks in Use Today
Larger than LANs, but smaller than metropolitan area networks (MANs,
explained below), these types of networks are typically seen in
universities, large K-12 school districts or small businesses. They can be
spread across several buildings that are fairly close to each other so
users can share resources.
These types of networks are larger than LANs but smaller than WANs –
and incorporate elements from both types of networks. MANs span an
entire geographic area (typically a town or city, but sometimes a
Empowerment Technology 20 | P a g e
campus). Ownership and maintenance is handled by either a single
person or company (a local council, a large company, etc.).
This term is fairly new within the past two decades. It is used to explain a
relatively local network that is designed to provide high-speed
connection in server-to-server applications (cluster environments),
storage area networks (called “SANs” as well) and processor-to-
processor applications. The computers connected on a SAN operate as
a single system at very high speeds.
Empowerment Technology 21 | P a g e
These types of networks are built and owned by businesses that want to
securely connect its various locations to share computer resources.
By extending a private network across the Internet, a VPN lets its users
send and receive data as if their devices were connected to the private
network – even if they’re not. Through a virtual point-to-point connection,
users can access a private network remotely.
HISTORY OF INTERNET
The WorldWideWeb browser
Empowerment Technology 22 | P a g e
Internet Explorer (formerly Microsoft Internet Explorer and Windows
Internet Explorer,commonly abbreviated IE or MSIE) is a series
of graphical web browsers developed by Microsoft and included in
the Microsoft Windows line of operating systems, starting in 1995. It was
first released as part of the add-on
package Plus! for Windows 95 that
year. Later versions were available as
free downloads, or in-service packs,
and included in the original equipment
manufacturer (OEM) service releases
of Windows 95 and later versions of
Windows. Although it has since been
discontinued, it is still maintained
Empowerment Technology 23 | P a g e
EXERCISE -1.1
Empowerment Technology 24 | P a g e