You are on page 1of 27

DON BOSCO TVET CENTER-CALAUAN, INC.

KM77 BRGY. DAYAP, CALAUAN, LAGUNA 4012


MOBILE NO.: SMART: 0947-6334-245
LANDLINE NO.: (049) 539-5356
dbtvetcenter-calauan@one-bosco.org @DBTVETCENTERCALAUAN

EMPOWERMENT
TECHNOLOGY
CHAPTER-1

FOUNDATIONS OF MODERN
COMPUTERS

Author: JULIET N. CORONADO


Consultation Time: Mon-Friday 3:00PM-4:00 PM

Empowerment Technology I|Page


MODULE DESCRIPTOR

Introduction

Empowerment Technology or E-Tech often deals with the use of


different technologies such as mobile phones, telephone, computer
and other devices to locate, save, and communicate and to
inform. Empowerment Technology is important for its innovative
uses is sufficient in our daily lives.

Training Outline

• Lesson 1. Computer Systems


• Lesson 2. Cyber Etiquettes and Guidelines
• Lesson 3. Internet Concepts and History

Empowerment Technology II | P a g e
TABLE OF
CONTENTS

LESSON 1 ………………………………………………….1-6
EXERCISE1.1………………………………………………7
LESSON 2…………………………………………………..8-15
EXERCISE1.1………………………………………………16
HANDS-ON PRACTICE…………………………………..16
LESSON 3………………………………………………….17-23
EXERCISE 1.1……………………………………………..24

Empowerment Technology III | P a g e


Lesson-1
CONCEPTS IN MODERN COMPUTERS

OBJECTIVES:

After reading this lesson, you must be able to:

1. Define Computer
2. Identify the generations of computers.
3. Describe the computer systems.

 A computer is a machine or device that performs processes, calculations and


operations based on instructions provided by a software or hardware
program. It has the ability to accept data (input), process it, and then produce
outputs.
 Modern computers are electronic devices used for a variety of purposes
ranging from browsing the web, writing documents, editing videos, creating
applications, playing video games, etc.

Empowerment Technology 1|Page


The five generations of computers

 1940 – 1956:  First Generation – Vacuum Tubes


These early computers used vacuum tubes as circuitry and magnetic drums for
memory.
 1956 – 1963: Second Generation – Transistors
The replacement of vacuum tubes by transistors saw the advent of the second
generation of computing.
 1964 – 1971: Third Generation – Integrated Circuits
By this phase, transistors were now being miniaturised and put on silicon chips
(called semiconductors).
 1972 – 2010: Fourth Generation – Microprocessors
This revolution can be summed in one word: Intel. The chip-maker developed the
Intel 4004 chip in 1971, which positioned all computer components (CPU,
memory, input/output controls) onto a single chip.
 2010-  : Fifth Generation – Artificial Intelligence
Computer devices with artificial intelligence (AI) are still in development, but
some of these technologies are beginning to emerge and be used such as voice
recognition.

THE DATA PROCESSING CYCLE

Data processing  refers to the transformation of raw data into meaningful output.
Data can be done manually using a pen and paper, mechanically using simple
devices example typewriter or electronically using modern data processing toolset
computers.
Data collection - involves getting the data/facts needed for processing from the
point of its origin to the computer

Data Input- the collected data is converted into machine-readable form by an input
device, and send into the machine.
Processing - is the transformation of the input data to a more meaningful form
(information) in the CPU.
Output - is the production of the required information, which may be input in future.

Empowerment Technology 2|Page


Two major elements of computer:
Hardware and Software

 HARDWARE COMPONENTS
Computer hardware is the collection of all the parts you can physically touch. 

 SOFTWARE COMPONENTS
Computer software, on the other hand, is not something you can touch. Software is a
set of instructions for a computer to perform specific operations. You need both
hardware and software for a computer system to work.

System Software’s
These are the backbone of all software. Example of these are
Operating system, utility software and driver software.
Application Software’s
These are programs with specific function or use. Example of
these are Microsoft office, photo editing, games etc.

Can a computer run without software?

Answer: In most situations, yes, a computer can run without software being
installed. However, if an operating system or interpreter is not found, it either
generates an error or doesn't output any information. A computer needs an operating
system that allows both the user and software to interact with the computer
hardware.

Can a computer run without hardware?

Answer:
Most computers require at least a display, hard
drive, keyboard, memory, motherboard, processor, power supply, and video card to
function properly.

Input Devices
The following table lists some examples of devices that are used to
put information into a computer:

Keyboard
The primary input device for a computer, allowing users
to type information just as they once did on a typewriter.

Empowerment Technology 3|Page


Mouse
Used with graphical interface environments to point to and
select objects on the system's monitor. Can be purchased in a
variety of sizes, shapes, and configurations.

Scanner
Converts printed or photographic information to digital
information that can be used by the computer. Works similar
to the scanning process of a photocopy machine.

Microphone
Works like the microphone on a tape recorder. Allows
input of voice or music to be converted to digital
information and saved to a file.

CD-ROM/DVD drive
Compact disc–read only memory: stores large
amounts of data on a CD that can be read by a
computer

OUTPUT DEVICES
These are peripherals in the computer that are used in producing results
of computer operations into understandable product or result.

Printer
Generates a "hard copy" of information. Includes dot
matrix, ink jet, and laser varieties.

Monitor

The primary output device. Visually displays text and


graphics.

Empowerment Technology 4|Page


Plotter
Similar to a printer, but uses pens to draw an image. Most
often used with graphics or drawing programs for very
large drawings.

Speakers
Reproduce sound. Optional high-quality speakers can be
added to provide improved output from games and
multimedia software.

Floppy Disk Drive


Mechanism for reading and writing to low-capacity,
removable, magnetic disks. Used to store and easily
transport information.

Hard Disk Drive


High-capacity internal (and sometimes external) magnetic
disks for storing data and program files. Also called fixed
disks.

Processing
The central processing unit (CPU) is the heart and brain of the computer.
This one component, or "chip," is responsible for all primary number
crunching and data management

Motherboard

The main circuit board of the computer. The


large circuit board found inside the computer.
Without it, a computer is just a metal box. The
motherboard contains all the remaining items
in this table; for all practical purposes, it is the
computer.

Chip Set
A group of computer chips or integrated circuits (ICs) that,
when working together, manage and control the computer
system. This set includes the CPU and other chips that
control the flow of data throughout the system.

Empowerment Technology 5|Page


Data Bus
A group of parallel conductors (circuit
traces) found on the motherboard and
used by the CPU to send and receive data
from all the devices in the computer.

Address Bus
An address bus is a computer bus (a series of lines
connecting two or more devices) that is used to specify
a physical address. When a processor or DMA-enabled
device needs to read or write to a memory location, it
specifies that memory location on the address bus (the
value to be read or written is sent on the data bus).

Expansion Slots
Specialized sockets that allow additional
devices called expansion cards or, less
commonly, circuit boards, to be attached to the
motherboard. Used to expand or customize a
computer, they are extensions of the computer's
bus system.

Clock
Establishes the maximum speed at which the
processor can execute commands. Not to be
confused with the clock that keeps the date and
time.

Battery
Protects unique information about the setup of the
computer against loss when electrical power fails or is
turned off. Also maintains the external date and time
(not to be confused with the CPU's clock).

Empowerment Technology 6|Page


EXERCISES 1.1

Directions: Write the word TRUE if the statement is correct and write
the correct of words to make the statement correct in the space given.

_____1. A computer is an electronic device that transforms data.


_____2. The fifth generation computers used Integrated Circuits (ICs.).
_____3. The monitor is an example of an Input device.
_____4. The backbone of all software programs is the system software.
_____5. Microsoft Word program is an example of Application software.
_____6. The storage devices are the physical equipment used in
entering data to be processed.
_____7. The concept of Artificial Intelligence allows computer to carry
out its own decision.
_____8. Soft copy is obtained as printouts.
_____9. The set of instructions in the computer system is called
hardware.
_____10. Storage devices are physical equipment that can be an input
and output device at the same time.

Empowerment Technology 7|Page


Lesson-2
CYBER ETIQUETTE

OBJECTIVES:

At the end of this lesson, the learners should be able to:


1. Know the ten commandments of computer ethics.
2. Identify the Safety Tips for children and teens.
3. Recognize the Cyber Etiquettes and Guidelines.

Empowerment Technology 8|Page


Internet Safety Tips for Children and Teens

 Personal Information. Don’t give out personal information without


your parents’ permission. This means you should not share your
last name, home address, school name, or telephone number.
Remember, just because someone asks for information about you
does not mean you have to tell them anything about yourself!

 Screen Name. When creating your screen name, do not include


personal information like your last name or date of birth.

 Passwords. Don’t share your password with anyone but your


parents. When you use a public computer make sure you logout of
the accounts you’ve accessed before leaving the terminal.

 Photos. Don’t post photos or videos online without getting your


parents’ permission.

 Online Friends. Don’t agree to meet an online friend unless you


have your parents’ permission. Unfortunately, sometimes people
pretend to be people they aren't. Remember that not everything
you read online is true.

 Online Ads. Don’t buy anything online without talking to your


parents first. Some ads may try to trick you by offering free things
or telling you that you have won something as a way of collecting
your personal information.

 Downloading. Talk to your parents before you open an email


attachment or download software. Attachments sometimes contain
viruses. Never open an attachment from someone you don’t know.

Empowerment Technology 9|Page


 Bullying. Don’t send or respond to mean or insulting messages.
Tell your parents if you receive one. If something happens online
that makes you feel uncomfortable, talk to your parents or to a
teacher at school.

 Social Networking. Many social networking websites (e.g.,


Facebook, Twitter, Second Life and MySpace) and blog hosting
websites have minimum age requirements to signup. These
requirements are there to protect you!

 Research. Talk to your librarian, teacher or parent about safe and


accurate websites for research. The public library offers lots of
resources. If you use online information in a school project make
sure you explain where you got the information.

20 email etiquette guidelines for the workplace

1. Use standard fonts and formatting

For professional business correspondence, keep your fonts, sizes and


colors classic. For example, use a standard font such as Arial, Calibri or
Times New Roman in 10- or 12-point font and in black. When you use
bold or italics, never use them on more than one word or a string of
words in a single email. 

2. Include a clear subject line

Title your email in a way that the recipient immediately knows what the
message is about before opening it. For example, if you’re emailing
about a change of time for a meeting, you might make the subject
“Meeting time changed to 2 pm.” Or if you’re following up on a
presentation, you might write, “Quick question about your presentation.”

3. Email from a professional email address

Use your company email address if possible. However, if you are self-
employed or using a personal email address for work-related
correspondence, set up a professional email address that is appropriate
for the workplace.

Empowerment Technology 10 | P a g e
4. Use professional greetings

Choose a salutation that is appropriate for the relationship you have with
the recipient. If you are sending an email to a coworker, a casual
greeting such as “Hello” may be appropriate. If you’re contacting
someone for the first time or if they are a professional acquaintance, use
a more formal greeting like “Dear Sarah/Ms. Atkins.” It’s recommended
to use the person’s name exactly as it’s shown too unless you know they
go by a nickname. In other words, don’t assume that Michael goes by
Mike or that Jennifer goes by Jen unless you’ve seen them refer to
themselves in that fashion.

20 Ways to Start an Email

5. Use an introduction

Depending on who you are emailing, it’s best practice to introduce


yourself by first and last name as well as the company you are
representing in the first few lines. This is especially important when
emailing new contacts, clients, potential customers or employers. Let
them know how you received their contact information.

Example: “My name is Jessica Franklin and I’m with White Label


Agency. Mark Gregston gave me your name and suggested I reach out
to you regarding your amazing printing services.”

How to Introduce Yourself Over Email

6. Know the culture

If you are emailing someone in another country, it is a best practice to


research customs in that country. Miscommunication can easily happen
because of cultural differences, especially in writing when you don’t see
the other person’s body language to accompany the message.

7. Be cautious with “Reply All”

The benefit of using “Reply all” is that you can respond to everyone at
once to let them know an issue has been addressed. However, when in
doubt, use “Reply” to avoid inundating a list of people with unnecessary
emails.

Empowerment Technology 11 | P a g e
8. Use sentence case

Use sentence case when you’re sending a professional email. That


means capitalizing the first word of every sentence as well as proper
nouns. Avoid using all caps on any of the words.

Example: “Anne, it was great seeing you at the meeting. I look forward


to connecting again soon.” 

9. Double-check attachments

If you can copy and paste information into an email rather than attaching
a document, do that. If not, let the recipient know in the body of your
email that you have attached a document. It’s also good etiquette to
compress or zip the attachment so it takes up less space in their inbox. 

10. Proofread

Proper spelling and grammar are important when sending business


correspondence. After you finish writing an email, read it out loud to
ensure there are no errors. Taking the time to read it out loud will
increase the likelihood of catching any mistakes that your eyes may
have skimmed over had you read it silently.

11. Don’t use emojis

Unless the recipient has used emojis when communicating with you in
the past, resist the temptation to use them yourself. They can reflect
poorly on your professionalism and even though they may seem cute,
they can easily be misinterpreted in a business setting.

12. Be positive

Be intentional about maintaining a positive tone in business emails


because they lack the benefit of facial expressions and our true voices.
Be aware of every word you use and how it may come across. For
example, instead of talking about “constraints” or “limitations,” try
“possibilities” or “opportunities.” Rather than “faults,” try  “differences.”  

Empowerment Technology 12 | P a g e
13. Reply within 24 hours

When someone emails you, replying within 24 hours, perhaps up to 48


hours, is common courtesy. If you have unintentionally passed this
timeframe, express your apologizes and politely explain the delay. 

14. Keep your tone professional

Think carefully about your word choice in an email and how someone
else could read them. Avoid negativity, sarcasm and adjectives that can
cause you to sound overly emotional. Be careful when using humor too,
as it can be misinterpreted.

15. Check the recipient’s name

Always check the recipient’s name one last time before you send the
email. Pull up their LinkedIn profile or check how they’ve signed off on
emails to you and spell the name the same way. Be aware that
sometimes the autocorrect function incorrectly changes some names so
do a final proofread too.  

16. Shorten URLs

Pasting a lengthy URL into your email can look messy and take up
valuable space. Use a link shortener to shorten the link or hyperlink text
within the email. 

17. Perfect your email signature

Less is generally more where email signatures are concerned. Your


signature should typically include only your name, job title, company
website or LinkedIn URL and a phone number where you can be
reached. You may also want to include your photo or your company’s
logo, particularly if you work for yourself. It’s important to check that your
email has a responsive design and that it will look good on a mobile
device. A responsive design adjusts for mobile users. 

How to End an Email

18. Use BCC appropriately

BCC stands for blind carbon copy, which is similar to CC except that the
email recipients specified in the BCC field do not appear in the header or

Empowerment Technology 13 | P a g e
to the recipients in the To or Cc fields. Using BCC is good etiquette if
you want to protect someone’s email address from being exposed to
others.

For example, if you are emailing a group of subcontractors about a


change in policy or procedure, it’s considerate to BCC everyone on the
list. It’s also a good idea to use if you’re sending a weekly newsletter to
clients who don’t know each other and who would wish to keep their
addresses private. Otherwise try to avoid using it, as it may be viewed as
deceitful.

19. Think before forwarding

A best practice for forwarding is to summarize what’s being discussed so


the recipient quickly knows what you need from them. It’s also important
to keep in mind that some emails are not intended to be forwarded and
may contain private or sensitive information. Use caution when
forwarding.

20. Set informative out-of-office replies

If you plan to be out of the office for an extended period of time, set up
an automated out of office reply to let people know you won’t be able to
able to respond to their emails until a specific date. Include a contact
that the individual can reach if there is an urgent matter. Include “Out of
Office” and the date in the subject line so recipients can quickly
recognize that they’ve received an automated response. It’s also helpful
to include the first line in the message as: “This is an automated
message while I am out of the office.”

SOCIAL MEDIA GUIDELINES

Best practices

Freedom of speech must be exercised responsibly on the sites. These


recommendations provide a roadmap for constructive, respectful, and
productive use of social networking sites.

 Be respectful
Respect your audience and your colleagues. Take care not to
engage in any conduct that would not be acceptable in the
workplace. 

Empowerment Technology 14 | P a g e
 Get your facts straight
Ensure that you are providing accurate information so that you are
not misrepresenting the colleges or the district.

 Be mindful of your public image


Consider the image you want to portray to the public. Be mindful
that what you post may be viewed by parents, students,
administrators and community members, and may stay public for a
long time.

 Use your best judgment


Remember there may be consequences to what you post, so
consider your content carefully. If you are about to post something
that makes you the slightest bit uncomfortable, review these
guidelines and think about whether to post the material.

Empowerment Technology 15 | P a g e
EXERCISE -1

ESSAY:

How does social media affect your activities? How can you use the
media positively? Write at least 3-5 sentences.

_________________________________________________________

_________________________________________________________

_________________________________________________________
_________________________________________________________

_____________________________________________________.

HANDS ON PRACTICE-1

Directions: Create a google mail account and send to me the screen


shot photo of your Gmail account.

RUBRICS
CRITERION DESCRIPTION DEVELOPING AT EXEMPLARY SCORE REMARKS
1-5 STANDARD 9-10
6-8
Accuracy Content
Organization
Speed Time Element
Output Aesthetic Appeal
Creativity
Work Habits Workmanship
Total Score

Lesson 3:

INTERNET CONCEPTS

Empowerment Technology 16 | P a g e
The Internet is the global system of
interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate
between networks and devices. It is a network of
networks that consists of private, public, academic,
business, and government networks of local to
global scope, linked by a broad array of electronic,
wireless, and optical networking technologies .

Different Types of Internet Connections

Dial-Up (Analog 56K).


Dial-up access is cheap but slow. A modem
(internal or external) connects to the Internet after
the computer dials a phone number.  This analog
signal is converted to digital via the modem and
sent over a land-line serviced by a public telephone
network.  Telephone lines are variable in quality
and the connection can be poor at times.  The lines
regularly experience interference and this affects
the speed, anywhere from 28K to 56K.  Since a
computer or other device shares the same line as
the telephone, they can’t be active at the same
time.

DSL.  DSL stands for Digital Subscriber Line.  It is an


internet connection that is always “on”.  This uses 2
lines so your phone is not tied up when your computer
is connected.  There is also no need to dial a phone
number to connect.  DSL uses a router to transport data
and the range of connection speed, depending on the
service offered, is between 128K to 8 Mbps.

Empowerment Technology 17 | P a g e
Cable.  Cable provides an internet connection through a
cable modem and operates over cable TV lines.  There
are different speeds depending on if you are uploading
data transmissions or downloading.  Since the coax cable
provides a much greater bandwidth over dial-up or DSL
telephone lines, you can get faster access.  Cable speeds
range from 512K to 20 Mbps.

Wireless.   Wireless, or Wi-Fi, as the name suggests, does not use telephone lines
or cables to connect to the internet.   Instead, it uses radio frequency.  Wireless is
also an always on connection and it can be accessed from just about anywhere. 
Wireless networks are growing in coverage areas by the minute so when I mean
access from just about anywhere, I really mean it.  Speeds will vary, and the range is
between 5 Mbps to 20 Mbps.

Satellite.  Satellite accesses the


internet via a satellite in Earth’s
orbit. The enormous distance that
a signal travels from earth to
satellite and back again, provides
a delayed connection compared
to cable and DSL.  Satellite
connection speeds are around
512K to 2.0 Mbps.

Empowerment Technology 18 | P a g e
Cellular.  Cellular technology provides wireless Internet access through
cell phones.  The speeds vary depending on the provider, but the most
common are 3G and 4G speeds.  A 3G is a term that describes a
3rd generation cellular network obtaining mobile speeds of around 2.0
Mbps.  4G is the fourth generation of cellular wireless standards. The
goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality
is about 21 Mbps currently.

Empowerment Technology 19 | P a g e
11 Types of Networks in Use Today

1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a


wireless modem, a computer or two, phones, printers, tablets, etc., and
revolves around one person in one building. These types of networks are
typically found in small offices or residences, and are managed by one
person or organization from a single device.

2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before –


LANs are the most frequently discussed networks, one of the most
common, one of the most original and one of the simplest types of
networks. 

LANs connect groups of computers and low-voltage devices together


across short distances (within a building or between a group of two or
three buildings in close proximity to each other) to share information and
resources. Enterprises typically manage and maintain LANs.

3. Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network


technology such as Wi-Fi. Typically seen in the same types of
applications as LANs, these types of networks don’t require that devices
rely on physical cables to connect to the network.

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs,
explained below), these types of networks are typically seen in
universities, large K-12 school districts or small businesses. They can be
spread across several buildings that are fairly close to each other so
users can share resources.

5. Metropolitan Area Network (MAN)

These types of networks are larger than LANs but smaller than WANs –
and incorporate elements from both types of networks. MANs span an
entire geographic area (typically a town or city, but sometimes a

Empowerment Technology 20 | P a g e
campus). Ownership and maintenance is handled by either a single
person or company (a local council, a large company, etc.).

6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together


across longer physical distances. This allows computers and low-voltage
devices to be remotely connected to each other over one large network
to communicate even when they’re miles apart.

7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of


storage devices to several servers, these types of networks don’t rely on
a LAN or WAN. Instead, they move storage resources away from the
network and place them into their own high-performance network. SANs
can be accessed in the same fashion as a drive attached to a server.
Types of storage-area networks include converged, virtual and unified
SANs.

8. System-Area Network (also known as SAN)

This term is fairly new within the past two decades. It is used to explain a
relatively local network that is designed to provide high-speed
connection in server-to-server applications (cluster environments),
storage area networks (called “SANs” as well) and processor-to-
processor applications. The computers connected on a SAN operate as
a single system at very high speeds.

9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN


technology can be integrated into structured cabling to overcome
concerns about supporting traditional Ethernet protocols and network
applications such as PoE (Power over Ethernet). A point-to-multipoint
LAN architecture, POLAN uses optical splitters to split an optical signal
from one strand of singlemode optical fiber into multiple signals to serve
users and devices.

10. Enterprise Private Network (EPN)

Empowerment Technology 21 | P a g e
These types of networks are built and owned by businesses that want to
securely connect its various locations to share computer resources.

11. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users
send and receive data as if their devices were connected to the private
network – even if they’re not. Through a virtual point-to-point connection,
users can access a private network remotely.

HISTORY OF INTERNET
The WorldWideWeb browser

The first web browser - or browser-editor rather -


was called WorldWideWeb as, after all, when it
was written in 1990 it was the only way to see
the web. Much later it was renamed Nexus in
order to save confusion between the program
and the abstract information space (which is now
spelled World Wide Web with spaces).

A web browser (commonly referred to as


a browser) is a software application for
accessing information on the World Wide Web.
When a user requests a web page from a
particular website, the web browser retrieves
the necessary content from a web server and
then displays the page on the user's device.

Empowerment Technology 22 | P a g e
Internet Explorer (formerly Microsoft Internet Explorer and Windows
Internet Explorer,commonly abbreviated IE or MSIE) is a series
of graphical web browsers developed by Microsoft and included in
the Microsoft Windows line of operating systems, starting in 1995. It was
first released as part of the add-on
package Plus! for Windows 95 that
year. Later versions were available as
free downloads, or in-service packs,
and included in the original equipment
manufacturer (OEM) service releases
of Windows 95 and later versions of
Windows. Although it has since been
discontinued, it is still maintained

Empowerment Technology 23 | P a g e
EXERCISE -1.1

Directions: Identify the parts of the Internet Explorer. In 15 minutes.


There should be a proof that you answered the activities on your own.
Send to my email, the video as proof. (jncoronado@one-bosco.org)

Empowerment Technology 24 | P a g e

You might also like