Professional Documents
Culture Documents
13
Competency: Plan and prepare for tasks to be undertaken
Objectives: Identify required data security guidelines in accordance with existing procedures.
Topic: Performing Computer Operations (PCO)
Materials:
Reference:
Copyright: For classroom use only
DepEd owned
CONCEPT NOTE:
DATA SECURITY
Data
- as a general concept refers to the fact that some existing information or knowledge is represented or
coded in some form suitable for better usage or processing.
- the quantities, characters, or symbols on which operations are performed by a computer
The core elements of data security are confidentiality, integrity, and availability. This is
a security model and guide for organizations to keep their sensitive data protected from unauthorized access
and data exfiltration.
Confidential Data is a generalized term that typically represents data classified as Restricted, according to the
data classification scheme defined in this Guideline. This term is often used interchangeably with sensitive
data.
Non-public Information is defined as any information that is classified as Private or Restricted Information
according to the data classification scheme defined in this Guideline.
Sensitive Data is a generalized term that typically represents data classified as Restricted, according to the data
classification scheme defined in this Guideline. This term is often used interchangeably with confidential data.
Commonly if you are authorized to access data probably the requirements are the following:
1. Login name/Username
2. Security/Password
Direction: Determine what is ask for. Write your answer in the activity sheet.
1. It refers to the quantities, characters, or symbols on which operations are performed by a computer.
2. A generalized term for data which is classified as restricted.
3. It is defined as all data owned or licensed.
4. Two requirements needed if you are an authorized person to access data.
Quarter: 1 Week: 4 Day: 2 Activity No. 14
Competency: Input data into computer
Objectives: Determine appropriate program/application in accordance with company procedures
Topic: Performing Computer Operations (PCO)
Materials:
Reference:
Copyright: For classroom use only
DepEd owned
CONCEPT NOTE:
Application Software - which is software that uses the computer system to perform special functions or
provide entertainment functions beyond the basic operation of the computer itself.
10. Content Access Software Accessing content through media players, web browsers
Direction: Classify the following software based on its type. Write your answer on a sheet of paper.
1. Opera 6. Encarta
2. Adobe Photoshop 7. Microsoft Office
3. PowerPoint 8. Keynotes
4. Oracle 9. WordPad
5. Documentation 10. Real Player
Quarter: 1 Week: 4 Day: 3 Activity No. 15
Competency: Input data into computer
Objectives: Identify the accuracy of information and save the information with standard
operating procedures
Topic: Performing Computer Operations (PCO)
Materials:
Reference: COMPUTER HARDWARE SERVICING 1, K to 12 – Technology and Livelihood
Education TLE_IACSS9-12PCO-Ic-d-4
Copyright: For classroom use only
DepEd owned
CONCEPT NOTES:
Proofreading a Document
There are many features to help you proofread your document. These include: Spelling and Grammar,
Thesaurus, AutoCorrect, Default Dictionary, and Word Count.
Thesaurus
The Thesaurus allows you to view synonyms. To use the thesaurus:
• Click the Review Tab of the Ribbon
• Click the Thesaurus Button on the Proofing Group.
• The thesaurus tool will appear on the right side of the screen and you can view word options.
CONCEPT NOTES:
Storage Drives
2. Optical Drive
An optical drive is a storage device that uses lasers to read data on the
optical media. There are three types of optical drives: Compact Disc
(CD), Digital Versatile Disc (DVD) and Blu-ray Disc (BD).
3. External Flash Drive An external flash drive, also known as a thumb drive, is a removable
storage device that connects to a USB port. These drives can
be accessed by the operating system in the same way that other types
of drives are accessed.
Direction: Enumeration.