You are on page 1of 7

Republic of the Philippines

Department of Education- Region X


Division of Valencia City
CENTRAL BUKIDNON INSTITUTE, INC.
S.Y. 2021-2022

Computer 10
Learning Modules- 1 and 2
1st Quarter

_________________________
Learner’s Name

_________________________
Parent’s Name & Signature

Teacher:
James Enoveno
Cellphone Number: 09552747135
Email: tiagosan1986@gmail.com
Facebook: AL Munir
Weeks 1 and 2: PRODUCTIVITY
SOFTWARE,
Mobile Productivity Apps and
Malware and Firewall
Memory Text: “It is he who made the earth by his power, who established the world by his wisdom, and by his
understanding stretched out the heavens. Jeremiah 10:12:”  

Enabling Outcomes:
► Define productivity tools;
► List different Microsoft Office software for different office documents and software applications for
media conferencing;
► Define mobile productivity applications;
► List different mobile productivity apps
► Define computer security; and
► Elaborate on how the end-user can protect him/herself from malware and attacks.

Concepts (Generalization)
Productivity tools (also known as productivity software) are computer software programs that allow users to
view, create, and modify general office documents (e.g., letters, spreadsheets, memos, presentations, form
generation, image editing, etc.) quickly and easily.
As office documents are used in the day-to-day operations of businesses and state offices, proper tools should
be in place to enable end-user productivity.
Productivity tools are great solutions to increase the end-user productivity at school, work, or even out of the
school or office. It is usually available in many platforms such as offline installed software, as an online web
application, and even in mobile platforms (e.g., Android, iOS).
Productivity software such as the Microsoft Office suites, which brought word processing, spreadsheet, and
relational database programs to the desktop in the 1980s, is the core example of productivity tools.
Productivity tools come in a wide range of software, sometimes bundled together, or offered separately.
So why should you use productivity tools? While there is a wide range of benefits, the best reason is that it just
makes essential, everyday computing tasks more efficient.
There are more and numerous productivity tools waiting to be discovered and developing right now. They took
the form of timers, calendars, written to-do list, and everything you could think of to boost your productivity.
As advancements in app development have made progress, productivity software service providers also use
mobile platforms to view and edit files on the end user’s smartphones, tablevts, and wearables. Take note;
most developers nowadays are making desktop productivity applications available to your mobile smartphones
too.

PRODUCTIVITY TOOL APPLICATION

PRODUCTIVITY TOOL APPLICATION


There are more and numerous productivity tools waiting to be discovered and developing right now. They took
the form of timers, calendars, written to-do list, and everything you could think of to boost your productivity.
As advancements in app development have made progress, productivity software service providers also use
mobile platforms to view and edit files on the end user's smartphones, tablets, and wearables. Take note, most
developers nowadays are making desktop productivity applications available to your mobile smartphones too.

Mobile Productivity Application

is a computer software program that allows mobile devices such as smartphones, tablets, and wearable device
users to perform essential day-to-day tasks.

It is available for end-users for free. Maybe you are using one right now such as note taking app, email app, or a
calendar app on your smartphone. Microsoft’s Office suite, for instance, is available as a free app download for
most iOS, Android, and other OS.
The category of mobile productivity apps also includes file hosting and file-sharing services such as Dropbox
and Google Drive to media conferencing apps such as Skype and Zoom.
With the help of modern technology, more and more institutions are meeting online and doing productivity
works using these mobile productivity applications at your fingertips. All you need is a smartphone, an internet
connection and yourself.

In 1956, AT&T started working on a “Picturephone” prototype capable of transmitting still images every two
seconds over regular analog public switched telephone network (PSTN) telephone lines. After 8 years, the
Picturephone made its debut at World’s Fair 1964.

Computer Security

Core Principles of Cyber Security


In any security relating to computers, the three core principles should be present:
● Confidentiality – Sensitive information must remain confidential and should be accessible to authorized
users only.
● Integrity – Data must not in any way be altered from its original state.
● Availability – Information must always be available to authorized users whenever needed.
There are hundreds of attacks per second all over the world that can infiltrate a network and cause serious harm
such as the following:
● record keyboard strokes and steal passwords,
● send spam and phishing emails,
● gain access to restricted or personal information on your computer, or on other systems that you have
access to,
● infect other systems with viruses and other malware, and
● produce great volumes of data traffic, slowing down the whole system.

Here are some of the ways that computer users can protect themselves against security breaches:

✔ Use strong, ambiguous passwords that can’t be easily predicted.


✔ Ensure that your computer, devices, and applications are updated with the latest version of the operating
system.
✔ Ensure that your computer is secured with up-to-date antivirus and anti-spyware
✔ Ignore unknown or unsolicited links and attachments sent for you.
✔ Look for ‘HTTPS’ in the URL before you input any confidential information
✔ Avoid using unfamiliar unencrypted e-mail or video conferencing software.

Be Active (Exercises/Activities)
Directions: Identify the following. Write WP if the given application software is Word Processing, P if
Presentation, S if Spreadsheet, DP if Desktop Publishing, ES if Email Software, MC if Media Conference and
FHS if File Hosting Service.
Ignite (Evaluation)
List the dos and don’ts to achieve computer security.

Dos Don’ts
IFL (Integration of Faith & Learning)

Technology cannot be simply rejected, demonized, or even mindlessly accepted and used. For your
technological usage, you need to do so discerningly, and with an open hand knowing that technology
is not the solution to every problem—but it is a vehicle to share the gospel and do good for others.

Reference/s

EDUCODE _ PowerPoint Lesson Grade 10

You might also like