You are on page 1of 20

1

ESTANZA NATIONAL HIGH SCHOOL


LINGAYEN, PANGASINAN

HAND-OUTS
IN
COMPUTER - T.L.E. 10
(QUARTER 1-WEEK 5&6)

LEARNING OBJECTIVES:
At the end of the lesson, you should be able to:

1. Understand what is a software and its categories.


2. Differentiate between system software and application software.
3. Identify the common operating system software and application software used for
computers.
4. Explain the use of various types of application software.
5. Define what people ware is.

INFORMATION SHEET
LESSON 10: THE COMPUTER SOFTWARE

What is the difference between a system software and application software?


What are the types of application software commonly run in the computer?
To make the computers work, you have to give them instructions what to do or how to work
with the information. These instructions are called software.
The software is a set of instructions developed by a computer programmer. Software is also
known as program.

Different types of software tell computers how to do different things. When you want to draw
on a computer, you need to have a drawing program. When you want to write on a computer, you
need to have a word processing program.
Software can be classified into two categories:
SOFTWARE CATEGORIES
What is an operating system?
1. Operating System Software- is a set of programs that control how the computer hardware and the
software will work together. Without an operating system, a computer is useless.
*It controls the operations of input, output and input/output devices.
*It manages the reading of data from input devices and transmitting the information to output devices.
*An operating system is the most important software that runs on a computer.

QUARTER 1-WEEK 5-8 Elaine Bautista


2

*It manages the computer's memory and processes, as


well as all of its software and hardware. *It also allows
you to communicate with the computer without knowing
how to speak the computer's language. 

Some of the well-known operating system software


1. Disk Operating System (DOS) – operating
system intended to run on any Intel 8086-family
of microprocessors.
2. Macintosh Operating System – operating
system program developed by Apple Company
specifically for Apple-Macintosh computers and
its devices.
3. MS Windows – operating system program
developed by Microsoft Company for common type
of personal computers and its devices.
Modern operating systems use a graphical user
interface, or GUI (pronounced gooey). A GUI lets you use
your mouse to click icons, buttons, and menus, and
everything is clearly displayed on the screen using a
combination of graphics and text.
Microsoft Windows
Microsoft created the Windows operating system in
the mid-1980s. Over the years, there have been many
different versions of Windows, but the most recent ones are
Windows 10 (released in 2015), Windows 8 (2012),
Windows 7 (2009), and Windows Vista (2007). Windows
comes pre-loaded on most new PCs, which helps to make it
the most popular operating system in the world.
Mac OS is a line of operating systems created by Apple. It
comes preloaded on all new Macintosh computers, or Macs. All of the recent versions are known
as OS X (pronounced O-S Ten), and the specific versions include El Capitan (released in
2015),Yosemite (2014), Mavericks (2013), Mountain Lion (2012), and Lion (2011).

Linux (pronounce LINN-ux) is a family of open


source operating systems, which means that they can be
modified and distributed by anyone around the world. This is
very different from proprietary software like Windows,
which can only be modified by the company that owns it
(Microsoft). The advantages of Linux are that it is free, and
there are many different distributions (or versions) that you
can choose from. Each distribution has a different look and
feel, and the most popular ones include Ubuntu, Mint,
and Fedora.
2. APPLICATION SOFTWARE – is a set of programs developed to do a specific activity in
the computer.
*Application software uses the capacity of a computer directly for specific tasks and are used to
manipulate text, graphics and numbers.

QUARTER 1-WEEK 5-8 Elaine Bautista


3

Types of Application Software


1. Word processing software – software used for
writing letters, essays and stories. It allows you to
create, edit, format and print text and graphics in a
document.
Examples of Word Processing Software: WordStar,
Microsoft Word, WordPerfect
2. Desktop publishing software – software used to
prepare pages for newspapers, brochures,
newsletters, and books. This software has various
fonts and creative styles for designing text and graphics on page. Some examples of
desktop software are: Adobe PageMaker, Microsoft
Publisher, Print Artist
3. Spreadsheet software – A worksheet or
spreadsheet is a rectangle grid of rows and columns
intersecting to create cells. It is a software used to
enter data in a tabular form, create formulas to
produce calculations. Some examples of
spreadsheet software are: Lotus 1-2-3, Microsoft
Excel
4. Database software – software used to manage a huge amount of records like
students’ grades, customer’s list, mailing list, telephone numbers and others. This
software can produce reports and can be a source of specific information. Databases are
used in offices, educational settings and organizations of different types. 3 of the most
widely used DBMS designed for microcomputers include Corel Paradox, Microsoft Access
and Lotus Approach. Some examples of database software are: Fox Pro, MS Access, and
Oracle
5. Presentation software -- Information is presented visually through presentation
graphics that combine numerous visual objects for creating interesting and attractive
presentations. These tools are also used for communicating persuasive messages. Slides
are used for electronic presentation and there are layout, normal and slide show views.
You can choose color schemes, slide layouts, special effects, animation, transitions and
builds.
6. Internet Browsers -- A web browser, or simply
"browser," is an application used to access and
view websites. Common web browsers include
Microsoft Internet Explorer, Google Chrome,
Mozilla Firefox, and Apple Safari. ... For example,
Ajax enables a browser to dynamically update

QUARTER 1-WEEK 5-8 Elaine Bautista


4

information on a webpage without the need to reload the page. A web browser (commonly
referred to as a browser) is a software application for accessing information on the World Wide
Web. ... The most used browser is Google Chrome, with a 64% global market share on all devices,
followed by Safari with 18%. Other notable browsers include Firefox and Microsoft Edge.
7. Email Programs -- Email
software is a program that features
and functionality for using
electronic mail. In most cases,
these programs are not actual email hosting technologies, but rather, email editors with
different formats, layout and messaging functionality tools.
8. Educational Software- software design to present a learning package or topic.
Computer-Aided Learning can help the students to strengthen their language and
mathematical skills. Education software is computer software with the primary purpose
of teaching or self-learning.
9. Entertainment Software – software designed to play games in the computer.
Example of entertainment software are: Chess, Card Game, Flight Stimulator. On-line
Games
10. Graphics Software – software used to create designs, logos, presentation,
animations and pictures. Some of graphics software examples are: CorelDraw, Ms
Powerpoint, Adobe Photoshop
Application Software Type Examples
Word processing software MS Word, WordPad and Notepad
Database software Oracle, MS Access etc
Spreadsheet software Apple Numbers, Microsoft Excel
Multimedia software Real Player, Media Player
Presentation Software Microsoft Power Point, Keynotes
Enterprise Software Customer relationship management system
Information Worker Software Documentation tools, resource management tools
Educational Software Dictionaries: Encarta, Britannica Mathematical:
MATLAB Others: Google Earth, NASA World Wind
Simulation Software Flight and scientific simulators
Content Access Software Accessing content through media players, web
browsers
Application Suites Open Office, Microsoft Office
Software for Engineering and IDE or Integrated Development Environments
Product Development

SKILL TEST:

QUARTER 1-WEEK 5-8 Elaine Bautista


5

Title of the Activity: ACTIVITY 1: WHAT IS IT?


Directions: Answer the following questions: write your answers on the box provided.

1. What is a software?
2. Name the two categories of software.
3. Give Examples.

Title of the Activity: ACTIVITY 2: JOB WELL DONE!


Directions: List the tasks of operating system. Write your answers inside the
SHAPE.

OPERATING SYSTEM
SOFTWARE

Title of the Activity: ACTIVITY 3: OS vs AS


Directions: Write OS if the statement or the given example tells about Operating
system software and write AS if the statement tells about Application software.
Write your answers on the space provided.
_____1. It loads and runs other software applications.
_____2. Software designed to play games in the computer like Chess and Solitaire.
_____3. Recognizes and installs peripheral devices.
_____4. Moves data to and from the hard disk.
_____5. Manages files and folders.
_____6.Software used to create designs, logos, presentations, animations and pictures.
_____7. Microsoft Excel.
_____8. Microsoft Windows
_____9. Mac OS X
_____10. Disk Operating System (DOS)
_____11. Software used for writing letters, essays and stories. It also allows you to create,
edit, format and print text and graphics in a document.
_____12. Microsoft Publisher
_____14. Software used to enter data in a tabular form, create formulas to produce
calculations.
_____15. Manages system security.

Title of the Activity: ACTIVITY 4: LET’S IDENTIFY!


Directions: Identify what type of software is being described or asked. Choose the
letter of the correct answer inside the box.

QUARTER 1-WEEK 5-8 Elaine Bautista


6

a. Database Software d. Ms Windows g. DOS h. Graphics Software


b. Entertainment Software e. Educational Software i. Software
c. Operating System Software f. Application Software j. Desktop Publishing Software

_____1. It is a set of programs that control how the computer hardware and the software will work
together.
_____2. It is an operating system program developed by Microsoft Company for common type of
personal computers and its devices.
_____3. There are instructions given to the computers to work, what to do and how to work with the
information.
_____4. It is a set of programs developed to do a specific activity in the computer.
_____5. It is an operating system intended to run on any Intel 8086-family of microprocessors.
_____6. This software used to prepare pages for newspapers, brochures, newsletters and books.
_____7. It is a software used to create designs, logos, presentations, and pictures.
_____8. It is a software design to present a learning package or topic. It can help the students to
strengthen their language and mathematical skills.
_____9. This software designed to play games in the computer.
_____10. This software used to manage a huge amount of records like student’s grades, customer’s
list, mailing list, telephone numbers and others.

Title of the Activity: ACTIVITY 5: LET’S IDENTIFY!


Directions: Tell whether the following is an operating software or an
application software.
1. Solitaire - _________________________
2. DOS - _________________________
3. Windows XP - _________________________
4. Ms Publisher - _________________________
5. Corel Draw - _________________________
6. Windows Vista(2007) - _________________________
7. Macintosh - _________________________
8. Apple iOS - _________________________
9. Android - _________________________
10. Adobe PageMaker - _________________________
11. Windows 8 - _________________________
12. Ms PowerPoint - _________________________
13. Oracle - _________________________
14. Adobe Photoshop - _________________________
14. Windows 10 - _________________________
15. Ms Excel - _________________________

LESSON 11: PEOPLEWARE


Computers operate using a combination of hardware and software. Examples of peopleware
include individual people, groups of people, project teams, businesses, developers, and end users.
While peopleware can mean many different things, it always refers to the people who develop or use
computer systems.
PeopleSoft software (Peopleware) refers to a person associated with the use of computers in
both the direct and indirect. Related parties include individuals who have direct knowledge of the
computer systems analysts, programmers, such as users, computers, and related parties, including
those indirectly involved or affected by the use of computers.
Agencies of computer generally consists of three major parties.

QUARTER 1-WEEK 5-8 Elaine Bautista


7

1. Analysis and Design System (System Analysis and Design). The function of this department is to
analyze and design computer systems suitable for various entities.
2. Programming (Programming). The function of this department is to create a software program or
the analysis and design work has been made.
3. Operations and Services (Operation and Services).The function of this department is to support
programs that programmers create applications. In order to get the desired results.

Personal computer
The labor market needs to have a deep understanding of information technology and
communications experience. This work will include. Job design programs Applications on the Web
The task of computer programming languages. Work on the database Work on the network, both
inside and outside the organization. The security of the computer systems on the network. The
organization has needs personnel with knowledge. The ability to manage And software development
To use the various aspects of the organization. For example, professional technologies such as
information and communication.
1. The author of the program or programmer (programmer). Responsible for writing computer
programs for use in areas such as the program about commodity trading. The program applies to the
account. Programs or systems of large organizations
2. The analyst (system analyst). Responsible for the analysis and development of information systems.
Analysts system analyzes, processes and systems designed to meet the needs of users. This may
include the design database.
3. The administrators and database administrators (database administrator). Responsible management
database (database) including design. Maintenance Information Administration and security of the
database, such as the user's account. User Rights Assignment
4. Supervision and Management System (system administrator) Acts and management of computer
systems in the organization. By overseeing the installation and maintenance of operating. Mounting
hardware designs and maintenance of user accounts. For smaller organizations, the authorities may
need to take control and manage the network.
5. Administrator and Network Administrator (network administrator). Manage system and network
management. And the security of the corporate network, such as monitoring the use of the network
and install the network intrusion prevention.
6. The development and management of the site (webmaster). Functional design Update and maintain
the site up to date. In particular, need to be updated to the date.
7. Technical Staff (technician). Serve computer maintenance. Install or install hardware and
troubleshoot problems that may arise from the use of computers in the organization.
8. Writers game (game maker). Acting, writing or a computer game development program currently
writing a pro career as a computer program has been very popular in Thailand.

SKILL TEST:

Title of the Activity: ACTIVITY 6: DESCRIBE ME!


Directions: Explain what is peopleware and their specific jobs.

Explain:
QUARTER
What 1-WEEK 5-8
is Peopleware? Give examples. Elaine Bautista
8

Title of the Activity: ACTIVITY 7: WHO AM I?


Directions: Identify what peopleware is being described. Write the letter of your answer on
the space provided.
A. System Administrator B. Webmaster C. Peopleware D.
Game Maker
E. System Analyst F. Technician G. Network
Administrator
H. Programmer I. Database Administrator J. Programming
_____1. It refers to a person associated with the use of computers in both the direct and
indirect.
_____ 2. Mounting hardware designs and maintenance of user accounts.
_____ 3. The development and management of the site (webmaster). Functional design
Update and maintain the site up to date. In particular, need to be updated to the date.
_____ 4. Serve computer maintenance. Install or install hardware and troubleshoot problems
that may arise from the use of computers in the organization.
_____ 5. Responsible for writing computer programs for use in areas such as the program
about commodity trading.
_____ 6. Responsible for management database (database) including design. Maintenance
Information Administration and security of the database, such as the user's account. User
Rights Assignment
_____ 7. Responsible for the analysis and development of information systems
_____ 8. Acting, writing on a computer game development program currently writing a pro
career as a computer program has been very popular in Thailand.
_____ 9. The function of this department is to create a software program or the analysis and
design work has been made.
_____10. He monitors the use of the network and install the network intrusion prevention.

References:
1. https://rb.gy/k6xe6t
2. https://www.educba.com/what-is-application-software-its-types/
3. https://www.techopedia.com/definition/1663/email-software
4.
https://rb.gy/yinbuu
5.
https://rb.gy/fpoqop
6. https://rb.gy/zb0xfs
7. https://sites.google.com/site/technologynattayac/peopleware
5. Computer Concepts – Ms Windows/Ms Word/Internet/Ms PowerPoint – By. Ma. Minerva
J. Gorres

ESTANZA NATIONAL HIGH SCHOOL


LINGAYEN, PANGASINAN

QUARTER 1-WEEK 5-8 Elaine Bautista


9

HAND-OUTS
IN
T.L.E. 10
(COMPUTER)
QUARTER 1-WEEK 7

LEARNING OBJECTIVES:

At the end of the lesson, you should be able to:


1. Identify the proper ways on how to clean the computer.
2. Enumerate proper ways of handling and taking care of the computer.
3. Explain the importance of proper maintenance of computer.

INFORMATION SHEET
LESSON 11: USING THE COMPUTER WITH CARE
What is the proper ways of handling and taking care of the computer?
Why is it important to take good care of the computer?

Computers, like any other piece of electronic equipment, need special care and
attention in order to perform properly and safely. A malfunctioning hardware will
hang up your work and the worst part is you will have to start all over again.
PROPER WAYS ON HANDLING THE COMPUTER
 KEEP THE COMPUTER OUT OF DIRECT SUNLIGHT AND EXTREME HEAT.
Extreme heat can damage the small chips inside the computer.
 KEEP THE COMPUTER IN A STABLE PLACE
Banging, pounding, and unnecessary movement would damage the hard disk
and video card of the computer.
 REGULARLY CLEAN THE MOUSE, KEYBOARD, MONITOR AND PRINTER.
Extreme dust and moisture could damage the computer and its parts.
 ALWAYS SHUT DOWN THE COMPUTER PROPERLY
Improper shutting down of the computer will cause damage to the programs
installed and files that are saved in the computer.
 IT IS BETTER TO LEAVE THE COMPUTER TURN ON FOR A SHORT PERIOD
OF TIME, RATHER THAN IT OFF AND ON AGAIN.

QUARTER 1-WEEK 5-8 Elaine Bautista


10

 Turning on and off can mess up the systematics flow of the operating system of
the computer.
 NEVER UNPLUG THE COMPUTER AND ITS DEVICES WHILE THEY ARE IN
USE.
Any electric interruption may cause your computer to crash.
 PLUG THE COMPUTER TO THE AUTOMATIC VOLTAGE REGULATOR (AVR)
AND NOT DIRECTLY TO THE ELECTRIC SOCKET.
Sudden surge of electricity may cause electrocution to computer especially
during storm.

Keeping your computer physically clean


Dust isn't just unattractive—it can potentially damage or even destroy parts of your
computer. Cleaning your computer regularly will help you keep it working
properly and avoid expensive repairs.
CLEANING THE KEYBOARD
Dust, food, liquid, and other particles can get stuck underneath the keys on your
keyboard, which can prevent it from working properly. The basic cleaning
tips below can help keep your keyboard clean.
1. Unplug the keyboard from the USB or PS/2 port. If the keyboard is plugged into
the PS/2 port, you will need to shut down the computer before unplugging it.
2. Turn the keyboard upside down and gently shake it to remove dirt and dust.
3. Use a can of compressed air to clean between the keys.
4. Moisten a cotton cloth or paper towel with rubbing alcohol and use it to clean
the tops of the keys. Do not pour alcohol or any other liquid directly onto the keys.
5. Reconnect the keyboard to the computer once it is dry. If you are connecting it to
a PS/2 port, you will need to connect it before turning on the computer.

CLEANING THE MOUSE

QUARTER 1-WEEK 5-8 Elaine Bautista


11

There are two main mouse types: optical and mechanical. Each is cleaned in


basically the same way, although the mechanical mouse requires a bit more work.
1. Optical mice require no internal cleaning because they do not contain any
rotating parts; however, they can get sticky over time as
dust collects near the light emitter. This can cause erratic
cursor movement or prevent the mouse from working
properly.
2. Mechanical mice are especially susceptible
to dust and particles that can accumulate inside the
mouse, which can make it difficult to track—or move—
properly. If the mouse pointer does not move smoothly, the
mouse may need to be cleaned.
The basic cleaning tips below will help keep your mouse
clean:
1. Unplug the mouse from the USB or PS/2 port. If the mouse is plugged into the
PS/2 port, you will need to shut down the computer before unplugging it.
2. Moisten a cotton cloth with rubbing alcohol, and use it to clean the top and
bottom of the mouse.
3. If you have a mechanical mouse, remove the tracking ball by turning the ball-
cover ring counter-clockwise. Then clean the tracking ball and the inside of the
mouse with a cotton cloth moistened with rubbing alcohol.
4. Allow all of the parts to dry before reassembling and reconnecting the mouse. If
you are connecting it to a PS/2 port, you will need to connect it before turning on the
computer.
If you just want to give the mouse a quick cleaning, place it on a clean sheet of
paper and move the mouse back and forth. Some of the dust and particles should
rub off onto the paper.
CLEANING THE MONITOR
Dirt, fingerprints, and dust can make your computer screen difficult to read; however,
it's easy to clean your screen when needed. There are monitor-cleaning kits you
can buy, but they may damage your monitor if they're designed for a different type of
monitor. For example, a monitor cleaner that is designed for glass screens may not
work with some non-glass LCD screens. The safest method is simply to use a soft
clean cloth moistened with water.
Do not use glass cleaner to clean a monitor. Many screens have anti-glare coatings
that can be damaged by glass cleaner.
1. Turn off the computer.
2, Unplug the monitor from the power. If you are using a laptop, unplug the laptop.
3. Use a soft clean cloth moistened with water to wipe the screen clean.
Note: Do not spray any liquids directly onto the screen. The liquid could leak into the
monitor and damage the internal components.

TIPS FOR CLEANING OTHER COMPUTER SURFACES


From time to time, you should clean your computer
case and the sides and back of the monitor to avoid

QUARTER 1-WEEK 5-8 Elaine Bautista


12

a buildup of dust and dirt. Here are a few tips you can use when cleaning these
surfaces.
1. Dust is your computer's main enemy. Use an anti-static cloth to lightly dust your
computer casing. Do not use furniture cleaners or strong solvents.
2. Use a can of compressed air to blow out debris from the air intake slots.
Ammonia diluted with water—or glass cleaner comprised mostly of ammonia and
water—is a safe cleaning solution for computer surfaces. The milder the solution,
the better.
Clean the monitor housing and case (but not the monitor screen) by spraying a
safe cleaning solution onto a paper towel or anti-static cloth and wiping in a
downward motion.
KEEP IT COOL!
Don't restrict airflow around your computer. A computer can generate a lot of heat,
so the casing has fans that keep it from overheating. Avoid stacking papers, books,
and other items around your computer.
Many computer desks have an enclosed compartment for the computer case. If
you have this type of desk, you may want to position the case so it is not against the
back side of the desk. If the compartment has a door, you may want to leave it open
to improve airflow.

PROTECTING YOUR COMPUTER


Your computer faces many potential threats, including viruses, malware, and hard
drive failure. This is why it's important to do everything you can to protect your
computer and your files.
Why clean your computer?
Cleaning your computer’s hardware and software is important for a lot of reasons.
Clean hardware can help your computer run more smoothly and extend your
computer’s lifespan, which can save time and money. Regular cleaning protects your
investment and your data. When you wipe off the screen and empty crumbs from
your keyboard, you’re helping your equipment perform better and you reduce the risk
it will break down.
Dust and other unwanted dirt can build up and suffocate your PC’s hardware. By
regularly cleaning dust out of the fan vents and case, you can help protect the
system from overheating and causing permanent damage to the internal parts of
your computer and the information you store on it.
How often does it need to be done? If you don’t want to hurt your PC’s performance
and lifespan with the added stress and heat, give it a good cleaning at least every six
month to a year.
While the average user’s computer lasts several years, true cleaning of hardware
and software could extend your PC’s useful life by a few more years.
Clean software helps protect your data. Antivirus software and regular program
updates help ensure viruses, malware, and cybercriminals stay out of your system.
When you back up your files, delete unused programs, and perform maintenance
tasks like defragmenting the hard drive, you help to ensure your computer can save
your files without accidentally corrupting them.

QUARTER 1-WEEK 5-8 Elaine Bautista


13

You probably like a tidy home. It’s a good idea to keep your computer tidy, too. For
instance, using an external hard drive or cloud-based storage can declutter your
computer while helping to keep valuable data safe and secure.
Computers, like any other electronic device, need regular maintenance. Just like
your annual medical check-up program, your computer also needs scheduled
maintenance of computer hardware to ensure that you extend its lifespan. This is
what many people call preventative maintenance.
But, before we dwell on the purpose of preventative maintenance let us first consider
the basic question of what computer hardware is and what is in the preventative
maintenance program.

SKILL TEST:
Title of the Activity: ACTIVITY 1: HOW TO TAKE CARE OF
COMPUTER
Directions: Read and understand each sentence. Write TRUE if the
statement express the correct and proper handling of computers and
FALSE if the sentence is not. Write your answer on the space.
_______1. Never unplug the computer and its devices while they are in use.
_______2. Warm your computer with sunlight every morning.
_______3. Sudden surge of electricity may not cause electrocution to computer
especially during storm.
_______4.It is better to leave the computer turn ON for a short period of time, rather
than turn it OFF and ON again.
_______5. Banging, pounding and unnecessary movement would never damage the
hard disk and video card of the computer.
_______6. Regular cleaning of keyboard, monitor, mouse and printer can damage
them.
_______7. Improper shutting down of the computer will cause damage to the
programs installed and files that are saved in the computer.
_______8. Plug the computer to the automatic voltage regulator (AVR) and not
directly to the electric socket.
_______9. Turning on and off cannot mess up the systematic flow of the operating
system of the computer.
_______10. Use cleaning brush when removing dirt on the keyboard.

Title of the Activity: ACTIVITY 2: LET’S CHECK!


Directions: How do you clean the following parts of the computer?

1.

2.

3.

QUARTER 1-WEEK 5-8 Elaine Bautista


14

4.

Title of the Activity: ACTIVITY 3: EXPLAIN!


Directions: Explain: Give a few reasons why regular computer
maintenance is important. Write your explanation inside the box.

Title of the Activity: ACTIVITY 4: I CARE!


Directions: Make your own list on how you will take care of your
computer.
Write them in a 1 whole sheet of paper.

1. Monitor
2. Keyboard
3. Mouse
4. Printer

References:

1. https://bit.ly/3998y2T - how to use computer properly


2. https://bit.ly/2UWupSI -proper care of printer
3. https://edu.gcfglobal.org/en/computerbasics/keeping-your-computer-clean/1/
4. https://youtu.be/kgBIsKeTLLk - CLEANING COMPUTER (video on how to
clean your computer)
5. Computer Concepts – Ms Windows/Ms Word/Internet/Ms PowerPoint – By.
Ma. Minerva J. Gorres

PREPARED BY:
ELAINE G. BAUTISTA
SUBJECT TEACHER
ESTANZA NATIONAL HIGH SCHOOL
LINGAYEN, PANGASINAN

QUARTER 1-WEEK 5-8 Elaine Bautista


15

HAND-OUTS
IN
T.L.E. 10(COMPUTER)
WEEK 8

LEARNING OBJECTIVES:

At the end of the lesson, you should be able to:


1. Define what computer ethics is.
2. Describe the different unethical activities in using the computers.
3. Define what is data privacy.
4. Explain the importance of having respect to one’s privacy.

INFORMATION SHEET

Lesson 12: COMPUTER ETHICS


What is computer ethics?
What are the different wrong activities done using the computer?
Are you using the computer and its related technology in the right manner, or you just do not care the
effect of improper use of computers to others as long as you are enjoying it?
As computers become more and more a part of our everyday lives, we must understand that with this
technology comes responsibility.

WHAT IS COMPUTER ETHICS?


COMPUTER ETHICS refers to the good manners or right behavior that computer users must
observe and follow when using the computer and its related technology.
Let us enumerate and understand the ten commandments of computer ethics written by Dr. Ramon C.
Barquin. These commandments will guide you on the right behavior that must be observed every time
you use a computer.

10 COMMANDMENTS OF COMPUTER ETHICS

1. THOU SHALL NOT USE COMPUTER TO HARM OTHER PEOPLE.


If it’s not right to hurt other people physically, it is equally bad to harm others by sending
false information and character damaging messages about people, institution, or association.
2. THOU SHALL NOT INTERFERE WITH OTHER PEOPLE’S COMPUTER WORK.

QUARTER 1-WEEK 5-8 Elaine Bautista


16

If it’s not right to break into someone’s home and then mess up the appliances found there, it
is equally bad to use someone else’s computer, mess, edit, and make changes in his files without
permission.
3. THOU SHALL NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.
If it’s not right to go through personal belongings of other people, it is equally bad to open
someone’s personal computer files without his knowledge.
4. THOU SHALL NOT USE A COMPUTER TO STEAL.
If it’s not right to forcibly enter other people’s houses and then get their belongings, and
important documents, it is equally bad to get into the computer system of anybody, an association or
an institution to obtain information.
HACKING – Unauthorized and illegal breaking into the computer system of other people or
institution to get documents, information, or financial possession.
HACKERS – are irresponsible users of computer who do hacking activities.
5. THOU SHALL NOT USE A COMPUTER TO BEAR FALSE WITNESS.
If it’s not right to spread false rumors about a person, it is equally bad to post false
information on the computer just to gain benefits.
6. THOU SHALL NOT COPY OR USE LICESED SOFTWARE FOR WHICH YOU HAVE
NOT PAID.
It is not right to use someone’s property without asking permission, it is equally bad to
reproduce or sell licensed software programs without paying for it.
Software Piracy –Unauthorized copying of licensed software for personal use or for business.
7. THOU SHALL NOT USE OTHER PEOPLE’S COMPUTER RESOURCES WITHOUT
AUTHORIZATION OR PROPER COMPENSATION
If it’s not right to just photocopy or reproduce a copyrighted book without permission, it is
equally bad to copy or use somebody else’s computer materials without paying for it or getting
approval from the owner.
8. THOU SHALL NOT APPROPRIATE OTHER PEOPLE’S COMPUTER INTELLECTUAL
OUTPUT.
If it’s not right to copy someone else’s work then claim it as yours, it is equally bad to
appropriate or use one’s own writing, materials, ideas and claim it as yours.
PLAGIARISM—Is copying, appropriating, and using one’s materials, ideas, or passages without
asking permission, citing of source, or giving due acknowledgement to the owner.
COPYRIGHT – is an exclusive legal right given to the owner or company to publish and dispose
materials or products that they have created or financed.
9. THOU SHALL THINK THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU
WRITE OR THE COMPUTER SYSTEM YOU DESIGN.
If it’s not right to create materials that would pose to individuals, it is equally bad to design
and create computer programs that could damage one’s computer system or harmfully affect other
people’s business.
COMPUTER VIRUS – is a software program that is created to intentionally harm or destroy other
software, system and even computer hardware.
10. THOU SHALL NOT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION
AND RESPECT FOR YOUR FELLOW HUMANS.
If it’s not right to bully someone you meet or interact with in cyberspace. Remember that
behind the computer is a real person with feelings.

QUARTER 1-WEEK 5-8 Elaine Bautista


17

SKILL TEST:
ACTIVITY 1: COMPUTER JARGONS
Directions: Match the description in column A to its meaning in Column B.
write the letter of the correct answer.
COLUMN A COLUMN B
_____1. An illegal reproduction of licensed software A. COPYRIGHT
for personal use or distribution B. ENCODING
_____2. The good manners and right conduct that C. COMPUTER ETHICS
Must be observed when using computer. D. PLAGIARISM
_____3. An illegal breaking of one’s computer E. HACKERS
System to get information. F. SOFTWARE PIRACY
_____4. Programs that intentionally designed to destroy G. HACKING
Other computer system and programs.
_____5. An exclusive right given to create, publish, and
Dispose materials or products.
_____6. Copy one’s computer materials then present
And claim it as yours.
Title of the Activity: ACTIVITY 2: COMPUTER ETHICS
Directions: Answer the following questions in a whole sheet of paper
1. Define what computer ethics is.
2. What are the 10 Computer Ethics?

LESSON 13: Data Privacy


Data privacy, also called information privacy, is the aspect of information technology (IT)
that deals with the ability an organization or individual has to determine what data in
a computer system can be shared with third parties.

Privacy is important because: Privacy gives us the power to choose our thoughts and


feelings and who we share them with. Privacy protects our information we do not want
shared publicly (such as health or personal finances). Privacy helps protect our physical
safety (if our real time location data is private)
https://www.youtube.com/watch?v=KjX7CT6M1x8 - Data Privacy Act of 2012 (RA 10173)

Why is Privacy important? (Data Privacy Day)


What data is being collected about me?
Many of our activities leave a trail of data. This includes phone records, credit card
transactions, GPS in cars tracking our positions, mobile phones (with or without GPS), and
the list is growing. Online, almost all activities leave a trail of data which service providers
will collect, such as instant messaging, browsing websites or watching videos.
This trove of personal data is collected, stored, and may be shared with others – without
your consent!

Why is privacy important?


Privacy is the ability to control who can access information about our private life and our
activities.
Privacy is important because:

QUARTER 1-WEEK 5-8 Elaine Bautista


18

 Privacy gives us the power to choose our thoughts and feelings and who we share
them with.
 Privacy protects our information we do not want shared publicly (such as health or
personal finances).
 Privacy helps protect our physical safety (if our real time location data is private).
 Privacy helps protect us as individuals, and our businesses, against entities we depend
on or that are more powerful than us.
 Privacy is tied to Freedom…. Could we really be free – and have free will – without
Privacy?
Can we still maintain privacy?
Thankfully Privacy is not dead (yet) but it is under threat. Some entities such as the NSA
have made it clear that their goal is the end of privacy, worldwide. Without privacy, we will
become easily controlled, manipulated, and feel a loss of control over ourselves and our
personal lives.

However, the good news is that now more than ever, many businesses, technologists, activists
and others are hard at work to improve and maintain our privacy.
How do I protect my privacy?
There are many ways you can improve your privacy, for example by exercising caution
before sharing private data online or with others. You may also make minor decisions, such
as paying in cash instead of using a credit card, encrypting your emails and backups, and
reading the terms of services before using a product (ie. is your privacy going to be
respected?).

SKILL TEST:
Title of the Activity: ACTIVITY 3: LET’S IDENTIFY!
Directions: Identify what is being asked or described. Choose your answer
inside the box. Write only the letter of the correct answer on the space
provided.

a. COMPUTER ETHICS f. HACKER


b. COMPUTER CRIMES g. VIRUS PROGRAMMERS
c. COPYRIGHT h. COMPUTER VIRUS
d. SOFTWARE PIRACY i. CRACKER
e. PLAGIARISM j. HACKING

_______1. It refers to the good manners or right behaviour that computer users must observe
and follow when using the computer and its related technology.
_______2. It results from deliberate tampering with data and information.
_______3. Is a person who breaks into a computer system to get access to the information
stored there.
_______4.It is unauthorized and illegal breaking into the computer system of other people or
institution to get documents, information or financial possession.

QUARTER 1-WEEK 5-8 Elaine Bautista


19

_______5. They are like crackers who breach the computer system in order to steal
information or cause harm to computer systems. They program dangerous viruses to get
access to systems.
_______6. It is the unauthorized copying of licensed software for distribution and for
business.
_______7. It is a software program that is created to intentionally harm of destroy other
software, system and even computer hardware.
_______8. It is copying, appropriating, and using one’s materials, ideas or passages without
asking permission, citing the sources or giving due acknowledgement to the owner.
_______9. It is an exclusive legal right even to the owner or company to publish and dispose
materials or products that they have created or financed.
_______10. It is a person who breaks into a computer system just like a hacker, with the
intention to steal passwords, files or programs for unauthorized use. They may sell this
information to some other people for money.

Title of the Activity: ACTIVITY 4: TRUE OR FALSE!


Directions: Write TRUE if the statement tells about correct conduct in using
computer and FALSE if it’s not.
_______1. Thou shall use a computer in ways that show consideration and respect for your
fellow humans.
_______2. It is right to copy someone’s work then claim it as yours.
_______3. It is not right to use the social media just to bully someone.
_______4. Thou shall not interfere with other people’s computer work.
_______5. It is right to send and spread false information and character damaging messages
about other people, institution or association using a fake acct.
_______6. It is equally fair to open someone’s personal computer files without his/her
knowledge.
_______7. Spreading fake news on FB using a dummy account is alright just to gain more
fiends.
_______8. It is not right to design or create computer programs that could damage one’s
computer system or harmfully affect other people’s business.
_______9. It is not right to get into someone’s account and get personal information without
his/her knowledge.
_______10. Thou shall not use other people’s computer resources without authorization or
proper compensation.

Title of the Activity: ACTIVITY 5: EXPLAIN!


Directions: Explain the following Computer Ethics in a few words. You can give
examples if you want.

1. THOU SHALL NOT USE A COMPUTER TO STEAL.

2. THOU SHALL NOT USE A COMPUTER TO BEAR FALSE WITNESS.

QUARTER 1-WEEK 5-8 Elaine Bautista


20

3. THOU SHALL NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.

4. THOU SHALL NOT USE COMPUTER TO HARM OTHER PEOPLE.

5. THOU SHALL NOT INTERFERE WITH OTHER PEOPLE’S COMPUTER


WORK/PROJECT

Title of the Activity: ACTIVITY 6:


Directions: Answer the following questions below:

1. What is privacy?

2. Why is it important to respect one’s privacy?

References:
1. Computer Concepts – Ms Windows/Ms Word/Internet/Ms PowerPoint – By. Ma. Minerva
J. Gorres
2. shorturl.at/HKV38
3. https://www.youtube.com/watch?v=KjX7CT6M1x8 - Data Privacy Act of 2012 (RA 10173)
YOUTUBE CHANNEL

Prepared by:
ELAINE G. BAUTISTA
SUBJECT TEACHER

QUARTER 1-WEEK 5-8 Elaine Bautista

You might also like