Professional Documents
Culture Documents
HAND-OUTS
IN
COMPUTER - T.L.E. 10
(QUARTER 1-WEEK 5&6)
LEARNING OBJECTIVES:
At the end of the lesson, you should be able to:
INFORMATION SHEET
LESSON 10: THE COMPUTER SOFTWARE
Different types of software tell computers how to do different things. When you want to draw
on a computer, you need to have a drawing program. When you want to write on a computer, you
need to have a word processing program.
Software can be classified into two categories:
SOFTWARE CATEGORIES
What is an operating system?
1. Operating System Software- is a set of programs that control how the computer hardware and the
software will work together. Without an operating system, a computer is useless.
*It controls the operations of input, output and input/output devices.
*It manages the reading of data from input devices and transmitting the information to output devices.
*An operating system is the most important software that runs on a computer.
information on a webpage without the need to reload the page. A web browser (commonly
referred to as a browser) is a software application for accessing information on the World Wide
Web. ... The most used browser is Google Chrome, with a 64% global market share on all devices,
followed by Safari with 18%. Other notable browsers include Firefox and Microsoft Edge.
7. Email Programs -- Email
software is a program that features
and functionality for using
electronic mail. In most cases,
these programs are not actual email hosting technologies, but rather, email editors with
different formats, layout and messaging functionality tools.
8. Educational Software- software design to present a learning package or topic.
Computer-Aided Learning can help the students to strengthen their language and
mathematical skills. Education software is computer software with the primary purpose
of teaching or self-learning.
9. Entertainment Software – software designed to play games in the computer.
Example of entertainment software are: Chess, Card Game, Flight Stimulator. On-line
Games
10. Graphics Software – software used to create designs, logos, presentation,
animations and pictures. Some of graphics software examples are: CorelDraw, Ms
Powerpoint, Adobe Photoshop
Application Software Type Examples
Word processing software MS Word, WordPad and Notepad
Database software Oracle, MS Access etc
Spreadsheet software Apple Numbers, Microsoft Excel
Multimedia software Real Player, Media Player
Presentation Software Microsoft Power Point, Keynotes
Enterprise Software Customer relationship management system
Information Worker Software Documentation tools, resource management tools
Educational Software Dictionaries: Encarta, Britannica Mathematical:
MATLAB Others: Google Earth, NASA World Wind
Simulation Software Flight and scientific simulators
Content Access Software Accessing content through media players, web
browsers
Application Suites Open Office, Microsoft Office
Software for Engineering and IDE or Integrated Development Environments
Product Development
SKILL TEST:
1. What is a software?
2. Name the two categories of software.
3. Give Examples.
OPERATING SYSTEM
SOFTWARE
_____1. It is a set of programs that control how the computer hardware and the software will work
together.
_____2. It is an operating system program developed by Microsoft Company for common type of
personal computers and its devices.
_____3. There are instructions given to the computers to work, what to do and how to work with the
information.
_____4. It is a set of programs developed to do a specific activity in the computer.
_____5. It is an operating system intended to run on any Intel 8086-family of microprocessors.
_____6. This software used to prepare pages for newspapers, brochures, newsletters and books.
_____7. It is a software used to create designs, logos, presentations, and pictures.
_____8. It is a software design to present a learning package or topic. It can help the students to
strengthen their language and mathematical skills.
_____9. This software designed to play games in the computer.
_____10. This software used to manage a huge amount of records like student’s grades, customer’s
list, mailing list, telephone numbers and others.
1. Analysis and Design System (System Analysis and Design). The function of this department is to
analyze and design computer systems suitable for various entities.
2. Programming (Programming). The function of this department is to create a software program or
the analysis and design work has been made.
3. Operations and Services (Operation and Services).The function of this department is to support
programs that programmers create applications. In order to get the desired results.
Personal computer
The labor market needs to have a deep understanding of information technology and
communications experience. This work will include. Job design programs Applications on the Web
The task of computer programming languages. Work on the database Work on the network, both
inside and outside the organization. The security of the computer systems on the network. The
organization has needs personnel with knowledge. The ability to manage And software development
To use the various aspects of the organization. For example, professional technologies such as
information and communication.
1. The author of the program or programmer (programmer). Responsible for writing computer
programs for use in areas such as the program about commodity trading. The program applies to the
account. Programs or systems of large organizations
2. The analyst (system analyst). Responsible for the analysis and development of information systems.
Analysts system analyzes, processes and systems designed to meet the needs of users. This may
include the design database.
3. The administrators and database administrators (database administrator). Responsible management
database (database) including design. Maintenance Information Administration and security of the
database, such as the user's account. User Rights Assignment
4. Supervision and Management System (system administrator) Acts and management of computer
systems in the organization. By overseeing the installation and maintenance of operating. Mounting
hardware designs and maintenance of user accounts. For smaller organizations, the authorities may
need to take control and manage the network.
5. Administrator and Network Administrator (network administrator). Manage system and network
management. And the security of the corporate network, such as monitoring the use of the network
and install the network intrusion prevention.
6. The development and management of the site (webmaster). Functional design Update and maintain
the site up to date. In particular, need to be updated to the date.
7. Technical Staff (technician). Serve computer maintenance. Install or install hardware and
troubleshoot problems that may arise from the use of computers in the organization.
8. Writers game (game maker). Acting, writing or a computer game development program currently
writing a pro career as a computer program has been very popular in Thailand.
SKILL TEST:
Explain:
QUARTER
What 1-WEEK 5-8
is Peopleware? Give examples. Elaine Bautista
8
References:
1. https://rb.gy/k6xe6t
2. https://www.educba.com/what-is-application-software-its-types/
3. https://www.techopedia.com/definition/1663/email-software
4.
https://rb.gy/yinbuu
5.
https://rb.gy/fpoqop
6. https://rb.gy/zb0xfs
7. https://sites.google.com/site/technologynattayac/peopleware
5. Computer Concepts – Ms Windows/Ms Word/Internet/Ms PowerPoint – By. Ma. Minerva
J. Gorres
HAND-OUTS
IN
T.L.E. 10
(COMPUTER)
QUARTER 1-WEEK 7
LEARNING OBJECTIVES:
INFORMATION SHEET
LESSON 11: USING THE COMPUTER WITH CARE
What is the proper ways of handling and taking care of the computer?
Why is it important to take good care of the computer?
Computers, like any other piece of electronic equipment, need special care and
attention in order to perform properly and safely. A malfunctioning hardware will
hang up your work and the worst part is you will have to start all over again.
PROPER WAYS ON HANDLING THE COMPUTER
KEEP THE COMPUTER OUT OF DIRECT SUNLIGHT AND EXTREME HEAT.
Extreme heat can damage the small chips inside the computer.
KEEP THE COMPUTER IN A STABLE PLACE
Banging, pounding, and unnecessary movement would damage the hard disk
and video card of the computer.
REGULARLY CLEAN THE MOUSE, KEYBOARD, MONITOR AND PRINTER.
Extreme dust and moisture could damage the computer and its parts.
ALWAYS SHUT DOWN THE COMPUTER PROPERLY
Improper shutting down of the computer will cause damage to the programs
installed and files that are saved in the computer.
IT IS BETTER TO LEAVE THE COMPUTER TURN ON FOR A SHORT PERIOD
OF TIME, RATHER THAN IT OFF AND ON AGAIN.
Turning on and off can mess up the systematics flow of the operating system of
the computer.
NEVER UNPLUG THE COMPUTER AND ITS DEVICES WHILE THEY ARE IN
USE.
Any electric interruption may cause your computer to crash.
PLUG THE COMPUTER TO THE AUTOMATIC VOLTAGE REGULATOR (AVR)
AND NOT DIRECTLY TO THE ELECTRIC SOCKET.
Sudden surge of electricity may cause electrocution to computer especially
during storm.
a buildup of dust and dirt. Here are a few tips you can use when cleaning these
surfaces.
1. Dust is your computer's main enemy. Use an anti-static cloth to lightly dust your
computer casing. Do not use furniture cleaners or strong solvents.
2. Use a can of compressed air to blow out debris from the air intake slots.
Ammonia diluted with water—or glass cleaner comprised mostly of ammonia and
water—is a safe cleaning solution for computer surfaces. The milder the solution,
the better.
Clean the monitor housing and case (but not the monitor screen) by spraying a
safe cleaning solution onto a paper towel or anti-static cloth and wiping in a
downward motion.
KEEP IT COOL!
Don't restrict airflow around your computer. A computer can generate a lot of heat,
so the casing has fans that keep it from overheating. Avoid stacking papers, books,
and other items around your computer.
Many computer desks have an enclosed compartment for the computer case. If
you have this type of desk, you may want to position the case so it is not against the
back side of the desk. If the compartment has a door, you may want to leave it open
to improve airflow.
You probably like a tidy home. It’s a good idea to keep your computer tidy, too. For
instance, using an external hard drive or cloud-based storage can declutter your
computer while helping to keep valuable data safe and secure.
Computers, like any other electronic device, need regular maintenance. Just like
your annual medical check-up program, your computer also needs scheduled
maintenance of computer hardware to ensure that you extend its lifespan. This is
what many people call preventative maintenance.
But, before we dwell on the purpose of preventative maintenance let us first consider
the basic question of what computer hardware is and what is in the preventative
maintenance program.
SKILL TEST:
Title of the Activity: ACTIVITY 1: HOW TO TAKE CARE OF
COMPUTER
Directions: Read and understand each sentence. Write TRUE if the
statement express the correct and proper handling of computers and
FALSE if the sentence is not. Write your answer on the space.
_______1. Never unplug the computer and its devices while they are in use.
_______2. Warm your computer with sunlight every morning.
_______3. Sudden surge of electricity may not cause electrocution to computer
especially during storm.
_______4.It is better to leave the computer turn ON for a short period of time, rather
than turn it OFF and ON again.
_______5. Banging, pounding and unnecessary movement would never damage the
hard disk and video card of the computer.
_______6. Regular cleaning of keyboard, monitor, mouse and printer can damage
them.
_______7. Improper shutting down of the computer will cause damage to the
programs installed and files that are saved in the computer.
_______8. Plug the computer to the automatic voltage regulator (AVR) and not
directly to the electric socket.
_______9. Turning on and off cannot mess up the systematic flow of the operating
system of the computer.
_______10. Use cleaning brush when removing dirt on the keyboard.
1.
2.
3.
4.
1. Monitor
2. Keyboard
3. Mouse
4. Printer
References:
PREPARED BY:
ELAINE G. BAUTISTA
SUBJECT TEACHER
ESTANZA NATIONAL HIGH SCHOOL
LINGAYEN, PANGASINAN
HAND-OUTS
IN
T.L.E. 10(COMPUTER)
WEEK 8
LEARNING OBJECTIVES:
INFORMATION SHEET
If it’s not right to break into someone’s home and then mess up the appliances found there, it
is equally bad to use someone else’s computer, mess, edit, and make changes in his files without
permission.
3. THOU SHALL NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.
If it’s not right to go through personal belongings of other people, it is equally bad to open
someone’s personal computer files without his knowledge.
4. THOU SHALL NOT USE A COMPUTER TO STEAL.
If it’s not right to forcibly enter other people’s houses and then get their belongings, and
important documents, it is equally bad to get into the computer system of anybody, an association or
an institution to obtain information.
HACKING – Unauthorized and illegal breaking into the computer system of other people or
institution to get documents, information, or financial possession.
HACKERS – are irresponsible users of computer who do hacking activities.
5. THOU SHALL NOT USE A COMPUTER TO BEAR FALSE WITNESS.
If it’s not right to spread false rumors about a person, it is equally bad to post false
information on the computer just to gain benefits.
6. THOU SHALL NOT COPY OR USE LICESED SOFTWARE FOR WHICH YOU HAVE
NOT PAID.
It is not right to use someone’s property without asking permission, it is equally bad to
reproduce or sell licensed software programs without paying for it.
Software Piracy –Unauthorized copying of licensed software for personal use or for business.
7. THOU SHALL NOT USE OTHER PEOPLE’S COMPUTER RESOURCES WITHOUT
AUTHORIZATION OR PROPER COMPENSATION
If it’s not right to just photocopy or reproduce a copyrighted book without permission, it is
equally bad to copy or use somebody else’s computer materials without paying for it or getting
approval from the owner.
8. THOU SHALL NOT APPROPRIATE OTHER PEOPLE’S COMPUTER INTELLECTUAL
OUTPUT.
If it’s not right to copy someone else’s work then claim it as yours, it is equally bad to
appropriate or use one’s own writing, materials, ideas and claim it as yours.
PLAGIARISM—Is copying, appropriating, and using one’s materials, ideas, or passages without
asking permission, citing of source, or giving due acknowledgement to the owner.
COPYRIGHT – is an exclusive legal right given to the owner or company to publish and dispose
materials or products that they have created or financed.
9. THOU SHALL THINK THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU
WRITE OR THE COMPUTER SYSTEM YOU DESIGN.
If it’s not right to create materials that would pose to individuals, it is equally bad to design
and create computer programs that could damage one’s computer system or harmfully affect other
people’s business.
COMPUTER VIRUS – is a software program that is created to intentionally harm or destroy other
software, system and even computer hardware.
10. THOU SHALL NOT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION
AND RESPECT FOR YOUR FELLOW HUMANS.
If it’s not right to bully someone you meet or interact with in cyberspace. Remember that
behind the computer is a real person with feelings.
SKILL TEST:
ACTIVITY 1: COMPUTER JARGONS
Directions: Match the description in column A to its meaning in Column B.
write the letter of the correct answer.
COLUMN A COLUMN B
_____1. An illegal reproduction of licensed software A. COPYRIGHT
for personal use or distribution B. ENCODING
_____2. The good manners and right conduct that C. COMPUTER ETHICS
Must be observed when using computer. D. PLAGIARISM
_____3. An illegal breaking of one’s computer E. HACKERS
System to get information. F. SOFTWARE PIRACY
_____4. Programs that intentionally designed to destroy G. HACKING
Other computer system and programs.
_____5. An exclusive right given to create, publish, and
Dispose materials or products.
_____6. Copy one’s computer materials then present
And claim it as yours.
Title of the Activity: ACTIVITY 2: COMPUTER ETHICS
Directions: Answer the following questions in a whole sheet of paper
1. Define what computer ethics is.
2. What are the 10 Computer Ethics?
Privacy gives us the power to choose our thoughts and feelings and who we share
them with.
Privacy protects our information we do not want shared publicly (such as health or
personal finances).
Privacy helps protect our physical safety (if our real time location data is private).
Privacy helps protect us as individuals, and our businesses, against entities we depend
on or that are more powerful than us.
Privacy is tied to Freedom…. Could we really be free – and have free will – without
Privacy?
Can we still maintain privacy?
Thankfully Privacy is not dead (yet) but it is under threat. Some entities such as the NSA
have made it clear that their goal is the end of privacy, worldwide. Without privacy, we will
become easily controlled, manipulated, and feel a loss of control over ourselves and our
personal lives.
However, the good news is that now more than ever, many businesses, technologists, activists
and others are hard at work to improve and maintain our privacy.
How do I protect my privacy?
There are many ways you can improve your privacy, for example by exercising caution
before sharing private data online or with others. You may also make minor decisions, such
as paying in cash instead of using a credit card, encrypting your emails and backups, and
reading the terms of services before using a product (ie. is your privacy going to be
respected?).
SKILL TEST:
Title of the Activity: ACTIVITY 3: LET’S IDENTIFY!
Directions: Identify what is being asked or described. Choose your answer
inside the box. Write only the letter of the correct answer on the space
provided.
_______1. It refers to the good manners or right behaviour that computer users must observe
and follow when using the computer and its related technology.
_______2. It results from deliberate tampering with data and information.
_______3. Is a person who breaks into a computer system to get access to the information
stored there.
_______4.It is unauthorized and illegal breaking into the computer system of other people or
institution to get documents, information or financial possession.
_______5. They are like crackers who breach the computer system in order to steal
information or cause harm to computer systems. They program dangerous viruses to get
access to systems.
_______6. It is the unauthorized copying of licensed software for distribution and for
business.
_______7. It is a software program that is created to intentionally harm of destroy other
software, system and even computer hardware.
_______8. It is copying, appropriating, and using one’s materials, ideas or passages without
asking permission, citing the sources or giving due acknowledgement to the owner.
_______9. It is an exclusive legal right even to the owner or company to publish and dispose
materials or products that they have created or financed.
_______10. It is a person who breaks into a computer system just like a hacker, with the
intention to steal passwords, files or programs for unauthorized use. They may sell this
information to some other people for money.
1. What is privacy?
References:
1. Computer Concepts – Ms Windows/Ms Word/Internet/Ms PowerPoint – By. Ma. Minerva
J. Gorres
2. shorturl.at/HKV38
3. https://www.youtube.com/watch?v=KjX7CT6M1x8 - Data Privacy Act of 2012 (RA 10173)
YOUTUBE CHANNEL
Prepared by:
ELAINE G. BAUTISTA
SUBJECT TEACHER