Module 3 - Performing Computer Operations
Module 3 - Performing Computer Operations
7/8
Module 3
Performing Computer
Operations
Learning Outcome 4: Produce output/data using computer system (TLE_IACSS9 - 12PCO -If – 7)
Key Terms
Internet is a set of millions of computers worldwide connected into a
network with the purpose of exchanging data among users.
World Wide Web (WWW) is one of the services on the Internet which we
use to browse web pages (set of HTML documents connected with
hyperlinks).
Hypertext Transfer Protocol (HTTP) is a protocol (set of rules) that
allows transmission of information published on the Web.
Uniform Resource Locator (URL)- is a web address of a particular
object (Web pages, images, or Word or PDF document) published on the
Internet.
File Transfer Protocol (FTP) is a protocol that allows data transfer
between computers over the Internet.
Module 3- Performing Computer Operations
Key Terms
Hyperlink or link is a part of the text or graphics on a web page; when we activate a
hyperlink image.
Web browser is a software (program) which allows us to browse web pages. The most
widely used: Google Chrome, Mozilla Firefox, Opera, Internet Explorer
Web search engine contains content categorization of many Web pages.
Internet Service Provider (ISP) is a company that provides Internet access for its users (T-
Com, Carnet.)
Web Search is used to locate information.
Web Address is used to locate a particular webpage. It is sometimes referred to as a “URL”
(Uniform Resource Locator).
Input is an information or programs that entered into the computer system through input
devices such as the keyboard.
Output is a display information on the screen (monitor) or the printer and sends
information to other computers.
Data Processing Methods
ENTER or RETURN
Moves the cursor down one line bringing
it to the left margin. Enter also process
commands such as choosing an option in a
dialog (message) boxes and submitting a
form.
DEL or DELETE
Deletes character at cursor and/or
characters to the right of the cursor and all
highlighted (or selected) text.
Basic Keyboard Commands in Data Processing
CTRL + N
Allow the user to create document
Software are divided into two types:
1. Systems software is a
program that manages the
resources of the computer
system and simplify applications
programming. Example:
Operating System such as Linux,
Macintosh, Microsoft Windows
Software are divided into two types:
2. Application software is a
program that directs the
performance of a particular use,
or application of computers to
meet the information processing
needs of end users. Example:
MSWord, MS Excel, Adobe
Reader
Application software
Examples:
Microsoft Excel
Google Sheets
Open Office-Spreadsheet
Application software
Examples:
Microsoft Publisher
IStudio Publisher
Adobe Indesign
Application software
Examples:
Microsoft PowerPoint
Google Slides
Corel Presentation
Different Ways to Transfer Data
1. Web Browser
2. Internet Connection
3. Internet Service Provider
4. Web Search engine
Web Browser
4. Evolutionary Maintenance
This type concerns both hardware and software, so
you can update Windows and change various parts of
the PC for better performance.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures
Data Security
A data security is about keeping your data
safe from accidental or malicious damage.
Security is a consideration at all stages of your
research, particularly if working with
disclosure or licensed data.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures
Procedures in Ensuring Data Security
Data Backup
2. Cloud backup
3. Flash drive
Scanning of a Virus
Computer Virus is a type of malicious
code or program written to alter the way a
computer operates and is designed to
spread from one computer to another.
A virus scan is the process of using
anti-virus software to scan and identify
viruses in a computing device. It is an
information security process that aims to
review
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures