0% found this document useful (0 votes)
67 views

Learning Module: Information and Communication Technology

The document provides information about computers and their parts. It defines a computer and describes the two main types of computer hardware: external and internal. Externally, it lists common peripherals like monitors, keyboards, printers, speakers, microphones, webcams, mice, touchpads, USB drives, memory cards, and scanners. Internally, it mentions the motherboard, central processing unit (CPU), hard disk drives, and optical drives as main components, along with the network interface card. The document provides students with foundational knowledge of computer parts and systems.

Uploaded by

Carlo2512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Learning Module: Information and Communication Technology

The document provides information about computers and their parts. It defines a computer and describes the two main types of computer hardware: external and internal. Externally, it lists common peripherals like monitors, keyboards, printers, speakers, microphones, webcams, mice, touchpads, USB drives, memory cards, and scanners. Internally, it mentions the motherboard, central processing unit (CPU), hard disk drives, and optical drives as main components, along with the network interface card. The document provides students with foundational knowledge of computer parts and systems.

Uploaded by

Carlo2512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Republic of the Philippines

ST. PETER BAPTIST COLLEGE FOUNDATION


(Formerly: St. Peter Baptist Academy)
Zone 1, Poblacion, Lupi, Camarines Sur – 4409
http//:facebook.com/SPBCF-Activity-Page
S/Y: 2023-2024

JUNIOR HIGH SCHOOL

TLE
INFORMATION AND
COMMUNICATION TECHNOLOGY 10

LEARNING MODULE

NAME: _____________________________________________________

GRADE & SECTION: _____________________________________________________

Contact Information:
Teacher: Jessa Nocillado Martinez Email: [email protected]
CP#: 09480693162 Fb: Jessa Nocillado Martinez
TABLE OF CONTENTS

Pages

Introduction 1

Pretest 2

Types and Parts of Computer 3

Parts of Motherboard 7

Activity 1 7

Types of Malware 8

Safety Procedures 9

Activity 2 11
INTRODUCTION

ICT Stands for Information and Communications Technology. It refers to the


concept of using technology to get information. Involves the use of computers
and other electronic devices to access information easily and quickly. Examples
of ICT include not only personal computers but also new forms of telephones,
televisions, appliances, and various hand held devices. ICT refers to
technologies that provide access to information through telecommunications. It is
similar to Information Technology (IT), but focuses primarily on communication
technologies. This includes the Internet, wireless networks, cell phones, and
other communication media.

Page 1 || Technology and Livelihood Education 10


PRETEST

Task 1: Guide Questions


Directions: Answer the following questions and write your answer on a long bond
paper.
1. Differentiate Entrepreneurs and Entrepreneurship?
2. Explain why entrepreneurial activities are important to social development
and economic progress?
3. What entrepreneurial activities related to Computer Hardware Servicing do
you know and are capable of doing?
4. What do you think are the most important competencies one must possess
in order to be successful in running a chosen business?

Task 2: Matching Type

Directions: match the entrepreneurial competencies in column A with their


meaning in column B. Write the letter of the correct answer on the space
provided before each number.
A B
______1. Creative a. makes wise decisions towards the set
objectives
______2. Profit-oriented b. strategic thinking and setting of goals
______3. Disciplined c. trusting in one’s ability
______4. Sound decision maker d. adoptable to change
______5. Possess people skills e. innovates to have an edge over other
competitors
______6. Excellent planner f. solid dedication
______7. Confident g. skillful in record keeping
______8. Hardworking h. always sticks to the plan
______9. Ability to accept change i. work diligently
______10. Committed j. effective and efficient communication
skills and relates well to people
k. always looking for an opportunity to
have/earn income.

Page 2 || Technology and Livelihood Education 10


Task 3: Goals and Targets
Directions: You will create your own personal goals and targets in this subject.
Write your answers below the box of goals and targets and the ultimate goal. For
example: My goals and target is to know more about ICT, the proper use of
hands in typing on the keyboard, etc. While my ultimate goal is being able to
operate by my own the computer and use other software properly on computer.

Goals and Targets Ultimate Goal

LESSON 1
Types and Parts of Computers

COMPUTER

A computer is a machine or
device that performs processes,
calculations and operations based on
instructions provided by a software or
hardware program. It has the ability to
accept data (input), process it, and
then produce outputs.

Modern computers are electronic devices used for a variety of


purposes ranging from browsing the web, writing documents, editing
videos, creating applications, playing video games, etc.
They are designed to execute applications and provide a variety of
solutions by combining integrated hardware and software components.
Hardware
-refers to the external and internal devices and equipment that
enable you to perform major functions such as input, output, storage,
communication, processing, and more.
There are two types of computer hardware: external and internal.

Page 3 || Technology and Livelihood Education 10


External Hardware
 Monitor - is an output device similar to a TV screen
that displays information, documents or images
generated by the computing device.

 Keyboard - is an input device featuring a


standard QWERTY keyset that enables users to
input text, numbers or special characters.

 Printer – it render electronic data from a


computer into printed material.

 Speaker - is an external audio output device that


connects to a computer to generate a sound output.

 Headphones, earphones, earbuds - .


Similar to speakers, these devices
provide audio output that's audible only
to a single listener.

 Microphone - is a device that translates


sound waves into electrical signals and
supports computer-based audio
communications.

 WebCam. A camera captures visual


images and streams them to the
computer or through a computer to a
network device.

Page 4 || Technology and Livelihood Education 10


 Mouse - is a hand-held pointing device that
moves a cursor around a computer screen
and enables interaction with objects on the
screen. It may be wired or wireless.

 Touchpad - is an input device, external or built


into a laptop, used to control the pointer on a
display screen. It is typically an alternative to an
external mouse.

 USB flash drive - is an external,


removable storage device that uses
flash memory and interfaces with a
computer through a USB port.

 Memory Card - is a type of portable external


storage media, such as a CompactFlash card,
used to store media or data files.

 Scanner or optical scanner - is a


hardware input device that optically
"reads" and image and converts it into
a digital signal.

Internal Hardware
 Motherboard. This is a printed
circuit board that holds the central
processing unit (CPU) and other
essential internal hardware and
functions as the central hub that all
other hardware components run

Page 5 || Technology and Livelihood Education 10


 CPU - is the brain/heart of the computer that
processes and executes digital instructions
from various programs; its clock
speed determines the computer's performance
and efficiency in processing data.

 Hard disk drives are physical storage devices


that store both permanent and temporary data in
different formats, including programs, device
files, photos, etc.

 Optical Drive - they enable the computer to


read and interact with nonmagnetic external
media, such as compact disc read-only
memory or digital video discs.

 Network Interface Card (NIC) - is a


circuit board or chip that enables the
computer to connect to a network; also
known as a network adapter or local area
network adapter, it typically supports
connection to an Ethernet network.

 Random Access Memory (RAM) - is


temporary memory storage that makes
information immediately accessible to
programs; RAM is volatile memory, so
stored data is cleared when the computer
powers off.

Software
-is the intangible part of the device that lets the user interact with the hardware
and command it to perform specific tasks. Computer software includes the
following:
 OS and related utilities;
 programs that control certain computer functions; and
 applications that usually perform operations on user-supplied data.

The presence of malicious software, or malware, such as viruses, Trojan horses,


spyware and worms, can have a huge effect on computer programs and a
system's OS. Hardware is not affected by malware.

Page 6 || Technology and Livelihood Education 10


PARTS OF MOTHERBOARD

ACTIVITY # 1
Direction: Answer the following questions.

1. Differentiate Software and Hardware.


2. Give at least 5 examples each for Software and Hardware.

True or False
Directions: On the space provided, write TRUE if the statement is
correct, and write FALSE if the statement is incorrect.
1. The mouse is an output device.
2. A processing device handles the intermediate stage of processing
incoming data.
3. Input, output and processing devices can work without storage
devices.
4. Optical disc is any media read using a laser assembly.
5. A computer's RAM handles all instructions it receives from
hardware and software running on the computer.
6. Flash drives are examples of primary storage devices.
7. Hardware can work without software.
8. The CPU is called the “brain of the computer”.
9. The RAM stores temporary memory.
10. Hard disk is an example of magnetic storage device.

Page 7 || Technology and Livelihood Education 10


1. Virus is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software. Computer viruses aim
to disrupt systems, cause major operational issues, and result in data loss
and leakage.
2. Adware is a type of malicious software that secretly installs itself on your
device and displays unwanted advertisements and pop-ups. In some cases,
adware can even track your online behavior and display personalized ads.
Adware is short for advertising supported software, designed to throw
advertisements up on your screen, most often within a web browser. Some
security professionals view it as the forerunner of the modern-day PUP
(potentially unwanted program). Typically, it uses an underhanded method
to either disguise itself as legitimate, or piggyback on another program to
trick you into installing it on your PC, tablet, or mobile device.
3. A rootkit is a type of malware designed to give hackers access to and
control over a target device. Although most rootkits affect the software and
the operating system, some can also infect your computer’s hardware and
firmware. Rootkits are adept at concealing their presence, but while they
remain hidden, they are active.
4. Spyware is malicious software that enters a user’s computer, gathers data
from the device and user, and sends it to third parties without their consent.
Spyware collects personal and sensitive information that it sends to
advertisers, data collection firms, or malicious actors for a profit. Attackers
use it to track, steal, and sell user data, such as internet usage, credit card,
and bank account details, or steal user credentials to spoof their identities.
5. Ransom malware, or ransomware, is a type of malware that prevents
users from accessing their system or personal files and demands ransom
payment in order to regain access. While some people might think "a virus

Page 8 || Technology and Livelihood Education 10


locked my computer," ransomware would typically be classified as a
different form of malware than a virus.
6. Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program. The delivery method typically sees an
attacker use social engineering to hide malicious code within legitimate
software to try and gain users' system access with their software.
7. A remote access Trojan (RAT) is a malware program that opens a
backdoor, enabling administrative control over the victim’s computer. RATs
are typically downloaded together with a seemingly legitimate program, like
a game, or are sent to the target as an email attachment. Once the attacker
compromises the host’s system, they can use it to distribute RATs to
additional vulnerable computers, establishing a botnet.
8. A worm virus refers to a malicious program that replicates itself,
automatically spreading through a network. In this definition of computer
worms, the worm virus exploits vulnerabilities in your security software to
steal sensitive information, install backdoors that can be used to access the
system, corrupt files, and do other kinds of harm.
9. Keylogger are a particularly insidious type of spyware that can record and
steal consecutive keystrokes (and much more) that the user enters on a
device. The term keylogger, or "keystroke logger," is self-explanatory:
Software that logs what you type on your keyboard. However, keyloggers
can also enable cybercriminals to eavesdrop on you, watch you on your
system camera, or listen over your smartphone's microphone.

SAFETY PROCEDURES

It is essential to maintain safe working conditions to prevent accidents and


injury to any person or damage to any object in a work area. New staff and visitors
must be informed of the appropriate safety procedures. Any transgression of the
procedures must be reported. As an aspiring computer technician, you should be
aware of all possible dangers in the workplace. It is a must to follow proper
procedures for handling computer equipment. Failure to follow the prescribed
safety procedures could result in fines, criminal convictions, and damage to
equipment, claims for damage from the owner of the property and data, injury, or
death.

A safe work space is clean, organized, and well-lit. The disposal or recycling
of hazardous computer components must be done properly. Make sure to follow
regulations that govern how to dispose specific items. When an organization
violates these regulations, there can be legal consequences. To keep you safe, this
module provides the general and fire safety guidelines that protects the technician
and the equipment.

Page 9 || Technology and Livelihood Education 10


General Safety Guidelines
General Safety Guidelines

Follow the basic safety guidelines to prevent cuts, burns, electrical shock,
and damage to eyesight. As a best practice, make sure that a fire extinguisher and
first aid kit are available in case of fire or injury. Here are some general safety
guidelines:

 Remove your watch or any other jewelry and secure loose clothing. Turn off
the power and unplug equipment before opening the case performing service.
And cover any sharp edges inside the computer case with tape.
 Never open a power supply or a monitor.
 Do not touch areas in printers that are hot or those which use high voltage.
 Know where the fire extinguisher is located and learn how to use it.
 Know where the first aid kit is located. Keep food and drinks out of your
workspace.
 Keep your workspace clean and free of clutter. Lift heavy objects with sturdy
leg support to avoid back injury.

Fire Safety Guidelines

Follow fire safety guidelines to protect equipment and lives. Turn off and
unplug the computer before beginning a repair to avoid damage to the computer or
electric shock to the technician, Fire can spread rapidly and be very costly. Proper
use of a fire extinguisher can prevent a small fire from getting out of control. When
working with computer components, always consider the possibility of an accidental
fire and prepare how to react. If there is a fire, you should follow these safety
procedures:

 Always have a planned fire escape route before beginning any work.
 Never fight a fire that is out of control or not contained.
 Get out of the building quickly in case of an out-of-control fire.
 Contact emergency services immediately for help.

Page 10 || Technology and Livelihood Education 10


Activity # 2
Directions: Based from the illustration below, how many violations of Safety Standards can
you find? Enumerate at least 10. Write your answers on the space provided below the picture.

1. ____________________________________________________
2. ____________________________________________________
3. ____________________________________________________
4. ____________________________________________________
5. ____________________________________________________
6. ____________________________________________________
7. ____________________________________________________
8. ____________________________________________________
9. ____________________________________________________
10. __________________________________________________

Directions: Write Tik if the statement is true and Tok if the statement is false.
Write your answer on space provided.
_____1. Always wear personal protective equipment (PPE) in accordance
with the organization’s OHS procedures and practices.
_____2. Always work alone so that there’s no one who can take care of you
in case of emergency.
_____3. Take away any liquid near your work area to avoid getting
electrocuted or accidentally damaging computer parts.
_____4. Be careful with tools that may cause short circuit.
_____5. Use excessive force if things don’t quite slip into place
_____6. Hold the components on the edges and do not touch the Integrated
Circuit (IC) parts.
_____7. Clean the area before and after using it to maintain sanitation and
preventive accidents.

Page 11 || Technology and Livelihood Education 10


____8. Make sure that the pins are properly aligned when connecting a
cable connector
____9. Contingency measures during workplace accidents, fire and other
emergencies are not recognized.
____10. Always power off the computer and unplug the computer before
working on it.

Reference:
https://www.studocu.com/row/document/northwestern-polytechnical-
university/advanced-mathematics/grade-10-tle-css-ict-2021-2022/20032603

https://www.slideshare.net/danielmanaog14/k12-module-in-tle-ict-grade-10-
all-gradings

You might also like