Tle 8
Tle 8
GOALS
1. To promote transformative leadership that ensures efficient and
effective administration services to stakeholders.
2. Enhance the quality of academic and technical education thru
curriculum and instructional development.
3. Provide quality services that nurture student’s learning and
promote stakeholder’s by satisfaction.
4. Engage the entire community in the teaching-learning process.
5. Provide venue for developing faculty and staff to grow in the
profession.
6. Promote research as part of continuing professional development.
PREPARED BY
APPROVED BY Dr. Iris Jane Agbong- Coates
COURSE SYLLABUS IN TLE 8
LEARNING PLAN
SEMI FINAL
Lecture:
Describe the V. Microsoft G.M Discussio Oral Computer
MS Windows Word Almano,E n Recitation Multimedia
platform; 1. Microsoft Word t, Al Presentat Written Projector
Created a Basics (2007) ion Quiz PPT
folder and 2. Parts of the Basic Q and A Hands-on Internet
organized files; Microsoft Word Informati Performa
Used Microsoft screen on Lab: nce
Word 3. Microsoft Word Technolo Demons Practical
processing Tabs gy tration Test
application; 4. Microsoft word http://w Hands- Hands-on
Performed the Groups ww.gcfle on Performa
following 5. Commands in armfree. Activity nce
format Microsoft Word org/offic Compilati
documents, Application e2010/ex on of MS
paragraph 6. Create, Open cel2010, Word
alignment and and Save June 10, Exercises
spacing, insert Documents 2015
and format
tables;
Demonstrate
skill in creating, Computer
opening and Multimedia
saving Projector
documents; Lecture: PPT
Expressed Discussio Internet
appreciation in n
the application
VI. Microsoft Presentat Oral
Excel ion Recitation
1. Spreadsheet G.M Q and A Written
Discussed the and Electronic Almano,E Quiz
concept of Spreadsheet t, Al Lab: Hands-on
electronic 2. Parts of the MS (2007) Demons Performa
spreadsheet; Excel Screen Basic tration nce
Identified and such as groups Informati Hands- Practical
described and tabs, on on Test
Microsoft Excel additional Technolo Activity Hands-on
2007 and its buttons and gy Performa
environment; commands, http://w nce
Demonstrated creating Excel ww.gcfle Compilati
understanding Spreadsheet armfree. on of MS
of “formula” 3. Formula and org/offic Excel
and the order Order of Priority e2010/ex Exercises
of priority in in excel cel2010,
computation computation June 10,
using Excel; 4. Data Types 2015
Classified the 5. Creating and
different data formulating
types Excel
contained in Worksheets and
the cell; workbooks
Applied 6. Using Formulas
formulas in in Computing
problem Excel Problems
solving activity
using excel
application;
Created and
formatted
worksheets
and workbooks
containing
various data
such as charts;
Appreciated
the use of
Microsoft Excel
application
FINALS Lecture:
demonstrate VII. Technical G.M Discussio Oral Computer
understandin Drafting Alman n Recitation Multimedia
g on the 1. Technical o,Et, Al Presentat Written Projector
concept of Drafting (2007) ion Quiz PPT
technical Concept Basic Q and A Hands-on Internet
drafting, 2. 2D Animation Inform Performa
illustration, Concepts ation Lab: nce
2D animation 3. Medical Techno Demons Practical
and medical Transcription logy tration Test
transcription; Concepts Hands- Hands-on
on Performa
Activity nce
COURSE Developed the skills, knowledge and techniques in Microsoft Word and Microsoft
REQUIREMENTS Excel
Designed a digital media using a movie maker application
Demonstrated understanding of concepts on technical drafting, illustration 2D
animation and medical transcription
Portfolio Compilation of of MS Word Exercises
Portfolio Compilation of of MS Excel Exercises
GRADING SYSTEM
Laboratory Exercises/Performance -------------------- 60%
Exam/Quizzes ----------------------------------------------- 20%
Portfolio ------------------------------------------------------ 20%
Total: 100%
JEJIE M. AWIT MA. MINVILUZ G. OCEÑA DR. IRIS JANE G. AGBONG-COATES, Ph.D
Instructor OIC-PROGRAM HEAD DEAN OF COLLEGE
Course description
This course deals to develop and update industry knowledge, observe workplace hygiene procedures,
perform workplace and safety practices, Provide effective customer services ICT.
To attain what is expected for this course, this course pack focuses on the discussion of the
following;
Chapter 1: Basic computer concepts
To aid students' learning, you should look over all of the modules and answer honestly all of the
activities assigned to each module.
-------------TABLE OF CONTENTS----------
Basic Computer Concepts
Definition of Computer
Elements of Computer
Parts of the Computer; Accessories of the Computer
Basic Computer operations
Classification Viruses and Anti-viruses
Definition of Mouse; Mouse Actions
Keyboard Keys; Proper Keys
Operating System
Definition of Operating System
Types of Operating System
Windows and Linux OS
The history of Windows Operating System
Windows Application
Definition of Windows 7
The Desktop Components
Parts of a Window
File Management and Organization
Google Classroom Platform and Benefits
Microsoft Word
Microsoft Word Basics
Parts of the Microsoft Word screen
Microsoft Word Tabs
Microsoft word Groups
Commands in Microsoft Word Application
Create, Open and Save Documents
Microsoft Excel
Spreadsheet and Electronic Spreadsheet
Parts of the MS Excel Screen such as groups and tabs, additional buttons and commands,
creating Excel Spreadsheet
Formula and Order of Priority in excel computation
Data Types
Creating and formulating Excel Worksheets and workbooks
Using Formulas in Computing Excel Problems
Technical Drafting
Technical Drafting Concept
2D Animation Concepts
Medical Transcription Concepts
Lesson 1
Basic computer concepts
MOTHERBOARD
The motherboard is a paramount computer component as this
is the central part where everything else is connecting to. A
motherboard is an affably sized circuit board that allows other
elements to interact. It has ports, which are facing outside a PC
case so that you can plug in a monitor, charge your computer or
plug in a mouse. It also has slots for expansions so that you can
install additional accessory ports if you wish to do so. Here you will get the detailed microbit
lessons and the purchase site. The motherboard stores low-level data like the system time even
when a PC is switched off.
POWER SUPPLY
The power supply is the device that powers all other mechanisms of the PC. It generally plugs into the
motherboard. It can connect to either a plug for an outlet (desktop) or an internal battery (laptop).
The CPU is the PC’s brain since it works the hardest. A CPU does all the calculations needed for a system
and varies in speed. The CPU generates heat, and that’s why a fan is installed inside the PC. More powerful
CPU’s are required for intense computer work or work that necessitates programming multifaceted
software or editing high-definition video.
RAM is short-term memory. When you open Microsoft Word, the computer places it in RAM, and when
closing the window, that RAM is released. The more RAM on your PC, the more programs can run at the
same time.
They are less regular than they used to be, but several machines still have optical drives for reading DVDs
or CDs. They can be used for watching movies or listening to music, copying information on a blank disc,
or installing software to the disc.
ARROW KEYS – Moves the cursor around document without changing text FUNCTION KEYS or F
KEYS – Access commands by themselves or in combination with the three command keys; CTRL,
SHIFT, and ALT
Command or Special Keys
Command keys normally do nothing on their own but work in combination with other keys. Each
piece of software uses the command keys differently though there is a move to standardize some
functions. The Control key or Ctrl is often used to access commands. The Alternative key or Alt is
often used to access menus. The Shift key is used to type CAPITAL LETTERS. As well the command
keys are all used to move through documents and edit text faster and easier. As well many
computers have Special keys design specifically for the particular computer. Apple computers have
the Apple keys and Macs have Command keys. Many keyboards now have a Windows key
specifically for Windows 9x and newer systems. Many older computers also have special keys used
for a variety of different functions.
Some Notebook or Laptop keys are left out because of space limitations and they usually have a
Special function key which allows other keys to
double for the missing ones.
Basic Typing Rules
Place one space between each word, after a punctuation mark and at the end of a sentence.
Always start a sentence with a capital letter. Use capitals for names, addresses, provinces and
countries, places, organizations, businesses, associations, schools, colleges, universities, days of
the week, months, holidays, nationalities, ethnic groups and languages.
Learning the keyboard is the first step to learning computers. Learning involves practice. It really
is as simple as that. There are two kinds of typing.
The first is called Touch Typing. The Touch Typist uses the Home Keys asdf for the left hand
and jkl; for the right) and all the fingers on both hands as well as the thumbs for the Space Bar
while typing. There are many commercial and public domain programs that are designed to teach
this method.
The other method is some times called 'Hunt and Peck' or depending on finger strength 'Search
and Destroy'. This involves using one or more fingers on one or two hands to type. It is a perfectly
acceptable way of using a computer and many people get along fine with this technique. I myself
find this an extremely funny method to watch in action
Different types of Computer Viruses - Computer Virus Classification
Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard drive, where the Master
Boot Record (MBR) is stored. The Master Boot Record (MBR) stores the disk's primary partition
table and to store bootstrapping instructions which are executed after the computer's BIOS passes
execution to machine code. If a computer is infected with Boot Sector Virus, when the computer
is turned on, the virus launches immediately and is loaded into memory, enabling it to control the
computer.
Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail
addresses which are stored in the address book and replicate by e-mailing themselves to the
addresses stored in the address book of the e-mail program.
• Macro viruses: Macro viruses are written by using the Macro programming languages like VBA,
which is a feature of MS office package. A macro is a way to automate and simplify a task that you
perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as
part of the document or spreadsheet and can travel to other systems when these files are
transferred to another computers.
• Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and
change their code every time they infect a different system. This helps the Polymorphic Viruses to
hide from anti-virus software.
Armored Viruses: Armored Viruses are type of viruses that are designed and written to make itself
difficult to detect or analyze. An Armored Virus may also have the ability to protect itself from
antivirus programs, making it more difficult to disinfect.
Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus
software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic
nature which helps them to hide from heuristic detection.
Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the
anti-virus application by encrypting parts of the virus itself. This is known as mutation.
Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus
application running on the computer. A retrovirus can be considered anti-antivirus. Some
Retroviruses attack the anti-virus application and stop it from running or some other destroys the
virus definition database.
Multiple Characteristic viruses: Multiple Characteristic viruses has different characteristics of
viruses and have different capabilities.
Computer mouse
A computer mouse is an input device that is used with a computer. Moving a mouse along a
flat surface can move the cursor to different items on the screen. Items can be moved or selected by
pressing the mouse buttons (called clicking).[1] Today's mice have two buttons, the left button and right
button, with a scroll wheel in between the two. Today, many computer mice use wireless technology and
have no wire.
There are many types of mouse. Optical mouse, wireless mouse, mechanical mouse, trackball mouse. A
computer mouse is a handheld hardware input device that controls a cursor in a GUI and can move and
select text, icons, files, and folders. For desktop computers, the mouse is placed on a flat surface such as
a mouse pad or a desk and is placed in front of your computer. The picture to the right is an example of a
desktop computer mouse with two buttons and a wheel. The mouse was originally known as the X-Y
position Indicator for a display system and was invented by Douglas Engelbart in 1963 while working
at Xerox PARC. However, due to Alto's lack of success, the first widely used application of the mouse was
with the Apple Lisa computer.
Today this device is on virtually every computer. The primary function is to move the mouse pointer on
the screen. The mouse pointer can be used for many actions on the computer. Clicking or double clicking
an icon, folder, or other object will open a document or execute the program. Users can also move an
icon, folder, or other object by clicking a mouse button and dragging the object with the mouse pointer.
Pointing to an item on the screen means moving your mouse so the pointer appears to be touching the
item. When you point to something, a small box often appears that describes the item.
Below is a list of the home row keys, the finger used, and the keys the thumb (spacebar) presses.
A key
The left pinky (little) finger is placed over the "A" key and is also responsible for the second most keys on
the keyboard, including the following keys.
"`" (back quote) and when pressing Shift, the "~" (tilde)
1 and when pressing Shift, the "!" (exclamation mark)
Tab
Q
Caps Lock
A
Left Shift
Left Ctrl
Z
Fn key
S key
The left ring finger is placed over the "S" key and is also responsible for the following keys.
The left middle finger is placed over the "D" key and is also responsible for the following keys.
F key
The left index finger is placed over the "F" key and is also responsible for the following keys.
The right index finger is placed over the "J" key and is also responsible for the following keys.
K key
The right ring middle finger is placed over the "K" key and is also responsible for the following
keys.
The right ring finger is placed over the "L" key and is also responsible for the following keys.
; (semicolon) key
The right pinky (little) finger is placed over the ";" key and is also responsible for the most keys
on the keyboard, including the following keys.
Both thumbs are placed over the spacebar and may also be used for the following keys.
Answer the following questions based on your own opinion