0% found this document useful (0 votes)
266 views

Module 3 - Performing Computer Operations

This document discusses performing computer operations, including: - Producing output/data using a computer system - Using basic functions of a web browser to locate information - Maintaining computer equipment and systems It covers key terms related to computers and the internet, data processing methods, basic keyboard commands, types of software, ways to transfer data, requirements for internet searches, parts of web browsers and their functions, and procedures for ensuring data security including backups and virus checks.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
266 views

Module 3 - Performing Computer Operations

This document discusses performing computer operations, including: - Producing output/data using a computer system - Using basic functions of a web browser to locate information - Maintaining computer equipment and systems It covers key terms related to computers and the internet, data processing methods, basic keyboard commands, types of software, ways to transfer data, requirements for internet searches, parts of web browsers and their functions, and procedures for ensuring data security including backups and virus checks.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

TLE-ICT CSS

7/8

Module 3
Performing Computer
Operations

Technology and Livelihood Education-ICT CSS


TLE-ICT CSS

Module 3- Performing Computer


7/8 Operations

Learning Outcome 4: Produce output/data using computer system (TLE_IACSS9 - 12PCO -If – 7)

Learning Outcome 5: Use basic functions of a World Wide Web browser to


locate information (TLE_IACSS9-12PCO-Ig-h-8)

Learning Outcome 6: Maintain computer equipment and systems (TLE_IACSS9-12PCO-Ii-j-9)

Technology and Livelihood Education-ICT CSS


Module 3- Performing Computer Operations

Key Terms
 Internet is a set of millions of computers worldwide connected into a
network with the purpose of exchanging data among users.
 World Wide Web (WWW) is one of the services on the Internet which we
use to browse web pages (set of HTML documents connected with
hyperlinks).
 Hypertext Transfer Protocol (HTTP) is a protocol (set of rules) that
allows transmission of information published on the Web.
 Uniform Resource Locator (URL)- is a web address of a particular
object (Web pages, images, or Word or PDF document) published on the
Internet.
 File Transfer Protocol (FTP) is a protocol that allows data transfer
between computers over the Internet.
Module 3- Performing Computer Operations

Key Terms
Hyperlink or link is a part of the text or graphics on a web page; when we activate a
hyperlink image.
 Web browser is a software (program) which allows us to browse web pages. The most
widely used: Google Chrome, Mozilla Firefox, Opera, Internet Explorer
 Web search engine contains content categorization of many Web pages.
 Internet Service Provider (ISP) is a company that provides Internet access for its users (T-
Com, Carnet.)
 Web Search is used to locate information.
 Web Address is used to locate a particular webpage. It is sometimes referred to as a “URL”
(Uniform Resource Locator).
 Input is an information or programs that entered into the computer system through input
devices such as the keyboard.
 Output is a display information on the screen (monitor) or the printer and sends
information to other computers.
Data Processing Methods

Computer data is information processed or stored


by a computer. This information may be in the
form of text documents, images, audio clips,
software programs, or other types of data. Data
input is a collected data which is converted into
machine-readable form by an input device and
send into the machine.
Data Processing Methods

Data processing is a manipulation of data by


a computer. It transforms raw data into
meaningful output.
Data Processing Methods

1. Manual Data Processing - The data is processed


manually without using any machine or tool to get
required results.
2. Mechanical Data Processing - The data is processed
by using different devices like typewriters, mechanical
printers or other mechanical devices.
3. Electronic Data Processing - It is the modern
technique to process data
Basic Keyboard Commands in Data Processing

ENTER or RETURN
Moves the cursor down one line bringing
it to the left margin. Enter also process
commands such as choosing an option in a
dialog (message) boxes and submitting a
form.

DEL or DELETE
Deletes character at cursor and/or
characters to the right of the cursor and all
highlighted (or selected) text.
Basic Keyboard Commands in Data Processing

BKSP or BACKSPACE Deletes the


character to the left of cursor and all
highlighted text
SPACE BAR Moves the cursor one space at
a time to the right SHIFT KEY. Use the shift
keys to type capital letters and to type the
upper character on keys with two characters
on them.
Basic Keyboard Commands in Data Processing

CAPS LOCK Locks the keyboard so it types


capital letters (a light goes on when caps
lock is on)

TAB Moves the cursor five spaces to the


right (number of spaces are usually
adjustable). Tab moves to the next field in a
form or table (Shift-Tab for previous field).
Basic Keyboard Commands in Data Processing

ESC or ESCAPE Cancels a menu or dialog box.

ARROW KEYS Moves the cursor around document without


changing text.
FUNCTION KEYS or F KEYS Access commands
by themselves or in combination with the three
command keys; CTRL, SHIFT, and ALT

CTRL + N
Allow the user to create document
Software are divided into two types:

1. Systems software is a
program that manages the
resources of the computer
system and simplify applications
programming. Example:
Operating System such as Linux,
Macintosh, Microsoft Windows
Software are divided into two types:

2. Application software is a
program that directs the
performance of a particular use,
or application of computers to
meet the information processing
needs of end users. Example:
MSWord, MS Excel, Adobe
Reader
Application software

1. Spreadsheets is an application in which data


are used for analysis, planning and modelling.

Examples:
 Microsoft Excel
 Google Sheets
 Open Office-Spreadsheet
Application software

2. Word processing is an application


that computerize the creation, edition,
and printing of documents by
electronically processing text data.
Examples:
 Microsoft Word
 Google Docs
 Open Office - Writer
Application software
3. Desktop Publishing is an application used to
produce a printed material like newsletters,
brochures, manuals, and books with several type
styles, graphics, and colors on each page.

Examples:
 Microsoft Publisher
 IStudio Publisher
 Adobe Indesign
Application software

4. Presentation Software is an application


software that is specifically designed to allow
users to create a presentation of ideas by
stringing together text, images and audio/video.

Examples:
 Microsoft PowerPoint
 Google Slides
 Corel Presentation
Different Ways to Transfer Data

1. E-Mail is an information stored on a computer that is


exchanged between two users over telecommunications.
2. File sharing sites or File Transfer Protocol is a type of data
transfer system usually utilized for websites and complicated file
system.
3. External media or storage devices can transfer files by
copying data into external hard drives, thumb drives, or other
storage devices.
4. Cloud Storage is one of the most popular and easiest to use
method for file sharing in today’s digital world.
Establish Information Requirements for
Internet Search

1. Web Browser
2. Internet Connection
3. Internet Service Provider
4. Web Search engine
Web Browser

It is a computer program used to retrieve and


displays information from the Internet. The most
popular web browsers are Mozilla Firefox, Google
Chrome, Microsoft Internet Explorer and Apple
Safari. Your computer will have a pre-installed web
browser, but you may also add other browsers.
Different
Different Types
types ofofa Web Browser
web browser

Google Chrome is a web browser developed by


Google and known to be one of the most popular
web browsers.

Mozilla Firefox is a new browser derived from


Mozilla. It was released in 2004 and has grown
to be the second most popular browser on the
Internet.
Different
Different Types
types ofofa Web Browser
web browser

Safari is a web browser developed by


Apple Inc. and included in Mac OS X.

Internet Explorer is a product from software


giant Microsoft and the most commonly used
browser in the universe

Opera is smaller and faster than most other


browsers, yet it is full- featured.
Basic Parts of Browser and their Functions

Navigation Bar is located at the


top of your computer screen. Its
functions allow you to navigate
the web.

Navigation Buttons are used to go


back and forth between webpages.
• To go back, click on the left arrow
• To go forward, click on the right
arrow
Basic Parts of Browser and their Functions

Home Page appears when


the web browser is launch.

History provides a list of the


websites you have visited.
Basic Parts of Browser and their Functions
Address Bar/Search Bar is used to
type in a Web Address or to perform a
Web Search.

Favorites is a feature that allows


you to bookmark websites to
provide one-click access later.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures
Types of Computer Maintenance
1. Predictive Maintenance This refers to using a diagnostic
tool to anticipate possible failures and avoid some possible
issues.
2. Preventive Maintenance It prevents possible failures,
improve the function of a system and prolong the life of various
computer components. Disk cleanup is a maintenance utility
that scans your computer’s hard drive for files that you no
longer needed. Defragmentation is the process of consolidating
fragmented files on the user's hard drive.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures
Types of Computer Maintenance
3. Corrective Maintenance
It refers to the set of tasks destined to correct the defects to be
found in the different equipment.
For example: If the operating system failed and we want it to work
again in the same condition, we apply the necessary measures such as
computer reformat.
Computer Reformat is the process of erasing all information on the
drive by formatting the drive to prepare that disk to be used for other data.
Reformat is commonly performed to correct a major data corruption,
check to see if the disk is bad, or clean the disk drive.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures

Types of Computer Maintenance

4. Evolutionary Maintenance
This type concerns both hardware and software, so
you can update Windows and change various parts of
the PC for better performance.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures

Data Security
A data security is about keeping your data
safe from accidental or malicious damage.
Security is a consideration at all stages of your
research, particularly if working with
disclosure or licensed data.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures
Procedures in Ensuring Data Security

1. Creating Passwords are the foundation of security. Getting a


good one is a great basis for keeping your data safe, but a weak
password is like an unlocked door.
2. Data Encryption maintains the security of data and
documentation through an algorithm to transforming information
into something unreadable requiring a “key” to decrypt and
return to comprehension.
3. Data Backup is a process of duplicating data to allow retrieval
of the duplicate set after a data loss event.
Procedures for Ensuring Security of Data, Including Regular
Backups and Virus Checks in Accordance with Standard
Operating Procedures

Data Backup

A data backup is the action of copying files


and folders for the purpose of being able to
restore them in case of data loss. Data loss can
be a huge setback and in some cases can even
lead to a business failure or transaction
catastrophe.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Data Back-up Options


To increase the chances of recovering lost or corrupted
data. Below are some of the backup options to mitigate data loss.

1. External hard drive - A portable, easy to


use, and capable of storing large files. It can
be moved from computer to computer, making
it convenient to transport data.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

2. Cloud backup

- It allows users to back up their data to hardware


that’s in a remote location. Most cloud storage
services provide a large amount of storage space and
encrypt the content for data security.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

3. Flash drive

- A small portable storage device mostly


used to transfer files from device to
another device.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

The Most Common Types of Data Backup


1. Full backup - It is when every single file and folder in
the system is backed up.
2. Incremental backup - The process of restoring lost
data from backup is longer but the process is much
quicker.
3. Differential backup - This type of backup requires
more storage space than incremental backup does,
however, but it also allows for a faster restore time.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

4. Mirror backup - A mirror backup, as the name


implies, is when an exact copy is made of the
source data.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Scanning of a Virus
Computer Virus is a type of malicious
code or program written to alter the way a
computer operates and is designed to
spread from one computer to another.
A virus scan is the process of using
anti-virus software to scan and identify
viruses in a computing device. It is an
information security process that aims to
review
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Virus scanning relies entirely on the


strength of an anti-virus engine that uses a
repository of descriptions of known viruses,
malware and other malicious content.
Antivirus software is a program or set of
programs that are designed to prevent,
search for, detect, and remove software
viruses, and other malicious software like
worms, Trojans, adware, and more.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Three Different Types of Virus Scanning

1. Full Scan will take a few hours to complete if you


happen to have a lot of data stored on your system.
2. Custom Scan is a great way to check quickly the pen
drives or hard drives.
3. Quick Scan targets the entire system but it does not
take as much time as a full scan.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Ways to Prevent Virus Infections


1. Keeping antivirus up to date and running scans on a regular
basis.
2. Strict policies should be put in place to prevent virus infection
e.g. prohibiting the use of flash drives, or require flash disk to
be scanned before use.
3. Other policy to consider is the prohibiting of downloading since
unsuspecting users can accidentally download malware.
4. A firewall may also be used to block dangerous downloads.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Basic File Maintenance Procedures in Line


with the Standards Operating Procedures

File Maintenance is the software processes


concerned with maintaining file integrity and
file efficiency, usually of data files. It is
concerned with the internal organization of
files.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

There are Two Types of File Maintenance

1. Partition Maintenance includes periodic checking of


the file system's underlying structure and metadata,
modifying the partition layout, and low-level backups.
2. Content Maintenance involves monitoring and
controlling the space used by files as well as file backup
and recovery.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Basic Procedures in File Maintenance

1. Update your antivirus and run a scan - The


anti-virus updates contain the latest files needed
to combat new viruses and protect your computer.
2. Run spyware removal software - Protect your
files from unwanted copy.
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

3. Empty your Recycle Bin - This will delete all


unnecessary files from your computer.
4. Conduct Disk cleanup - It finds files that are
no longer needed.
5. Run Disk Defragmentation - It picks up all of
the pieces of data that are spread across your hard
drive and puts them back together again.

You might also like