Ict 4 Lesson 1 Being Healthy and Safe When Using Computers Uses of Computers
Ict 4 Lesson 1 Being Healthy and Safe When Using Computers Uses of Computers
Ict 4 Lesson 1 Being Healthy and Safe When Using Computers Uses of Computers
Lesson 1
Being Healthy and Safe When Using Computers
Uses of Computers
Computers can be used in a lot of ways. They are used in education, health
and medicine, recreation and entertainment, and government.
Computers are used in education to get information. Education has also
evolved into using the Internet for mobile learning.
Computers are also used in the field of medicine. Information now can be
digitized, and electronic devices to help patients have been developed.
People who are hard of hearing can now have hearing instruments that can
be adjusted to precise measurements using computers.
The field of recreation and entertainment has also been penetrated by
computers. Movies can be created with the help of software imaging.
The government also uses computer. Records are computerized for faster
transactions. Traffic control is also done using computers.
Bad Habits Prevention
People spend a lot of time in front of their computers. Their bodies are
physically stressed without them even knowing it. They acquire bad habits
when working in front of their machines. These bad habits can cause
injuries and pain. How can we avoid these bad habits?
Here are some practices to help keep us healthy while using our
computers.
1. Arrange our workstation regularly.
2. Modify our body mechanics.
3. Move
4. Exercise while we work.
Computer Laboratory Rules
1. Before entering the Laboratory, we:
a. Keep our hands clean.
b. Knock on the door and wait, if we are late.
c. Do not bring food and drinks.
d. Do not enter when there is no teacher.
e. Throw away candy or gum in the trash.
2. In the laboratory, we:
a. Do not run.
b. Do not bang on the equipment.
c. Do not bump into other students, chairs, and tables.
d. Do not touch other student’s monitor, keyboard, or mouse.
e. Stay in our assigned seat.
3. During instruction, we:
a. Do not start any program until the teacher says so.
b. Follow instructions and stay on the task.
c. Respect the files of other students.
d. Do not download any files or programs into our computers.
e. Do not change the settings of our computers.
4. At the end of the period, we:
a. Save our works promptly.
b. Close all programs and log off or shut down properly.
c. Straighten up the keyboard and the mouse.
d. Keep the chairs in line.
e. Leave the room quietly.
Name: Date:
Grade: Subject: ICT
Activity 1
Create Folders
Create a folder in your desktop, and rename it as Vacations. Create
subfolders inside Vacations, and name with the places you have been to.
Use the outline below:
1. Vacations
1.1 Place One
1.2 Place Two
1.3 Place Three
Attached your screenshot photo.
Activity 2
Encircle Yes or No
Encircle YES if the statement follows computer laboratory rules.
Encircle NO if it does not.
YES NO 4. You enter the computer laboratory early so you can enjoy the
air conditioning.
YES NO 5. You do not bring food and drinks inside the computer
laboratory.
YES NO 7. You keep the chairs in line before you leave the computer
laboratory.
YES NO 8. You need to see the time so you use it as your wallpaper.
YES NO 10. You clean dirty and sticky keys with soap and water.
ICT
Lesson 2
Learning File Management
• While we work using some MS Office applications, we will be asked
what file name we wish to save our files as and where to save them.
• The Save As option in the File menu can help us assign a file name
for our work, and the Browse folder section can help us find a place
to save our file.
File Management
• Is the sorting, naming and maintaining of computer files. It aims to
organize and classify computer data to remove unwanted files.
Folder Creation
• 1. Right-click a blank space on the desktop. This will display Desktop
options where new folders can be created.
• 2. Choose New to create a new folder.
• 3. Rename the new folder with the name we plan to use.
Subfolder Creation
• Are created in a similar manner, but this time, we right-click inside the
main folder to activate the options, and follow the same steps in
creating a folder.
Name: Date:
Grade: Subject: ICT
Activity 1
Name the Special Characters
Name the special characters below. Write your answers on the lines.
1. {} __________
2. & __________
3. # __________
4. @__________
5. ^ __________
6. () __________
7. : ___________
8. ! ___________
9. % __________
10. <> _____
Activity 2
Change the File Names
1. Given the file names on the left, convert the file names based on the
required format with your partner. You may change the file name
itself.
2. Write the new file names in the boxes.
Activity 3
Check the Good File Names
Put a check inside the box that shows a good file name.
1.EnglishHW1
2.I<3 Computers
3.#MyBestWork
4.MyReportontheEffectsofTooMuchComputerUse
5.MathReviewer-Qtr3
6.CuTi3~P@tOoti3h
7.CuddlingwithDogs
8.Computer_Project
9.Out1nGwit#fri3nd$
10.MyPlaylist
Lesson 3
Recognizing Computer Threats
• Malware is short for malicious software. It is a code created with
malicious intent. It is designed to damage, destroy, steal, or inflict bad
action on data, hosts, or networks.
Types of Malware:
• 1. A computer virus is a type of malware that propagates by inserting
a copy of itself and becoming part of another program.
• It spreads from one computer to another, leaving infections as it
travels. Some viruses overwrite other programs with copies of
themselves that destroy the host program altogether.
Activity 1
Identify Browser Logos
Identify the images shown below. Write your answers on the lines.
1. _____________________
2. ______________________
3. ____________________
Activity 2
Finish the Statement
Write the word on the line that best fits as an ending for each
sentence.
1. A stand-alone program that replicates copies of itself and destroys
the host program is called a __________________.
2. A type of malware named after a wooden horse is called a
_________________.
3. The short term for malicious code is ___________________.
4. A loaded and activated software that attacks its host is called a
_________________.
5. A type of malware that inserts a copy of itself and becomes part of
another program is called a _______________.