Ict 4 Lesson 1 Being Healthy and Safe When Using Computers Uses of Computers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

ICT 4

Lesson 1
Being Healthy and Safe When Using Computers
Uses of Computers
Computers can be used in a lot of ways. They are used in education, health
and medicine, recreation and entertainment, and government.
Computers are used in education to get information. Education has also
evolved into using the Internet for mobile learning.
Computers are also used in the field of medicine. Information now can be
digitized, and electronic devices to help patients have been developed.
People who are hard of hearing can now have hearing instruments that can
be adjusted to precise measurements using computers.
The field of recreation and entertainment has also been penetrated by
computers. Movies can be created with the help of software imaging.
The government also uses computer. Records are computerized for faster
transactions. Traffic control is also done using computers.
Bad Habits Prevention
People spend a lot of time in front of their computers. Their bodies are
physically stressed without them even knowing it. They acquire bad habits
when working in front of their machines. These bad habits can cause
injuries and pain. How can we avoid these bad habits?
Here are some practices to help keep us healthy while using our
computers.
1. Arrange our workstation regularly.
2. Modify our body mechanics.
3. Move
4. Exercise while we work.
Computer Laboratory Rules
1. Before entering the Laboratory, we:
a. Keep our hands clean.
b. Knock on the door and wait, if we are late.
c. Do not bring food and drinks.
d. Do not enter when there is no teacher.
e. Throw away candy or gum in the trash.
2. In the laboratory, we:
a. Do not run.
b. Do not bang on the equipment.
c. Do not bump into other students, chairs, and tables.
d. Do not touch other student’s monitor, keyboard, or mouse.
e. Stay in our assigned seat.
3. During instruction, we:
a. Do not start any program until the teacher says so.
b. Follow instructions and stay on the task.
c. Respect the files of other students.
d. Do not download any files or programs into our computers.
e. Do not change the settings of our computers.
4. At the end of the period, we:
a. Save our works promptly.
b. Close all programs and log off or shut down properly.
c. Straighten up the keyboard and the mouse.
d. Keep the chairs in line.
e. Leave the room quietly.
Name: Date:
Grade: Subject: ICT

Activity 1
Create Folders
Create a folder in your desktop, and rename it as Vacations. Create
subfolders inside Vacations, and name with the places you have been to.
Use the outline below:
1. Vacations
1.1 Place One
1.2 Place Two
1.3 Place Three
Attached your screenshot photo.

Activity 2
Encircle Yes or No
Encircle YES if the statement follows computer laboratory rules.
Encircle NO if it does not.

YES NO 1. You stay in your assigned seat.

YES NO 2. You straighten up your mouse and keyboard before you


leave the computer laboratory.

YES NO 3. You start a program whenever you are ready.

YES NO 4. You enter the computer laboratory early so you can enjoy the
air conditioning.
YES NO 5. You do not bring food and drinks inside the computer
laboratory.

YES NO 6. You change the wallpaper to display nice scenery.

YES NO 7. You keep the chairs in line before you leave the computer
laboratory.

YES NO 8. You need to see the time so you use it as your wallpaper.

YES NO 9. You close all programs and log off properly.

YES NO 10. You clean dirty and sticky keys with soap and water.
ICT
Lesson 2
Learning File Management
• While we work using some MS Office applications, we will be asked
what file name we wish to save our files as and where to save them.
• The Save As option in the File menu can help us assign a file name
for our work, and the Browse folder section can help us find a place
to save our file.

Good File Names versus Bad File Names


• Good File Names help us easily find the file we need. It should tell us
what the file is about even before we open the file.
• Bad File Names cause delay and confusion.
Good File Names Creation
• 1. File names must be specific.
• 2. Do not make the names too long.
• 3. Avoid using special characters like : ~!@#$%*()/:”<>
• 4. Do not use spaces. Use underscores, dashes, no spaces, or
Camel case instead.
• A. Underscores (e.g., file_name)
• B. Dashes (e.g., file-name)
• C. No spaces (e.g., filename)
• D. Camel case- The first letter of each word is capitalized, with no
spaces in between words (e.g., FileName)

File Management
• Is the sorting, naming and maintaining of computer files. It aims to
organize and classify computer data to remove unwanted files.

Folder Creation
• 1. Right-click a blank space on the desktop. This will display Desktop
options where new folders can be created.
• 2. Choose New to create a new folder.
• 3. Rename the new folder with the name we plan to use.

Subfolder Creation
• Are created in a similar manner, but this time, we right-click inside the
main folder to activate the options, and follow the same steps in
creating a folder.
Name: Date:
Grade: Subject: ICT

Activity 1
Name the Special Characters
Name the special characters below. Write your answers on the lines.
1. {} __________
2. & __________
3. # __________
4. @__________
5. ^ __________
6. () __________
7. : ___________
8. ! ___________
9. % __________
10. <> _____

Activity 2
Change the File Names
1. Given the file names on the left, convert the file names based on the
required format with your partner. You may change the file name
itself.
2. Write the new file names in the boxes.

File Name New Format


a. Letter to my parents Camel case

b. My class schedule for Underscores


the 1st quarter

c. First Holy Communion, Dashes


August 2018

d. Computer subject for No spaces


Grade 4 students

Activity 3
Check the Good File Names
Put a check inside the box that shows a good file name.
1.EnglishHW1
2.I<3 Computers
3.#MyBestWork
4.MyReportontheEffectsofTooMuchComputerUse
5.MathReviewer-Qtr3
6.CuTi3~P@tOoti3h
7.CuddlingwithDogs
8.Computer_Project
9.Out1nGwit#fri3nd$
10.MyPlaylist
Lesson 3
Recognizing Computer Threats
• Malware is short for malicious software. It is a code created with
malicious intent. It is designed to damage, destroy, steal, or inflict bad
action on data, hosts, or networks.
Types of Malware:
• 1. A computer virus is a type of malware that propagates by inserting
a copy of itself and becoming part of another program.
• It spreads from one computer to another, leaving infections as it
travels. Some viruses overwrite other programs with copies of
themselves that destroy the host program altogether.

• 2. A computer worm is similar to computer virus in the sense that it


replicates copies of itself and causes the same type of damage.
• Unlike a virus, a worm is a stand-alone software and does not require
a host program to spread. It enters a computer and takes advantage
of file-transport or informational transport features on the system that
allows it to travel on its own.

• 3. A Trojan is another type of malware that was named after the


wooden horse that the Greeks used to infiltrate the city of Troy.
• It is a software that looks real, but it activates and attacks the host
when loaded. It irritates the user with pop-ups, deletes files, steals
data, and spreads viruses.
Name: Date:
Grade: Subject: ICT

Activity 1
Identify Browser Logos
Identify the images shown below. Write your answers on the lines.

1. _____________________

2. ______________________

3. ____________________

Activity 2
Finish the Statement
Write the word on the line that best fits as an ending for each
sentence.
1. A stand-alone program that replicates copies of itself and destroys
the host program is called a __________________.
2. A type of malware named after a wooden horse is called a
_________________.
3. The short term for malicious code is ___________________.
4. A loaded and activated software that attacks its host is called a
_________________.
5. A type of malware that inserts a copy of itself and becomes part of
another program is called a _______________.

Prepared by: Teacher Nurunnihma J. Amat

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy