Common Competency-Perform Computer Operations

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 100

Common Competency: Perform Computer Operations

Table of Contents
MODULE CONTENT ........................................................................................................................................................ 5
LEARNING EXPERIENCES ........................................................................................................................................... 6
LEARNING OUTCOME 1: Requirements of task are determined ............................................................... 6
INFORMATION SHEET 3.1 -1 MAIN TYPES OF COMPUTER ........................................................................ 7
HISTORY OF COMPUTERS ...................................................................................................................................... 7
What are the Different Types of Computers? ................................................................................................ 7
Desktop Computers................................................................................................................................................ 8
Laptop Computers .................................................................................................................................................. 8
Types of Personal Computers ............................................................................................................................ 9
Other Types of Computers .................................................................................................................................. 9
SELF CHECK 3.1-1 ....................................................................................................................................................... 10
ANSWER KEY 3.1-1 ...................................................................................................................................................... 10
INFORMATIONS SHEET No. 3.1-2 ......................................................................................................................... 11
INFO2 APPROPRIATE HARDWARE AND SOFTWARE IS SELECTED ...................................................... 11
PARTS OF THE COMPUTER ................................................................................................................................. 11
System Unit ................................................................................................................................................................. 11
Storage ........................................................................................................................................................................... 12
Hard Disk Drive...................................................................................................................................................... 12
CD and DVD drives ............................................................................................................................................... 12
Floppy Disk Drive ................................................................................................................................................. 13
Mouse ......................................................................................................................................................................... 13
Monitor ...................................................................................................................................................................... 15
Printer ........................................................................................................................................................................ 15
Speakers .................................................................................................................................................................... 15
Modem ....................................................................................................................................................................... 16
MAIN PARTS OF A COMPUTER ........................................................................................................................... 16
There are two basic common types for Computer Casing or chassis: .............................................. 17
STANDARD COMPUTER BOX LAYOUT ............................................................................................................ 18
CPU .............................................................................................................................................................................. 18
Most Common DRAM used in PC’s are: .......................................................................................................... 20
Graphics Card ......................................................................................................................................................... 21
Sound Card............................................................................................................................................................... 22
Network Card .......................................................................................................................................................... 22
Common Competency: Perform Computer Operations

STORAGE DEVICES.................................................................................................................................................. 28
Different RAM Types and its uses ..................................................................................................................... 29
PRINTER ....................................................................................................................................................................... 30
Processing .................................................................................................................................................................... 35
Output Devices........................................................................................................................................................... 37
Input and Output ...................................................................................................................................................... 37
SUPPORT HARDWARE ............................................................................................................................................ 40
SELF CHECK 3.1-2 ....................................................................................................................................................... 42
ANSWER KEY 3.1-2 ...................................................................................................................................................... 42
INFORMATIONS SHEET No. 3.1-3 ......................................................................................................................... 43
Info3 Task Is Planned to Ensure OH & S Guidelines and Procedures are Followed ...................... 43
Common Types of Computer Software............................................................................................................ 43
Programming Program Or Programming Languages.................................................................................. 44
OTHER TYPES OF SOFTWARE............................................................................................................................ 44
GENERAL SECURITY, PRIVACY LEGISLATION AND COPYRIGHT....................................................... 45
Software Assurance .................................................................................................................................................. 46
SELF CHECK 3.1-3 ....................................................................................................................................................... 48
ANSWER KEY 3.1-3 ...................................................................................................................................................... 48
INFORMATIONS SHEET No. 3.1-4 ......................................................................................................................... 49
DIFFERENT PARTS OF A COMPUTER KEYBOARD ........................................................................................ 49
Numeric Keypad .................................................................................................................................................... 49
Navigation Keys ..................................................................................................................................................... 49
Typewriter Keyboard ........................................................................................................................................... 50
Special Keys ............................................................................................................................................................ 50
KEYBOARD BASICS.................................................................................................................................................. 50
INSIDE THE KEYBOARD ........................................................................................................................................ 51
THE MAGIC BEHIND KEYBOARDING ................................................................................................................. 4
General keyboard shortcuts: .............................................................................................................................. 5
Dialog Box Keyboard Shortcuts ........................................................................................................................ 6
Microsoft Natural Keyboard Shortcuts .......................................................................................................... 7
Accessibility Keyboard Shortcuts.................................................................................................................... 7
Windows Explorer Keyboard Shortcuts ......................................................................................................... 7
Shortcut Keys For Character Map ................................................................................................................... 7
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts ................................. 8
Microsoft Internet Explorer Navigation ........................................................................................................ 8
Common Competency: Perform Computer Operations

SELF CHECK 3.1-4 ....................................................................................................................................................... 11


ANSWER KEY 3.1-4 ...................................................................................................................................................... 11
LO2. INPUT DATA INTO COMPUTER .................................................................................................................... 12
Input Data into the Computer ................................................................................................................................ 12
INFORMATIONS SHEET No. 3.2-1 ......................................................................................................................... 13
INPUT DATA INTO THE COMPUTERS .................................................................................................................. 13
Input Device ................................................................................................................................................................ 13
Types of input devices ............................................................................................................................................ 13
4 Data Input Methods, Media and Devices .................................................................................................... 14
Aims of Data Collection ..................................................................................................................................... 14
Problems of Collecting Data ............................................................................................................................. 15
The Main Methods of Data Input ................................................................................................................... 15
SELF CHECK 3.2-1 ....................................................................................................................................................... 16
ANSWER KEY 3.2-1 ...................................................................................................................................................... 16
LEARNING EXPERIENCES ......................................................................................................................................... 17
LEARNING OUTCOME 3 – PRODUCE/OUTPUT DATA USING COMPUTER SYSTEM ........................ 17
INFORMATION SHEET NO 3.3-1 ............................................................................................................................ 18
Application ................................................................................................................................................................... 18
SELF-CHECK 3.3-1 ....................................................................................................................................................... 19
ANSWER SHEET 3.3-1 ................................................................................................................................................ 20
INFORMATION SHEET NO 3.3-2 ............................................................................................................................ 21
Learning objective: ................................................................................................................................................... 21
SELF-CHECK 3.3-2 ....................................................................................................................................................... 23
ANSWER SHEET 3.3-2 ................................................................................................................................................ 24
INFORMATION SHEET NO 3.3-3 ............................................................................................................................ 25
Desktop icons are correctly selected, opened and closed for navigation purposes.................... 25
Learning objective: ................................................................................................................................................... 25
SELF CHECK 3.3-3 ....................................................................................................................................................... 26
INFORMATION SHEET NO 3.3-4 ............................................................................................................................ 27
Keyboard techniques are carried out in line with OH & S requirements for safe use of
keyboards ..................................................................................................................................................................... 27
Learning objective: ................................................................................................................................................... 27
TASK SHEET 3.3-4 ....................................................................................................................................................... 28
LEARNING EXPERIENCES ......................................................................................................................................... 29
LEARNING OUTCOME 4 – PRODUCE/OUTPUT DATA USING COMPUTER SYSTEM ........................ 29
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.4-1 ............................................................................................................................ 30


SELF-CHECK 3.4-1 ....................................................................................................................................................... 31
ANSWER KEY 3.4-1 ...................................................................................................................................................... 31
INFORMATION SHEET NO 3.4-2 ............................................................................................................................ 32
Data are printed out as required using computer hardware/peripheral devices in accordance
with standard operating procedures ................................................................................................................ 32
Learning objective: ................................................................................................................................................... 32
Introduction ................................................................................................................................................................ 32
SELF-CHECK 3.4-2 ....................................................................................................................................................... 34
ANSWER KEY 3.4-2 ...................................................................................................................................................... 34
INFORMATION SHEET NO 3.4-3 ............................................................................................................................ 35
Files and data are transferred between compatible systems using computer software,
hardware/ peripheral devices in accordance with standard operating procedures .................... 35
Learning objective: ................................................................................................................................................... 35
Data Transfer Method ............................................................................................................................................. 35
TASK SHEET 3.4-3 ....................................................................................................................................................... 36
LEARNING EXPERIENCES ......................................................................................................................................... 37
LEARNING OUTCOME 5 – MAINTAIN COMPUTER EQUIPMENT AND SYSTEMS ............................... 37
INFORMATION SHEET NO 3.5-1 ............................................................................................................................ 38
SELF-CHECK 3.5-1 ....................................................................................................................................................... 40
ANSWER SHEET 3.5-1 ................................................................................................................................................ 41
INFORMATION SHEET NO 3.5-2 ............................................................................................................................ 42
Learning objective: ................................................................................................................................................... 42
SELF CHECK 3.5-2 ....................................................................................................................................................... 44
ANSWER SHEET 3.5-2 ................................................................................................................................................ 44
INFORMATION SHEET NO 3.5-3 ............................................................................................................................ 45
Basic file maintenance procedures are implemented in line with the standard operating
procedures.................................................................................................................................................................... 45
Learning objective: ................................................................................................................................................... 45
TASK SHEET 3.5-3 ....................................................................................................................................................... 47
INFORMATION SHEET NO 3.5-4 ............................................................................................................................ 48
Document systems are maintained .................................................................................................................. 48
Learning objective: ................................................................................................................................................... 48
SELF-CHECK 3.5-4 ....................................................................................................................................................... 49
ANSWER SHEET 3.5-4 ................................................................................................................................................ 49
Common Competency: Perform Computer Operations

MODULE CONTENT

UNIT OF COMPETENCY: PERFORM COMPUTER OPERATIONS


MODULE TITLE: PERFORM COMPUTER OPERATIONS
INTRODUCTION:

This unit of competency deals with the knowledge, skills and attitudes in providing effective
customer service. It includes greeting customer, identifying customer needs, delivering service to
customer, handling queries through use of common business tools and technology and handling
complaints, evaluation and recommendation.
NOMINAL DURATION:
LEARNING OUTCOMES:

 Plan and prepare for task to be undertaken


 Input data into computer
 Access information using computer
 Produce/output data using computer system
 Maintain computer equipment and systems
Common Competency: Perform Computer Operations

LEARNING EXPERIENCES

LEARNING OUTCOME 1: Requirements of task are determined


Learning Activities Special Instructions

1. Read information sheet 3.1-1 If you have some problem on the content of the
Customers are greeted in line with enterprise information sheet don’t hesitate to approach
procedure your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self-check provided in the module
2. Answer self-check 3.1-1 Refer your answer to answer key 3.1-1
3. Read information sheet 3.1-2 If you have some problem on the content of the
Verbal and non-verbal communications are information sheet don’t hesitate to approach
appropriate to the given situation your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self-check provided in the module.
4. Answer self-check 3.1-2 Refer your answer to answer key 3.1-2
5. Read information sheet 3.1-3 If you have some problem on the content of the
Nonverbal communication are observed when information sheet don’t hesitate to approach
responding to customer your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self-check provided in the module
6. Answer self-check 3.1-3 Refer your answer to answer key 3.1-3
Common Competency: Perform Computer Operations

INFORMATION SHEET 3.1 -1


MAIN TYPES OF COMPUTER

Learning Objective:
After reading this information sheet, you must be able to:
1. Determine different types of computers.
2. Determine part of the computer

HISTORY OF COMPUTERS
ABACUS It could rightly be called the first mechanical computing device. It was used as far
back as 2,600 B.C and is still used today.

The first mechanical calculating machine that was developed by Blaise Pascal in the
PASCALINE early 1600s. This device could add and subtract. Later Gottfried von Leibnitz
developed a calculator that could also multiply and divide.

AUTOMATED LOOM This was invented by weaver Joseph Jacquered in LOOM the early 1800s that uses
punched cards to record data.

This is where modern computer history began. This machine was proposed by
DIFFERENCE ENGINE Charles Babbage in ENGINE the 1800s which bears the resemble of today’s
computers which is capable of computing and at the same time print results.

ELECTROMECANICAL The American chapter of computer history began when Herman Hollerith
successfully completed his tabulating machine for the Census Bureau in 1890.
ENGINE

ELECTRONIC John Anatasoff is generally credited with building the first electronic computer as
lowa State University.
COMPUTER

Was developed by Howard Aiken with the help of IBM, is the first large-scale,
MARK I
general-purpose, electromechanical computer. It was completed in 1994.

This was the world’s first large-scale electronic digital computer which was
ENIAC developed by J. Presper Eckert and John Mauchly in 1946. This computer is
designed to calculate missile trajectories.
Was later developed by mathematician John von Neuman in the 1940s which runs
EDSAC and EDVAC
in the concept of stored programs.

This is the first commercial computer which was completed and delivered to the
UNIVAC
U.S. Census Bureau in 1951.

What are the Different Types of Computers?

There are many types of computers, but personal computers such as desktop and laptop
computers are probably the two type of computers that you think of first.
Common Competency: Perform Computer Operations

Desktop Computers

Example Desktop Computer

Many people use desktop computers, or desktops as they are often referred to, at work, home,
school, or the library. They can be small, medium, or large in style, and usually sit on a desk. The
term desktop actually refers to the casing, or the tower. Once you add a monitor, mouse, and a
keyboard, you have what is typically known as a desktop computer.

Most desktop computers are easy to upgrade and expand, or add new parts. In addition to
expandability, another benefit of desktop computers is the cost. If you compare a desktop computer
with 128 MB of RAM and a 2 GB hard drive to a laptop with the same features, you will most likely
find that the desktop computer is priced lower.
The term desktop computer originated when the computer case was wide and flat, and was
designed specifically to fit on your desktop with the monitor on top.

Laptop Computers

Example Laptop Computer


The second type of computer that you may be familiar with is a laptop computer, or laptops as
they are often referred to. Laptops are battery or AC-powered personal computers that can be easily
carried and used in a variety of locations.

A quick glance at the size of a laptop and you might guess that it would be difficult to expand or
upgrade. While the desktop computer case is relatively easy to open and access internal
components, the small laptop case makes this more difficult in comparison; however, the primary
benefit of a laptop computer is its small size and easy portability.
A laptop computer is sometimes called a notebook computer because of its size.
Common Competency: Perform Computer Operations

Types of Personal Computers

iMac all-in-one computer

Two popular types of personal computers are the IBM compatible and Macintosh computers. The
first personal computer was produced by IBM in 1981 and was called the IBM PC. In 1984, Apple
Computer introduced the Macintosh, or Mac, and it became the first widely sold personal computer
with a graphical user interface or GUI (pronounced gooey). Although both IBM and Apple computers
are personal computers, the term PC came to refer to IBM or IBM-compatible personal computers.

Apple now produces a Macintosh computer called the iMac, which is a desktop computer that
features an all-in-one design. This means all the internal components are located behind the
monitor, rather than in a tower case, which is customary in desktop computers.
While our training is intended for people who use PCs and the Windows operating system.

Other Types of Computers


You may hear someone refer to a computer as a workstation or a server, especially at work. You
may wonder how these two items are different from desktop computers.
Workstations are similar to desktop computers, but are more powerful and are usually connected
to a network. Servers are specialized computers that store and deliver, or “serve up,” information to
other computers on a network.
There are many different types of servers such as file servers, database servers, and web servers.
For example, employees at a company might store all the business documents on a file server so
that they can share files and access then from any computer on the network. When you use your
browser to click a link, a web server delivers the page you requested on the Internet, the biggest
network in the world.
Common Competency: Perform Computer Operations

SELF CHECK 3.1-1

Write TRUE if the statement is correct and FALSE if the statement is incorrect and write your
answers in the space provided for.

1. Abacus it could rightly be called the first mechanical computing device.

2. Desktop computer originated when the computer case was wide and flat, and
was designed specifically to fit on your desktop with the monitor on top.

3. Pascaline The first mechanical calculating machine. Developed a calculator that


could also multiply and divide.

4. Workstations are similar to desktop computers, but are more powerful and are
usually connected to a network.

5. MARK I This is the first commercial computer which was completed and delivered
to the U.S. Census Bureau in

ANSWER KEY 3.1-1

1. TRUE
2. TRUE
3. TRUE
4. TRUE
5. FALSE
Common Competency: Perform Computer Operations

INFORMATIONS SHEET No. 3.1-2

INFO2 APPROPRIATE HARDWARE AND SOFTWARE IS


SELECTED

Learning Objective:
After reading this information sheet, you must be able to:
1. Determine hardware and software of the computer.

PARTS OF THE COMPUTER


If you use a desktop computer, you might already know that there isn't any single part called the
"computer." A computer is really a system of many parts working together. The physical parts,
which you can see and touch, are collectively called hardware. (Software, on the other hand, refers
to the instructions, or programs, that tell the hardware what to do.)
The illustration below shows the most common hardware in a desktop computer system. Your
system may look a little different, but it probably has most of these parts. A laptop computer has
similar parts but combines them into a single notebook-sized package.

System Unit
The system unit is the core of a computer system. Usually it's a rectangular box placed on or
underneath your desk. Inside this box are many electronic components that process information.
The most important of these components is the central processing unit (CPU), or microprocessor,
which acts as the "brain" of your computer. Another component is random access memory (RAM),
which temporarily stores information that the CPU uses while the computer is on. The information
stored in RAM is erased when the computer is turned off.
Almost every other part of your computer connects to the system unit using cables. The cables plug
into specific ports (openings), typically on the back of the system unit. Hardware that is not part of
the system unit is sometimes called a peripheral device or device.
Common Competency: Perform Computer Operations

Storage
Your computer has one or more disk drives—devices that store information on a metal or plastic
disk. The disk preserves the information even when your computer is turned off.

Hard Disk Drive


Your computer's hard disk drive stores information on a hard disk, a rigid platter or stack of
platters with a magnetic surface. Because hard disks can hold massive amounts of information,
they usually serve as your computer's primary means of storage, holding almost all of your
programs and files. The hard disk drive is normally located inside the system unit.

CD and DVD drives


Nearly all computers today come equipped with a CD or DVD drive, usually located on the front of
the system unit. CD drives use lasers to read (retrieve) data from a CD, and many CD drives can
also write (record) data onto CDs. If you have a recordable disk drive, you can store copies of your
files on blank CDs. You can also use a CD drive to play music CDs on your computer.
Common Competency: Perform Computer Operations

DVD drives can do everything that CD drives can, plus read DVDs. If you
have a DVD drive, you can watch movies on your computer. Many DVD
drives can record data onto blank DVDs.

Tip

If you have a recordable CD or DVD drive, periodically back up (copy) your important files to CDs or
DVDs. That way, if your hard disk ever fails, you won't lose your data.

Floppy Disk Drive

Floppy disk drives store information on floppy disks, also called floppies or diskettes.
Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also
retrieve information more slowly and are more prone to damage. For these reasons, floppy
disk drives are less popular than they used to be, although some computers still include
them.

Why are floppy disks "floppy"? Even though the outside is made of hard plastic, that's just
the sleeve. The disk inside is made of a thin, flexible vinyl material.

Mouse

A mouse is a small device used to point to and select items on your computer screen. Although mice
come in many shapes, the typical mouse does look a bit like an actual mouse. It's small, oblong,
and connected to the system unit by a long wire that resembles a tail. Some newer mice are
wireless.
Common Competency: Perform Computer Operations

A mouse usually has two buttons: a primary button (usually the


left button) and a secondary button. Many mice also have a wheel between the two buttons, which
allows you to scroll smoothly through screens of information.

When you move the mouse with your hand, a pointer on your screen moves in the same direction.
(The pointer's appearance might change depending on where it's positioned on your screen.) When
you want to select an item, you point to the item and then click (press and release) the primary
button. Pointing and clicking with your mouse is the main way to interact with your computer. For
more information, see Using your mouse.

Keyboard

A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it
has keys for letters and numbers, but it also has special keys:

The function keys, found on the top row, perform different functions depending on where they are
used.
The numeric keypad, located on the right side of most keyboards, allows you to enter numbers
quickly.
The navigation keys, such as the arrow keys, allow you to move your position within a document or
webpage.

You can also use your keyboard to perform many of the same tasks you can perform with a
mouse. For more information, see Using your keyboard.
Common Competency: Perform Computer Operations

Monitor
A monitor displays information in visual form, using text and graphics. The portion of the monitor
that displays the information is called the screen. Like a television screen, a computer screen can
show still or moving pictures.

There are two basic types of monitors: CRT (cathode ray tube)
monitors and LCD (liquid crystal display) monitors. Both types
produce sharp images, but LCD monitors have the advantage of
being much thinner and lighter. CRT monitors, however, are
generally more affordable.

Printer

A printer transfers data from a computer onto paper. You don't need a printer to use your
computer, but having one allows you to print e-mail, cards, invitations, announcements, and other
materials. Many people also like being able to print their own photos at home.

The two main types of printers are inkjet printers and laser printers. Inkjet printers are the most
popular printers for the home. They can print in black and white or in full color and can produce
high-quality photographs when used with special paper. Laser printers are faster and generally
better able to handle heavy use.

Speakers

Speakers are used to play sound. They may be built into the system unit or connected with cables.
Speakers allow you to listen to music and hear sound effects from your computer.
Common Competency: Perform Computer Operations

Computer speakers

Modem

To connect your computer to the Internet, you need a modem. A modem is a


device that sends and receives computer information over a telephone line or
high-speed cable. Modems are sometimes built into the system unit, but
higher-speed modems are usually separate components.

Cable modem

MAIN PARTS OF A COMPUTER


A typical PC contains the following hardware:
There are many other possible hardware components, such as a DVD, CD-RW, Zip drive or network
card. There are also many subcomponents of a PC, such as the cooling fan, printer port or reset
switch to name a few. This article focuses on the basic PC hardware. The hardware in the list above
is nearly universal to a basic PC.
What are the main components of my computer and what are their function. An important
question, also what should I be looking for in my computer's components, here I will explain the
main parts of a computer system and what each part does, and some examples of some good ones
to use.

Case + PSU

A computer case is what contains the entire computer's components, there will be space for drives,
add-in cards and the motherboard. In addition to this, space for the Power Supply Unit (PSU).
Common Competency: Perform Computer Operations

Depending on the size of motherboard that you have and the


need for space in your computer there are a variety of
computer case sizes to accommodate the computer's
components.

Things to consider are desk space, cooling, room for expansion


and cost. With these things in mind you should have no
problem selecting the correct case for your needs.

Listed below are the cases with the advantages and disadvantages of each, most cases cost more
the larger they get however very small cases are normally more expensive than the bigger ones!

Mini - Ideal for people who need a PC in a very small space, for the Micro ATX motherboards.
Advantages - Look cool, saves loads of space, added features. Disadvantages - Cost, little/no room
for expansion, problems of overheating with fast processors.
Slim line - Ideal for people who want a desktop computer, but dont want a huge box on their desk.
Advantages - Look cool, saves loads of space, added features. Disadvantages - Cost, little/no room
for expansion.

Desktop - Cheap case solution for a PC. Advantages - Cheap to buy, loads of room for expansion.
Disadvantages - They are big, take up desk space. Can have overheating problems if the internal
case design is poor.

Mini-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy,
loads of room for expansion. Disadvantages - Having it on the floor can make problems getting to
the drives and cables that are too short.
Midi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy,
loads of room for expansion. Disadvantages - Having it on the floor can make problems getting to
the drives and cables that are too short.
Maxi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy,
loads of room for expansion. Disadvantages - Having it on the floor can make problems getting to
the drives and cables that are too short.

There are two basic common types for Computer Casing or chassis:
 Tower Case – it is designed to stand vertically that will lessen the space being occupied. It
comes in three basic sizes: full, midi and mini.

 Desktop Case – it is designed horizontally which are usually used for office or home PCs. It
comes in two basic sizes: standard and slim line.
Common Competency: Perform Computer Operations

STANDARD COMPUTER BOX LAYOUT

CPU

The CPU or the Central Processing unit is the brain of the computer and the single most important
chip in the computer. Modern processors contain millions of transistors which are etched onto a
tiny square silicon called a die, which is about the with of a standard thumb.

The faster and better the processor the more quickly the
computer will execute commands, so your games will work faster
and your applications will work more quickly and more
responsively.
There are various chip producers the big two are Intel and AMD,
both work well, though the Intel chips still have a slight
advantage on floating point calculations.
Common Competency: Perform Computer Operations

Central Processing Unit (CPU) or Microprocessor - The CPU is


the first thing that comes to mind when many people think
about a computer's speed and performance. It is the “heart and
brain of the computer”. The faster the processor, the faster the
computer can think. In the early days of PC computers, all
processors had the same set of pins that would connect the CPU
to the motherboard, called the Pin Grid Array (PGA). These pins
fit into a socket layout called Socket 7. This meant that any
processor would fit into any motherboard.

Current socket arrangements are often named for the number of


pins in the PGA. Commonly used sockets are:

Socket LGA775 – For latest pentum 4, Pentum D, Series Core


Technologies
Socket 478 - for older Pentium and Celeron processors
Socket 754 - for AMD Sempron and some AMD Athlon
processors
Socket 939 - for newer and faster AMD Athlon processors
Socket AM2 - for the newest AMD Athlon processors
Socket A - for older AMD Athlon processors

With a processor, the faster the more expensive it is. Beware the price differences a lot for only a
small increase in performance, sometimes a clock speed increase of 0.2Ghz can cost £200 or more
extra
RAM
RAM or Random Access Memory is the memory used by the computer while it is in operation, this
memory is described as volatile as it is wiped clean when the computer is shutdown. Again the more
RAM that you have installed in your computer the faster the computer will operate.

There are various types of RAM, they vary becuase of the


increasing in processor speeds and the need for the RAM to keep
up.
You can get RAM modules in various sizes i.e. their logical sizes,
the amount of data they can hold. This range from 1MB, 2MB,
4MB, 8MB, 16MB, 32MB, 64MB, 128MB, 256MB, 512MB, 1GB,
2GB. Nowadays you will normally only find RAM in sizes of 128MB
or above.

SIMM or DIMM? The two main types of RAM are SIMM (Single Inline Memory Module) and DIMM
(Dual Inline Memory Module) all modern computers use the DIMM type of RAM.
There are 4 main types of RAM listed below and then within these there are even more types under
each of these main types.
Common Competency: Perform Computer Operations

The traditional RAM type is DRAM (dynamic RAM). The other type is SRAM (static RAM). SRAM
continues to remember its content, while DRAM must be refreshed every few milli seconds. DRAM
consists of micro capacitors, while SRAM consists of off/on switches. Therefore, SRAM can respond
much faster than DRAM. SRAM can be made with a rise time as short as 4 ns. It is used in different
versions in L2 cache RAM (for example pipe line BURST Cache SRAM).
DRAM is by far the cheapest to build. Newer and faster DRAM types are developed continuously.
Currently, there are at least four types:

 FPM (Fast Page Mode)


 ECC (Error Correcting Code)
 EDO (Extended Data Output)
 SDRAM (Synchronous Dynamic RAM)

Most Common DRAM used in PC’s are:

Synchronous Dynamic RAM (SDRAM)

1. Single Data Rate (SDR) SDRAM is a synchronous form of DRAM.

2. Double data rate (DDR) SDRAM was a later development of SDRAM, used in PC
memory from 2000 onwards. DDR2 SDRAM is a minor enhancement on DDR-SDRAM that
mainly affords higher clock speeds and somewhat deeper pipelining.

Motherboard The motherboard is the main circuit board inside the PC which holds the processor,
memory and expansion slots and connects directly or indirectly to every part of the PC. It's made up
of a chipset (known as the "glue logic"), some code in ROM and the various interconnections or
buses.

PC designs today use many different buses to link their various components. Wide, high-speed
buses are difficult and expensive to produce: the signals travel at such a rate that even distances of
just a few centimeters cause timing problems, while the metal tracks on the circuit board act as
miniature radio antennae, transmitting electromagnetic noise that introduces interference with
signals elsewhere in the system.
Common Competency: Perform Computer Operations

Shown below is an annotated diagram of the motherboard.

The move recently is the have as much as possible on the board so there is little need for PCI and
AGP expansion slots, i.e. you have onboard sound, graphics, LAN, modem, wireless LAN and even
SCSI and RAID.

Graphics Card
A video adapter (alternate terms include graphics card, display adapter, video card, video board and
almost any combination of the words in these terms) is an integrated circuit card in a computer or,
in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video
controller so that data can be sent to a computer's display. Today, almost all displays and video
adapters adhere to a common denominator de facto standard, Video Graphics Array (VGA). VGA
describes how data - essentially red, green, blue data streams - is passed between the computer
and the display.

There are 3 main types of graphics card, and are divided into
these types by the way that they connect to the motherboard.
They are listed below:

 PCI (Peripheral Component Interface) - This is the oldest


type of connection and thus the slowest, though
performance is not that great it does the job fine for
Windows non-graphics applications. Often the graphics
cards for PCI are very cheap.
 AGP (Accelerated Graphics Port) - With the need for faster
graphics a new connector was added to motherboard to
allow faster graphics. The graphics cards available for this
are vastly faster than PCI offering better performance,
though there is a price hike too.
 PCI-Express - A new and most expensive type of card that
fits into a PCI-Express slot on a motherboard that
supports it. The bandwidth to the card is much greater
and thus the performance of the card.

Monitor – an output device used for visual display of information.


If you are looking at your computer’s monitor for extended periods of time it is
important to find one which offers the maximum comfort for your eyes. The
Common Competency: Perform Computer Operations

trend with monitors is toward ever higher resolution with increased number of
colors.

The table shows the types of monitor and their comparative features in terms of
resolution, scanning rate and number of color.

TYPE OF Scanning
Resolution Color Palette
MONITOR Rate (KHz)
Monochrome
640 x 350 1 1 15.75
Composite
Color Composite 640 x 200 4 4 15.75
Monochrome (TTL) 720 x 350 1 1 18.40
RGA (CGA) 640 x 200 4 16 15.75
EGA 640 x 350 16 64 21.80
Multiscan 800 x 600 Unlimited Unlimited 15.5 to 35.0
PGA 640 x 480 Unlimited Unlimited 30
VGA 640 x 480 256 262.000 31.49
Super High 1200 x 800 + Varies Varies 30 to 75
LCD 1200 x 800 + Varies Varies 40 to 100
Touch Screen 1200 x 800 + Varies Varies 45 to 100

Sound Card
A type of expansion board on PC–compatible computers that allows the playback and recording of
sound, such as from a WAV or MIDI file or a music CD–ROM. Most PCs sold at retail include a
sound card.

Quite commonly now motherboards come with built on sound


cards, they seem to be perfectly useable, although some of the
older onboard sound cards are awful.

Any modern motherboard you should be okay with. If you want


extra performance you can buy a sound card, this fits in a spare
PCI slot.

Network Card
A network card allows you to connect your PC to a network, it acts as the interface between the
network medium (cable, radio waves etc.) and your PC. There are various types of network cable,
however now you will only really find UTP (Unshielded Twisted Pair) CAT 5/5e/6 and wireless
802.11a/b/g network cards.

Again most motherboards have built on Network Cards and they


are normally fine to use.
You can pick up a PCI network card for around £8 and up. Intel
or 3com cards seem to be the best and most stable in my
experience, though they do cost a bit more.
Common Competency: Perform Computer Operations

You can connect two PCs together with some network cable or more than two with a hub/switch to
which you connect more PCs, see my networking section about this.

LAN Card/Ethernet Card/Network Interface Card (NIC) – an expansion card inserted in the
computer to be connected into a network.

Wireless LAN PCI LAN Card ISA LAN Card


Card
Router – an internetworking devices that passes data packets between networks and makes
decision regarding the best path for delivery of data on a network.

Networking Media
RJ 45 Connector

UTP Cable (Unshielded Twisted Pair)

Modems - (which is short for modulator/demodulator) converts the digital data signal
of the PC into the analog data signal that is used on the plain old telephone system
(POTS) — which is also called the public telephone switched network (PTSN).

Modems can be installed inside the PC in an expansion slot, or they can be attached to
the PC externally through a serial or USB port. An internal modem is installed like any other
expansion card — into a compatible expansion slot.

Internal Modem External Modem

Hub or Switch – a common connection point of a network

Floppy Disk Drive

A floppy disk is a data storage device that comprises a circular piece of thin, flexible (hence "floppy")
magnetic storage medium encased in a square or rectangular plastic wallet. Floppy disks are read
Common Competency: Perform Computer Operations

and written by a floppy disk drive or FDD, not to be confused with "fixed disk drive", which is an old
IBM term for a hard disk drive.

Floppy disk drives use a small flat disk called a "diskette" the
information is stored on it magnetically.
There are various types of size of floppy disk, nowadays all you
will find are High Density 1.44MB 3.5" disks. Below is a list of
the various types of 3.5 Inch disks:

360KB - Single Density

720KB - Double Density

1.44MB - High Density

2.88MB - Ultra High Density

Floppy disks are on the way out, though they are still used when installing an OS on a computer,
though with bootable CD-ROMs even this use is on the way out it all seems to be going to CDs or
USB pen drives (also called a "Think Stick.")

Hard Disk Drive

This is a non-volatile storage medium, all modern PCs will have one if not more than one. A
magnetic disk that stores data. Usually a fixed disk, permanently sealed in the drive, though
possibly a removable hard disk. A hard disk can store a huge amount of data up to 400GB on one
disk. Access time is much faster than soft (floppy) disks. The head that reads the data floats over
the hard disk's surface, while the head of the floppy disk touches the disk's surface while reading or
writing data.

The main thing that differentiates drives from one another, other
than the size is the interface they use to connect to the PC.
The two main PC interfaces are SCSI and IDE (ATA) they are listed
below:

SCSI (Small Computer System Interface) most commonly found on


servers or Apple Macintoshes SCSI allows for the "daisy-chaining"
of up to 7 devices per bus. It has always had the image of being
faster, more expandable and more reliable though IDE keeps
getting better.

IDE (Integrated Drive Electronics) and ATA (AT Attachment) is what you will commonly need on
your PC for home or small office use a ATA drive is more than enough. It is cheaper to buy an ATA
drive and ATA/IDE drive controllers are built on to all motherboards as standard.

IDE drives are rated by ATA 33, ATA 66, ATA 100 and ATA 150 the larger the number the faster the
drive can transfer data.
Common Competency: Perform Computer Operations

Hard drives are one of the computer components that have plummeted in price over the years, now
you can get a 40GB drive for under £40.

Removable Storage Drive

Removable storage drives, things kind of like a removable hard disk became very popular but now
with the Internet and USB memory sticks they seem to have gone out of favour again. The Iomega
Zip drive was one of the most widely used, but suffered from the problem that the storage capacity
was small and the costs of the drive and media were expensive especially for the larger sizes.

Often these drives work by having a hard disk drive like


disk that is contained in a case so it can be removed easily
and transported protecting the disk and its contents.

A Iomega Zip Drive is around £80 and plugs into the USB port, nowdays to ensure there is no need
for a Zip Drive on the other computer you are moving data to, it just needs a USB port and away
you go!

CD Drive
CD-ROM drives are necessary today for most programs. A
single CD can store up to 650 MB of data (newer CD-Rs
allow for 700 MB of data, perhaps more with "overburn").
Fast CD-ROM drives have been a big topic in the past, but
all of today's CD-ROM drives are sufficiently fast. Of
course, it's nice to have the little bits of extra speed.
However, when you consider CD-ROM drives are generally
used just to install a program or copy CDs, both of which
are usually done rarely on most users' computers, the
extra speed isn't usually very important. The speed can
play a big role if you do a lot of CD burning at high speeds
or some audio extraction from audio CDs (i.e. converting
CDs to MP3s).

CD-Writer Drive

CD-R (which stands for Recordable) drives (aka burners, writers) allow a user to create their own
CDs of audio and/or data. These drives are great for backup purposes (backup your computer's
hard drive or backup your purchased CDs) and for creating your own audio CD compilations (not to
mention other things like home movies, multimedia presentations, etc.).
Common Competency: Perform Computer Operations

With a CD writer you can burn to a CD once, it works by


WORM (Write Once Read Many). You can make multiple
sessions on a disk so you can write a bit one day and a
bit more another up to the storage capacity. But unlike
CD-RW you can't erase it all and start again.

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Note some older drives will
not support 700MB/80Min discs.

CD-Writer & Re-Writer Drive

CD-R/RW (which stands for Recordable / Rewritable) drives (aka burners, writers) allow a user to
create their own CDs of audio and/or data. These drives are great for backup purposes (backup
your computer's hard drive or backup your purchased CDs) and for creating your own audio CD
compilations (not to mention other things like home movies, multimedia presentations, etc.).

With a CD-R/RW you can write to a CD then erase its


contents and rewrite over it all again.

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Remeber RW discs will not
always work in normal CD-Drives and rarely work in Audio CD Players.

DVD-ROM Drive

DVD-ROM drives can store up to 4 GB of data or about 6 times the size of a regular CD (not sure on
the exact size, but suffice to say it's a very large storage medium). DVDs look about the same and
are the same size as a CD-ROM. DVD drives can also read CD-ROM drives, so you don't usually
need a separate CD-ROM drive.

DVD drives have become low enough inprice that there


isn't much point in purchasing a CD-ROM drive instead
of a DVD-ROM drive. Some companies even make CD
burner drives that will also read DVDs (all in one).
DVD's most practical use is movies.

The DVD format allows for much higher resolution digital recording that looks much clearer than
VCR recordings.

DVD-Writer Drive

DVD recordable drives are available in a couple of different formats - DVD-R or DVD+R with a RW
version of each. These are slightly different discs and drives (although some drives support writing
to both formats). One is not much better than the other, so it really boils down to price of the media
(and also availability of the media).
Common Competency: Perform Computer Operations

You can fit up to 4.3GB on a single DVD disc, and now


some drives support multiple layers with 2 x 4.3GB i.e.
8.6GB per disc.

All the CD standards are a bit confusing so here is a table showing them, note that some of these
standards and the equipment built to them have gone the way of Betamax and the Dinosaurs.
Now a run down of each of the standards and what each one can do.

Standard Description

CD-ROM Compact Disc Read Only Memory - This is a disc that only allows for reading can store up to 650MB or 700MB.

Compact Disc Recordable - This disc allows for you to write once to a disc, i.e. you can erase it and start again. Stores up to
CD-R
650/700MB.

Compact Disc Rewritable - This disc allows for you to write many times on one disc, i.e. you can erase it and start again.
CD-RW
Stores up to 650/700MB.

DVD-ROM Digital Versatile/Video Disc - This disc only allows for reading can store up to 4.3GB.

Digital Versatile/Video Disc - Recordable -This disc allows for you to write once to a disc, i.e. you can erase it and start
DVD R+
again, can store up to 4.3GB. Note that one is plus and one minus you need to select the correct disc for your drive.

Digital Versatile/Video Disc - Recordable - This disc allows for you to write once to a disc, i.e. you can erase it and start
DVD R-
again, can store up to 4.3GB. Note that one is plus and one minus you need to select the correct disc for your drive.

Digital Versatile/Video Disc - Rewritable - This disc allows for you to write many times on one disc, i.e. you can erase it and
DVD RW+
start again. Stores up to 4.3GB. Note that one is plus and one minus you need to select the correct disc for your drive.

Digital Versatile/Video Disc - Rewritable - This disc allows for you to write many times on one disc, i.e. you can erase it and
DVD RW-
start again. Stores up to 4.3GB. Note that one is plus and one minus you need to select the correct disc for your drive.

Digital Versatile/Video Disc - Random Access Memory - DVD-RAM has the best recording features but it is not compatible
DVD-RAM
with most DVD-ROM drives and DVD-Video players. Think more of it as a removable hard disk.

Any comments or suggestions please mail me, I’ll try to update this page when I can, with more
useful information about computers and the like.
Common Competency: Perform Computer Operations

STORAGE DEVICES

USB Drive Floppy Disk Hard Disk Drive Other Storage


Devices

Digital audio tape can also refer to a compact cassette with digital storage.

Digital Audio Tape (DAT or R-DAT) is a signal recording and playback medium developed by Sony
in the mid 1980s. In appearance it is similar to a compact audio cassette, using 4 mm magnetic
tape enclosed in a protective shell, but is roughly half the size at 73 mm × 54 mm × 10.5 mm.

A hard disk drive[1] (often shortened as "hard disk"[2] or "hard drive"[3]), is a main storage device of
the computer or is a non-volatile storage device which stores digitally encoded data on rapidly
rotating platters with magnetic surfaces.

When installing two hard drives, it is necessary to check the jumper setting for the Master/Slave
configuration. The jumper pins for Master/Slave can be found between the power connector and
IDE ribbon cable connector. Every hard drive manufacturer has different pin configurations which
is found on the information pasted in the hard drive itself

 Master is used for the first hard drive


 Slave is for the second hard drive.
Common Competency: Perform Computer Operations

USB flash drive consists of a NAND-type flash memory data storage device integrated with a USB
(universal serial bus) interface. USB flash drives are typically removable and rewritable, much
smaller than a floppy disk (1 to 4 inches or 2.5 to 10 cm), and most USB flash drives weigh less
than an ounce (28g).[1] Storage capacities typically range from 64 MB to 128 GB[2] with steady
improvements in size and price per gigabyte. Some allow 1 million write or erase cycles[3][4] and have
10-year data retention,[5] connected by USB 1.1 or USB 2.0.

Different RAM Types and its uses

The type of RAM doesn't matter nearly as much as how much of it you've got, but using plain old
SDRAM memory today will slow you down. There are three main types of RAM: SDRAM, DDR and
Rambus DRAM.

SDRAM (Synchronous DRAM)


Almost all systems used to ship with 3.3 volt, 168-pin SDRAM DIMMs. SDRAM is not an extension
of older EDO DRAM but a new type of DRAM altogether. SDRAM started out running at 66 MHz,
while older fast page mode DRAM and EDO max out at 50 MHz. SDRAM is able to scale to 133 MHz
(PC133) officially, and unofficially up to 180MHz or higher. As processors get faster, new
generations of memory such as DDR and RDRAM are required to get proper performance.

DDR (Double Data Rate SDRAM)


DDR basically doubles the rate of data transfer of standard SDRAM by transferring data on the up
and down tick of a clock cycle. DDR memory operating at 333MHz actually operates at 166MHz * 2
(aka PC333 / PC2700) or 133MHz*2 (PC266 / PC2100). DDR is a 2.5 volt technology that uses 184
pins in its DIMMs. It is incompatible with SDRAM physically, but uses a similar parallel bus,
making it easier to implement than RDRAM, which is a different technology.

Rambus DRAM (RDRAM)


Despite it's higher price, Intel has given RDRAM it's blessing for the consumer market, and it will

be the sole choice of memory for Intel's Pentium 4. RDRAM is a serial memory technology that
arrived in three flavors, PC600, PC700, and PC800. PC800 RDRAM has double the maximum
throughput of old PC100 SDRAM, but a higher latency. RDRAM designs with multiple channels,
Common Competency: Perform Computer Operations

such as those in Pentium 4 motherboards, are currently at the top of the heap in memory
throughput, especially when paired with PC1066 RDRAM memory.

DIMMs vs. RIMMs


DRAM comes in two major form factors: DIMMs and RIMMS.

DIMMs are 64-bit components, but if used in a motherboard with a dual-channel configuration (like
with an Nvidia nForce chipset) you must pair them to get maximum performance. So far there aren't
many DDR chipset that use dual-channels. Typically, if you want to add 512 MB of DIMM memory
to your machine, you just pop in a 512 MB DIMM if you've got an available slot. DIMMs for SDRAM
and DDR are different, and not physically compatible. SDRAM DIMMs have 168-pins and run at 3.3
volts, while DDR DIMMs have 184-pins and run at 2.5 volts.

RIMMs use only a 16-bit interface but run at higher speeds than DDR. To get maximum
performance, Intel RDRAM chipsets require the use of RIMMs in pairs over a dual-channel 32-bit
interface. You have to plan more when upgrading and purchasing RDRAM.

DRAM

SDRAM

SIMM
PRINTER

Printer is an output device which is connected to computer to get permanent output. The output
of printer is also called Hard Copy. There are two types of printers (a) Impact printers (b) non-
impact printers.

The main categories are:


- Laser printers,
- Ink-jets,
- Dot-matrix,
- Multifunctional, etc.
Normally home computer users will use ink-jets as they are relatively cheap but superior in
quality to dot-matrix. Laser jets and other printers created by new technology are more expensive
and more commonly found in the offices.
Common Competency: Perform Computer Operations

Ink-jets(bubble-jets) printers spray ionized tiny drops of ink onto a page


to create an image. This is achieved by using magnetized plates which direct the ink's path onto
the paper in the desired pattern. Almost all ink-jets offer a color option as standard, in varying
degrees of resolution. Ink-jet printers are capable of producing high quality print which almost
matches the quality of a laser printer. A standard ink-jet printer has a resolution of 300 dots per
inch, although newer models have improved on that. As a rule color link-jet printers can also be
used as a regular black and white printer.

Laser printers operate by shining a laser beam to produce an image on a


drum. The drum is then rolled through a pool, or reservoir, or toner, and the electrically charged
portions of the drum pick up ink. Finally, using a combination of heat and pressure, the ink on
the drum is transferred onto the page. Laser printers print very fast, and the supply cartridges
work a long time. Color laser printers use the same toner-based printing process as black and
white ( B/W) laser printers, except that they combine four different toner colors. Color laser
printers can also be used as a regular black and white laser printer.

Flatbed Scanners

Flatbed scanners will take up some desktop space but provide a lot of bang for the
buck. They look like miniature printers with a flip-up cover protecting the glass platen. Depending
on their size, these can fit standard or legal-sized documents, and the flexible cover allows you to
scan large items such as books. These scanners are great for scanning the occasional newspaper
article, book chapter, or photograph; or for those who may need to scan or bulky items such as the
cover of a DVD. Flatbed scanners are often built into multifunction printers (MFPs). You can find
decent flatbed scanners for $100 or less.

Photo Scanners

Sheet fed scanners are smaller than flatbed scanners; as the name
implies, you feed a document or photo into the scanner rather than place it on top. You’ll win back
some of that desktop space with a sheet fed scanner but you may sacrifice some resolution in the
process. If you’re only scanning documents, however, it may be a worthwhile trade, especially if
Common Competency: Perform Computer Operations

you’ve got a lot of them since you can feed them in bunches. With a flatbed scanner, you’ll have to
scan one page at a time (unless it comes with an automatic document feeder).

Portable Scanners

Portable scanners are small enough to bring on the road. In fact, some are small enough to put in
your pocket; pen scanners are just a bit bigger than fountain pens and can scan the text of a
document line by line. Some are as wide as a page and roll easily down the page. They’re not going
to give high-resolution scans and so aren’t good for scanning photographs or other applications
where you need a high-quality result. Since they’re not cheaper than flatbed

scanners, they’re probably only useful if you are a student, a researcher, or a spy. Figure on
spending about $150 for one.

KEYBOARD
- is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of
buttons or keys, which act as mechanical levers or electronic switches. A keyboard typically has
characters engraved or printed on the keys and each press of a key typically corresponds to a single
written symbol. However, to produce some symbols requires pressing and holding several keys
simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs
(characters), other keys or simultaneous key presses can produce actions or computer commands.

Different types of computer keyboards:

ERGONOMIC: Often when someone refers to an "ergonomic", "split", or "natural" keyboard, they mean
the type of keyboard which has an empty area in between two sets of keys, which have a different
layout intended to be more ergonomic than typical keyboard types.

AT: The abbreviation "AT" can be used when referring to any keyboard made for AT-class (most
computers made since the mid-1990s) computers, including standard PS/2 keyboards. However, it is
most frequently used to describe keyboards with a large 5-pin connector; these fit some pre-Pentium
and Pentium I/II computers, but require an "AT-to-PS/2" adapter to be connected to most computers,
because they have a different (PS/2) jack.

USB: Some newer keyboards connect to a computer's USB port (a small rectangular port) rather than a
PS/2 port. This doesn't offer any great benefit, as humans can't possibly type fast enough to take
advantage of USB's faster data transmission speeds. Some older computers lack USB ports.
Common Competency: Perform Computer Operations

ADB: This refers to a different type of accessory port/jack on some Apple computers which ADB
keyboards can be connected to. For computer types which don't have an ADB port, adapters are
available which allow them to be plugged into a USB port.

XT: Keyboards referred to with the abbreviation "XT" can be used with some older
types of computers (8086/8088, XT-286) but won't work with most computers being used at present.
Many of them have fewer keys than modern keyboards. AT/XT keyboards are more versatile; they can
be used with both older and newer computers and usually have an AT/XT switch on the back. XT and
AT/XT keyboard types are more likely to have the larger, backward-"L" shaped "Enter" key, rather than
the smaller straight kind on many newer keyboards.

MOUSE

(Plural mouse’s, mice, or mouse devices) is a pointing device that functions by detecting
two-dimensional motion relative to its supporting surface. Physically, a mouse consists of an object
held under one of the user's hands, with one or more buttons. It sometimes features other
elements, such as "wheels", which allow the user to perform various system-dependent operations,
or extra buttons or features can add more control or dimensional input. The mouse's motion
typically translates into the motion of a pointer on a display, which allows for fine control of a
Graphical User Interface.

LO1 PERFORM COMPUTER OPERATIONS

JOB SHEET # 1

DEMONSTRATION: Configure all parts you see below, give exact location (you can draw or label its
components, peripherals, and equipment)

1 2 3 4
Common Competency: Perform Computer Operations

5 6 7 8

9 10 11 12

COMPONENTS OF A COMPUTER
In this lesson, we take a look at the different components of a computer system.

After this lesson, you will be able to


 Define the primary components that make up a computer

Estimated lesson time: 10 minutes


As you might expect, the components of a computer reflect the function of the machine—
specifically, the three stages of computing, as outlined in Lesson 1. Let's examine the
components.

Input Devices
The following table lists some examples of devices that are used to put information into a computer.
Device Description

Keyboard
The primary input device for a computer, allowing users to type information just as they once
did on a typewriter.

Mouse

Used with graphical interface environments to point to and select objects on the system's
monitor. Can be purchased in a variety of sizes, shapes, and configurations.

Scanner

Converts printed or photographic information to digital information that can be used by the
computer. Works similar to the scanning process of a photocopy machine.
Common Competency: Perform Computer Operations

Microphone

Works like the microphone on a tape recorder. Allows input of voice or music to be
converted to digital information and saved to a file.

CD-ROM/DVD drive

Compact disc–read only memory: stores large amounts of data on a CD that can be read by
a computer.

Processing

The central processing unit (CPU) is the heart and brain of the computer. This one component, or
"chip," is responsible for all primary number crunching and data management. It is truly the
centerpiece of any computer. It is so important that whole generations of computer technology are
based and measured on each "new and improved" version of the CPU.

When we refer to the CPU, we are usually speaking of the processor. However, the CPU requires
several other components that support it with the management of data to operate. These
components, when working in harmony, make up the primary elements of the PC we know today.
The following table lists these fundamental support components.

Component Description

Motherboard

The main circuit board of the computer. The large circuit board found inside the
computer. Without it, a computer is just a metal box. The motherboard contains all
the remaining items in this table; for all practical purposes, it is the computer.

A group of computer chips or integrated circuits (ICs) that, when working together,
Chip set manage and control the com- puter system. This set includes the CPU and other
chips that control the flow of data throughout the system.
Common Competency: Perform Computer Operations

Data bus

A group of parallel conductors (circuit traces) found on the motherboard and used by
the CPU to send and receive data from all the devices in the computer.

Address bus
A group of parallel conductors (circuit traces) found on the motherboard and used by
the CPU to "address" memory locations. Determines which information is sent to, or
received from, the data bus. An address bus is a computer bus (a series of lines
connecting two or more devices) that is used to specify a physical address. When a
processor or DMA-enabled device needs to read or write to a memory location, it
specifies that memory location on the address bus (the value to be read or written is
sent on the data bus).

Expansion slots

Specialized sockets that allow additional devices called expansion cards or, less
commonly, circuit boards, to be attached to the motherboard. Used to expand or
customize a computer, they are extensions of the computer's bus system.

Clock

Establishes the maximum speed at which the processor can execute commands.
Not to be confused with the clock that keeps the date and time.

Battery
Protects unique information about the setup of the computer against loss when
electrical power fails or is turned off. Also maintains the external date and time (not
to be confused with the CPU's clock).

Stores temporary information (in the form of data bits) that the CPU and software
Memory need to keep running.
Common Competency: Perform Computer Operations

Output Devices

The following table lists some common devices, known as peripherals, used exclusively for output.

Device Description

Printer
Generates a "hard copy" of information. Includes dot matrix, ink jet, and laser
varieties.

Monitor

The primary output device. Visually displays text and graphics.

Plotter
Similar to a printer, but uses pens to draw an image. Most often used with graphics
or drawing programs for very large drawings.

Speakers

Reproduce sound. Optional high-quality speakers can be added to provide improved


output from games and multimedia software.

Input and Output

Some devices handle both input and output functions. These devices are called input/output (I/O) devices, a
term you will encounter quite often.

Device Description

Floppy disk drive


Mechanism for reading and writing to low-capacity, removable, magnetic
disks. Used to store and easily transport information.
Common Competency: Perform Computer Operations

Hard disk drive

High-capacity internal (and sometimes external) magnetic disks for storing


data and program files. Also called fixed disks.

Modem

Converts computer data to information that can be transmitted over


telephone wires and cable lines. Allows communication between
computers over long and short distances.

Network card
An expansion card that allows several computers to connect to each other
and share information and programs. Also called network interface card
(NIC).

CD recorder Also called CD-R. You can copy data to a CD with this device, but you can
only write to a section of the disc once. Variations on this type of device
include compact disc–rewritable (CD-RW) drives. These drives allow you
to read, write, and overwrite a special CD-ROM-type disc.

Tape drive
Large-capacity, magnetic, data storage devices. Ideal for backup and
retrieval of large amounts of data. Works like a tape recorder and saves
information in a linear format.

Other external storage devices include Iomega Zip drives, which allow users to store 100 MB or 250
MB of data on a single Zip disk.
Other Computer Parts and Accessories

The following table lists some examples of cable that are used to communicate to a system.

Cable/ Cord Description

IDE (ATA/PATA Cable)


IDE is also known as ATA or PATA (Parallel ATA) and is a way of
handling a parallel data bus from a disk drive (well, usually a disk drive)
to a computer mother board where the disk controller is mostly
embedded in the disk drive.

SATA (Serial ATA) is an advance on this where the signals are sent
over a serial bus not a parallel bus. The cable is much smaller and it will
run at higher speed and will support more than 2 drives on a bus.
SATA/ATA

Note: They are both ways to connect a disk drive to a computer. You
Common Competency: Perform Computer Operations

use the one that matches your computer mother board (old ones
support IDE only, newer ones will support SATA and may support both
SATA and IDE) and your disk drive (disk drives are either IDE or SATA,
never seen one with both available).

USB Cable

USB cable is a cable that is used to connect a device to a computer or


laptop or Printer, Video cameras, Mp3, mp4 even cell phone.

A/V Cable

A/V cable is to use for connect a device to tv and it has the video and
audio cable.

Heat Sink
An environment capable of absorbing heat from an object with which it
is in thermal contact without a phase change or an appreciable change
in temperature.

A protective device that absorbs and dissipates the excess heat


generated by a system.

USB HUB
A device that increases the number of USB ports on a PC. However,
since the hub plugs into one of the USB ports on the computer, the total
number of additional ports is minus one. For example, a four-port hub
adds three new ports. USB hubs are typically used to extend USB
sockets to the top of the desk for conveniently connecting external
peripherals.

Power Cord

A power cord, line cord, or mains cable is a cord or cable that


temporarily connects an electrical appliance to the distribution circuits of
an electrical power source via a wall socket or extension cord.

A voltage regulator is an electrical regulator designed to automatically


maintain a constant voltage level.
AVR (Automatic Voltage Regulator)
It may use an electromechanical mechanism, or passive or active
electronic components. Depending on the design, it may be used to
regulate one or more AC or DC voltages.
Common Competency: Perform Computer Operations

An uninterruptible power supply, also uninterruptible power


UPS (Uninterruptible Power Supply) source, UPS or battery/flywheel backup, is an electrical apparatus
that provides emergency power to a load when the input power source,
typically the utility mains, fails. A UPS differs from an auxiliary or
emergency power system or standby generator in that it will provide
instantaneous or near-instantaneous protection from input power
interruptions by means of one or more attached batteries and
associated electronic circuitry for low power users, and or by means of
diesel generators and flywheels for high power users. The on-battery
runtime of most uninterruptible power sources is relatively short—5–15
minutes being typical for smaller units—but sufficient to allow time to
bring an auxiliary power source on line, or to properly shut down the
protected equipment
Computer Fan

A computer fan is any fan inside a computer case used for cooling
purposes, and may refer to fans that draw cooler air into the case from
the outside, expel warm air from inside, or move air across a heatsink to
cool a particular component. The use of fans to cool a computer is an
example of active cooling.

Laptop/Notebook cooler
A laptop/notebook cooler, cooler pad or chill mat is an accessory for
laptop computers that helps reduce their operating temperature.
Normally used when the laptop's fan device is unable to sufficiently cool
the laptop, a cooling pad may house active or passive cooling methods
and rests beneath the laptop. Active coolers move air or liquid to direct
heat away from the laptop quickly, while passive methods may rely on
thermally conductive materials or increasing passive airflow.

TV Tuner or TV Video Capture

A TV tuner card is a computer component that allows television signals


to be received by a computer. Most TV tuners also function as video
capture cards, allowing them to record television programs onto a hard
disk.

SUPPORT HARDWARE

Lesson 2 covered the basic hardware that makes up a computer. There are, however, additional
components needed to support safe computer operation. In this lesson, we look at several devices
that protect and enhance the value of a computer.

After this lesson, you will be able to


Common Competency: Perform Computer Operations

 Identify additional support hardware for a computer


 Understand the functions of some of the add-on hardware

Estimated lesson time: 5 minutes

In addition to the devices that support a computer's data-processing functions, there are others
that enhance its operation and performance. The following table lists some of these devices.

Device Description

Power supply
Converts a local power source (typically 110 volts AC in the United States) to 3.3, 5,
or 12 volts DC. Most power supplies also perform some basic line conditioning and
surge-protection functions.

Surge suppressor

Used to prevent large power spikes (for instance, lightning) from damaging a
computer.

UPS

Uninterruptible power supply. Acts as both a surge suppresser (to prevent high-power
spikes) and a power leveler to provide the computer with a constant source of power.
Can even provide power during a power failure or interruption (although the duration
depends on the UPS and the computer's power consumption) so that the user can
safely save data before shutting down.

Case
The box that houses most of the system must provide an environment that minimizes
electrical interference to other electronic devices in the area. It should provide a
proper heat level for safe operation and bays and connections for drives, circuit
boards, and I/O devices.

Don't let the term support hardware lead you to underestimate the importance of these
components. How important are roads to commerce, or water to a city? Without a reliable power
source, modern PCs would not exist. The internal power supply keeps a clean current running to
the system.
Common Competency: Perform Computer Operations

SELF CHECK 3.1-2

Fill in the blank. Answer the question of the following.

1. Unit is the brain of the computer and the single most important chip in the
computer.

2. The core of a computer system. Usually it's a rectangular box placed on or


underneath your desk.

3. The disk preserves the information even when your computer is turned off.

4. Stores information on a hard disk, a rigid platter or stack of platters with a


magnetic surface.

5. Displays information in visual form, using text and graphics.

ANSWER KEY 3.1-2


1. 1. 11is converted from impulses into an inert value, representing the character on the individual key. A1.analog pulses into a
digital format that can be used or stored b

1. CPU

2. System Unit

3. Storage

4. Hard Disk Drive

5. Monitor
Common Competency: Perform Computer Operations

INFORMATIONS SHEET No. 3.1-3

Info3 Task Is Planned to Ensure OH & S Guidelines and


Procedures are Followed

Learning Objective:

After reading this information sheet, you must be able to:


1. Determine safety for the software.

Common Types of Computer Software

Computer Software is the languages of the computer. And like the human languages, there are
many different computer languages. Essentially, Computer software can be divided into three main
groups depending on their use and application these are:

1. System software or Operating System software

Is the software used by the computer to translate inputs from various sources into a
language which a machine can understand. Basically the System software or the operating system
software coordinates the different hardware components of a computer. There are many OS in the
market. The most popular OS are from the stable of Windows, Microsoft has migrated to Vista,
its latest offering in the market. It may come as a surprise to some that there are other operating
systems used by others. Among these UNIX is use for large office setups with extensive networking.
XENIX is software which has now become redundant. HP –UX and AIX are some operating system
used by HP computers. Apache OS is quite popular with web servers. IBM is still uses proprietary
operating system for its main frames. Proprietary systems are generally built with the help of a
variant of UNIX operating system.

2. Application software

A normal user rarely gets to see the operating system or to work with it. But all of us are
familiar with application software which we must use to interact with computer. Popular examples
of application software are the Microsoft office suite which include word, excel, and PowerPoint.
We have use this application extensively. Internet explorer, Mozilla Firefox is two applications
software used to access the internet.

Application Software - also provides support to the physical components of computers.


System software coordinates all external devices of computer system like printer, keyboard,
displays etc.

Application software is used for commercial purpose. The application software is widely
used in educational, business and medical fields. Computer games are the most popular forms of
application software. Industrial automation, databases, business software and medical
Common Competency: Perform Computer Operations

software prove to be of great help in the respective fields. Educational software is widely used in
educational institutes across the globe.

3. Programming Languages;
Programmers use the programming software to develop the programming languages
necessary to run computer software. Compliers, interpreters, linkers and text editors are some of
the basic tools used in programming software.

Programming Program Or Programming Languages

Now a kind of computer software which is used exclusively by computer programmers.


Unless we are also programmers, we are unlikely to come across programming languages. A simple
way to understand programming languages is to think of them as bricks which can be used to
create application and operating system. C++, Java and SIMLAB are some popular programming
languages. Generally java is used for internet application. C++ is a language of a professional
developers and used extensively in developing operating system. PHP is another languages used for
internet applications. There is a new class of languages which are utilized for mobiles. These are
light weight, modular languages which are used to design mobile application.

Computer software fall under three basic categories; system software or operating system
software, application software, and Programming languages. We usually use application on a day to
day basis. These application are themselves created using programming languages.

OTHER TYPES OF SOFTWARE

There are many different types of software, which can be a little confusing for the uninitiated.
Following is a brief definition of each type, and the differences between them.

Retail software: This type of software is sold off the shelves of retail stores. It includes expensive
packaging designed to catch the eye of shoppers and, as such, is generally more expensive. An
advantage of retail software is that it comes with printed manuals and installation instructions,
missing in hard-copy form from virtually every other category of software. However, when hard-copy
manuals and instructions are not required, a downloadable version off the Internet will be less
expensive, if available.

OEM software: OEM stands for "Original Equipment Manufacturer" and refers to software sold
in bulk to resellers, designed to be bundled with hardware. For example, Microsoft has contracts
with various companies including Dell Computers, Toshiba, Gateway and others. Microsoft sells its
operating systems as OEM software at a reduced price, minus retail packaging, manuals and
installation instructions. Resellers install the operating system before systems are sold and the
OEM CD is supplied to the buyer. The "manual" consists of the Help menu built into the software
itself. OEM software is not legal to buy unbundled from its original hardware system.

Shareware: This software is downloadable from the Internet. Licenses differ, but commonly the user
is allowed to try the program for free, for a period stipulated in the license, usually thirty days. At
the end of the trial period, the software must be purchased or uninstalled. Some shareware
Common Competency: Perform Computer Operations

incorporates an internal clock that disables the program after the trial period unless a serial
number is supplied. Other shareware designs continue to work with "nag" screens, encouraging the
user to purchase the program.

Crippleware: This software is similar to shareware except that key features will cease to work after
the trial period has ended. For example, the "save" function, the print function, or some other vital
feature necessary to use the program effectively may become unusable. This "cripples" the program.
Other types of crippleware incorporate crippled functions throughout the trial period. A purchase is
necessary to unlock the crippled features.

Demo software: Demo software is not intended to be a functioning program, though it may allow
partial functioning. It is mainly designed to demonstrate what a purchased version is capable of
doing, and often works more like an automated tutorial. If a person wants to use the program, they
must buy a fully functioning version.

Adware: This is free software that is supported by advertisements built into the program itself.
Some adware requires a live Internet feed and uses constant bandwidth to upload new
advertisements. The user must view these ads in the interface of the program. Disabling the ads is
against the license agreement. Adware is not particularly popular.

Spyware: Spyware software is normally free, but can be shareware. It clandestinely "phones home"
and sends data back to the creator of the spyware, most often without the user's knowledge. For
example, a multimedia player might profile what music and video files the software is called upon to
play. This information can be stored with a unique identification tag associated with the specific
program on a user's machine, mapping a one-to-one relationship. The concept of spyware is very
unpopular, and many programs that use spyware protocols were forced to disclose this to users and
offer a means to turn off reporting functions. Other spyware programs divulge the protocols in their
licenses, and make acceptance of the spyware feature a condition of agreement for using the
software.

Freeware: Freeware is also downloadable off the Internet and free of charge. Often freeware is only
free for personal use, while commercial use requires a paid license. Freeware does not contain
spyware or adware. If it is found to contain either of these, it is reclassified as such.

Public domain software: This is free software, but unlike freeware, public domain software does
not have a specific copyright owner or license restrictions. It is the only software that can be legally
modified by the user for his or her own purposes. People are encouraged to read licenses carefully
when installing software, as they vary widely.

GENERAL SECURITY, PRIVACY LEGISLATION AND COPYRIGHT


The security of software is threatened at various points throughout its life cycle, both by inadvertent
and intentional choices and actions taken by “insiders”—individuals closely affiliated with the
organization that is producing, deploying, operating, or maintaining the software, and thus trusted
by that organization—and by “outsiders” who have no affiliation with the organization. The
software’s security can be threatened:
Common Competency: Perform Computer Operations

 during its development: A developer may corrupt the software—intentionally or


unintentionally—in ways that will compromise the software’s dependability and
trustworthiness when it is operational.
 during its deployment (distribution and installation): If those responsible for distributing
the software fail to tamperproof the software before shipping or uploading, or transmit it over
easily intercepted communications channels, they leave the software vulnerable to
intentional or unintentional corruption. Similarly, if the software’s installer fails to “lock
down” the host platform, or configures the software insecurely, the software is left vulnerable
to access by attackers.
 during its operation: Once COTS and open source software has gone operational,
vulnerabilities may be discovered and publicized; unless security patches and updates are
applied and newer supported versions (from which the root causes of vulnerabilities have
been eliminated) are adopted, such software will become increasingly vulnerable. Non-
commercial software and open source software (OSS) may also be vulnerable, especially as it
may manifest untrustworthy behaviors over time due to changes in its environment that
stress the software in ways that were not anticipated and simulated during its testing. Any
software system that runs on a network-connected platform has its vulnerabilities exposed
during its operation. The level of exposure will vary depending on whether the network is
public or private, Internet-connected or not, and whether the software’s environment has
been configured to minimize its exposure. But even in highly controlled networks and “locked
down” environments, the software may be threatened by malicious insiders (users,
administrators, etc.).
 during its sustainment: If those responsible for addressing discovered vulnerabilities in
released software fail to issue patches or updates in a timely manner, or fail to seek out and
eliminate the root causes of the vulnerabilities to prevent their perpetuation in future
releases of the software, the software will become increasingly vulnerable to threats over
time. Also, the software’s maintainer may prove to be a malicious insider, and may embed
malicious code, exploitable flaws, etc., in updated versions of the code.

Both research and real-world experience indicate that correcting weaknesses and vulnerabilities as
early as possible in the software’s life cycle is far more cost-effective over the lifetime of the software
than developing and releasing frequent security patches for deployed software.

Software Assurance
The main objective of software assurance is to ensure that the processes, procedures, and products
used to produce and sustain the software conform to all requirements and standards specified to
govern those processes, procedures, and products. Software security and secure software are often
discussed in the context of software assurance. Software assurance in its broader sense refers to
the assurance of any required property of software. For software practitioners at the National
Aeronautics and Space Administration (NASA), software assurance refers to the assurance of safety
as a property of software. Similarly, in other communities, software assurance may refer to
assurance of reliability or quality. In the context of this article, software assurance is concerned
with assuring the security of software.

An increasingly agreed-upon approach for assuring the security of software is the software security
assurance case, which is intended to provide justifiable confidence that the software under
consideration
(1) is free of vulnerabilities;
(2) functions in the “intended manner,” and this “intended manner” does not compromise the
security or any other required properties of the software, its environment, or the information it
Common Competency: Perform Computer Operations

handles; and
(3) can be trusted to continue operating dependably under all anticipated circumstances, including
anomalous and hostile environmental and utilization circumstances—which means that those who
build the software need to anticipate such circumstances and design and implement the software to
be able to handle them gracefully. Such circumstances include

 the presence of unintentional faults in the software and its environment


 the exposure of the operational software to accidental events that threaten its security
 the exposure of the software to intentional choices or actions that threaten its security
during its development, deployment, operation, or sustainment

Software is more likely to be assuredly secure when security is a key factor in the following aspects
of its development and deployment:

 Development principles and practices: The practices used to develop the software and the
principles that governed its development are expressly intended to encourage and support
the consideration and evaluation of security in every phase of the software’s development life
cycle. Some secure development principles and practices for software are suggested later in
this article.
 Development tools: The programming language(s), libraries, and development tools used to
design and implement the software are evaluated and selected for their ability to avoid
security vulnerabilities and to support secure development practices and principles.
 Testing practices and tools: The software is expressly tested to verify its security, using
tools that assist in such testing.
 Acquired components: Commercial off-the-shelf (COTS) and OSS components are evaluated
to determine whether they contain vulnerabilities, and if so whether the vulnerabilities can
be remediated through integration to minimize the risk they pose to the software system.
 Deployment configuration: The installation configuration of the software minimizes the
exposure of any residual vulnerabilities it contains.
 Execution environment: Protections are provided by the execution environment that can be
leveraged to protect the higher level software that operates in that environment.
 Practitioner knowledge: The software’s analysts, designers, developers, testers, and
maintainers are provided with the necessary information (e.g., through training and
education) to give them sufficient security awareness and knowledge to understand,
appreciate, and effectively adopt the principles and practices that will enable them to
produce secure software.
Common Competency: Perform Computer Operations

SELF CHECK 3.1-3

1. Enumerate the common types of software?


2. What is the assurance of software?
3. Safety for the Software?

ANSWER KEY 3.1-3

1. a. System Software
b. Application Software
c. Programming Languages

2. The assurance of software is to ensure that the processes, procedures, and products used to
produce and sustain the software conform to all requirements and standards specified to govern
those processes, procedures, and products.

3. a. Development principles and practices


b. Development Tools
c. Testing Practices and Tools
d. Acquired Components
e. Deployment Configuration
f. Execution Environment
g. Practitioner Knowledge
Common Competency: Perform Computer Operations

INFORMATIONS SHEET No. 3.1-4

Learning Objective:
After reading this information sheet, you must be able to:
1. Determine of the parts of a keyboard.

DIFFERENT PARTS OF A COMPUTER KEYBOARD

The computer keyboard works much like a mouse; many keyboard shortcuts can eliminate the need
for a mouse. Keys are split into different parts of the keyboard, each providing a specific function.

Function Keys
Across the top of a keyboard are a row of keys called the Function Keys. Each key is composed of
the letter F and a number, ranging from F1 to F12. Each of the Function Keys performs a specific
operation based upon what software is being used.

Numeric Keypad
Many larger keyboards have an extra section to the right that contains the Numeric Keypad. This
consists of the numbers 1 through 9, an asterisk, a slash, a dash, a plus sign, an enter key and a
period. There is also is a "Num Lock" key, which is used to turn on and off the Numeric Keypad.

Navigation Keys
The Navigation Keys, also called the Direction Keys, are used to navigate through documents and
websites. Examples of Navigation Keys are the up, down, left and right arrows.
Common Competency: Perform Computer Operations

Typewriter Keyboard
The center of the keyboard, which contains the largest amount of keys, includes letters and
numbers. Most typing is done with these keys.

Special Keys
Other keys include the Alt and Ctrl keys (used for specific functions), the Tab key (used to insert
the curser) and the Shift key (used to make capital letters or symbols that are located on the
number keys).

Escape
The Escape key is located in the upper left-hand corner of the keyboard. It is used to cancel
operations.

KEYBOARD BASICS

Keyboards differ by manufacturer and the operating system they


are designed for.

A keyboard's primary function is to act as an input device. Using a


keyboard, a person can type a document, use keystroke shortcuts,
access menus, play games and perform a variety of other tasks.
Keyboards can have different keys depending on the manufacturer, the
operating system they're designed for, and whether they are attached to
a desktop computer or part of a laptop. But for the most part, these keys, also called keycaps, are
the same size and shape from keyboard to keyboard. They're also placed at a similar distance from
one another in a similar pattern, no matter what language or alphabet the keys represent.

Most keyboards have between 80 and 110 keys, including:

 Typing keys
 A numeric keypad
 Function keys
 Control keys

The typing keys include the letters of the alphabet, generally laid out in the same pattern
used for typewriters. According to legend, this layout, known as QWERTY for its first six
letters, helped keep mechanical typewriters' metal arms from colliding and jamming as
people typed. Some people question this story -- whether it's true or not, the QWERTY
pattern had long been a standard by the time computer keyboards came around.

Keyboards can also use a variety of other typing key arrangements. The most widely known
is Dvorak, named for its creator, August Dvorak. The Dvorak layout places all of the vowels
on the left side of the keyboard and the most common consonants on the right. The most
commonly used letters are all found along the home row. The home row is the main row
where you place your fingers when you begin typing. People who prefer the Dvorak layout say
it increases their typing speed and reduces fatigue. Other layouts include ABCDE, XPeRT,
Common Competency: Perform Computer Operations

QWERTZ and AZERTY. Each is named for the first keys in the pattern. The QWERTZ and
AZERTY arrangements are commonly used in Europe.

The numeric keypad is a more recent addition to the computer keyboard. As the use of
computers in business environments increased, so did the need for speedy data entry. Since
a large part of the data was numbers, a set of 17 keys, arranged in the same configuration
found on adding machines and calculators, was added to the keyboard.

The Apple keyboard's control keys include the "Command" key.


Other common control keys include:

 Home
 End
 Insert
 Delete
 Page Up
 Page Down
 Control (Ctrl)
 Alternate (Alt)
 Escape (Esc)

The Windows keyboard adds some extra control keys: two Windows or Start keys, and an
Application key. Apple keyboards, on the other hand, have Command (also known as
"Apple") keys. A keyboard developed for Linux users features Linux-specific hot keys,
including one marked with "Tux" the penguin -- the Linux logo/mascot.

INSIDE THE KEYBOARD


A keyboard is a lot like a miniature computer. It has its own processor and circuitry that
carries information to and from that processor. A large part of this circuitry makes up the
key matrix.
Common Competency: Perform Computer Operations

The microprocessor and controller circuitry of a


keyboard

The key matrix is a grid of circuits underneath the keys. In all keyboards (except for
capacitive models, which we'll discuss in the next section), each circuit is broken
at a point below each key. When you press a key, it presses a switch, completing
the circuit and allowing a tiny amount of current to flow through. The mechanical
action of the switch causes some vibration, called bounce, which the processor
filters out. If you press and hold a key, the processor recognizes it as the equivalent
of pressing a key repeatedly.
When the processor finds a circuit that is closed, it compares the location of that
circuit on the key matrix to the character map in its read-only memory (ROM). A
character map is basically a comparison chart or lookup table. It tells the processor
the position of each key in the matrix and what each keystroke or combination of
keystrokes represents. For example, the character map lets the processor know that
pressing the a key by itself corresponds to a small letter "a," but the Shift and a
keys pressed together correspond to a capital "A."

The key matrix

A computer can also use separate character maps, overriding the one found in the
keyboard. This can be useful if a person is typing in a language that uses letters
that don't have English equivalents on a keyboard with English letters. People can
also set their computers to interpret their keystrokes as though they were typing on
a Dvorak keyboard even though their actual keys are arranged in a QWERTY
layout. In addition, operating systems and applications have keyboard accessibility
settings that let people change their keyboard's behavior to adapt to disabilities.
KEYBOARD SWITCHES

Keyboards use a variety of switch technologies. Capacitive switches are considered


to be non-mechanical because they do not physically complete a circuit like most
other keyboard technologies. Instead, current constantly flows through all parts of
the key matrix. Each key is spring-loaded and has a tiny plate attached to the
bottom of it. When you press a key, it moves this plate closer to the plate below it.
As the two plates move closer together, the amount of current flowing through the
Common Competency: Perform Computer Operations

matrix changes. The processor detects the change and interprets it as a key press
for that location. Capacitive switch keyboards are expensive, but they have a longer
life than any other keyboard. Also, they do not have problems with bounce since
the two surfaces never come into actual contact.

All of the other types of switches used in keyboards are mechanical in nature.
Each provides a different level of audible and tactile response -- the sounds and
sensations that typing creates. Mechanical key switches include:

 Rubber dome
 Membrane
 Metal contact
 Foam element

This keyboard uses rubber dome switches.

Rubber dome switches are very common. They use small, flexible rubber domes,
each with a hard carbon center. When you press a key, a plunger on the bottom of
the key pushes down against the dome, and the carbon center presses against a
hard, flat surface beneath the key matrix. As long as the key is held, the carbon
center completes the circuit. When the key is released, the rubber dome springs
back to its original shape, forcing the key back up to its at-rest position. Rubber
dome switch keyboards are inexpensive, have pretty good tactile response and are
fairly resistant to spills and corrosion because of the rubber layer covering the key
matrix.

Rather than having a switch for each key, membrane keyboards use a continuous
membrane that stretches from one end to another. A pattern printed in the
membrane completes the circuit when you press a key. Some membrane keyboards
use a flat surface printed with representations of each key rather than keycaps.
Membrane keyboards don't have good tactile response, and without additional
mechanical components they don't make the clicking sound that some people like
to hear when they're typing. However, they're generally inexpensive to make.

Metal contact and foam element keyboards are increasingly less common. Metal
contact switches simply have a spring-loaded key with a strip of metal on the
bottom of the plunger. When the key is pressed, the metal strip connects the two
Common Competency: Perform Computer Operations

parts of the circuit. The foam element switch is basically the same design but with
a small piece of spongy foam between the bottom of the plunger and the metal strip,
providing a better tactile response. Both technologies have good tactile response,
make satisfyingly audible "clicks," and are inexpensive to produce. The problem is
that the contacts tend to wear out or corrode faster than on keyboards that use
other technologies. Also, there is no barrier that prevents dust or liquids from
coming in direct contact with the circuitry of the key matrix.
FROM THE KEYBOARD TO THE COMPUTER
As you type, the processor in the keyboard analyzes the key matrix and determines
what characters to send to the computer. It maintains these characters in its
memory buffer and then sends the data.

A PS/2 type keyboard connector.

Many keyboards connect to the computer through a cable with a PS/2 or USB
(Universal Serial Bus) connector. Laptops use internal connectors. Regardless of
which type of connector is used, the cable must carry power to the keyboard, and it
must carry signals from the keyboard back to the computer.
Wireless keyboards, on the other hand, connect to the computer through infrared
(IR), radio frequency (RF) or Bluetooth connections. IR and RF connections are
similar to what you'd find in a remote control. Regardless of which sort of signal
they use, wireless keyboards require a receiver, either built in or plugged in to the
USB port, to communicate with the computer. Since they don't have a physical
connection to the computer, wireless keyboards have an AC power connection or
use batteries for power.

Microsoft wireless keyboard


Common Competency: Perform Computer Operations

This Microsoft wireless keyboard is battery-


powered.

Whether it's through a cable or wireless, the signal from the keyboard is monitored by the
computer's keyboard controller. This is an integrated circuit (IC) that processes all of the
data that comes from the keyboard and forwards it to the operating system. When the
operating system (OS) is notified that there is data from the keyboard, it checks to see if the
keyboard data is a system level command. A good example of this is Ctrl-Alt-Delete
on a Windows computer, which reboots the system. Then, the OS passes the keyboard data
on to the current application.

The application determines whether the keyboard data is a command, like Alt-f, which
opens the File menu in a Windows application. If the data is not a command, the
application accepts it as content, which can be anything from typing a document to
entering a URL to performing a calculation. If the current application does not accept
keyboard data, it simply ignores the information. This whole process, from pressing the key
to entering content into an application, happens almost instantaneously.

THE MAGIC BEHIND KEYBOARDING


There really is no "magic" or secret about good typing ability. It just takes time and
lots and lots of practice. However there are some important things that will help you
in the process:

**NOTE It is also important to strike the keys with a short quick stroke.
Common Competency: Perform Computer Operations

TIPS AND TRICKS


Please Read the following:

Learning to keyboard is not easy. It will


take lots of self discipline and
patience. Sometimes it takes weeks to show
just small improvements. If you look at
keyboarding as a skill that can
be mastered with lots of practice you will do
fine. One key factor to mastering
keyboarding is good technique.

Correct technique is the most important skill any beginning typist can
learn. Speed and accuracy are all built around good technique.

List of the keyboard shortcuts that are available in Windows XP

General keyboard shortcuts:

 CTRL+C (Copy)
 CTRL+X (Cut)
 CTRL+V (Paste)
 CTRL+Z (Undo)
 DELETE (Delete)
 SHIFT+DELETE (Delete the selected item permanently without placing the
item in the Recycle Bin)
 CTRL while dragging an item (Copy the selected item)
 CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
 F2 key (Rename the selected item)
 CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next
word)
 CTRL+LEFT ARROW (Move the insertion point to the beginning of the
previous word)
 CTRL+DOWN ARROW (Move the insertion point to the beginning of the next
paragraph)
 CTRL+UP ARROW (Move the insertion point to the beginning of the previous
paragraph)
 CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
 SHIFT with any of the arrow keys (Select more than one item in a window or
on the desktop, or select text in a document)
 CTRL+A (Select all)
Common Competency: Perform Computer Operations

 F3 key (Search for a file or a folder)


 ALT+ENTER (View the properties for the selected item)
 ALT+F4 (Close the active item, or quit the active program)
 ALT+ENTER (Display the properties of the selected object)
 ALT+SPACEBAR (Open the shortcut menu for the active window)
 CTRL+F4 (Close the active document in programs that enable you to have multiple
documents open simultaneously)
 ALT+TAB (Switch between the open items)
 ALT+ESC (Cycle through items in the order that they had been opened)
 F6 key (Cycle through the screen elements in a window or on the desktop)
 F4 key (Display the Address bar list in My Computer or Windows Explorer)
 SHIFT+F10 (Display the shortcut menu for the selected item)
 ALT+SPACEBAR (Display the System menu for the active window)
 CTRL+ESC (Display the Start menu)
 ALT+Underlined letter in a menu name (Display the corresponding menu)
 Underlined letter in a command name on an open menu (Perform the
corresponding command)
 F10 key (Activate the menu bar in the active program)
 RIGHT ARROW (Open the next menu to the right, or open a submenu)
 LEFT ARROW (Open the next menu to the left, or close a submenu)
 F5 key (Update the active window)
 BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
 ESC (Cancel the current task)
 SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM
from automatically playing)
 CTRL+SHIFT+ESC (Open Task Manager)

Dialog Box Keyboard Shortcuts


If you press SHIFT+F8 in extended selection list boxes, you enable extended selection
mode. In this mode, you can use an arrow key to move a cursor without changing the
selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection.
To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode
cancels itself when you move the focus to another control.

 CTRL+TAB (Move forward through the tabs)


 CTRL+SHIFT+TAB (Move backward through the tabs)
 TAB (Move forward through the options)
 SHIFT+TAB (Move backward through the options)
 ALT+Underlined letter (Perform the corresponding command or select the
corresponding option)
 ENTER (Perform the command for the active option or button)
 SPACEBAR (Select or clear the check box if the active option is a check box)
 Arrow keys (Select a button if the active option is a group of option buttons)
 F1 key (Display Help)
 F4 key (Display the items in the active list)
 BACKSPACE (Open a folder one level up if a folder is selected in the Save As or
Open dialog box)
Common Competency: Perform Computer Operations

Microsoft Natural Keyboard Shortcuts

 Windows Logo (Display or hide the Start menu)


 Windows Logo+BREAK (Display the System Properties dialog box)
 Windows Logo+D (Display the desktop)
 Windows Logo+M (Minimize all of the windows)
 Windows Logo+SHIFT+M (Restore the minimized windows)
 Windows Logo+E (Open My Computer)
 Windows Logo+F (Search for a file or a folder)
 CTRL+Windows Logo+F (Search for computers)
 Windows Logo+F1 (Display Windows Help)
 Windows Logo+ L (Lock the keyboard)
 Windows Logo+R (Open the Run dialog box)
 Windows Logo+U (Open Utility Manager)

Accessibility Keyboard Shortcuts

 Right SHIFT for eight seconds (Switch Filter Keys either on or off)
 Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
 Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
 SHIFT five times (Switch the Sticky Keys either on or off)
 NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
 Windows Logo +U (Open Utility Manager)

Windows Explorer Keyboard Shortcuts

 END (Display the bottom of the active window)


 HOME (Display the top of the active window)
 NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the
selected folder)
 NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
 NUM LOCK+Minus sign (-) (Collapse the selected folder)
 LEFT ARROW (Collapse the current selection if it is expanded, or select the parent
folder)
 RIGHT ARROW (Display the current selection if it is collapsed, or select the first
subfolder)

Shortcut Keys For Character Map


After you double-click a character on the grid of characters, you can move through the
grid by using the keyboard shortcuts:

 RIGHT ARROW (Move to the right or to the beginning of the next line)
 LEFT ARROW (Move to the left or to the end of the previous line)
 UP ARROW (Move up one row)
 DOWN ARROW (Move down one row)
 PAGE UP (Move up one screen at a time)
 PAGE DOWN (Move down one screen at a time)
 HOME (Move to the beginning of the line)
 END (Move to the end of the line)
 CTRL+HOME (Move to the first character)
 CTRL+END (Move to the last character)
Common Competency: Perform Computer Operations

 SPACEBAR (Switch between Enlarged and Normal mode when a character is


selected)

Microsoft Management Console (MMC) Main Window Keyboard Shortcuts

 CTRL+O (Open a saved console)


 CTRL+N (Open a new console)
 CTRL+S (Save the open console)
 CTRL+M (Add or remove a console item)
 CTRL+W (Open a new window)
 F5 key (Update the content of all console windows)
 ALT+SPACEBAR (Display the MMC window menu)
 ALT+F4 (Close the console)
 ALT+A (Display the Action menu)
 ALT+V (Display the View menu)
 ALT+F (Display the File menu)
 ALT+O (Display the Favorites menu)

Microsoft Internet Explorer Navigation

 CTRL+B (Open the Organize Favorites dialog box)


 CTRL+E (Open the Search bar)
 CTRL+F (Start the Find utility)
 CTRL+H (Open the History bar)
 CTRL+I (Open the Favorites bar)
 CTRL+L (Open the Open dialog box)
 CTRL+N (Start another instance of the browser with the same Web address)
 CTRL+O (Open the Open dialog box, the same as CTRL+L)
 CTRL+P (Open the Print dialog box)
 CTRL+R (Update the current Web page)
 CTRL+W (Close the current window)

PART OF A COMPUTER MOUSE


Common Competency: Perform Computer Operations

MOUSE
In computing, a mouse is a pointing device that functions by detecting two-dimensional
motion relative to its supporting surface. Physically, a mouse consists of an object held
under one of the user's hands, with one or more buttons. (Although traditionally a button
is typically round or square, modern mice have spring-loaded regions of their top surface
that operate switches when pressed down lightly.) It sometimes features other elements,
such as "wheels", which allow the user to perform various system-dependent operations,
or extra buttons or features that can add more control or dimensional input. The mouse's
motion typically translates into the motion of a cursor on a display, which allows for fine
control of a graphical user interface.

CONNECTIVITY AND COMMUNICATION PROTOCOLS

To transmit their input, typical cabled mice use a thin electrical cord terminating in a
standard connector, such as RS-232C, PS/2, ADB or USB. Cordless mice instead
transmit data via infrared radiation (see IrDA) or radio (including Bluetooth), although
many such cordless interfaces are themselves connected through the aforementioned
wired serial buses.

While the electrical interface and the format of the data transmitted by commonly
available mice is currently standardized on USB, in the past it varied between different
manufacturers. A bus mouse used a dedicated interface card for connection to an IBM PC
or compatible computer.

Serial interface and protocol

Standard PC mice once used the RS-232C serial port via a D-subminiature connector,
which provided power to run the mouse's circuits as well as data on mouse movements.
The Mouse Systems Corporation version used a five-byte protocol and supported three
buttons. The Microsoft version used an incompatible three-byte protocol and only allowed
for two buttons. Due to the incompatibility, some manufacturers sold serial mice with a
mode switch: "PC" for MSC mode, "MS" for Microsoft mode.[29]
Common Competency: Perform Computer Operations

PS/2 interface and protocol


For more details on this topic, see PS/2 connector. With the arrival of the IBM PS/2
personal-computer series in 1987, IBM introduced the eponymous PS/2 interface for mice
and keyboards, which other manufacturers rapidly adopted. The most visible change was
the use of a round 6-pin mini-DIN, in lieu of the former 5-pin connector. In default mode
(called stream mode) a PS/2 mouse communicates motion, and the state of each button,
by means of 3-byte packets.[30] For any motion, button press or button release event, a
PS/2 mouse sends, over a bi-directional serial port, a sequence of three bytes, with the
following format:

Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0

Byte 1 YV XV YS XS 1 MB RB LB

Byte 2 X movement

Byte 3 Y movement

Here, XS and YS represent the sign bits of the movement vectors, XV and YV indicate an
overflow in the respective vector component, and LB, MB and RB indicate the status of
the left, middle and right mouse buttons (1 = pressed). PS/2 mice also understand several
commands for reset and self-test, switching between different operating modes, and
changing the resolution of the reported motion vectors. In Linux, a PS/2 mouse is
detected as a /dev/psaux device.

For 3-D (or 6-degree-of-freedom) input, vendors have made many extensions both to the
hardware and to software. In the late 90's Logitech created ultrasound based tracking
which gave 3D input to a few millimeters accuracy, which worked well as an input device
but failed as a profitable product. In 2008, Motion4U introduced its "OptiBurst" system
using IR tracking for use as a Maya (graphics software) plugin.

USB

The industry-standard USB protocol and its connector have become widely used for mice;
it's currently among the most popular types.[33]

Cordless or Wireless
Cordless or wireless mice transmit data via infrared radiation (see IrDA) or radio
(including Bluetooth). The receiver is connected to the computer through a serial or USB
port. The newer nano receivers were designed to be small enough to remain connected in
a laptop or notebook computer during transport.[34]
Common Competency: Perform Computer Operations

SELF CHECK 3.1-4

Question: Give at least 25 keyboard shortcut keys and give its function

ANSWER KEY 3.1-4


 CTRL+C (Copy)
 CTRL+X (Cut)
 CTRL+V (Paste)
 CTRL+Z (Undo)
 SHIFT+DELETE (Delete)
 CTRL+SHIFT+ESC (Open Task Manager)
 CTRL+ESC (Display the Start menu)
 CTRL+SHIFT+ESC (Open Task Manager)
 CTRL+A (Select all)
 CTRL+TAB (Move forward through the tabs)
 CTRL+SHIFT+TAB (Move backward through the tabs)
 TAB (Move forward through the options)
 SHIFT+TAB (Move backward through the options)
 Windows Logo+D (Display the desktop)
 Windows Logo+M (Minimize all of the windows)
 Windows Logo+ L (Lock the keyboard)
 Windows Logo+R (Open the Run dialog box)
 Windows Logo+U (Open Utility Manager)
 Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
 Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
 SHIFT five times (Switch the StickyKeys either on or off)
 CTRL+N (Open a new console)
 CTRL+S (Save the open console)
 CTRL+M (Add or remove a console item)
 CTRL+W (Open a new window)
Common Competency: Perform Computer Operations

LO2. INPUT DATA INTO COMPUTER

Input Data into the Computer

ASSESSMENT CRITERIA:
1. Data entered into the computer using appropriate program/application in
accordance with company procedure
2. Accuracy of information checked and information saved in accordance with
standard operating procedures
3. Inputted data stored in storage media according to requirements
4. Work performed within ergonomic guidelines

CONTENTS:
Relevant types of software
Communication skills to identify lines of communication, request advice, follow
instructions and receive feedback
Storage devices and basic categories of memory
Basic ergonomics of keyboard and computer user

CONDITIONS:
The students/trainees must be provided with the following:
Equipment:
- 1 unit of computer
- voltage regulator/UPS
Learning Materials:
- Learning manuals
- Work instruction
- Hand-outs
Supplies/Materials:
- Operating system
- Application program

METHODOLOGIES:
Lecture-demonstration
Self-paced instruction
Group discussion

ASSESSMENT METHODS:
Hands-on
Direct observation
Practical demonstration
Common Competency: Perform Computer Operations

INFORMATIONS SHEET No. 3.2-1

INPUT DATA INTO THE COMPUTERS

Learning Objective:
After reading this information sheet, you must be able to:
1. Determine to input the data into the computers.

Input Device
In computing, an input device is a piece of computer hardware equipment used to
provide data and control signals to an information processing system such as
a computer or information appliance. Examples of input devices
include keyboards, mouse, scanners, digital cameras and joysticks. Audio input devices
may be used for purposes including speech recognition. Many companies are utilizing
speech recognition to help assist users to use their device(s).

Types of input devices


 Audio conversion device
 Barcode reader
 Biometrics (e.g., fingerprint scanner)
 Business Card Reader
 Digital camera and Digital Camcorder
 Electroencephalography (EEG)
 Finger (with touchscreen or Windows Touch)
 Gamepad, Joystick, Paddle, Steering wheel, and Microsoft Kinect
 Gesture recognition
 Graphics tablet
 Keyboard
 Light gun
 Light pen
 Magnetic ink (like the ink found on checks)
 Magnetic stripe reader
 Medical imaging devices (e.g., X-Ray, CAT Scan, and Ultrasound images)
 Microphone (using voice speech recognition or biometric verification)
 MIDI keyboard
 MICR
 Mouse, touchpad, or other pointing devices
 Optical Mark Reader (OMR)
 Paddle
 Pen or Stylus
 Punch card reader
 Remote
 Scanner
 Sensors (e.g., heat and orientation sensors)
Common Competency: Perform Computer Operations

 Sonar imaging devices


 Touchscreen
 Voice (using voice speech recognition or biometric verification)
 Video capture device
 VR helmet and gloves
 Webcam
 Yoke

WHAT ARE THE INPUT DEVICES OF MY COMPUTER


Every computer comes with a keyboard and a mouse (touchpad with laptop), which are
considered input devices. As far as other input devices, it depends on what was included
with your computer and what is attached to it. The best method of determining all of the
input devices your computer has is to go through the list above.

WHAT DOES AN INPUT DEVICE SEND TO A COMPUTER?


What an input device sends (inputs) to a computer depends on the device. Additionally,
all input devices send data from the device over a cable or wireless transmission to the
computer. For example, as you move a computer mouse, the data it sends to the
computer is the X-Y axis movements that the computer uses to display the mouse
cursoron the screen. You can see a live example of this on our x-axis definition.

WHY DOES A COMPUTER NEED AN INPUT DEVICE?


Today, input devices are important because they are what allows you to interact with and
add new information to a computer. For example, if a computer had no input devices, it
could run by itself but there would be no way to change its settings, fix errors, or other
various user interactions. Also, if you wanted to add new information to the computer
(e.g., text, command, document, picture, etc.), you wouldn't be able to do so without an
input device.

4 Data Input Methods, Media and Devices

The chapter is divided into the following sections:


 Aims of data collection.
 The problems of collecting data.
 The main methods of data input.
 Forms and dialogue design.
 Data verification and validation.
 Coding.
 Input media and devices.

Aims of Data Collection

The overall aim of any method of data collection is to translate information created by
people into a form usable by a computer.

 Reducing the volume of input to minimum practical levels.


Common Competency: Perform Computer Operations

 Reducing the amount of data which needs manual preparation.


 Designing input to ease the task of preparation (using menus and simple boxed
forms).
 Using the minimum number of stages from origin of the data to computer input.

Problems of Collecting Data

 The preparation of source documents is slow, hard work and prone to mistakes.
 Typing speeds are very slow compared with computer speeds. This is known as the
'keyboard bottleneck'.
 It is wasteful to use media e.g. punched cards and paper tape which can be used
only once.
 Mistakes can easily be made when copying from one medium to another. Such
mistakes are known as transcription errors.
 Transmission delays or losses can occur, particularly if data have to be physically
transferred to the computer.
 Data entry can be expensive, often accounting for 40-50% of the total data-
handling costs.

The Main Methods of Data Input

(a) Data Input Methods the main methods of data input are:
(i) On-line Data Entry Data is entered directly into the computer one transaction at a time
(also known as transaction processing) under program control. The main types of on-line
data entry device are: VDUs, teletypes, light pens, voice input and shop-floor data
collection devices. They can be used off-line also for bulk data collection.
(ii) Source Document Conversion this is where source documents, e.g. order forms and
time sheets, are batched and converted into a computer-acceptable medium. The data is
entered, verified and validated by computer and then transferred to backing store (tape or
disk) for later processing. Such systems are called key-to-storage systems. The keyboard
will be part of the VDU type device.

(iii) Direct Data Capture Data is captured directly without a conversion stage. Specially
marked or printed documents (e.g. questionnaires, bank cheques) can be read by special
input devices. Tags attached to clothing and collected at the point of sale are another
example of direct input media. This method eliminates the keyboard, automates
transcription, increases speeds and reduces media costs. , Whatever the method of data
input chosen one of the aims must be to reduce the number of stages yet still ensure that
data is input free of errors. Fig. 4.1 shows the input stages for the main methods of data
capture. It should be apparent why on-line is so popular.
Common Competency: Perform Computer Operations

SELF CHECK 3.2-1

Answer the questions of the following.

1. How can you assess an effective data-entry system?


2. What are the problems of collecting data?
3. How can the problems of collecting data be overcome?

ANSWER KEY 3.2-1

1. An effective data-entry system must be fast, accurate, versatile, efficient, secure and
cost-effective.
2. The preparation of source documents is slow, hard work and prone to mistakes.
3. a. online data entry
b. source document conversion
c. direct data capture
Common Competency: Perform Computer Operations

LEARNING EXPERIENCES

LEARNING OUTCOME 3 – PRODUCE/OUTPUT DATA USING COMPUTER


SYSTEM

Learning Activities Special Instructions

1. Read information sheet # 3.3-1 Read, analyze and perform the information
on Correct program/application is and activities regarding information sheet #
selected based on job 3.3-1
requirements
2. Answer self-check # 3.3-1 Refer the answers to the answers key # 3.3-1

3. Read information sheet # 3.3-2 Read information sheet. After reading, the
on Program/application containing learner is encouraged to answer the self- check
the information required is provided.
accessed according to company
procedures
4. Answer self-check # 3.3-2 Refer the answers to the answers key # 3.3-2
5. Read information sheet # 3.3-3 Read information sheet. After reading, the
on Desktop icons are correctly learner is encouraged to answer the self- check
selected, opened and closed for provided.
navigation purposes
6. Answer self-check # 3.3-3 Refer the answers to the answers key #3.3-3
7. Read information sheet # 3.3-4 Read information sheet. After reading, the
on Keyboard techniques are learner is encouraged to answer the self- check
carried out in line with OH & S provided.
requirements for safe use of
keyboards
8. Answer self-check # 3.3-4 Refer the answers to the answers key #3.3-4
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.3-1


Correct program/application is selected based on job
requirements
Learning Objectives:

After reading this information sheet, the student/trainee should be able to:
1. Know the correct program

Application

An application, or application program, is a software program that runs on your


computer. Web browsers, e-mail programs, word processors, games, and utilities
are all applications. The word "application" is used because each program has a
specific application for the user. For example, a word processor can help a student
create a research paper, while a video game can prevent the student from getting
the paper done.
In contrast, system software consists of programs that run in the background,
enabling applications to run. These programs include assemblers, compilers, file
management tools, and the operating system itself. Applications are said to run on
top of the system software, since the system software is made of of "low-level"
programs. While system software is automatically installed with the operating
system, you can choose which applications you want to install and run on your
computer.
Macintosh programs are typically called applications, while Windows programs are
often referred to as executable files. This is why Mac programs use the .APP file
extension, while Windows programs use the .EXE extension. Though they have
different file extensions, Macintosh and Windows programs serve the same
purpose and can both be called applications.
Application software
An application software (app or application for short) is a computer software
designed to perform a group of coordinated functions, tasks, or activities for the
benefit of the user. Examples of an application include a word processor, a
spreadsheet, an accounting application, a web browser, a media player, an
aeronautical flight simulator, a console game or a photo editor. The collective
noun application software refers to all applications collectively. This contrasts with
system software, which is mainly involved with running the computer.
Applications may be bundled with the computer and its system software or
published separately, and may be coded as proprietary, open-source or university
projects. Apps built for mobile platforms are called mobile apps.
Common Competency: Perform Computer Operations

SELF-CHECK 3.3-1

Learn your mastery in Information Sheet 3.3-1 by answering the questions below:

Test 1. Write TRUE if the statement is correct and write FALSE if the
statement is incorrect.

____________1. An application, or application program, is a software


program that runs on your computer.
____________2. The word "application" is used because each program has a
specific application for the user.
____________3. System software consists of programs that run in the
background
____________4. This contrasts with system software, which is mainly
involved with running the computer.
____________5. Apps built for mobile platforms are called mobile apps.

The trainee’s underpinning knowledge was


□ Satisfactory
□ Not Satisfactory
Common Competency: Perform Computer Operations

ANSWER SHEET 3.3-1


1. True
2. True
3. True
4. True
5. True
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.3-2


Program/application containing the information required is
accessed according to company procedures
Learning objective:
After reading this information sheet you must be able to
1. Know the program/application required

There are many different ways to divide up different types of application software, and
several are explained here.
Since the development and near-universal adoption of the web, an important distinction
that has emerged, has been between web applications — written with HTML, JavaScript
and other web-native technologies and typically requiring one to be online and running a
web browser, and the more traditional native applications written in whatever languages
are available for one's particular type of computer. There has been a contentious debate
in the computing community regarding web applications replacing native applications for
many purposes, especially on mobile devices such as smartphones and tablets. Web apps
have indeed greatly increased in popularity for some uses, but the advantages of
applications make them unlikely to disappear soon, if ever. Furthermore, the two can be
complementary, and even integrated.

Application software can also be seen as being either horizontal or vertical. Horizontal
applications are more popular and widespread, because they are general purpose, for
example word processors or databases. Vertical applications are niche products, designed
for a particular type of industry or business, or department within an organization.
Integrated suites of software will try to handle every specific aspect possible of, for
example, manufacturing or banking worker, or accounting, or customer service.
There are many types of application software:
LibreOffice Writer, an open-source word processor that is a component of LibreOffice

An application suite consists of multiple applications bundled together. They usually have
related functions, features and user interfaces, and may be able to interact with each
other, e.g. open each other's files. Business applications often come in suites, e.g.
Microsoft Office, LibreOffice and iWork, which bundle together a word processor, a
spreadsheet, etc.; but suites exist for other purposes, e.g. graphics or music.

Enterprise software addresses the needs of an entire organization's processes and data
flows, across several departments, often in a large distributed environment. Examples
include enterprise resource planning systems, customer relationship management (CRM)
systems and supply chain management software. Departmental Software is a sub-type of
enterprise software with a focus on smaller organizations or groups within a large
organization. (Examples include travel expense management and IT Helpdesk.)
Enterprise infrastructure software provides common capabilities needed to support
enterprise software systems. (Examples include databases, email servers, and systems for
managing networks and security.)
Common Competency: Perform Computer Operations

Information worker software lets users create and manage information, often for
individual projects within a department, in contrast to enterprise management. Examples
include time management, resource management, analytical, collaborative and
documentation tools. Word processors, spreadsheets, email and blog clients, personal
information system, and individual media editors may aid in multiple information worker
tasks.
Content access software is used primarily to access content without editing, but may
include software that allows for content editing. Such software addresses the needs of
individuals and groups to consume digital entertainment and published digital content.
(Examples include media players, web browsers, and help browsers.)
Educational software is related to content access software, but has the content or
features adapted for use in by educators or students. For example, it may deliver
evaluations (tests), track progress through material, or include collaborative capabilities.

Simulation software simulates physical or abstract systems for either research, training
or entertainment purposes.
Media development software generates print and electronic media for others to consume,
most often in a commercial or educational setting. This includes graphic-art software,
desktop publishing software, multimedia development software, HTML editors, digital-
animation editors, digital audio and video composition, and many others.
Product engineering software is used in developing hardware and software products. This
includes computer-aided design (CAD), computer-aided engineering (CAE), computer
language editing and compiling tools, integrated development environments, and
application programmer interfaces.

Entertainment Software can refer to video games, screen savers, programs to display
motion pictures or play recorded music, and other forms of entertainment which can be
experienced through use of a computing device.

Applications can also be classified by computing platform such as a particular operating


system, delivery network such as in cloud computing and Web 2.0 applications, or
delivery devices such as mobile apps for mobile devices.
The operating system itself can be considered application software when performing
simple calculating, measuring, rendering, and word processing tasks not used to control
hardware via command-line interface or graphical user interface. This does not include
application software bundled within operating systems such as a software calculator or
text editor.
Common Competency: Perform Computer Operations

SELF-CHECK 3.3-2

Learn your mastery in Information Sheet 3.3-2 by answering the questions below:

Test 1. Write TRUE if the statement is correct and write FALSE if the
statement is incorrect.

____________1. Application software can also be seen as being either


horizontal or vertical.
____________2. Enterprise infrastructure software provides common
capabilities needed to support enterprise software systems.
____________3. Content access software is used primarily to access content
without editing, but may include software that allows for content editing.
____________4. Information worker software lets users create and manage
information, often for individual projects within a department, in contrast
to enterprise management.
____________5. Media development software generates print and electronic
media for others to consume, most often in a commercial or educational
setting.

The trainee’s underpinning knowledge was


□ Satisfactory
□ Not Satisfactory
Common Competency: Perform Computer Operations

ANSWER SHEET 3.3-2


6. True
7. True
8. True
9. True
10. True
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.3-3


Desktop icons are correctly selected, opened and closed for
navigation purposes
Learning objective:
After reading this information sheet you must be able to
1. Managing Desktop Icons
The icons on the desktop can also have their appearance and size changed we have
already used the display properties to alter the size of these. Now we will look at placing
new ones on the desktop and creating shortcut icons.

1. To change the look of an icon e.g. the My Computer icon we need to access the
desktop properties, as before right click the desktop and select properties
2. Select the Desktop tab
3. Click Customize Desktop
4. Highlight the My Computer icon (just a single left click to highlight). Then select
change icon pictures of all available icons will be displayed. Icon files can also be
downloaded from the internet to be used.
5. Highlight the picture to be used and click OK to apply
If icons have been downloaded use the browse button to locate them.
6. The My Computer icon has now been changed to the new icon picture this will
appear in all menus including the start menu
7. We will now place a shortcut icon onto the desktop
From the start menu select programs and then the program you want make the
shortcut to. The example shown is for a screen shot program called “Printscreen”
8. Right click the program,
9. then select send to
10. Then Desktop (create shortcut)
11. A shortcut icon has now been created on the desktop
12. Note the icon has a small arrow in the corner indicating this is a shortcut if this icon
was deleted it would not remove the associated program.
13. Another way of placing a shortcut on the desktop is to use drag and drop.
14. Drag and drop is simply left clicking the icon and holding down the left mouse
button. Then drag the icon to the desired location and release the mouse button the
icon is moved and shortcut created.
15. Drag and drop can also be used to move files from one location to another.
16. Drag and drop will now be used to create a shortcut to windows media player.
Click the start button
17. Left click windows media player and hold down the mouse button. Now drag onto the
desktop then release,
18. The shortcut to media player has now been created.
19. To tidy up the icons on the desktop, right click on the desktop and select arrange
icons by, then click Name
20. The icons will be arranged alphabetically with the exception of the default icons My
Documents, My Computer, My Network Places, Recycle Bin and Internet Explorer.
Common Competency: Perform Computer Operations

SELF CHECK 3.3-3

Enumerate at least 5 Desktop icons.


Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.3-4


Keyboard techniques are carried out in line with OH & S
requirements for safe use of keyboards
Learning objective:
After reading this information sheet you must be able to
1. Know the keyboard techniques
Correct Keyboarding Technique
In order to develop optimal keyboarding speed and accuracy, students need to use proper
technique. Not only does proper keyboarding technique help develop skill, but it also
helps prevent the development of RSI (repetitive stress injury, more commonly known as
carpal tunnel).
What constitutes correct keyboarding technique?

Correct keyboarding technique requires proper hand positioning at the computer


keyboard and learning to key by touch, thus enabling eyes to remain on the copy rather
than watching fingers.
Keyboard

 The keyboard should be detachable from the screen


 Place the keyboard at the front edge of the desk so that it is within range of your
hands without straightening your elbows.
 Place the keyboard in a position that allows your forearms to be at a 90 degree
angle and the wrists to be straight (hand in line with the forearm)
 Determine what section of the board you use most frequently, and readjust the
keyboard so that section is centred with your body.
 The keyboard angle should sit flat on the desk to help maintain a straight wrist
position.
 Wrist rests can help to maintain neutral postures and pad hard surfaces. However,
the wrist rest should only be used to rest the palms of the hands between
keystrokes. Resting on the wrist rest while typing is not recommended. Wrist rests
are primarily for periods of rest between bouts of typing.
Common Competency: Perform Computer Operations

TASK SHEET 3.3-4

Perform the Correct Keyboarding Technique.


Common Competency: Perform Computer Operations

LEARNING EXPERIENCES

LEARNING OUTCOME 4 – PRODUCE/OUTPUT DATA USING COMPUTER


SYSTEM

Learning Activities Special Instructions

9. Read information sheet # 3.4-1 Read, analyze and perform the information
on Entered data are processed and activities regarding information sheet #
using appropriate software 3.4-1
commands
10. Answer self-check # 3.4-1 Refer the answers to the answers key # 3.4-1

11. Read information sheet # 3.4-2 Read information sheet. After reading, the
on Data are printed out as learner is encouraged to answer the self- check
required using computer provided.
hardware/peripheral devices in
accordance with standard
operating procedures
12. Answer self-check # 3.4-2 Refer the answers to the answers key # 3.4-2
13. Read information sheet # 3.4-3 Read information sheet. After reading, the
on Files and data are transferred learner is encouraged to answer the self- check
between compatible systems using provided.
computer software, hardware/
peripheral devices in accordance
with standard operating
procedures
14. Answer self-check # 3.4-3 Refer the answers to the answers key #3.4-3
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.4-1


Entered data are processed using appropriate software commands
Learning Objectives:

After reading this information sheet, the student/trainee should be able to:
1. Know the Data processing system

Data processing system


A data processing system is a combination of machines, people, and processes that for a
set of inputs produces a defined set of outputs. The inputs and outputs are interpreted as
data, facts, information, ... depending on the interpreter's relation to the system. A
common synonymous term is "information system”.
A data processing system may involve some combination of:
Conversion - converting data to another form or Language.
Validation – Ensuring that supplied data is "clean, correct and useful."
Sorting – "arranging items in some sequence and/or in different sets."
Summarization – reducing detail data to its main points.
Aggregation – combining multiple pieces of data.
Analysis – the "collection, organization, analysis, interpretation and presentation of data."
Reporting – list detail or summary data or computed information.

Types of data processing systems


By application area
Scientific data processing
Scientific data processing "usually involves a great deal of computation (arithmetic
and comparison operations) upon a relatively small amount of input data,
resulting in a small volume of output."
Commercial data processing
Commercial data processing "involves a large volume of input data, relatively few
computational operations, and a large volume of output." Accounting programs
are the prototypical examples of data processing applications. Information
Systems (IS) is the field that studies such organizational computer systems.
Data analysis
"Data analysis is a body of methods that help to describe facts, detect patterns,
develop explanations, and test hypotheses." For example, data analysis might be
used to look at sales and customer data to "identify connections between products
to allow for cross selling campaigns."
By service type
Transaction processing systems
Common Competency: Perform Computer Operations

Information storage and retrieval systems


Command and control systems
Computing service systems
Process control systems
Message switching systems

SELF-CHECK 3.4-1

What are the Types of Data Processing System in Application Area?

ANSWER KEY 3.4-1

 Scientific data processing


 Commercial data processing
 Data analysis
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.4-2


Data are printed out as required using computer
hardware/peripheral devices in accordance with standard
operating procedures
Learning objective:
After reading this information sheet you must be able to

1. Learn about the different types of peripheral devices and how they allow you to
do more with your computer.
Introduction
A peripheral device connects to a computer system to add functionality. Examples are a
mouse, keyboard, monitor, printer and scanner.

Definition
Say you just bought a new computer and, with excitement, you unpack it and set it all
up. The first thing you want to do is print out some photographs of the last family party.
So it's time to head back to the store to buy a printer. A printer is known as a peripheral
device.
A computer peripheral is a device that is connected to a computer but is not part of the
core computer architecture. The core elements of a computer are the central processing
unit, power supply, motherboard and the computer case that contains those three
components. Technically speaking, everything else is considered a peripheral device.
However, this is a somewhat narrow view, since various other elements are required for a
computer to actually function, such as a hard drive and random-access memory (or
RAM).
Most people use the term peripheral more loosely to refer to a device external to the
computer case. You connect the device to the computer to expand the functionality of the
system. For example, consider a printer. Once the printer is connected to a computer, you
can print out documents. Another way to look at peripheral devices is that they are
dependent on the computer system. For example, most printers can't do much on their
own, and they only become functional when connected to a computer system.

Types of Peripheral Devices


There are many different peripheral devices, but they fall into three general categories:

 Input devices, such as a mouse and a keyboard


 Output devices, such as a monitor and a printer
 Storage devices, such as a hard drive or flash drive

Input Peripherals
Some devices, such as the keyboard, mouse or drawing pad, are designed to allow you to
share data to your machine in the form of text commands in a language the computer
understands, or the correct positioning of a cursor with a mouse. Peripherals can also be
used for access purposes, such as typing in the proper password on the keyboard to
access the program menu. A scanner is another input peripheral that can be handy in a
Common Competency: Perform Computer Operations

business environment for bringing in text or digital images into a computer. These devices
might plug directly into your computer or be connected through a wireless setup.

Output Peripherals
Your business can also use peripherals that enhance what your computer produces.
Printers can share documentation of your system activity, such as an annual report or
envelopes to your customers. Monitors allow you to view the activity on a computer,
whether it's a workstation, a network that needs to be regularly monitored or a display in
the lobby. Speakers are also output peripherals and allow you to hear sounds, which is
especially helpful if you take part in online teleconferences and webinars.
Common Competency: Perform Computer Operations

SELF-CHECK 3.4-2

Identify the following devices. Write your answer if it’s input device,
output device or storage device.

1. Keyboard
2. Printer
3. Mouse
4. Flash drive
5. Monitor
6. Hard drive

ANSWER KEY 3.4-2

1. Input device
2. Output device
3. Input device
4. Storage device
5. Output device
6. Storage device
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.4-3


Files and data are transferred between compatible systems using
computer software, hardware/ peripheral devices in accordance
with standard operating procedures
Learning objective:
After reading this information sheet you must be able to
1. Transfer data into compatible systems

Data Transfer Method

Product Overview:
USB is integrated into a single standardized connector, so data transfers must be
performed by time-sharing of the protocol bus. Since all USB peripheral devices use the
same basic protocol, in order to allow data contents to convey different meanings, it is
necessary to use an upstream software stack closer to the application for processing, as
well as to handle the concept of time.

USB achieves this by categorizing transfers into 4 types: Interrupt, Bulk, Isochronous,
and Control. The peripheral devices can achieve optimal communication by selecting the
most suited method of transfer. In terms of data transfer rate, USB 1.x supports full-
Speed transfers at 12 Mbps and low-Speed transfers at 1.5 Mbps. USB 2.0 further
supports high-Speed transfers at 480 Mbps.

Four Types of Data Transfer


Interrupt Transfer
Human interface devices such as mice, keyboards, and joysticks are expected to be
capable of processing input signals fast enough so that the users do not feel a "lag."
Traditionally, detected input signals were handled as interrupt requests; however, with
USB, processes cannot be started as interrupt requests from the input device, as all data
transfer requests are initiated by the host. To work around this issue, the host "polls" the
input device periodically, for example every 10 ms, which is quick enough for reflecting
keyboard inputs to the screen without irritating the user. Under the USB specification,
this method with the host periodically transferring data is referred to as an "Interrupt
transfer."
The 1.5 Mbps low-Speed specification was designed primarily for low-cost input devices,
and is available only for use by devices that use the Interrupt transfers. Note that mice,
keyboards, and other input devices also require the use of Control transfers.
Bulk Transfer

Image input devices, printing devices, and storage devices such as printers, scanners,
digital cameras, memory card reader/writers, FDD, and DVD recorders are expected to
transfer large volumes of data with accuracy (i.e. without loss of data). For example, it is
Common Competency: Perform Computer Operations

not acceptable for printers to output faulty printouts due to corrupted data. "Bulk
transfer" can provide data transfers with high reliability. In order to maximize utilization
of the bus, however, Bulk transfers cannot be temporally controlled.

Data transfer rates for image input devices, printing devices, and storage devices vary
greatly depending on the availability of the bus. Hence, Bulk transfer is not suited for
applications that require strict management of the transfer rate. Note that image devices,
printing devices, and storage devices also require the use of Control transfers.
Isochronous Transfer
Audio and video devices such as speakers, microphones, telephones, and video
conferencing devices are expected to be capable of maintaining the concept of time. That
is, the devices must be able to transfer a certain amount of data on a periodic basis. USB
uses frames (or microframes in USB 2.0) to divide time into units, during which all data
transfers are executed.

The most important requirement for "Isochronous transfers" is to transfer a constant


amount of data over each time period. Hence, failed transfers are not retried under USB,
as doing so will make it difficult to maintain a consistent flow of time. Note that speakers
and other audio/video devices also require the use of Control transfers.
Control Transfer
Unlike Interrupt, Bulk, and Isochronous transfers, Control transfers have rules about the
content of the transferred data.

Control transfers are used to exchange device details, allocate USB addresses, and
configure devices, and are hence used by all devices.

TASK SHEET 3.4-3

Transfer data between compatible systems using computer


software, hardware/ peripheral devices.
Common Competency: Perform Computer Operations

LEARNING EXPERIENCES

LEARNING OUTCOME 5 – MAINTAIN COMPUTER EQUIPMENT AND


SYSTEMS

Learning Activities Special Instructions

1. Read information sheet # 3.5-1 Read, analyze and perform the information
on Systems for cleaning, minor and activities regarding information sheet #
maintenance and replacement of 3.5-1
consumables are implemented
2. Answer self-check # 3.5-1 Refer the answers to the answers key # 3.5-1

3. Read information sheet # 3.5-2 Read information sheet. After reading, the
on Procedures for ensuring learner is encouraged to answer the self- check
security of data, including regular provided.
back-ups and virus checks are
implemented in accordance with
standard operating procedures
4. Answer self-check # 3.5-2 Refer the answers to the answers key # 3.5-2
5. Read information sheet # 3.5-3 Read information sheet. After reading, the
on Basic file maintenance learner is encouraged to answer the self- check
procedures are implemented in provided.
line with the standard operating
procedures
6. Answer self-check # 3.5-3 Refer the answers to the answers key # 3.5-3
7. Read information sheet # 3.5-4 Read information sheet. After reading, the
on Document systems are learner is encouraged to answer the self- check
maintained provided.
8. Answer self-check # 3.5-4 Refer the answers to the answers key # 3.5-4
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.5-1


Systems for cleaning, minor maintenance and replacement of
consumables are implemented
Learning Objectives:
After reading this information sheet, the student/trainee should be able to:
 Clean, maintain and replace consumables of computer equipment.
From dusty computer fans to fingerprints on compact discs, computer parts and
devices can get awfully dirty from normal everyday use or when left sitting
unused. The best way to have any computer component cleaned is to have it
professionally serviced, but if you no longer have a service warranty, or if you
picked up a second-hand item and want to clean it to see if it even works, here are
some tips on how to clean some common items.
General Precautions
When working around electronics there are some precautions you should always
take when cleaning:
 The best way to clean any computer component or device is to follow the
manufacturer's instructions in your user manual.
- Always power off the system first
- Always use anti-static wristband or other professional grounding
devices
- Never work on carpeted surfaces
- Never spray cleaning fluids directly onto computer components.
Always spray the cleaner onto a cloth then wipe
- Do not allow any cleaner to run or drip near circuit boards, or near
seams on device casings.
- Never allow circuits or electronics to become damp or wet.
- Some cleaning solvents can damage components. In most cases,
water will work just as well.
- Cleaning electronics and circuit boards requires experience,
knowledge and special electronics cleaners. This type of cleaning is
best left to professionals.
General Cleaning Tricks & Tips
- If compressed air is too strong for little dust jobs, try using a plastic
liquid medicine plunger style dispenser. Pull the plunger all the way
back to fill it with air and then push it forward quickly for a quick
output of air to blow away dust in small places such as USB ports or
SD memory card slots. The small ends of these dispensers enable you
to reach a more concentrated area with the air then you could get
with just blowing our air yourself (from your mouth).
- When using compressed air, always release in short blasts. Longer
blasts can actually result in condensation.
Common Competency: Perform Computer Operations

- Anti-static cloths are great for attracting dust and are safe to use
around computer equipment.
- The cleaner you keep your work space, the cleaner your equipment
will be
- Be sure to hang on to your user manuals as they provide you with
the best cleaning methods for that particular device.
Computer maintenance
Data
 Backups
- Important data stored on computers may be copied and archived
securely so that, in the event of failure, the data and systems may be
reconstructed. When major maintenance such as patching is
performed, a backup is recommended as the first step in case the
update fails and reversion is required.
- Disk cleanup may be performed as regular maintenance to remove
these. Files may become fragmented and so slow the performance of
the computer. Disk defragmentation may be performed to combine
these fragments and so improve performance.
Legal issues
In the U.S.A, the Digital Millennium Copyright Act specifically exempts computer-
maintenance activities, so copies of copyright files may be made in the course of
maintenance provided that they are destroyed afterwards.
Software
Operating system
Operating-system files such as the Windows registry may require maintenance. A
utility such as a registry cleaner may be used for this. Also inbuilt Disk
defragmenter will also help.
Software updates
Software packages and operating systems may require regular updates to correct
software bugs and to address security weaknesses.
Replacement of consumables
Expenditure on computer systems does not stop with the initial purchase of the
hardware and software. Various computer supplies and consumables are needed
to keep a computer system operating. These include:
 paper for printers, photocopiers and fax machines
 ink and toner for printers, photocopiers and fax machines
 lubrication oil for various machines with moving parts
 spare replacement parts for various items
 storage disks of various kinds, such as floppy disks, tapes and CDs
 cables of various kinds
 cleaning materials
 tools for maintenance purposes
Common Competency: Perform Computer Operations

SELF-CHECK 3.5-1

Learn your mastery in Information Sheet 3.5-1 by answering the questions below:

Test 1. Write TRUE if the statement is correct and write FALSE if the
statement is incorrect.

____________1. Always power on the system first.


____________2. Be sure to hang on to your user manuals as they provide
you with the best cleaning methods for that particular device.
____________3. Important data stored on computers may be copied and
archived securely so that, in the event of failure, the data and systems
may be reconstructed.
____________4. Software packages and operating systems may require
regular updates to correct software bugs and to address security
weaknesses.
____________5. Some cleaning solvents can damage components. In most
cases, water will work just as well.

The trainee’s underpinning knowledge was


□ Satisfactory
□ Not Satisfactory
Common Competency: Perform Computer Operations

ANSWER SHEET 3.5-1


11. False
12. True
13. True
14. True
15. True
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.5-2


Procedures for ensuring security of data, including regular back-
ups and virus checks are implemented in accordance with
standard operating procedures
Learning objective:
After reading this information sheet you must be able to
1. Secure data.
Data security
Data security means protecting digital data, such as those in a database, from
destructive forces and from the unwanted actions of unauthorized users, such as
a cyber-attack or a data breach.
Disk encryption
Disk encryption refers to encryption technology that encrypts data on a hard disk
drive. Disk encryption typically takes form in either software (see disk encryption
software) or hardware (see disk encryption hardware). Disk encryption is often
referred to as on-the-fly encryption (OTFE) or transparent encryption.
Software versus hardware-based mechanisms for protecting data
Software-based security solutions encrypt the data to protect it from theft.
However, a malicious program or a hacker could corrupt the data in order to make
it unrecoverable, making the system unusable. Hardware-based security solutions
can prevent read and write access to data and hence offer very strong protection
against tampering and unauthorized access.
Hardware based security or assisted computer security offers an alternative to
software-only computer security. Security tokens such as those using PKCS#11
may be more secure due to the physical access required in order to be
compromised. Access is enabled only when the token is connected and correct PIN
is entered (see two-factor authentication). However, dongles can be used by
anyone who can gain physical access to it. Newer technologies in hardware-based
security solves this problem offering full proof security for data.
Working of hardware-based security: A hardware device allows a user to log in, log
out and set different privilege levels by doing manual actions. The device uses
biometric technology to prevent malicious users from logging in, logging out, and
changing privilege levels. The current state of a user of the device is read by
controllers in peripheral devices such as hard disks. Illegal access by a malicious
user or a malicious program is interrupted based on the current state of a user by
hard disk and DVD controllers making illegal access to data impossible.
Hardware-based access control is more secure than protection provided by the
operating systems as operating systems are vulnerable to malicious attacks by
Common Competency: Perform Computer Operations

viruses and hackers. The data on hard disks can be corrupted after a malicious
access is obtained. With hardware-based protection, software cannot manipulate
the user privilege levels. It is impossible for a hacker or a malicious program to
gain access to secure data protected by hardware or perform unauthorized
privileged operations. This assumption is broken only if the hardware itself is
malicious or contains a backdoor. The hardware protects the operating system
image and file system privileges from being tampered. Therefore, a completely
secure system can be created using a combination of hardware-based security and
secure system administration policies.
Backups
Backups are used to ensure data which is lost can be recovered from another
source. It is considered essential to keep a backup of any data in most industries
and the process is recommended for any files of importance to a user.
Data masking
Data masking of structured data is the process of obscuring (masking) specific
data within a database table or cell to ensure that data security is maintained and
sensitive information is not exposed to unauthorized personnel. This may include
masking the data from users (for example so banking customer representatives
can only see the last 4 digits of a customers national identity number), developers
(who need real production data to test new software releases but should not be
able to see sensitive financial data), outsourcing vendors, etc.
Data erasure
Data erasure is a method of software based overwriting that completely destroys
all electronic data residing on a hard drive or other digital media to ensure that no
sensitive data is lost when an asset is retired or reused.
Common Competency: Perform Computer Operations

SELF CHECK 3.5-2

What are the different types of securing data?

ANSWER SHEET 3.5-2

 Disk encryption
 Software versus hardware-based mechanisms for protecting data
 Backups
 Data masking
 Data erasure
Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.5-3


Basic file maintenance procedures are implemented in line with
the standard operating procedures
Learning objective:
After reading this information sheet you must be able to
1. Know the procedure on how to maintain files on your computer
Step 1: Uninstall Programs You Don't Use
Over time, unused software collects in our computers like old keys in a drawer: They were
useful for a time, but chances are you can't remember what they are for now. So if you
haven't used a program in the last six months, uninstall it to free up space and allow
your computer to run the important stuff more efficiently.
To do this, go to the Windows Start button, choose "Control Panel" select "Program and
Features" or "Install/Uninstall Programs," depending on the Windows version. Scan the
list. If you see a program you recognize and know you don't use it, right click on its name,
and then click uninstall. If you are unsure about a program, leave it alone.
Step 2: Delete Temporary and Unnecessary Files
Each time you visit a site online, your computer stores information so the next time you
visit, the page will load faster. This is good in principle, but temporary files add up over
time, and may ultimately slow the load time of applications. If you haven't deleted
temporary files in a year or longer, you may be able to free up 10 percent or more of the
computer's memory.

To do this, go back to the Start button, select "Computer" or "My Computer," right click
on the "C" drive, select "Properties" click on "Disk Cleanup" and select "All Users" if you
get a popup window with that option. Once you give it the go-ahead, Disk Cleanup will
calculate how much space you will be able to free up. Click to check the boxes in this
window. If you disagree with Disk Cleanup's recommendations, simply make sure that
box is unchecked. And then stop – don't click "Okay" yet. Rather, select the "More
Options" tab and proceed to Step 3.
Step 3: Delete All but Most Recent System Restore

Free up more disk space by removing all but the most recent restore point. As a standard
function,Windows takes a snapshot of the contents of your computer at regular intervals.
This procedure will keep only the most recent one.

Click "Clean up." This takes a fraction of a second, but as you proceed with the Disk
Cleanup, be patient. This process may take up to half an hour or longer if it's been some
time since the last cleanup.
Step 4: Defrag
Data is written and stored in disk blocks. Over time, files are deleted and new files are
added. If a file cannot be stored in adjacent blocks, they become fragmented. One 5
megabyte jpg. photo file, for example, could be scattered across 5,000 disk blocks. Instead
of pulling the pieces of a file from adjacent blocks, the computer has to gather them up,
Common Competency: Perform Computer Operations

which of course takes longer. Defragging is simply a way of eliminating empty blocks and
putting files back together.
Your Properties window should still be open. Select Tools. Click on "Defragment Now."
This process may be scheduled as an automatic task about once a week.
Step 5: Scan for Viruses, Spyware, etc.

Now that your computer is clean, use your security software to do a sweep for viruses,
worms, and spyware that can damage your computer and compromise your privacy. This
step should be faster now because you've already deleted unnecessary programs and files,
which can save scan time.
Common Competency: Perform Computer Operations

TASK SHEET 3.5-3

Perform the process on maintaining the files on your computer.


Common Competency: Perform Computer Operations

INFORMATION SHEET NO 3.5-4


Document systems are maintained
Learning objective:
After reading this information sheet you must be able to
1. Maintain document systems.

Document management system


A document management system (DMS) is a system (based on computer programs
in the case of the management of digital documents) used to track, manage and
store documents and reduce paper. Most are capable of keeping a record of the
various versions created and modified by different users (history tracking). The
term has some overlap with the concepts of content management systems. It is
often viewed as a component of enterprise content management (ECM) systems
and related to digital asset management, document imaging, workflow systems
and records management systems.
The following are important aspects of document control:
 reviewing and approving documents prior to release
 reviews and approvals
 ensuring changes and revisions are clearly identified
 ensuring that relevant versions of applicable documents are available at
their "points of use"
 ensuring that documents remain legible and identifiable
 ensuring that external documents (such as customer-supplied documents
or supplier manuals) are identified and controlled
 preventing “unintended” use of obsolete documents
Document management software
Paper documents have long been used in storing information. However, paper can
be costly and, if used excessively, wasteful. Document management software is
not simply a tool but it lets a user manage access, track and edit information
stored. Document management software is an electronic cabinet that can be used
to organize all paper and digital files. The software helps the businesses to
combine paper to digital files and store it into a single hub after it is scanned and
digital formats gets imported. Web based document management software are
becoming the staple of the industry.
Common Competency: Perform Computer Operations

SELF-CHECK 3.5-4

What are the important aspects of document control?

ANSWER SHEET 3.5-4


 reviewing and approving documents prior to release
 reviews and approvals
 ensuring changes and revisions are clearly identified
 ensuring that relevant versions of applicable documents are available at their
"points of use"
 ensuring that documents remain legible and identifiable
 ensuring that external documents (such as customer-supplied documents or
supplier manuals) are identified and controlled
 preventing “unintended” use of obsolete documents

You might also like