Sie sind auf Seite 1von 56

DIVISION CAPACITY

BUILDING ON ICT
INSTRUCTION FOR
GRADES 4 - 6 TEACHERS
December 5 – 7, 2017
Bagacay Integrated School
TECHNICAL SAFETY
PRECAUTIONS AND BASIC
PC OPERATIONS

SESSION NO. 3
ELVIN G. PRETENCIO
ICT Coordinator – PilarNAHS
Session Objectives
• Identify fundamental desktop PC peripherals
• Define computer related terms
• Be acquainted with technical precautions in
operating a PC and internet safety tips
• Demonstrate basic PC operations
• Understand ethical considerations in the use of ICT
• Exercise safety measures in operating a PC and
navigating the internet
Information Communication Technology

The term ICT is generally accepted to mean all


technologies that, combined, allow people and
organizations to interact in the digital world.
Information Communication Technology

ICT in education is focused mainly on the functionality of


desktop computer in performing work tasks, creating
media contents and products and for communication.
Building a Desktop PC in the Classroom

EXTERNAL PARTS INTERNAL PARTS


Building a Desktop PC in the Classroom

EXTERNAL PARTS
Keyboard Mouse Speakers

Voltage Regulator Monitor Screen

Power Cord VGA/HDMI Cable

Audio Jack DVD/CD Drive System Box


Building a Desktop PC in the Classroom

INTERNAL PARTS
Hard Disk Motherboard RAM

CPU Video, Audio & LAN Card

Power Supply SATA Cable

Cooling & Exhaust Fans CMOS Battery


Processing
• What have you felt after the activity?
• Did your group able to get a lot of correct
answers?
• How did you arrive at the correct answers?
• What does the score of the group tell you
about your competence in handling a
computer?
Definition of Common ICT Terms
Hardware – Any physical parts or components of
the computer

Software – Any programs or applications running


inside the computer

End User – The person to whom the program or


application is intended
Operating System – a software running the whole
computer’s basic function, scheduling tasks,
executing applications and controlling peripherals

Desktop – the home screen of a computer


containing icons, shortcuts, and files

PC – Personal Computer, a digital device based on


a micro processor which can be used by one person
at a time

Internet – Millions of computers around the world


connected together by telephone lines, cables or
satellites.
Online – a status when the computer is
connected to the internet

Offline - a status when disconnected with the


internet

Web Browser – a program which allow one to


surf the internet
TECHNICAL SAFETY
PRECAUTION
General Safety
• Risk assessment is important prior to any
operations in the computer workstation
• Five-Step Risk Assessment
1. Look for the hazards
2. Decide who might be harmed and how
3. Evaluate risks and decide whether existing
precautions are adequate or whether more
needs to be done
4. Record your findings
5. Review your risk assessment from time to
time and revise it
Common Hazards in a Computer
Workstation
• Unsuitable work desks and chairs
• Substandard computer peripherals
• Limited work space
• Faulty electrical wirings
• Poor room ventilation
• Poor lightings
• Flooded rooms
The Workstation
• Desks:
– big enough to allow the user to arrange the
screen, keyboard, documents, etc in a flexible
way
– have a matt surface
– big enough to let the user work comfortably &
change position
– be stable and positioned so that it's
comfortable and easy to use
• Chair:
– be stable and allow the user to work
comfortably
– be adjustable in height
– have a seat back adjustable in height and tilt
Keyboard Legal Requirement
• Keyboards should:
– be tilt adjustable and separate from the
screen to allow the user to work
comfortably
– have enough space in front of them to allow
the user to rest their hands and arms when
not keying
• You should also ensure that users:
– adjust the keyboard to get a comfortable
position
– keep their wrists straight when keying
– use the keys lightly and not overstretch their
fingers
– take frequent breaks
Pointing Device Legal Requirement
• Minimise risk by:
– Train user to use the mouse with relaxed arm
and a straight wrist
– informing the user that their fingers should rest
lightly on the buttons and not press too hard
– ensuring the device is suitable for the task
– training the user in keyboard shortcuts
– training the user to adjust the software
settings - these control the reaction time
between the mouse and the cursor on the
screen
Desktop PC Assembly
• Build the internal parts first then connect
external parts of the desktop computer
• Never touch internal parts
• Do not attempt PC Assembly when hands are
wet or when on barefoot
• Double check connections of parts before
plugging to power source
• Inspect and clean computer parts regularly
Anti-static Wrist Wrap
Internet Connectivity Safety Tips
• Internet security tackles these issues:
– Browsing the internet
– Electronic commerce
– Social networking
– Emailing
• Harmful and unwanted computer programs and
codes can be obtained via external sources like the
internet or removable storage devices
• Firewall, Internet Security, Antivirus and Anti-
spyware programs do the protection job well
however these things can charge certain amount of
cost.
• Update internet security and antivirus
programs with the latest protection modules
• Do not visit suspicious sites and pop-up
advertisements
• Most threats are targeted in hopes that you will
click on a harmful link, attachment, picture,
video or icon in an email or web page
• Do not open SPAM emails including those
emails coming from anonymous persons
• Do not reveal salient personal information such
as address, license numbers, bank
information, whereabouts and the like to chat
rooms and social media sites
• Protect your usernames and passwords and
never share such to anyone
• Log out your account after use
• Do not shop electronically to sites which are
untrusted and not secured
• Do not download pirated media content
• Do not meet a person whom you just know
virtually in the internet
Types of Malware
• Virus - software that can replicate itself and
spread to other computers or that are
programmed to damage a computer by
deleting files, reformatting the hard disk, or
using up computer memory
• Adware - Software that is financially supported
(or financially supports another program) by
displaying ads when you're connected to the
internet
• Spyware - software that surreptitiously gathers
information and transmits it to interested parties.
Information gathered includes visited websites,
browser/system information, and your computer's
IP address
• Browser Hijacking Software - Advertising software
that modifies your browser settings, creates
desktop shortcuts, and displays intermittent
advertising pop-ups. Once a browser is hijacked,
the software may also redirect links to other sites
that advertise, or sites that collect web usage
information
How Malware Gets Through
• Software that comes bundled with other
software is often called a "Trojan Horse"
• Peer-to-peer file sharing software bundles
various types of malware that are categorized
as spyware or adware
• Software that promises to speed up your
internet connection or assist with downloads
will often contain adware
• Another common way to infect a computer is
through email containing a seemingly benign
link or attachment
• Visiting malicious sites oftentimes cause
accidental or unintentional entry of computer
virus
Suggested FREE protection programs
• Download Panda Cloud Antivirus:
– http://www.pandasecurity.com/usa/homeusers/solutio
ns/free-antivirus/
• Download SMADAV 2017 Rev. 11.5:
– http://www.smadav.net/?lang=en

Installation requires internet connection.


BASIC DESKTOP PC
OPERATION
Turning On & Off the Desktop PC
• Plug the power cord to an electrical outlet. Use a
voltage regulator to prevent damaging your
computer from fluctuating electricity.
• Do not attempt to connect power cords to
electrical outlets when hands are wet.
• Press the power button and log-in to windows.
• When done, click windows icon on the desktop or
press windows button on the keyboard; then
select Shut Down computer.
• Turn off voltage regulator and unplug socket.
Power Button
The Mouse
• You can use your mouse to do a variety of tasks –
select things, open things and move things.
• To select things, move your cursor over the item,
click once with the left button and let go.
• To open things click twice on the left button – think
‘knock, knock’ on a door.
• To move things, you need to ‘drag and drop’. Hold
down the left button as you ‘drag’ the mouse
along. Let go of the button once you have
positioned the item where you want it
Basic Mouse Actions
The Keyboard
• The keyboard is for putting information such as
letters, words and numbers into your computer.
The keys are the individual buttons you press
when you type
• When you open a document or click in a box to
type, you will see a flashing vertical line. This
is the cursor. It tells you where you are going
to start typing on the page or screen
Buttons in the keyboard are arranged in QWERTY
layout.
Copy, Cut and Paste a File
Using the Mouse
• Point and right-click the file. Then, select “Copy”
from the drop down menu
• Go and right-click the desired area in the
computer or external device. From the drop-down
menu, select “Paste” to keep the copied file.
• To MOVE file to any location in the computer or
external device, simply do the same procedure
above but select “Cut” instead of “Copy”
Copy and Paste a File
Using the Keyboard
• Point and left-click the file. Then, press CTRL + C
(shortcut command for copy)
• Go to the desired area in the computer or external
device and place the file by pressing CTRL + V
(shortcut command for paste)
• To MOVE file to any location in the computer or
external device, simply do the same procedure
above but press CTRL + X instead of CTRL + C
Storing file Using Media Library
• Windows has default destination folders for
various media like documents, downloads,
pictures, music, and videos
• Simply click File Explorer Icon or This PC icon
Creating a new folder
Using the Mouse
• Navigate to the location where you want to
create the folder
• Right-click on a blank space in the folder
location
• Select “New” then “Folder” on the drop down
menu
• Enter your desired folder name
Creating a new folder
Using the Keyboard Shortcut
• Navigate to the location where you want to
create the folder
• Hold down the Ctrl, Shift, and N keys at the
same time
• Enter your desired folder name
Installing a Program or Application
• Purchase installation disk(s) from a reputable
computer shop or download installation file(s)
from secure websites
• For installation disk(s), simply insert the media
to the DVD/CD Drive and wait for the auto-run
selection. Click run “Setup.exe,” choose “Yes”
and follow installation wizard
• For downloaded installation file, double click
“Setup.exe” or any executable file (.exe)
present
Extending your Display to a Projector
• Connect computer and projector using VGA or
HDMI cable
• Power on the projector and position the unit as
desired
• In a regular operation, the computer display will
automatically be projected on the projector screen
• If NO DISPLAY is projected, simply press windows
icon on the keyboard plus letter p (Windows Icon +
+ P)
• Choose the desired display whether “duplicate” or
“extend” or “projector only”
ETHICS IN ICT &
ENTREPRENEURSHIP
ETHICS IN ICT
• Do not post private and sensitive messages
online.
• Do not send offensive and derogatory
messages via social media apps or sites
• Do not respond to any messages that are
mean or in any way make one feel
uncomfortable
• Do not upload private photos in the internet
• Do not download illegal or pirated programs or
apps
• Do not reproduce, distribute and/or sell illegal
or pirated programs or apps
• Avoid fights in online messaging sites
• Be a good citizen online
• Respect intellectual property rights
• Site original authors of visual, audio and
literary content posted in the internet
• Respect freedom of expression
APPLICATION
• Click windows icon, locate and open Notepad
app.
• On the notepad, type your personal
commitment statement to safely and
competently teach about ICT in EPP/TLE
class.
• Save as to My Documents or Documents with
the filename “complete name_pc” (Example:
christopherdsalino_pc)
“The goal is not perfection but
continuous improvement.”
THANK YOU FOR
LISTENING!

Elvin G. Pretencio
READ ME
(DELETE THIS SLIDE AFTER READING)
FONT STYLE: ARIAL
FONT SIZE:
SESSION TITLE OPENING: 44 (BOLD)
NAME OF FACI: 32
HEADING: 40
TEXT: 32
SECTION HEADER/SUB-TOPIC: 40 (BOLD)
CLOSING STATEMENT/QUOTE: 32 (ITALICS)
SESSION CLOSING: 40

NOTE: IMPROVISE IF NEEDED.

Das könnte Ihnen auch gefallen