Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

3 CBLM

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

COMPETENCY-BASED LEARNING MATERIALS

SECTOR: TOURISM (HOTEL AND RESTAURANT)


QUALIFICATION: HOUSEKEEPING NCII
UNIT OF COMPETENCY: PERFORM COMPUTER OPERATIONS
MODULE TITLE: PERFORMING COMPUTER OPERATIONS

PREPARED BY:

.
Daet, Camarines Norte

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL

Welcome to the Module PERFORMING COMPUTER OPERATIONS.


This module contains training materials for and activities for you to
complete.

The unit of competency “PERFORM COMPUTER OPERATIONS”


contained the knowledge and skills and attitudes required for Housekeeping.
It is one of the specialized modules at National Certificate Level II (NC II).

You are required to do through a series of learning activities in order


to complete each learning outcomes of the module. In each learning outcome
there are Information Sheets to help you better understand the required
activities. Follow these activities on your own and answer the Self Check at
the end of each learning outcome. You may provide a blank Answer Sheet
to write your answers for each self-check. If you have questions, don’t
hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered
in this learners guide because you have:

 Been working for some time


 Already completed training in this area

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 2 of 42
NCII Developed by:
Revision # 02
If you can demonstrate to your trainer that you are competent in a
particular outcome, you don’t have to do the same training again. Talk to
your trainer about having them formally recognized. If you have a
qualification or certificate of competence from previous training, show it to
your trainer. If the skills you acquired are still current and relevant to the
unit/s of competency they may become part of evidence you can present to
RPL. If you are not sure about the currency of your skills discuss this with
your trainer.

After completing this module ask your trainer to assess your


competency. Result of your assessment will be recorded in your competency
profile. All the learning activities are designed for you to complete at your
own pace.

HOUSEKEEPING NCII
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code


Develop and update Developing and update
TRS311201
1. industry knowledge industry knowledge
Observe workplace Observing workplace TRS311202
2. hygiene procedures hygiene procedures
Perform computer Performing computer TRS311203
3. operations operations

Perform workplace Performing workplace TRS311204


4.
safety practices safety practices

Provide effective Providing effective TRS311205


5.
customer services customer services

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 3 of 42
NCII Developed by:
Revision # 02
MODULE CONTENT

UNIT OF COMPETENCY : PERFORM COMPUTER OPERATIONS

MODULE TITLE : PERFORMING COMPUTER OPERATIONS

MODULE DESCRIPTOR : This module covers the knowledge, skills


and attitudes needed to perform computer
operations. This includes in putting, accessing,
producing and transferring data using
appropriate hardware and software.
NOMINAL DURATION : 3 hours

LEARNING OUTCOMES

At the end of this module you MUST be able to:

LO 1. Plan and prepare the task to be undertaken


LO 2 Input data into the computer
LO3. Access information using computer
LO 4. Produce output data using computer system
LO 5. Maintain computer equipment and system

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 4 of 42
NCII Developed by:
Revision # 02
ASSESSMENT CRITERIA

1 Requirements of the task undertaken are determine and properly


understood
2 Appropriate hardware and software is selected in accordance with the
task assigned and required outcome
3 Planned tasked conformed with the OHS guidelines and procedures
4 Entered data into the computer using appropriate
program/application is in accordance with company procedures
5 Accuracy of information is checked in accordance with the standard
operating procedures
6 Information is saved in accordance with the standard operating
procedures
7 Inputted data that are stored in the storage media are in accordance
with the requirements
8 Work is performed within the ergonomic guidelines.
9 Correct program/application is selected based on job requirements
10 Program/application containing the information required is accessed
in accordance with the company procedures
11 Desktop icons are correctly selected, opened and closed for navigation
purposes.
12 Keyboard techniques is carried out in line with OHS requirements for
safe use of keyboard.
13 Entered data is processed using appropriate software commands
14 Printed out data as required using computer hardware/peripheral
devices is in accordance with standard operating procedures
15 Transferred files/data between compatible systems using computer
software, hardware/peripheral devises is in accordance with standard
operating procedures
16 Cleaning, minor maintenance and replacement of consumables are
implemented in accordance with standard operating procedures
17 Procedures for ensuring security of data including regular back-ups
and virus checks are implemented in accordance with standard
operating procedures
18 Basic file maintenance procedures are implemented in line with the
standard operating procedures

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 5 of 42
NCII Developed by:
Revision # 02
LEARNING OUTCOME NO. 1
PLAN AND PREPARE THE TASK TO BE UNDERTAKEN

Contents:

1. The Computer

ASSESSMENT CRITERIA:
1. Requirements of the task undertaken are determine and properly
understood
2. Appropriate hardware and software is selected in accordance with the
task assigned and required outcome
3. Planned tasked conformed with the OHS guidelines and procedures

CONDITION:
The trainees/students must be provided with the following:
Equipment and Accessories
personal computer
network system
communication equipment
scanner
printer
keyboard
mouse
Supplies and Materials
office supplies diskettes

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 6 of 42
NCII Developed by:
Revision # 02
CDs Zip disks
Tools
Set of screw driver

Learning Materials
Learning elements/activity sheets
Manufacturer’s manual

METHODOLOGY:
1. Self paced/modular
2. Demonstration

ASSESSMENT METHODS
1. Written/Oral examination
2. Practical demonstration

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 7 of 42
NCII Developed by:
Revision # 02
Learning Experiences
Learning Outcome 1:
PLAN AND PREPARE THE TASK TO BE UNDERTAKEN
Learning Activities Special Instructions
Read Information Sheet 3.1-1 on
Go through the Information Sheets
The Computer and answer the self-checks to
Answer Self-check 3.1-1 on The ensure that knowledge on selecting
Computer the remedial therapeutic massage
View Multimedia Presentation principles to determine treatment
strategy are acquired.

Use a separate sheet of paper when


answering the Self-check. This
module is the property of the
training center. Please do not write
anything on it.

Make sure you do not look at the


Answer Key when answering the
self-checks.

Be sure that you are well-versed in


the contents of the Information
Sheet before proceeding to the next
Information Sheet.

After doing all activities in this

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 8 of 42
NCII Developed by:
Revision # 02
Learning Outcome, you are ready to
proceed to the next Learning
Outcome

Information Sheet 3.1-1

THE COMPUTER
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Gain basic computer knowledge

A computer is a machine that can be programmed to manipulate symbols.


Its principal characteristics are:

 It responds to a specific set of instructions in a well-defined manner.


 It can execute a prerecorded list of instructions (a program).
 It can quickly store and retrieve large amounts of data.

Therefore computers can perform complex and repetitive procedures


quickly, precisely and reliably. Modern computers are electronic and digital.
The actual machinery (wires, transistors, and circuits) is called hardware;
the instructions and data are called software. All general-purpose computers
require the following hardware components:

 Central processing unit (CPU): The heart of the computer, this is the
component that actually executes instructions organized in programs
("software") which tell the computer what to do.
 Memory (fast, expensive, short-term memory): Enables a computer to
store, at least temporarily, data, programs, and intermediate results.
 Mass storage device (slower, cheaper, long-term memory): Allows a
computer to permanently retain large amounts of data and programs
between jobs. Common mass storage devices include disk drives and
tape drives.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 9 of 42
NCII Developed by:
Revision # 02
 Input device: Usually a keyboard and mouse, the input device is the
conduit through which data and instructions enter a computer.
 Output device: A display screen, printer, or other device that lets you
see what the computer has accomplished.

In addition to these components, many others make it possible for the basic
components to work together efficiently. For example, every computer
requires a bus that transmits data from one part of the computer to
another.

II, Computer sizes and power

Computers can be generally classified by size and power as follows, though


there is considerable overlap:

 Personal computer: A small, single-user computer based on a


microprocessor.
 Workstation: A powerful, single-user computer. A workstation is like a
personal computer, but it has a more powerful microprocessor and, in
general, a higher-quality monitor.
 Minicomputer: A multi-user computer capable of supporting up to
hundreds of users simultaneously.
 Mainframe: A powerful multi-user computer capable of supporting
many hundreds or thousands of users simultaneously.
 Supercomputer: An extremely fast computer that can perform
hundreds of millions of instructions per second.

III, Personal Computer Types

Actual personal computers can be generally classified by size and chassis /


case. The chassis or case is the metal frame that serves as the structural
support for electronic components. Every computer system requires at least
one chassis to house the circuit boards and wiring. The chassis also
contains slots for expansion boards. If you want to insert more boards than
there are slots, you will need an expansion chassis, which provides
additional slots. There are two basic flavors of chassis designs–desktop
models and tower models–but there are many variations on these two basic
types. Then come the portable computers that are computers small enough
to carry. Portable computers include notebook and subnotebook computers,
hand-held computers, palmtops, and PDAs.

Tower model

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 10 of 42
NCII Developed by:
Revision # 02
The term refers to a computer in which the power supply, motherboard, and
mass storage devices are stacked on top of each other in a cabinet. This is in
contrast to desktop models, in which these components are housed in a
more compact box. The main advantage of tower models is that there are
fewer space constraints, which makes installation of additional storage
devices easier.

Desktop model

A computer designed to fit comfortably on top of a desk, typically with the


monitor sitting on top of the computer. Desktop model computers are broad
and low, whereas tower model computers are narrow and tall. Because of
their shape, desktop model computers are generally limited to three internal
mass storage devices. Desktop models designed to be very small are
sometimes referred to as slimline models.

Notebook computer

An extremely lightweight personal computer. Notebook computers typically


weigh less than 6 pounds and are small enough to fit easily in a briefcase.
Aside from size, the principal difference between a notebook computer and a
personal computer is the display screen. Notebook computers use a variety
of techniques, known as flat-panel technologies, to produce a lightweight
and non-bulky display screen. The quality of notebook display screens
varies considerably. In terms of computing power, modern notebook
computers are nearly equivalent to personal computers. They have the same
CPUs, memory capacity, and disk drives. However, all this power in a small
package is expensive. Notebook computers cost about twice as much as
equivalent regular-sized computers. Notebook computers come with battery
packs that enable you to run them without plugging them in. However, the
batteries need to be recharged every few hours.

Laptop computer

A small, portable computer -- small enough that it can sit on your lap.
Nowadays, laptop computers are more frequently called notebook
computers.

Subnotebook computer

A portable computer that is slightly lighter and smaller than a full-sized


notebook computer. Typically, subnotebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 11 of 42
NCII Developed by:
Revision # 02
Hand-held computer

A portable computer that is small enough to be held in one’s hand. Although


extremely convenient to carry, handheld computers have not replaced
notebook computers because of their small keyboards and screens. The
most popular hand-held computers are those that are specifically designed
to provide PIM (personal information manager) functions, such as a calendar
and address book. Some manufacturers are trying to solve the small
keyboard problem by replacing the keyboard with an electronic pen.
However, these pen-based devices rely on handwriting recognition
technologies, which are still in their infancy. Hand-held computers are also
called PDAs, palmtops and pocket computers.

Palmtop

A small computer that literally fits in your palm. Compared to full-size


computers, palmtops are severely limited, but they are practical for certain
functions such as phone books and calendars. Palmtops that use a pen
rather than a keyboard for input are often called hand-held computers or
PDAs. Because of their small size, most palmtop computers do not include
disk drives. However, many contain PCMCIA slots in which you can insert
disk drives, modems, memory, and other devices. Palmtops are also called
PDAs, hand-held computers and pocket computers.

PDA

Short for personal digital assistant, a handheld device that combines


computing, telephone/fax, and networking features. A typical PDA can
function as a cellular phone, fax sender, and personal organizer. Unlike
portable computers, most PDAs are pen-based, using a stylus rather than a
keyboard for input. This means that they also incorporate handwriting
recognition features. Some PDAs can also react to voice input by using voice
recognition technologies. The field of PDA was pioneered by Apple Computer,
which introduced the Newton MessagePad in 1993. Shortly thereafter,
several other manufacturers offered similar products. To date, PDAs have
had only modest success in the marketplace, due to their high price tags
and limited applications. However, many experts believe that PDAs will
eventually become common gadgets.

PDAs are also called palmtops, hand-held computers and pocket computers.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 12 of 42
NCII Developed by:
Revision # 02
Self- Check 3.1-1

SIMPLE MATCHING: Write the letter of the best answer in your answer
sheet.

Type of Computer Description


1 Handheld computer a. a handheld device that combines computing,
telephone/fax, and networking features
2 Laptop computer b. A small, portable computer -- small enough that
it can sit on your lap.
3 Notebook computer c. The term refers to a computer in which the
power supply, motherboard, and mass storage
devices are stacked on top of each other in a
cabinet
4 PDA d. An extremely lightweight personal computer.
5 Tower model e. A portable computer that is small enough to be
held in one’s hand.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 13 of 42
NCII Developed by:
Revision # 02
ANSWER KEY 3.1-1

1. E
2. B
3. D
4. A
5. C

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 14 of 42
NCII Developed by:
Revision # 02
LEARNING OUTCOME NO. 2
INPUT DATA INTO THE COMPUTER

Contents:

1. Standard operating procedures in entering and saving data into the


computer

ASSESSMENT CRITERIA:

1. Sources of information on the industry are accessed and applied


2. Industry information is correctly applied to day-to-day activity
3. Information to assist effective work performance is obtained

CONDITION:
The trainees/students must be provided with the following:
Equipment and Accessories
personal computer
network system
communication equipment
scanner
printer
keyboard
mouse

Supplies and Materials


office supplies
diskettes
CDs
Zip disks
Tools

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 15 of 42
NCII Developed by:
Revision # 02
Set of screw driver

Learning Materials
Learning elements/activity sheets
Manufacturer’s manual

METHODOLOGY:
1. Self paced/modular
2. Demonstration

ASSESSMENT METHODS
1. Written/Oral examination
2. Practical demonstration

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 16 of 42
NCII Developed by:
Revision # 02
Learning Experiences

Learning Outcome 2:
INPUT DATA INTO THE COMPUTER

Learning Activities Special Instructions


Read Information Sheet 3.2-1 on Go through the Information Sheets
Standard operating procedures in and answer the self-checks to
entering and saving data into the ensure that knowledge on selecting
computer the remedial therapeutic massage
Answer Self-check 3.2-1 Standard principles to determine treatment
operating procedures in entering and strategy are acquired.
saving data into the computer
View Multimedia Presentation
Use a separate sheet of paper when
answering the Self-check. This
module is the property of the
training center. Please do not write
anything on it.

Make sure you do not look at the


Answer Key when answering the
self-checks.

Be sure that you are well-versed in


the contents of the Information
Sheet before proceeding to the next
Information Sheet.

After doing all activities in this


Learning Outcome, you are ready to
proceed to the next Learning
Outcome

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 17 of 42
NCII Developed by:
Revision # 02
Information Sheet 3.2-1

STANDARD OPERATING PROCEDURES IN ENTERING AND SAVING


DATA INTO THE COMPUTER

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the standard operating procedures in entering and saving
data into the computer

Storage media are devices that store application and user information. The
primary storage media for a computer is usually the internal hard drive.
Most internal drives are regular IDE hard drives that come with the
computer. A removable drive is another popular storage device that is
usually connected by firewire, USB, or parallel port (e.g. portable Zip drives,
Jaz drives, or CD/DVD drives). Newer forms of external storage include USB
thumb drives and camera storage media.

Most external drives enable flexible data transfer from one computer to
another. A computer that has had external drives connected to it usually
has evidence in the computer’s registry of using the subject device. When
performing a forensic examination during discovery proceedings for
litigation, determining if external drives were connected to the computer
may help in obtaining additional evidence for discovery.

How Is Data Stored in a Computer?

Computer data storage is a complex subject, but it can be broken down into
three basic processes. First, data is converted to simple numbers that are
easy for a computer to store. Second, the numbers are recorded by hardware
inside the computer. Third, the numbers are organized, moved to temporary
storage and manipulated by programs, or software.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 18 of 42
NCII Developed by:
Revision # 02
Hard disk drives use magnetism to store numbers.

credit: Wavebreakmedia Ltd/Wavebreak Media/Getty Images

Binary Numbers

Every piece of data in a computer is stored as a number. For example,


letters are converted to numbers, and photographs are converted to a large
set of numbers that indicate the color and brightness of each pixel. The
numbers are then converted to binary numbers. Conventional numbers use
ten digits, from 0-9, to represent all possible values. Binary numbers use
two digits, 0 and 1, to represent all possible values. The numbers 0 through
8 look like this as binary numbers: 0, 1, 10, 11, 100, 101, 110, 111, 1000.
Binary numbers are very long, but with binary numbers any value can be
stored as a series of items which are true (1) or false (0), such as
North/South, Charged/Uncharged, or Light/Dark.

By Timothy Smithee

Self- Check 3.2-1

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 19 of 42
NCII Developed by:
Revision # 02
TRUE OR FALSE : Write T if the statement is correct and F if the statement
is wrong.

1. Every piece of data in a computer is stored as a letter.


2. Binary numbers use two digits, 0 and 1, to represent all possible
values.
3. Storage media are devices that store application and user information.
4. Most external drives enable flexible data transfer from one computer
to another.
5. A computer that has had external drives connected to it usually has
evidence in the computer’s registry of using the subject device.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 20 of 42
NCII Developed by:
Revision # 02
ANSWER KEY 3.2-1

1. F
2. F
3. T
4. T
5. T

LEARNING OUTCOME NO. 3


ACCESS INFORMATION USING COMPUTER

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 21 of 42
NCII Developed by:
Revision # 02
Contents:

1. Procedures/Techniques in Accessing Information

ASSESSMENT CRITERIA:

1. Correct program/application is selected based on job


requirements
2. Program/application containing the information required is
accessed in accordance with the company procedures
3. Desktop icons are correctly selected, opened and closed for
navigation purposes.
4. Keyboard techniques is carried out in line with OHS requirements
for safe use of keyboards

CONDITION:
The trainees/students must be provided with the following:
Equipment and Accessories
personal computer
network system
communication equipment
scanner
printer
keyboard
mouse

Supplies and Materials


office supplies
diskettes
CDs
Zip disks
Tools

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 22 of 42
NCII Developed by:
Revision # 02
Set of screw driver

Learning Materials
Learning elements/activity sheets
Manufacturer’s manual

METHODOLOGY:
3. Self paced/modular
4. Demonstration

ASSESSMENT METHODS
3. Written/Oral examination
1. Practical demonstration

Learning Experiences

Learning Outcome 3:

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 23 of 42
NCII Developed by:
Revision # 02
ACCESS INFORMATION USING COMPUTER
Learning Activities Special Instructions
Read Information Sheet 3.3-1 on Go through the Information Sheets
Procedures/Techniques in Accessing and answer the self-checks to
Information ensure that knowledge on selecting
the remedial therapeutic massage
principles to determine treatment
strategy are acquired.
Answer Self-check 3.3-1 on
Procedures/Techniques in Accessing
Information Use a separate sheet of paper when
answering the Self-check. This
module is the property of the
View Multimedia Presentation training center. Please do not write
anything on it.

Make sure you do not look at the


Answer Key when answering the
self-checks.

Be sure that you are well-versed in


the contents of the Information
Sheet before proceeding to the next
Information Sheet.

After doing all activities in this


Learning Outcome, you are ready to
proceed to the next Learning
Outcome

Information Sheet 3.3-1

PROCEDURES/TECHNIQUES IN ACCESSING INFORMATION

Learning Objectives:

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 24 of 42
NCII Developed by:
Revision # 02
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Describe the procedures and techniques in accessing information

A command is a specific instruction given to a computer application to


perform some kind of task or function.

In Windows, commands are usually entered via a command line interpreter,


like Command Prompt or Recovery Console.

Commands must always be entered into a command line interpreter exactly.


Entering a command incorrectly (wrong syntax, misspelling, etc.) could cause
the command to fail or worse, could execute the wrong command or the
right command in the wrong way, creating serious problems.

There are many different kinds of commands, and many phrases that use
the word command that probably shouldn't because they're not actually
commands. It can be kind of confusing.

Below are some popular kinds of commands you might encounter.

Command Prompt Commands

Command Prompt commands are true commands. True commands are programs


that are intended to be run from a command line interface (in this case the
Windows Command Prompt) and whose action or result is also produced in
the command line interface.

DOS Commands

DOS commands, more correctly called MS-DOS commands, might be


considered the "purest" of the Microsoft based commands since MS-DOS
has no graphical interface so each command lives completely in the
command line world.

Don't confuse DOS commands and Command Prompt commands. MS-DOS


and the Command Prompt may appear similar but MS-DOS is a true
operating system while Command Prompt is a program that runs within the
Windows operating system. Both share many commands but they are
certainly not the same.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 25 of 42
NCII Developed by:
Revision # 02
Run Commands

A run command is simply the name given to an executable for a particular


Windows-based program.

A run command is not a command in the strictest sense — it's more like a
shortcut. In fact, the shortcuts that live in your Start Menu or on your Start
Screen are usually nothing more than an icon representation of the
executable for the program — basically a run command with a picture.

For example, the run command for Paint, the painting and drawing program
in Windows, is mspaint and can be run from the Run box or Search box, or
even from the Command Prompt, but Paint is obviously not a command line
program.

Some other examples are a bit more confusing. The run command for
Remote Desktop Connection, for example, is mstsc but this run command
does have some command line switches that make opening the program
with specific parameters very easy. However, Remote Desktop Connection is
not a program designed for the command-line so it's not really a command.

Control Panel Commands

Another command you'll see referenced that isn't really a command is


the Control Panel applet command. A Control Panel applet command is really just
the run command for the Control Panel (control) with a parameter instructing
Windows to open a specific Control Panel applet.

For example, executing this command opens the Date and Time applet in
Control Panel directly.

control /name Microsoft.DateAndTime

You can execute this command from the Command Prompt, but the Control
Panel is not a command line program.

Recovery Console Commands

Recovery Console commands are also true commands. Recovery Console


commands are only available from within the Recovery Console, the
command line interpreter available only for troubleshooting problems and
only in Windows XP and Windows 2000.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 26 of 42
NCII Developed by:
Revision # 02
Self- Check 3.3-1

SIMPLE MATCHING: Write the letter of the best answer in your answer
sheet.

Command Description
1 Command Prompt a. the "purest" of the Microsoft based commands
Commands

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 27 of 42
NCII Developed by:
Revision # 02
2 b.the run command for the Control Panel
DOS Commands
3 Run Commands c. the command line interpreter available only for
troubleshooting problems
4 Control Panel d. the name given to an executable for a particular
Commands Windows-based program.
5 Recovery Console e. programs that are intended to be run from a
Commands command line interface.

ANSWER KEY 3.3-1


1. E
2. A
3. D
4. C
5. A

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 28 of 42
NCII Developed by:
Revision # 02
LEARNING OUTCOME NO. 4
PRODUCE OUTPUT DATA USING COMMUNICATION SYSTEM

Contents:

1. Operation and Use of Peripheral Devices

ASSESSMENT CRITERIA:

1. Entered data is processed using appropriate software commands

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 29 of 42
NCII Developed by:
Revision # 02
2. Printed out data as required using computer hardware/peripheral
devices is in accordance with standard operating procedures
3. Transferred files/data between compatible systems using computer
software, hardware/peripheral devises is in accordance with
standard operating procedures

CONDITION:
The trainees/students must be provided with the following:
Equipment and Accessories
personal computer
network system
communication equipment
scanner
printer
keyboard
mouse

Supplies and Materials


office supplies
diskettes
CDs
Zip disks
Tools
Set of screw driver

Learning Materials
Learning elements/activity sheets
Manufacturer’s manual

METHODOLOGY:
1. Self paced/modular
2. Demonstration

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 30 of 42
NCII Developed by:
Revision # 02
ASSESSMENT METHODS

1. Written/Oral examination
2. Practical demonstration

Learning Experiences

Learning Outcome 4:
PRODUCE OUTPUT DATA USING COMMUNICATION SYSTEM
Learning Activities Special Instructions
Read Information Sheet 3.4-1 on Go through the Information Sheets
Operation and Use of Peripheral and answer the self-checks to
Devices ensure that knowledge on selecting
the remedial therapeutic massage
principles to determine treatment

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 31 of 42
NCII Developed by:
Revision # 02
Answer Self-check 3.4-1 on strategy are acquired.
Operation and Use of Peripheral
Devices
Use a separate sheet of paper when
answering the Self-check. This
View Multimedia Presentation module is the property of the
training center. Please do not write
anything on it.

Make sure you do not look at the


Answer Key when answering the
self-checks.

Be sure that you are well-versed in


the contents of the Information
Sheet before proceeding to the next
Information Sheet.

After doing all activities in this


Learning Outcome, you are ready to
proceed to the next Learning
Outcome

Information Sheet 3.4-1

OPERATION AND USE OF PERIPHERAL DEVICES

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Explain procedures for operation and use of peripheral devices

A
peripheral device

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 32 of 42
NCII Developed by:
Revision # 02
provides input/output (I/O) functions for a computer and serves as an
auxiliary computer device without computing-intensive functionality.
Peripheral devices connect with a computer through several I/O interfaces,
such as communications (COM), Universal Serial Bus (USB) and serial
ports.

A peripheral device may be classified as:


1. Input devices – used to provide data and control signals to an
information processing system such as a computer or other
information appliance
Ex.: mouse, scanners, joysticks and keyboard
2. Output devices – a peripheral that receives data from a computer,
usually for display, projection or physical reproduction.
Ex.: monitor and printer
3. Storage devices – computer hardware used to remember or store data.
Ex.: hard drive or flash drive

Peripheral devices include the following:

 Mouse -
 Keyboard
 Printer
 Webcam
 Printer
 Scanner
 External drives

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 33 of 42
NCII Developed by:
Revision # 02
 Graphics cards
 CD-ROM

Self- Check 3.4-1

Identify the following devices. In your answer sheet write:


A for input device
B for output device
C for storage device

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 34 of 42
NCII Developed by:
Revision # 02
1. Scanner
2. Mouse
3. USB
4. Monitor
5. Printer

ANSWER KEY 3.4-1

1. A
2. A
3. C
4. B
5. B

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 35 of 42
NCII Developed by:
Revision # 02
LEARNING OUTCOME NO. 5
MAINTAIN COMPUTER EQUIPMENT AND SYSTEM

Contents:

1. Cleaning, Minor Maintenance and Replacements of Consumables

ASSESSMENT CRITERIA:

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 36 of 42
NCII Developed by:
Revision # 02
1. Cleaning, minor maintenance and replacement of consumables are
implemented in accordance with standard operating procedures
2. Procedures for ensuring security of data including regular back-
ups and virus checks are implemented in accordance with
standard operating procedures
3. Basic file maintenance procedures are implemented in line with the
standard operating procedures

CONDITION:
The trainees/students must be provided with the following:
Equipment and Accessories
personal computer
network system
communication equipment
scanner
printer
keyboard
mouse

Supplies and Materials


office supplies
diskettes
CDs
Zip disks
Tools
Set of screw driver

Learning Materials
Learning elements/activity sheets
Manufacturer’s manual

METHODOLOGY:
1. Self paced/modular

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 37 of 42
NCII Developed by:
Revision # 02
2. Demonstration

ASSESSMENT METHODS
1. Written/Oral examination
2. Practical demonstration

Learning Experiences

Learning Outcome 5:
MAINTAIN COMPUTER EQUIPMENT AND SYSTEM
Learning Activities Special Instructions
Read Information Sheet 3.5-1 on Go through the Information Sheets
Cleaning, Minor Maintenance and and answer the self-checks to
Replacements of Consumables ensure that knowledge on selecting
the remedial therapeutic massage
principles to determine treatment

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 38 of 42
NCII Developed by:
Revision # 02
Answer Self-check 3.5-1 on strategy are acquired.
Cleaning, Minor Maintenance and
Replacements of Consumables
Use a separate sheet of paper when
answering the Self-check. This
View Multimedia Presentation module is the property of the
training center. Please do not write
anything on it.

Make sure you do not look at the


Answer Key when answering the
self-checks.

Be sure that you are well-versed in


the contents of the Information
Sheet before proceeding to the next
Information Sheet.

After doing all activities in this


Learning Outcome, you are ready to
proceed to the next Learning
Outcome

Information Sheet 3.5-1

CLEANING, MINOR MAINTENANCE AND REPLACEMENTS OF


CONSUMABLES

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand procedures for cleaning, Minor Maintenance and
Replacements of Consumables

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 39 of 42
NCII Developed by:
Revision # 02
Basic Computer Maintenance Chores

One Time

 Set up your operating system to update automatically Set up your


anti-virus software to update automatically

Daily

 Clean up your email inbox


 Download email attachments – Save them right to where they
belong or create a folder called “downloads to file” and save there.

Weekly

 Organize cords and cables


 Clean your keyboard
 Clean your monitor
 Dust CPU and printer
 Perform a full system backup to external drive or cloud storage

Monthly

 Transfer photos to computer & delete from device – Consider a


cloud storage option so that it syncs automatically
 Organize photos into folder and/or albums – if  nothing else, at
least set up a file system of months and years
 Share digital photos and/or order prints
 Clean up “downloads to file” folder – Move them to the folder they
belong in
 Clean up your web browser
 Delete files from your system downloads folder – If you've been
disciplined with saving downloads where they need to go at the time,
this should be easy. If you haven't, then move files you need where
they belong
 Uninstall unused programs and apps.
 Run a disk cleanup
 Run full system virus and malware scan.
 Defragment your hard drive (not necessary if you have an SSD)

Annually

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 40 of 42
NCII Developed by:
Revision # 02
 Clean up contacts list on social media accounts – unfriend or
unfollow
 Clean up email contacts list

Self- Check 3.5-1

Determine the frequency of the following maintenance activities. Write:

A for one time


B for Daily
C for Weekly
D for Monthly
E for Annually

1. Organize cords and cables.


2. Clean up your email inbox.
3. Clean up contacts list on social media accounts – unfriend or
unfollow.

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 41 of 42
NCII Developed by:
Revision # 02
4. Transfer photos to computer & delete from device – Consider a
cloud storage option so that it syncs automatically.
5. Set up your operating system to update automatically Set up
your anti-virus software to update automatically

ANSWER KEY 3.5-1

1. C
2. B
3. E
4. D
5. A

Document No
Date Developed:
CBLM in Issued by:
July 20, 2029
Housekeeping Page 42 of 42
NCII Developed by:
Revision # 02

You might also like