3 CBLM Common 3 Perform Computer Operations

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

COMPETENCY - BASED LEARNING MATERIALS

Sector: TOURISM SECTOR

Qualification: BARISTA NC II

Unit of Competency: PERFORM COMPUTER OPERATIONS

Module Title: PERFORMING COMPUTER OPERATIONS

Institution:

Page 1 of 40
COMMON COMPETENCIE

LIST OF COMPETENCIES

No. Unit of Competency Module Title Code

Develop and Developing and


1. update industry updating industry TRS311201
knowledge knowledge
Observe workplace Observing workplace
2. TRS311202
hygiene procedures hygiene procedures

Perform computer Performing computer


3. TRS311203
operations operations

Perform workplace and Performing workplace and


4. TRS311204
safety practices safety practices

Provide effective Providing effective


5. TRS311205
customer service customer service

Page 2 of 40
LEARNING OUTCOME SUMMARY

QUALIFICATION/LEVEL: BARISTA NC II

Unit of Competency: PERFORM COMPUTER OPERATIONS

Modules Title: PERFORMING COMPUTER OPERATIONS

Module Descriptor: This unit covers the knowledge, skills and attitudes
and values needed to perform computer operations
which includes inputting, accessing, producing and
transferring data using the appropriate hardware
and software

Nominal Duration: 4 Hours

Summary of Learning Outcomes:

LO1. Plan and prepare for task to be undertaken

LO2. Input data into computer

LO3. Access information using computer

LO4. Produce/output data using computer system

LO5. Maintain computer equipment and systems

Page 3 of 40
INFORMATION SHEET 3.1-1
Hardware and peripheral devices used in computer operation

For the working of the Types of Computer Hardware, it needs both


hardware and software components. For every computer system, there can be
several hardware components attached to the system as per the requirements.

Hardware and peripheral devices used in computer operation

1. RAM
RAM (Random Access Memory) is a type of computer hardware that is used to

store the information and then process that information. The processing speed

of RAM is much faster than a hard disk but Ram is a volatile device which

means when a computer system is shut down all the information stored is

wiped out from RAM whereas hard disk is non-volatile which means it stores

the data permanently in it. The data can be easily stored in RAM and can be

easily fetched from RAM. The fetch process of data is very fast in Ram compare

to hard disk. There are two types of RAM SRAM (Static Random Access

Page 4 of 40
Memory) and DRAM (Dynamic random access memory). The use of SRAM is in

a cache memory of CPU. And the DRAM is mostly used in modern computers.

2. Hard disk
The hard disk is another type of computer hardware that is used to store the

data in it. The hard disk can be preinstalled in CPU or can be used as an

external device. The hard disk is the non-volatile component which means the

data is stored permanently in hard disk and it does not wipe out when the

system is shut down. The hard disk contains electromagnet surface which is

used to store huge chunks of data and can be accessed easily. The hard disk

has the capacity to store trillions of bytes of data in its storage. In the internal

of hard disk, it has a collection of stacked disks which have electromagnetic

surface used to store data in it. Every hard disk has a certain processing speed

which varies from 4200-15000 rpm. The higher the rpm more is the processing

speed of a hard disk. The high processing speed is used in supercomputers.

3. Monitor
For the computer hardware, the hardware is another device that is used to

display the output, videos and other graphics as it is directly connected to the

CPU. The video displayed by the monitor uses the video card. The monitor can

be compared to the television set but the difference is the resolution and

graphics displayed by the monitor are of much high quality compare to the

television set. The desktop is connected via a cable and gets fitted in a

computer video card which is installed in the motherboard of the computer

Page 5 of 40
system. For laptops, tablets the monitor is pre-built in the system and there is

no separate hardware installed in these devices. There are two types of

computer monitors which are CRT and LCD. The CRT was used as an old

model of computers. The LCD is used in a modern computer as they are

thinner and lighter and easy to use compared to CRT monitors.

4. CPU
CPU (Central processing unit) is the core hardware part of the computer

system which is used to interpret and execute most of the commands using

other computer parts i.e. software and hardware. The CPU is a core part of any

PC, laptops, tablets, and notebooks. The CPU is also called the brain of the

computer as every operation is executed in the CPU only. The CPU is made of

computer chip which contains billions of small transistors installed on it. All

the calculations are performed inside these transistors. The other hardware

components which are monitor, keyboard, mouse, printer, sound system are

connected o CPU.

5. Mouse
It is a hand operator input device that is used to point something on the

screen. The mouse can be wired or wireless. If the mouse is wired it is

connected to the CPU directly. The mouse can uses the laser o ball to scroll up

or down on the screen. Movement done from the mouse sends instructions

directly to the computer to move the cursor on the screen.

6. Keyboard

Page 6 of 40
The keyboard is another type of computer hardware that is used to give input

text, commands to the computer. The keyboard can be wired or wireless. The

keyboard contains alphabets, numbers, special characters and other buttons

to give input to the computer. It is the input device that takes input to the user

and processes the commands.

7. Printer
The printer is a type of hardware that is used to print something which is seen

on the computer and then transfer that displayed information to paper. The

printers can be differentiated based on size, processing speed, and other

factors.

Advantages of computer hardware

 It will help to establish an effective mode of communication that can help

the organizations to improve their business standards.

 It will help to make the task automated and help to store the huge

chunks of data that can be beneficial for the organization or individual.

 The user can use the hardware to give the instruction to command and

can obtain the output as per the given i9nstruction.

 The processing speed of a hardware device is fast which will help to

execute more operations at one time.

 The hardware devices are multiprocessing which means the user can use

more than one hardware device at the same time.

Page 7 of 40
 The hardware can be installed very easily in a computer system and also

can be upgraded as per the user requirements.

Video: https://www.youtube.com/watch?v=dRjcubrVSXw

Page 8 of 40
SELF-CHECK 3.1-1

Identification

Identify the correct answer to the question.

1. It is a type of computer hardware that is used to store the data.


2. A device that is used to display the output, videos and other graphics as it is
directly connected to the CPU.
3. This is the core hardware part of the computer system which is used to
interpret and execute most of the commands using other computer parts.
4. It is a type of computer hardware that is used to store the information and
then process that information.
5. It is a hand operator input device that is used to point something on the
screen.

Page 9 of 40
INFORMATION SHEET 3.1-2
Types of software used in computer operation

Every day, we come across different types of computer software that


helps us with our tasks and increase our efficiency. In this world of
technology, we even come across various software development trends that
help our business to grow; we are surrounded by all these software which
are determined to make our lives easier.

Types of software used in computer operation

1. System Software

System software aids the user and the hardware to function and interact
with each other. Basically, it is software to manage computer hardware
behavior so as to provide basic functionalities that are required by the
user. In simple words, we can say that system software is an intermediate
or a middle layer between the user and the hardware. The system software
runs in the background and is not used by the end-users. This is the
reason why system software is also known as ‗low-level software‘.

Page 10 of 40
Some common system software examples are:

 Operating System (OS): It is the most prominent example of System


Software. It is a collection of software that handles resources and
provides general services for the other applications that run over
them. Although each Operating System is different, most of them
provide a Graphical User Interface through which a user can manage
the files and folders and perform other tasks. There are various types
of operating system such as real-time, embedded, distributed,
multiuser, single-user, internet, mobile, and many more. It is
important to consider the hardware specifications before choosing an
operating system. Some examples of Operating systems given below:

1. Android
2. CentOS
3. iOS
4. Linux
5. Mac OS
6. MS Windows
7. Ubuntu
8. Unix

 Device Drivers: It is a type of software that controls particular


hardware which is attached to the system. Hardware devices that
need a driver to connect to a system include displays, sound cards,
printers, mice and hard disks. Further, there are two types of device
drivers: Kernel Device Drivers and User Device Driver. Some
examples of device drivers are:

1. BIOS Driver

Page 11 of 40
2. Display Drivers
3. Motherboard Drivers
4. Printer Drivers
5. ROM Drivers
6. Sound card Driver
7. USB Drivers
8. USB Drivers
9. VGA Drivers
10. VGA Drivers
11. Virtual Device Drivers

 Firmware: Firmware is the permanent software that is embedded


into a read-only memory. It is a set of instructions permanently
stored on a hardware device. It provides essential information
regarding how the device interacts with other hardware. Firmware
can be considered as ‗semi-permanent‘ as it remains permanent
unless it is updated using a firmware updater. Some examples of
firmware are:

1. BIOS
2. Computer Peripherals
3. Consumer Applications
4. Embedded Systems
5. UEFI

 Programming Language Translators: These are mediator programs


on which software programs rely to translate high-level language
code to simpler machine-level code. Besides simplifying the code, the
translators also do the following :

1. Assign data storage


2. Enlist source code as well as program details
3. Offer diagnostic reports
4. Rectify system errors during the runtime
5. Examples of Programming Language Translators are
Interpreter, Compiler and Assemblers.

 Utility: Utility software is designed to aid in analysing, optimizing,


configuring and maintaining a computer system. It supports the
computer infrastructure. This software focuses on how an OS
functions and then accordingly it decides its trajectory to smoothen
the functioning of the system. Software‘s like antiviruses, disk clean-
up & management tools, compression tools, defragmenters, etc. are
all utility tools. Some examples of utility tools are:

1. Avast Antivirus

Page 12 of 40
2. Directory Opus
3. McAfee Antivirus
4. Piriform CCleaner
5. Razer Cortex
6. Windows File Explorer
7. WinRAR
8. WinZip

2. Application Software

Application Software, also known as end-user programs or productivity


programs are software that helps the user in completing tasks such as
doing online research, jotting down notes, setting an alarm, designing
graphics, keeping an account log, doing calculations or even playing
games. They lie above the system software. Unlike system software, they
are used by the end-user and are specific in their functionality or tasks
and do the job that they are designed to do. For example, a browser is an
application designed specifically for browsing the internet or MS
PowerPoint is an application used specifically for making presentations.
Application Software or simply apps can also be referred to as non-
essential software as their requirement is highly subjective and their
absence does not affect the functioning of the system. All the apps that we
see on our mobile phones are also examples of Application Software. There
is certain software that is exclusively made for app development like
Meteor and Flutter. These are examples of Application software too.

There are various types of application software:

 Word Processors: These applications for documentation. Along with


that it also helps I storing, formatting and printing of these
documents. Some examples of word processors are:

1. Abiword
2. Apple iWork- Pages
3. Corel WordPerfect
4. Google Docs
5. MS Word

 Database Software: This software is used to create and manage a


database. It is also known as the Database Management System or
DBMS. They help with the organization of data. Some examples of
DBMS are:

1. Clipper
2. dBase

Page 13 of 40
3. FileMaker
4. FoxPro
5. MS Access
6. MySQL

 Multimedia Software: It is the software that is able to play, create


or record images, audio or video files. They are used for video editing,
animation, graphics, and image editing, Some examples of
Multimedia Software are:

1. Adobe Photoshop
2. Inkscape
3. Media Monkey
4. Picasa
5. VLC Media Player
6. Windows Media Player
7. Windows Movie Maker

 Education and Reference Software: These types of software are


specifically designed to facilitate learning on a particular subject.
There are various kinds of tutorial software that fall under this
category. They are also termed as academic software. Some examples
are:

1. Delta Drawing
2. GCompris
3. Jumpstart titles
4. KidPix
5. MindPlay
6. Tux Paint

 Graphics Software: As the name suggests, Graphics Software has


been devised to work with graphics as it helps the user to edit or
make changes in visual data or images. It comprises of picture
editors and illustration software. Some examples are:

1. Adobe Photoshop
2. Autodesk Maya
3. Blender
4. Carrara
5. CorelDRAW
6. GIMP
7. Modo
8. PaintShop Pro

Page 14 of 40
 Web Browsers: These applications are used to browse the internet.
They help the user in locating and retrieving data across the web.
Some examples of web browsers are:

1. Google Chrome
2. Internet Explorer
3. Microsoft Edge
4. Mozilla Firefox
5. Opera
6. Safari
7. UC Browser

Other than these, all the software that serves a specific purpose falls
under the category of Application Software.

However, there exists one more classification of the software. The software
can also be classified based on their availability and sharability.

This classification is as given below:

1. Freeware

Freeware software is available without any cost. Any user can download it
from the internet and use it without paying any fee. However, freeware
does not provide any liberty for modifying the software or charging a fee for
its distribution. Examples are:

 Adobe Reader
 Audacity
 ImgBurn
 Recuva
 Skype
 Team Viewer
 Yahoo Messenger

Page 15 of 40
2. Shareware

It is software that is freely distributed to users on a trial basis. It usually


comes with a time limit and when the time limit expires, the user is asked
to pay for the continued services. There are various types of shareware like
Adware, Donationware, Nagware, Freemium, and Demoware (Crippleware
and Trialware). Some examples of shareware are:

 Adobe Acrobat
 Get right
 PHP Debugger
 WinZip

Page 16 of 40
3. Open-source

These kinds of software are available to users with the source code which
means that a user can freely distribute and modify the software and add
additional features to the software. Open-Source software can either be
free or chargeable. Some examples of open-source software are:

 Apache Web Server


 GNU Compiler Collection
 Moodle
 Mozilla Firefox
 Thunderbird

4. Software

They are also known as Closed-source software. These types of


applications are usually paid and have intellectual property rights or
patents over the source code. The use of these is very restricted and
usually, the source code is preserved and kept as a secret.

Page 17 of 40
Video: https://www.youtube.com/watch?v=X-QjMhIVqLc

Page 18 of 40
SELF-CHECK 3.1-2

Identification

Identify the correct answer to the question.

1. It is a collection of software that handles resources and provides general


services for the other applications that run over them.
2. It is the permanent software that is embedded into a read-only memory.
3. It is the software that is able to play, create or record images, audio or
video files.
4. These applications are used to browse the internet.
5. It is a type of software that controls particular hardware which is
attached to the system.

Page 19 of 40
INFORMATION SHEET 3.2-1
Storage devices and basic categories of memory

Storage devices are any type of hardware that is capable of storing and
retrieving data. Most often these devices come in the form of hard drives or
optical discs. There are two main categories of storage devices. Primary
storage, such as RAM, is used by computer systems to temporarily store and
retrieve data. Secondary storage devices, such as hard drives stores data
permanently.

Storage devices and basic categories of memory

Primary memory
It is also called as the main memory of the computer. It stores the instructions,
operating system and data which required to run the computer. There are two
types of primary memories.
RAM (Random Access Memory)
ROM (Read Only Memory)

RAM
It performs both read and writes operations on memory. It stores data for
temporally. If power failures happened in systems during memory access
then you will lose your data permanently. So, RAM is a volatile memory. RAM
categorized into following types.

1. DRAM
2. SRAM
Page 20 of 40
3. DRDRAM

1. Dynamic RAM: Dynamic random access memory (DRAM) is a type of


random-access memory used in computing devices. It is made up of capacitors
and transistors. DRAM stores each bit of data in a separate capacitor or
transistors and it has two states of value in one bit called 0 and 1.

 DRAM is less expensive to produce than other RAMs


 DRAM writes data at the byte-level and reads at the multiple-byte
page level
 DRAM requires less power than other RAMs
 Static RAM

2. Static RAM: Static random access memory (SRAM) is a type of RAM that
holds data in a static form, that is, as long as the memory has power.as
dynamic RAM, it does not need to be refreshed.

 Static RAM provides faster access to data and is more expensive than
DRAM
 It is an expensive memory in which each cell must contain multiple
transistors.
 Static RAM does not use capacitors. The cache memory is
implemented in the cache memory. It is an expensive memory in
which each cell must contain multiple transistors.
 SRAM is also highly recommended for use in PCs, peripheral
equipment, printers, LCD screens, hard disk buffers, router buffers
and buffers in CDROM / CDRW drives.

3. Rambus Dynamic RAM: Rambus Dynamic Random Access Memory


(RDRAM) is a memory subsystem designed to transfer data at faster rates.
RDAM is made up of a random access memory (RAM), a RAM controller and a
bus path that connect RAM to microprocessors and other PC devices. RDRAM
is also known as Direct RDRAM or Rambus.
 It is used in Video game consoles because its transfer rate of data is
high compared all types of RAMs.
 RDRAM densities are 128 Mbit and 256 Mbit.

ROM
ROM stands for read-only memory, stores information that can only be read.
Modifying the data is difficult. ROM is also a type of non-volatile storage, which
means that the information is stored even if the component loses power.

There are few basic ROM types:

1. PROM

Page 21 of 40
2. EPROM
3. EEPROM – Electrically Erasable Programmable Read Only Memory
4. Flash EEPROM memory

1. PROM: Creating ROM chips from scratch is time-consuming and very


expensive in small quantities. For this reason, developers created a type of
ROM known as programmable read-only memory (PROM). Blank PROM chips
can be bought in low cost and coded by the user with a programmer while
buffering.

 It is used in digital electronic devices to store permanent data.


 It is available in low cost as compared to other RAMs.

2. EPROM: EPOM (erasable programmable read-only memory) is programmable


read-only memory (programmable ROM) that can be erased and re-used and it
is a non-volatile memory. We can erase the data in this EPROM by using high
voltage Ultraviolet light.

 In EPROM we need to erase each and every cell.


 We can‘t erase data in RAM, PROM only we can erase data in EPROM.

3. EEPROM: EEPROM (Electrically Erasable Programmable Read Only Memory)


this can be erased and reprogrammed using an electrical charge. EEPROM was
a replacement for PROM and EPROM chips and later it is used for computer‘s
BIOS.

 EEPROM requires data to be written or erased one byte at a time


 EEPROM are used to store configurations parameters and in modern
computers, they replaced BIOS CMOS memory.

4. Flash EEPROM memory


Flash memory is a type of non-volatile memory that erases data in units called
blocks. A block stored on a flash memory chip must be erased before data can
be written or programmed to the microchip.

 It is more expensive than other hard drives and RAMSs.


 It can be erased only limited number of times

Page 22 of 40
Secondary memory device and their storage method and capacity

Secondary Memory Device Storage Capacity


Floppy Disk (5.25 inches) Magnetic 1.2 MB
Floppy Disk (3.5 inches) Magnetic 1.44 MB
Floppy Disk (3.55 inches) Magnetic 80 KB to 242 KB
Hard Disk Magnetic up to 1 TB
CD-ROM Optical 640 MB to 680 MB
DVD-ROM Optical 4.7 GB to 17 GB
Pen-Drive Solid State 1 GB to 512 GB
Magnetic tape Magnetic Up to 1 TB

Memory Measurement
The data is measured in term of bits in the memory.

 A Bit is a single binary value that may be 0 or 1.


 A Nibble is a group of 4 bits.
 A Byte is a group of 8 bits and is equal to one character.

Name Size
1 bit Single digit 0 or 1
1 nibble 4 bits
1 byte 8 bits
1 Kilobyte(KB) 1024 Bytes
1 Megabyte(MB) 1024 KB
1 Gigabyte(GB) 1,024 MB
1 Terabyte(TB) 1,024 GB
1 Petabyte (PB) 1,024 TB
1 Exabyte (EB) 1,024 PB
1 Zetta byte (ZB) 1,024 EB
1 Yotta Byte (YB) 1,024 ZB
1 Bronto Byte 1,024 YB
1 Geop Byte 1,024 Bronto Byte

Video: https://www.youtube.com/watch?v=c3m9r62jMS8

Page 23 of 40
SELF-CHECK 3.2-1

Identification

Identify the correct answer to the question.

1. It is a type of random-access memory used in computing devices.


2. It is programmable read-only memory (programmable ROM) that can be
erased and re-used and it is a non-volatile memory.
3. It is a type of non-volatile memory that erases data in units called blocks.
4. It is a type of RAM that holds data in a static form.
5. It is a memory subsystem designed to transfer data at faster rates.

Page 24 of 40
INFORMATION SHEET 3.3-1
Desktop icons used in computer operation

Icons make it easier to recognize and locate items on your computer or


features within a program. Many operating systems, particularly for mobile
devices, use icons on the desktop to allow users to easy access installed
programs. Once launched, most programs now feature a graphical toolbar,
using icons instead of words to provide functionality.

Desktop icons used in computer operation

Programs

The icons to the program can be shortcut. You can tell it‘s a shortcut as it
contains an arrow. So, if you were to delete the shortcut, you wouldn‘t be
deleting the actual program, only the desktop link to it. Double-clicking on the
relevant icon will launch that program.

Files

Page 25 of 40
Icons that show a page represent a file. When you double-click on the icon, the
file will open in the program that it was created in. However, as no arrow
appears, it is not a shortcut, but indicates that this file was actually saved to
the desktop. Therefore, if this desktop icon is deleted, so is the actual file.

Folders and drives

An icon shows a folder contains files such as word-processing documents,


videos and software. Similarly, icons that show a hard disk will display the
contents of that drive in Windows Explorer when you double-click on it.

Recycle Bin

Recycle Bin is a location where deleted files or folders are temporarily stored.
The Recycle Bin allows users to recover files that were deleted. It is on
the desktop.

Video: https://www.youtube.com/watch?v=pDK0Vn6S1o8

Page 26 of 40
SELF-CHECK 3.3-1

Multiple Choices:

Instruction: Encircle the correct answer.

1. The desktop icon shown as a waste paper basket with the recycle symbol
on it.
A. Recycle Bin B. Files
C. Programs D. Folders and drives

2. An icons that show a hard disk will display the contents of that drive and
folder.
A. Recycle Bin B. Files
C. Programs D. Folders and drives

3. An icons that show a page.


A. Recycle Bin B. Files
C. Programs D. Folders and drives

4. An icon that been show in the desktop to view.


A. Recycle Bin B. Files
C. Programs D. Folders and drives

Page 27 of 40
INFORMATION SHEET 3.4-1
File and data output using computer system

A computer file is a computer resource for recording data discretely in a


computer storage device. Words can be written to paper, so can information be written
to a computer file.
File and data output using computer system

Text File – A file consisting of characters from the ASCII character code set.
Text files (also known as ASCII text files) contain character data. When we
create a text file we usually think of it consisting of a series of lines. On each
line are several characters (including spaces, punctuation, etc.) and we
generally ending the line with a return (a character within the ASCII character
code set). The return is also known as the new line character. You are most
likely already familiar with the escape code of \n which is used within many
programming languages to indicate a return character when used within a
literal string.

A typical text file consisting of lines can be created by text editors (Notepad) or
word processing programs (Microsoft Word). When using a word processor
you must usually specify the output file as text (.txt) when saving it. Most
source code files are ASCII text files with a unique file extension; such as C+
+ using
.cpp, C# using .cs, Python using .py, etc. Thus, most compiler/Integrated
Development Environment software packages can be used to create ASCII text
files.

Filename – The name and its extension. Most operating systems have
restrictions on which characters can be used in filenames. Example Lab_05.txt

Because some operating systems do not allow spaces, we suggest that you use
the underscore where needed for spacing in a filename.

Path (Filespec) – the location of a file along with filename. Filespec is short for
file specification. Most operating systems have a set of rules on how to specify
the drive and directory (or path through several directory levels) along with the
filename. Example: C:\myfiles\cosc_1436\Lab_05.txt

Because some operating systems do not allow spaces, we suggest that you use
the underscore where needed when creating folders or sub-directories.

Open – Your program requesting the operating system to let it have access to
an existing file or to open a new file. In most current programming languages, a
file data type exists and is used for file processing. A file variable will be used to
store the device token that the operating system assigns to the file being
Page 28 of 40
opened. An open function or method is used to retrieve the device token, and
typically requires at least two parameters: the path and the mode (read, write,
append, or a combination thereof). Corresponding pseudocode would be:

Declare File datafile

Datafile = open (filespec, mode)

The open function provides a return value of a device token from the
operating system and it is stored in the variable named data.

It is considered good programming practice to determine if the file was opened


properly. The reason the operating system usually can‘t open a file is because
the filespec is wrong (misspelled or not typed case consistent in some operating
systems) or the file is not stored in the location specified. Accessing files stored
on a network or the Internet may fail due to a network error.

Verifying that a file was opened properly is processed with a condition control
structure. That structure may be either be an if-then-else statement or a try-
catch / try-except error handler, depending on the programming language
used.
Read – Moving data from a device that has been opened into a memory location
defined in your program. For example:
text = read(datafile)
or
text = datafile. Read()
Write – Moving data from a memory location defined in your program to a
device that has been opened. For example:
write(datafile, text)
or
datafile. Write(text)

Close – Your program requesting the operating system to release a file that was
previously opened. There are two reasons to close a file. First, it releases the
file and frees up the associated operation system resources. Second, if closing a
file that was opened for output; it will clear the out the operating system‘s
buffer and ensure that all of the data is physically stored in the output file. For
example:
Close (datafile)
or
datafile. Close ()

Page 29 of 40
Using / With – A wrapper around a processing block that will automatically
close opened resources, available in some programming languages. For
example:

// C#

Using (datafile = open (filespec, mode))

//...

Or

# Python3

With open (filespec, mode) as datafile:

# ...

Key Terms

Close

Program requesting the operating system to release a file that was


previously opened.

Device token

A key value provided by the operating system to associate a device to


your program.

Filename

The name and its extension.

Filespec

The location of a file along with its filename.

Open

Your program requesting the operating system to let it has access to an


existing file or to open a new file.

Page 30 of 40
Read

Moving data from a device that has been opened into a memory location
defined in your program.

Stream

A sequence of data elements made available over time.

stdin

Standard input stream, typically the keyboard.

stderr

Standard output error stream, typically the monitor.

stdout

Standard output stream, originally a printer, but now typically the


monitor.[6]

Text file

A file consisting of characters from the ASCII character code set.

Using / with

A wrapper around a processing block that will automatically close


opened resources.

Write

Moving data from a memory location defined in your program to a device


that has been opened.

Reference: Programming Fundamentals – Rebus Community

Page 31 of 40
SELF-CHECK 3.4-1

Identification

Identify the correct answer to the question.

1. The location of a file along with its filename.


2. A file consisting of characters from the ASCII character code set.
3. Moving data from a device that has been opened into a memory location
defined in your program.
4. Program requesting the operating system to release a file that was
previously opened.
5. The name and its extension.

Page 32 of 40
INFORMATION SHEET 3.5-1
General Data security

Much of the information stored electronically is sensitive financial,


personal, medical and otherwise private information. Unauthorized
dissemination or access to data is unethical and, possibly, illegal. Personal
liability can be incurred whether either is compromised intentionally or
inadvertently.

General Data security

Use a Strong, Unique Password and Never Share It


The key to accessing the network is your password. In order to reduce the
chance of a computer or another person guessing your password, you should
choose a strong one. A strong password is a combination of letters, numbers,
and symbols that is not a word or common phrase. Your password should not
be a word from the dictionary or one that someone with a little personal
knowledge of you might guess (i.e. your child‘s name or your phone number).
As well, the password you use to access company resources should be unique
from those you use to access resources outside the company, and, most
importantly, you should never share your password with anyone or write it
down anywhere.

Page 33 of 40
Do Not Let another Person Use Your User Account
Your user account represents all the computing resources that you personally
have been authorized to access. By letting someone else use your user account,
you are letting them access resources for which they may not have approval.
Anything that they may do will, ultimately, be your responsibility.

Use Network Drives for Sensitive or Important Files


All files that contain sensitive information, or that are critical to the company‘s
work should be stored on a network drive – but only as long as they are
needed. These are usually the drives with higher letters in the alphabet above
―F:\‖.

 Security: Anyone with physical access to a computer can, one way or another,
get access to the files stored on the computer‘s local drives — A:\ through E:\.
 Data Protection: If a computer "crashes," then all data on the local drives
might be lost. Files stored on the network drives are backed up on a nightly
basis. In the event data is lost due to some disaster, there is a much greater
chance that the data can be restored to a relatively recent state.

Lock Your Computer When Away from Your Desk during the Day
The world's strongest password won't matter at all if you walk away from your
desk, even for a few minutes, and leave your computer on and unlocked. For
computers running Windows 2000 and Windows XP, press Ctrl-Alt-Del keys
simultaneously and select Lock Workstation. When you return to your desk,
you will have to enter your Novell password to unlock the computer. For Mac
workstations using OS X, you can password-protect your account
under "System Preferences" to be activated every time the computer goes
into Sleep mode.

While you are at your computer you should arrange your work area so that
your screen cannot be viewed by casual visitors. This can alleviate a lot of
inadvertent viewing of personal or confidential information.

Shutdown Your Computer When You Leave for the Day


When you leave the office each night, turn off your computer. A computer that
is off cannot be infected or compromised by attacks from other computers.

Page 34 of 40
Use Encryption for Viewing and Exchanging Sensitive Data
You should always use encryption to view web sites containing sensitive data.
You can tell if a web site is using encryption if the web address begins with
"https".

If you have created a web site that collects sensitive data, you should be sure
that the site forces users to use encryption when submitting data and that the
data, once submitted, is being stored securely.

Remember, email is not encrypted and therefore should not be used to


exchange sensitive data. If you have need to transfer sensitive data via email,
the information should be sent in a password-protected zip file attachment. Tell
the recipient the password in person or via telephone, not via email.

Finally, remember that when using wireless connections, they are not secure.
Any data you may be accessing can be captured someone using similar
technology. When accessing data and information that is confidential, you
should only use a connection that is hardwired to your machine.

Do Not Install Unapproved Software


Only the programs found in Start > USM Apps > Install have been approved
for installation on company computers. If you feel you need to install a piece of
software not found there, you must get the approval of DoIT staff first.

Do not install free software found on the Internet. These programs often
present a great security risk. To avoid this, be very wary, when surfing the
Internet, of pages that offer anything for free by just ―clicking here‖. If
unexpected pop up messages are displayed while surfing the Internet, use the
―X‖ in the upper right corner of the message to close it.

Think Before Opening Email Attachments


Be suspicious of emails with attachments that you were not expecting to
receive, even if they appear to be from someone you know. If it appears to be
from someone you know, before you open it, contact them and confirm that
they intended to send you the attachment.

Schedule an Antivirus Scan of Your Computer


Most of us have a weekly staff meeting. At these times your computer is usually
sitting idle in your office. That is a perfect time to schedule an antivirus scan of
your computer to run. These can run while your computer is locked.

Page 35 of 40
Be Careful Using Internet Explorer
We feel it is best to only use Internet Explorer for those websites that require it
(i.e., PeopleSoft) and use a different browser for all other web activity. The
Internet Explorer web browser that comes with Microsoft Windows seems to
have a new security flaw almost every month.

Reference: Steps to Data and Network Security – University of Southern Maine

Page 36 of 40
SELF-CHECK 3.5-1

True or False

Write true if the statement is correct and false if the statement is not
correct.

1. You should always use encryption to view web sites containing sensitive
data.
2. A computer that is off can be infected or compromised by attacks from other
computers.
3. All files that contain sensitive information, or that are critical to the
company‘s work should be stored on a network drive.
4. Let someone else use your user account.
5. Do not install free software found on the Internet.

Page 37 of 40
INFORMATION SHEET 3.5-2
Type of Computer Viruses

Most people know how to prepare for cold and flu season: wash your
hands, cover your mouth when you cough, cover your nose when you sneeze,
get plenty of rest, and avoid people who might be sick. It‘s something we learn
from a young age. We know to take these precautions, because we know how
humans contract viruses. In the same vein, when you know how viruses infect
computers, you can take better preventative measures to prevent viruses and
identify a virus before it rages out of control.

Type of Computer Viruses

1. RESIDENT VIRUS
Resident viruses set up shop in your RAM and meddle with your system
operations. They‘re so sneaky that they can even attach themselves to your
anti-virus software files.

2. MULTIPARTITE VIRUS
This virus infects the entire system. Multipartite viruses spread by
performing unauthorized actions on your operating system, folders, and
programs.

3. DIRECT ACTION
This virus targets a specific file type, most commonly executable files (.exe), by
replicating and infecting files. Due to its targeted nature, this virus type is one
of the easier ones to detect and remove.

Page 38 of 40
4. BROWSER HIJACKER
Easily detected, this virus type infects your browser and redirects you to
malicious websites.

5. OVERWRITE VIRUS
Like the name implies, overwrite viruses overwrite file content to infect entire
folders, files, and programs.

6. WEB SCRIPTING VIRUS


This sneaky virus disguises itself in the coding of links, ads, images, videos,
and site code. It can infect systems when users download malicious files or
visit malicious websites.

7. FILE INFECTOR
By targeting executable files (.exe), file infector viruses slow down programs
and damage system files when a user runs them.

8. NETWORK VIRUS
Network viruses travel through network connections and replicate themselves
through shared resources.

9. BOOT SECTOR VIRUS


One of the easier viruses to avoid, this virus hides out in a file on a USB drive
or email attachment. When activated, it can infect the system‘s master boot
record to damage the system.

Video: https://www.youtube.com/watch?v=G8VgUp0BfWg

Page 39 of 40
SELF-CHECK 3.5-2

Identification

Identify the correct answer to the question.

1. This virus targets a specific file type, most commonly executable files, by
replicating and infecting files.
2. This virus type infects your browser and redirects you to malicious websites.
3. This virus set up shop in the RAM and meddles with your system
operations.
4. This sneaky virus disguises itself in the coding of links, ads, images, videos,
and site code.
5. This virus overwrites file content to infect entire folders, files, and programs.

Page 40 of 40

You might also like