3 CBLM Common 3 Perform Computer Operations
3 CBLM Common 3 Perform Computer Operations
3 CBLM Common 3 Perform Computer Operations
Qualification: BARISTA NC II
Institution:
Page 1 of 40
COMMON COMPETENCIE
LIST OF COMPETENCIES
Page 2 of 40
LEARNING OUTCOME SUMMARY
QUALIFICATION/LEVEL: BARISTA NC II
Module Descriptor: This unit covers the knowledge, skills and attitudes
and values needed to perform computer operations
which includes inputting, accessing, producing and
transferring data using the appropriate hardware
and software
Page 3 of 40
INFORMATION SHEET 3.1-1
Hardware and peripheral devices used in computer operation
1. RAM
RAM (Random Access Memory) is a type of computer hardware that is used to
store the information and then process that information. The processing speed
of RAM is much faster than a hard disk but Ram is a volatile device which
means when a computer system is shut down all the information stored is
wiped out from RAM whereas hard disk is non-volatile which means it stores
the data permanently in it. The data can be easily stored in RAM and can be
easily fetched from RAM. The fetch process of data is very fast in Ram compare
to hard disk. There are two types of RAM SRAM (Static Random Access
Page 4 of 40
Memory) and DRAM (Dynamic random access memory). The use of SRAM is in
a cache memory of CPU. And the DRAM is mostly used in modern computers.
2. Hard disk
The hard disk is another type of computer hardware that is used to store the
data in it. The hard disk can be preinstalled in CPU or can be used as an
external device. The hard disk is the non-volatile component which means the
data is stored permanently in hard disk and it does not wipe out when the
system is shut down. The hard disk contains electromagnet surface which is
used to store huge chunks of data and can be accessed easily. The hard disk
has the capacity to store trillions of bytes of data in its storage. In the internal
surface used to store data in it. Every hard disk has a certain processing speed
which varies from 4200-15000 rpm. The higher the rpm more is the processing
3. Monitor
For the computer hardware, the hardware is another device that is used to
display the output, videos and other graphics as it is directly connected to the
CPU. The video displayed by the monitor uses the video card. The monitor can
be compared to the television set but the difference is the resolution and
graphics displayed by the monitor are of much high quality compare to the
television set. The desktop is connected via a cable and gets fitted in a
Page 5 of 40
system. For laptops, tablets the monitor is pre-built in the system and there is
computer monitors which are CRT and LCD. The CRT was used as an old
4. CPU
CPU (Central processing unit) is the core hardware part of the computer
system which is used to interpret and execute most of the commands using
other computer parts i.e. software and hardware. The CPU is a core part of any
PC, laptops, tablets, and notebooks. The CPU is also called the brain of the
computer as every operation is executed in the CPU only. The CPU is made of
computer chip which contains billions of small transistors installed on it. All
the calculations are performed inside these transistors. The other hardware
components which are monitor, keyboard, mouse, printer, sound system are
connected o CPU.
5. Mouse
It is a hand operator input device that is used to point something on the
connected to the CPU directly. The mouse can uses the laser o ball to scroll up
or down on the screen. Movement done from the mouse sends instructions
6. Keyboard
Page 6 of 40
The keyboard is another type of computer hardware that is used to give input
text, commands to the computer. The keyboard can be wired or wireless. The
to give input to the computer. It is the input device that takes input to the user
7. Printer
The printer is a type of hardware that is used to print something which is seen
on the computer and then transfer that displayed information to paper. The
factors.
It will help to make the task automated and help to store the huge
The user can use the hardware to give the instruction to command and
The hardware devices are multiprocessing which means the user can use
Page 7 of 40
The hardware can be installed very easily in a computer system and also
Video: https://www.youtube.com/watch?v=dRjcubrVSXw
Page 8 of 40
SELF-CHECK 3.1-1
Identification
Page 9 of 40
INFORMATION SHEET 3.1-2
Types of software used in computer operation
1. System Software
System software aids the user and the hardware to function and interact
with each other. Basically, it is software to manage computer hardware
behavior so as to provide basic functionalities that are required by the
user. In simple words, we can say that system software is an intermediate
or a middle layer between the user and the hardware. The system software
runs in the background and is not used by the end-users. This is the
reason why system software is also known as ‗low-level software‘.
Page 10 of 40
Some common system software examples are:
1. Android
2. CentOS
3. iOS
4. Linux
5. Mac OS
6. MS Windows
7. Ubuntu
8. Unix
1. BIOS Driver
Page 11 of 40
2. Display Drivers
3. Motherboard Drivers
4. Printer Drivers
5. ROM Drivers
6. Sound card Driver
7. USB Drivers
8. USB Drivers
9. VGA Drivers
10. VGA Drivers
11. Virtual Device Drivers
1. BIOS
2. Computer Peripherals
3. Consumer Applications
4. Embedded Systems
5. UEFI
1. Avast Antivirus
Page 12 of 40
2. Directory Opus
3. McAfee Antivirus
4. Piriform CCleaner
5. Razer Cortex
6. Windows File Explorer
7. WinRAR
8. WinZip
2. Application Software
1. Abiword
2. Apple iWork- Pages
3. Corel WordPerfect
4. Google Docs
5. MS Word
1. Clipper
2. dBase
Page 13 of 40
3. FileMaker
4. FoxPro
5. MS Access
6. MySQL
1. Adobe Photoshop
2. Inkscape
3. Media Monkey
4. Picasa
5. VLC Media Player
6. Windows Media Player
7. Windows Movie Maker
1. Delta Drawing
2. GCompris
3. Jumpstart titles
4. KidPix
5. MindPlay
6. Tux Paint
1. Adobe Photoshop
2. Autodesk Maya
3. Blender
4. Carrara
5. CorelDRAW
6. GIMP
7. Modo
8. PaintShop Pro
Page 14 of 40
Web Browsers: These applications are used to browse the internet.
They help the user in locating and retrieving data across the web.
Some examples of web browsers are:
1. Google Chrome
2. Internet Explorer
3. Microsoft Edge
4. Mozilla Firefox
5. Opera
6. Safari
7. UC Browser
Other than these, all the software that serves a specific purpose falls
under the category of Application Software.
However, there exists one more classification of the software. The software
can also be classified based on their availability and sharability.
1. Freeware
Freeware software is available without any cost. Any user can download it
from the internet and use it without paying any fee. However, freeware
does not provide any liberty for modifying the software or charging a fee for
its distribution. Examples are:
Adobe Reader
Audacity
ImgBurn
Recuva
Skype
Team Viewer
Yahoo Messenger
Page 15 of 40
2. Shareware
Adobe Acrobat
Get right
PHP Debugger
WinZip
Page 16 of 40
3. Open-source
These kinds of software are available to users with the source code which
means that a user can freely distribute and modify the software and add
additional features to the software. Open-Source software can either be
free or chargeable. Some examples of open-source software are:
4. Software
Page 17 of 40
Video: https://www.youtube.com/watch?v=X-QjMhIVqLc
Page 18 of 40
SELF-CHECK 3.1-2
Identification
Page 19 of 40
INFORMATION SHEET 3.2-1
Storage devices and basic categories of memory
Storage devices are any type of hardware that is capable of storing and
retrieving data. Most often these devices come in the form of hard drives or
optical discs. There are two main categories of storage devices. Primary
storage, such as RAM, is used by computer systems to temporarily store and
retrieve data. Secondary storage devices, such as hard drives stores data
permanently.
Primary memory
It is also called as the main memory of the computer. It stores the instructions,
operating system and data which required to run the computer. There are two
types of primary memories.
RAM (Random Access Memory)
ROM (Read Only Memory)
RAM
It performs both read and writes operations on memory. It stores data for
temporally. If power failures happened in systems during memory access
then you will lose your data permanently. So, RAM is a volatile memory. RAM
categorized into following types.
1. DRAM
2. SRAM
Page 20 of 40
3. DRDRAM
2. Static RAM: Static random access memory (SRAM) is a type of RAM that
holds data in a static form, that is, as long as the memory has power.as
dynamic RAM, it does not need to be refreshed.
Static RAM provides faster access to data and is more expensive than
DRAM
It is an expensive memory in which each cell must contain multiple
transistors.
Static RAM does not use capacitors. The cache memory is
implemented in the cache memory. It is an expensive memory in
which each cell must contain multiple transistors.
SRAM is also highly recommended for use in PCs, peripheral
equipment, printers, LCD screens, hard disk buffers, router buffers
and buffers in CDROM / CDRW drives.
ROM
ROM stands for read-only memory, stores information that can only be read.
Modifying the data is difficult. ROM is also a type of non-volatile storage, which
means that the information is stored even if the component loses power.
1. PROM
Page 21 of 40
2. EPROM
3. EEPROM – Electrically Erasable Programmable Read Only Memory
4. Flash EEPROM memory
Page 22 of 40
Secondary memory device and their storage method and capacity
Memory Measurement
The data is measured in term of bits in the memory.
Name Size
1 bit Single digit 0 or 1
1 nibble 4 bits
1 byte 8 bits
1 Kilobyte(KB) 1024 Bytes
1 Megabyte(MB) 1024 KB
1 Gigabyte(GB) 1,024 MB
1 Terabyte(TB) 1,024 GB
1 Petabyte (PB) 1,024 TB
1 Exabyte (EB) 1,024 PB
1 Zetta byte (ZB) 1,024 EB
1 Yotta Byte (YB) 1,024 ZB
1 Bronto Byte 1,024 YB
1 Geop Byte 1,024 Bronto Byte
Video: https://www.youtube.com/watch?v=c3m9r62jMS8
Page 23 of 40
SELF-CHECK 3.2-1
Identification
Page 24 of 40
INFORMATION SHEET 3.3-1
Desktop icons used in computer operation
Programs
The icons to the program can be shortcut. You can tell it‘s a shortcut as it
contains an arrow. So, if you were to delete the shortcut, you wouldn‘t be
deleting the actual program, only the desktop link to it. Double-clicking on the
relevant icon will launch that program.
Files
Page 25 of 40
Icons that show a page represent a file. When you double-click on the icon, the
file will open in the program that it was created in. However, as no arrow
appears, it is not a shortcut, but indicates that this file was actually saved to
the desktop. Therefore, if this desktop icon is deleted, so is the actual file.
Recycle Bin
Recycle Bin is a location where deleted files or folders are temporarily stored.
The Recycle Bin allows users to recover files that were deleted. It is on
the desktop.
Video: https://www.youtube.com/watch?v=pDK0Vn6S1o8
Page 26 of 40
SELF-CHECK 3.3-1
Multiple Choices:
1. The desktop icon shown as a waste paper basket with the recycle symbol
on it.
A. Recycle Bin B. Files
C. Programs D. Folders and drives
2. An icons that show a hard disk will display the contents of that drive and
folder.
A. Recycle Bin B. Files
C. Programs D. Folders and drives
Page 27 of 40
INFORMATION SHEET 3.4-1
File and data output using computer system
Text File – A file consisting of characters from the ASCII character code set.
Text files (also known as ASCII text files) contain character data. When we
create a text file we usually think of it consisting of a series of lines. On each
line are several characters (including spaces, punctuation, etc.) and we
generally ending the line with a return (a character within the ASCII character
code set). The return is also known as the new line character. You are most
likely already familiar with the escape code of \n which is used within many
programming languages to indicate a return character when used within a
literal string.
A typical text file consisting of lines can be created by text editors (Notepad) or
word processing programs (Microsoft Word). When using a word processor
you must usually specify the output file as text (.txt) when saving it. Most
source code files are ASCII text files with a unique file extension; such as C+
+ using
.cpp, C# using .cs, Python using .py, etc. Thus, most compiler/Integrated
Development Environment software packages can be used to create ASCII text
files.
Filename – The name and its extension. Most operating systems have
restrictions on which characters can be used in filenames. Example Lab_05.txt
Because some operating systems do not allow spaces, we suggest that you use
the underscore where needed for spacing in a filename.
Path (Filespec) – the location of a file along with filename. Filespec is short for
file specification. Most operating systems have a set of rules on how to specify
the drive and directory (or path through several directory levels) along with the
filename. Example: C:\myfiles\cosc_1436\Lab_05.txt
Because some operating systems do not allow spaces, we suggest that you use
the underscore where needed when creating folders or sub-directories.
Open – Your program requesting the operating system to let it have access to
an existing file or to open a new file. In most current programming languages, a
file data type exists and is used for file processing. A file variable will be used to
store the device token that the operating system assigns to the file being
Page 28 of 40
opened. An open function or method is used to retrieve the device token, and
typically requires at least two parameters: the path and the mode (read, write,
append, or a combination thereof). Corresponding pseudocode would be:
The open function provides a return value of a device token from the
operating system and it is stored in the variable named data.
Verifying that a file was opened properly is processed with a condition control
structure. That structure may be either be an if-then-else statement or a try-
catch / try-except error handler, depending on the programming language
used.
Read – Moving data from a device that has been opened into a memory location
defined in your program. For example:
text = read(datafile)
or
text = datafile. Read()
Write – Moving data from a memory location defined in your program to a
device that has been opened. For example:
write(datafile, text)
or
datafile. Write(text)
Close – Your program requesting the operating system to release a file that was
previously opened. There are two reasons to close a file. First, it releases the
file and frees up the associated operation system resources. Second, if closing a
file that was opened for output; it will clear the out the operating system‘s
buffer and ensure that all of the data is physically stored in the output file. For
example:
Close (datafile)
or
datafile. Close ()
Page 29 of 40
Using / With – A wrapper around a processing block that will automatically
close opened resources, available in some programming languages. For
example:
// C#
//...
Or
# Python3
# ...
Key Terms
Close
Device token
Filename
Filespec
Open
Page 30 of 40
Read
Moving data from a device that has been opened into a memory location
defined in your program.
Stream
stdin
stderr
stdout
Text file
Using / with
Write
Page 31 of 40
SELF-CHECK 3.4-1
Identification
Page 32 of 40
INFORMATION SHEET 3.5-1
General Data security
Page 33 of 40
Do Not Let another Person Use Your User Account
Your user account represents all the computing resources that you personally
have been authorized to access. By letting someone else use your user account,
you are letting them access resources for which they may not have approval.
Anything that they may do will, ultimately, be your responsibility.
Security: Anyone with physical access to a computer can, one way or another,
get access to the files stored on the computer‘s local drives — A:\ through E:\.
Data Protection: If a computer "crashes," then all data on the local drives
might be lost. Files stored on the network drives are backed up on a nightly
basis. In the event data is lost due to some disaster, there is a much greater
chance that the data can be restored to a relatively recent state.
Lock Your Computer When Away from Your Desk during the Day
The world's strongest password won't matter at all if you walk away from your
desk, even for a few minutes, and leave your computer on and unlocked. For
computers running Windows 2000 and Windows XP, press Ctrl-Alt-Del keys
simultaneously and select Lock Workstation. When you return to your desk,
you will have to enter your Novell password to unlock the computer. For Mac
workstations using OS X, you can password-protect your account
under "System Preferences" to be activated every time the computer goes
into Sleep mode.
While you are at your computer you should arrange your work area so that
your screen cannot be viewed by casual visitors. This can alleviate a lot of
inadvertent viewing of personal or confidential information.
Page 34 of 40
Use Encryption for Viewing and Exchanging Sensitive Data
You should always use encryption to view web sites containing sensitive data.
You can tell if a web site is using encryption if the web address begins with
"https".
If you have created a web site that collects sensitive data, you should be sure
that the site forces users to use encryption when submitting data and that the
data, once submitted, is being stored securely.
Finally, remember that when using wireless connections, they are not secure.
Any data you may be accessing can be captured someone using similar
technology. When accessing data and information that is confidential, you
should only use a connection that is hardwired to your machine.
Do not install free software found on the Internet. These programs often
present a great security risk. To avoid this, be very wary, when surfing the
Internet, of pages that offer anything for free by just ―clicking here‖. If
unexpected pop up messages are displayed while surfing the Internet, use the
―X‖ in the upper right corner of the message to close it.
Page 35 of 40
Be Careful Using Internet Explorer
We feel it is best to only use Internet Explorer for those websites that require it
(i.e., PeopleSoft) and use a different browser for all other web activity. The
Internet Explorer web browser that comes with Microsoft Windows seems to
have a new security flaw almost every month.
Page 36 of 40
SELF-CHECK 3.5-1
True or False
Write true if the statement is correct and false if the statement is not
correct.
1. You should always use encryption to view web sites containing sensitive
data.
2. A computer that is off can be infected or compromised by attacks from other
computers.
3. All files that contain sensitive information, or that are critical to the
company‘s work should be stored on a network drive.
4. Let someone else use your user account.
5. Do not install free software found on the Internet.
Page 37 of 40
INFORMATION SHEET 3.5-2
Type of Computer Viruses
Most people know how to prepare for cold and flu season: wash your
hands, cover your mouth when you cough, cover your nose when you sneeze,
get plenty of rest, and avoid people who might be sick. It‘s something we learn
from a young age. We know to take these precautions, because we know how
humans contract viruses. In the same vein, when you know how viruses infect
computers, you can take better preventative measures to prevent viruses and
identify a virus before it rages out of control.
1. RESIDENT VIRUS
Resident viruses set up shop in your RAM and meddle with your system
operations. They‘re so sneaky that they can even attach themselves to your
anti-virus software files.
2. MULTIPARTITE VIRUS
This virus infects the entire system. Multipartite viruses spread by
performing unauthorized actions on your operating system, folders, and
programs.
3. DIRECT ACTION
This virus targets a specific file type, most commonly executable files (.exe), by
replicating and infecting files. Due to its targeted nature, this virus type is one
of the easier ones to detect and remove.
Page 38 of 40
4. BROWSER HIJACKER
Easily detected, this virus type infects your browser and redirects you to
malicious websites.
5. OVERWRITE VIRUS
Like the name implies, overwrite viruses overwrite file content to infect entire
folders, files, and programs.
7. FILE INFECTOR
By targeting executable files (.exe), file infector viruses slow down programs
and damage system files when a user runs them.
8. NETWORK VIRUS
Network viruses travel through network connections and replicate themselves
through shared resources.
Video: https://www.youtube.com/watch?v=G8VgUp0BfWg
Page 39 of 40
SELF-CHECK 3.5-2
Identification
1. This virus targets a specific file type, most commonly executable files, by
replicating and infecting files.
2. This virus type infects your browser and redirects you to malicious websites.
3. This virus set up shop in the RAM and meddles with your system
operations.
4. This sneaky virus disguises itself in the coding of links, ads, images, videos,
and site code.
5. This virus overwrites file content to infect entire folders, files, and programs.
Page 40 of 40