SlideShare a Scribd company logo
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 1
LESSON 4
Occupational Health and Safety Procedures
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 2
LEARNING OUTCOMES
LO 1.1 Unlock different occupational health and safety procedures for literacy and
awareness using various dynamic computer applications
LO 1.2 Enumerate the different hazards and risks that may occur in workstations
and places through skit
LO 1.3 Decode the meanings conveyed by the different hazards and risks warning
symbols and importance of Personal Protective Equipment ( PPE)
LO 1.4 Do a survey on the various safety regulations and contingency measures
Observed by schools, LGUs, and other offices in the locality
LO 1.5 Use numerous dynamic computer applications and interactive designs in
The observance of OHS Procedural Plan to avoid hazards and risks
Definition of Terms
Occupational health and safety (OHS) - relates to health, safety, and welfare issues
in the workplace.
Computer security - defines as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems.
Cybersecurity - is defined as protecting computer systems, which communicate over
the computer networks
Data Encryption - Encrypting data involves using codes and ciphers.
Firewall - is a way of protecting a computer from intrusion through the ports.
Harm – physical injury or damage to health.
Hazard – a potential source of harm to a worker.
Risk assessment - Hazard identification is part of the process used to evaluate if any
particular situation, item, thing, etc. may have the potential to cause harm.
Symbol - is a mark, sign or word that indicates, signifies, or is understood as
representing an idea, object, or relationship.
Personal Protective Equipment (PPE) - is clothing or equipment designed to protect
workers from physical hazards when on a worksite
At the end of the lesson, you are expected
to do the following:
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 3
Desktop Publishing - is the process of using the computer and specific types of
software to combine text and graphics to produce documents such as newsletters,
brochures, books, Web pages and many other printed documents
What Do You Already Know?
Let us determine how much you already know about task
preparation and hand tools. Take this test.
Pre-Test
A. Directions: Match column A with column B in order to identify the term
/ word being described.
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 4
B. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
C. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
D. Examine and identify the different signs and symbols for safety presented
below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 5
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
E. Enumerate the basic parts of MS Publisher and write their functions
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 6
What Do You Need to Know?
Read information Sheet 1.1 very well then find out how much you can
remember and how much you learned by doing Self-check 1.1
Information Sheet 1.1
Occupational health and safety (OHS) relates to health, safety, and
welfare issues in the workplace. OHS includes the laws, standards, and
programs that are aimed at making the workplace better for workers, along
with co-workers, family members, customers, and other stakeholders. It
improves a company's occupational health and safety standard that ensures
good business, a better brand image, and higher employee morale.
Occupational health and safety standards are in place to mandate the
removal, reduction, or replacement of job site hazards. OHS programs should
also include material that helps minimize the effects of the different type of
hazards in a workplace. Identifying hazards in a workplace and deciding how
dangerous they are will help to eliminate hazards and modify the risks that are
present. Furthermore, Our government has rules and regulations
implementing Executive Order No.307 which states that Occupational Safety
and Health (OSH) is defined as the a) promotion and maintenance of the
highest degree of physical, mental and social well-being of workers in all
occupations; b) prevention among its workers of any departures from health
caused by their working conditions; c) protection among workers in their
employment from risks usually from factors adverse to health and d) placing
and maintenance of the worker in an occupational environment adapted to
his/her physiological ability.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 7
General Safety Guidelines
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first aid kit are available in case of fire or injury. Here are
some general safety guidelines:
 Remove your watch or any other jewelry and secure loose clothing.
 Turn off the power and unplug equipment before opening the case and
performing service.
 Cover any sharp edges inside the computer case with tape.
 Never open a power supply or a monitor.
 Do not touch areas in printers that are hot or those which use high
voltage.
 Know where the fire extinguisher is located and learn how to use it.
 Know where the first aid kit is located.
 Keep food and drinks out of your workspace.
 Keep your workspace clean and free of clutter.
 Lift heavy objects with sturdy leg support to avoid back injury.
12 OHS Procedures
In a workplace, each student has a responsibility to their classmates or
workgroups to report and act upon any potential hazards. Students need to be
aware the procedures needed in the present work environment such as:
1. Do not work alone so that there's someone who can take care of you in
case of emergency.
2. Always power off the computer and unplug the computer before
working on it.
3. Take away any liquid near your working area to avoid getting
electrocuted or accidentally damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the
computer.
6. Do not use excessive force if things don't quite slip into place.
7. Clean the area before and after using it to maintain sanitation and
prevent accidents.
8. Hold the components on the edges and do not touch the Integrated
Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with
the organization's OHS procedures and practices.
10. Make sure that the pins are properly aligned when connecting a cable
connector.
11. Contingency measures during workplace accidents, fire and other
emergencies are recognized.
12. Use brush, compressed air or blower in cleaning the computer system.
Computer Safety
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 8
Computer security allows you to use the computer while keeping
it safe from threats. Computer security can be defined as controls that are put
in place to provide confidentiality, integrity, and availability for all components
of computer systems. It keeps your information protected. Oftentimes, people
confound computer security with other related terms like information security
and cybersecurity. For example:
 Information security is securing information from unauthorized access,
modification & deletion
 Computer Security means securing a standalone machine by keeping it
updated and patched
 Cybersecurity is defined as protecting computer systems, which
communicate over the computer networks
Why is cybersecurity important?
Listed below are the reasons why cybersecurity is so important
in what’s become a predominant digital world:
 Cyber attacks can be extremely expensive for businesses to endure. In
addition to financial damage suffered by the business, a data breach
can also inflict untold reputational damage.
 Cyber-attacks these days are becoming progressively destructive.
Cybercriminals are using more sophisticated ways to initiate cyber
attacks.
 Regulations such as GDPR are forcing organizations into taking better
care of the personal data they hold.
 Security incidents regularly affect businesses of all sizes and often
make the front page causing irreversible reputational damage to the
companies involved
Computer Security Practices
Computer security threats are becoming relentlessly inventive these
days. There is much need for one to arm oneself with information and
resources to safeguard against these complex and growing computer security
threats and stay safe online. Some preventive steps you can take include:
1. Secure your computer physically by:
o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security
guard between the internet and your local area network
2. Stay up-to-date on the latest software and news surrounding your
devices and perform software updates as soon as they become
available
3. Avoid clicking on email attachments unless you know the source
4. Change passwords regularly, using a unique combination of numbers,
letters and case types
5. Use the internet with caution and ignore pop-ups, drive-by downloads
while surfing
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 9
6. Taking the time to research the basic aspects of computer security
and educate yourself on evolving cyber-threats
7. Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen
to your computer.
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before
they infect a computer.
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. It may not be possible to decipher captured data in
time to make any use of it. A security alert may inform you that you are using
an encrypted connection.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of
protecting a computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured.
Data being transported on a network is called traffic.
How to Enable Firewall for Windows 7
1. Open Windows Firewall by clicking the
Start button , and then clicking
Control Panel. In the search box, type
firewall, and then click Windows
Firewall.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 10
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link
in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
If you want the firewall to prevent all programs from communicating,
including programs that you have previously allowed to communicate through
the firewall, select the Block all incoming connections, including those in
the list of allowed programs check box.
Computer security threats
Computer security threats are possible dangers that can possibly
hamper the normal functioning of your computer. In the present age, cyber
threats are constantly increasing as the world is going digital. The most
harmful types of computer security are:
Viruses
A computer virus is a malicious
program which is loaded into the user’s
computer without user’s knowledge. It
replicates itself and infects the files and
programs on the user’s PC. The ultimate
goal of a virus is to ensure that the victim’s
computer will never be able to operate
properly or even at all.
Computer Worm
A computer worm is a software
program that can copy itself from one
computer to another, without human
interaction. The potential risk here is that it
will use up your computer hard disk space
because a worm can replicate in great
volume and with great speed.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 11
Phishing
Pronounced like fishing, phishing is a
term used to describe a malicious individual or
group of individuals who scam users. They do
so by sending e-mails or creating web
pages that are designed to collect an
individual's online bank, credit card, or other
login information.
Botnet
A botnet is a group of computers
connected to the internet that have been
compromised by a hacker using a computer
virus. An individual computer is called ‘zombie
computer’. The result of this threat is the
victim’s computer, which is the bot will be used
for malicious activities and for a larger scale
attack like DDoS.
Rootkit
A rootkit is a computer program
designed to provide continued privileged
access to a computer while actively hiding
its presence. Once a rootkit has been
installed, the controller of the rootkit will be
able to remotely execute files and change
system configurations on the host machine.
Keylogger
Also known as a keystroke logger,
keyloggers can track the real-time activity
of a user on his computer. It keeps a record
of all the keystrokes made by user
keyboard. Keylogger is also a very powerful
threat to steal people’s login credential
such as username and password.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 12
Pharming
Pharming is a scamming practice in
which malicious code is installed on a
personal computer or server, misdirecting
users to fraudulent Web sites without their
knowledge or consent.
Email spoofing
It is a deceitful email practice in which
the sender address is changed, so that it
would appear to have come from a different
source usually someone you know. It is
also known as fraudulent email activity
hiding email origins.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 13
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.1
Directions: Match column A with column B in order to identify the term / word
being described.
Refer to the Answer Key. What is your score?
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 14
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned concepts on Occupational Health and Safety
and Computer Safety. Be sure that you are also being able to demonstrate
skills and answer the guide questions comprehensively.
Activity 1.1
How to Enable Firewall for Windows 7
1. Open Windows Firewall by clicking the
Start button , and then clicking
Control Panel. In the search box, type
firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link
in Windows Firewall.
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 15
K-12 Creative Technology
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
4. Essential Question:
In the space below, list the services that are available.
________________________________________________________
________________________________________________________
________________________________________________________
Activity 1.2
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local
store to gather information about hardware and software firewalls.
Company/Hardware
Name
Website
URL
Cost Subscription Length
(Month/Year/Lifetime)
Hardware
Features
1. Using the Internet, research two different hardware firewalls. Based on
your research, complete the table below.
2. Which hardware firewall would you purchase? List reasons for your
choice.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 16
K-12 Creative Technology
LEARNING OUTCOME 1.2
Enumerate the different hazards and risks that may occur in
workstations and places through skit
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
What Do You Need To Know?
Read information Sheet very well then find out how much you can
remember and how much you learned by doing Self-check 1.2
Information Sheet 1.2
What is a hazard?
A hazard is any agent that can cause harm or damage to humans,
property, or the environment .It is commonly define also as “A hazard is any
source of potential damage, harm or adverse health effects on something or
someone”. Other government entities state that "Occupational health and
safety defines - Hazard identification and elimination and risk assessment
and control" uses the following terms:
 Harm – physical injury or damage to health.
 Hazard – a potential source of harm to a worker.
Risk is defined as the probability that exposure to a hazard will lead to a
negative consequence, or more simply, a hazard poses no risk if there is no
exposure to that hazard.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 17
K-12 Creative Technology
Hazard Identification, Risk Assessment, and Risk Control
Hazard identification is part of the process used to evaluate if any
particular situation, item, thing, etc. may have the potential to cause harm.
The term often used to describe the full process is risk assessment:
 Identify hazards and risk factors that have the potential to cause harm
(hazard identification).
 Analyze and evaluate the risk associated with that hazard (risk
analysis, and risk evaluation).
 Determine appropriate ways to eliminate the hazard, or control the risk
when the hazard cannot be eliminated (risk control).
Overall, the goal of hazard identification is to find and record possible
hazards that may be present in your workplace. It may help to work as a team
and include both people familiar with the work area, as well as people who are
not – this way you have both the experienced and fresh eye to conduct the
inspection. At work you can use these three Think Safe steps to help prevent
accidents such as:
1. Spot the Hazard (Hazard
Identification)
Key Point - A hazard is anything
that could hurt you or someone else.
Examples of workplace hazards
include:
frayed electrical cords (could result in
electrical shock)
boxes stacked precariously (they could
fall on someone)
noisy machinery (could result in damage to your hearing)
During work experience, you must remain alert to anything that may be
dangerous. If you see, hear or smell anything odd, take note. If you think it
could be a hazard, tell someone.
2. Assess the Risk (Risk Assessment)
Key Point
Assessing the risk means working out how
likely it is that a hazard will harm someone
and how serious the harm could be.
Whenever you spot a hazard, assess the risk by
asking yourself two questions:
 How likely is it that the hazard could harm
me or someone else?
 How badly could I or someone else be
harmed?
Always tell someone (your employer, your
supervisor or your health and safety (representative) about hazards you can't
fix yourself, especially if the hazard could cause serious harm to anyone.
For example:
 Ask your supervisor for instructions and training before using
equipment.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 18
K-12 Creative Technology
 Ask for help moving or lifting heavy objects.
 Tell your supervisor if you think a work practice could be dangerous.
If you are not sure of the safest way to do something during work experience,
always ask your work experience supervisor.
3. Make the Changes (Risk Control)
Key Point
It is your employer's responsibility to fix hazards. Sometimes you may be able
to fix simple hazards yourself, as long as you don't put yourself or others at risk. For
example, you can pick up things from the floor and put them away to eliminate a trip
hazard.
The six main categories of hazards are:
Biological. Biological hazards include
viruses, bacteria, insects, animals, etc., that
can cause adverse health impacts. For
example, mould, blood and other bodily
fluids, harmful plants, sewage, dust and
vermin.
Chemical. Chemical hazards are
hazardous substances that can cause harm.
These hazards can result in both health and
physical impacts, such as skin irritation,
respiratory system irritation, blindness,
corrosion and explosions.
Physical. Physical hazards are
environmental factors that can harm an
employee without necessarily touching them,
including heights, noise, radiation and
pressure.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 19
K-12 Creative Technology
Safety. These are hazards that create
unsafe working conditions. For example,
exposed wires or a damaged carpet might
result in a tripping hazard. These are
sometimes included under the category of
physical hazards.
Ergonomic. Ergonomic hazards are
a result of physical factors that can result in
musculoskeletal injuries. For example, a
poor workstation setup in an office, poor
posture and manual handling.
Common hazards encountered by computer technicians and users
Physical Hazards
One of the most common physical hazards involving computer
technicians is cables running across the floor. If someone trips, falls, and
hurts himself because of a cable you ran across the floor, someone (you, your
employer, or your customer) has a serious legal negligence problem.
Mechanical Hazards
When working on electronic equipment always be alert to any
possibility of being hurt by moving parts, hot components, or sharp edges.
Electric Shock Hazard
Inside computers and electronic equipment, there is a range of
voltages from 3.3 volts to 25 volts, most of these are harmless. But at the
power supply, you'll find line voltage, which is a lethal 220 volts.
Posture-related injuries from computer use
Back and neck pain, headaches, and shoulder and arm pain are
common computer-related injuries. Such muscle and joint problems can be
caused or made worse by poor workstation (desk) design, bad posture and
sitting for long periods of time.
Computer-related overuse injuries of the hand or arm
Muscles and tendons can become painful with repetitive movements
and awkward postures. This is known as ‘overuse injury’ and typically occurs
in the elbow, wrist or hand of computer users. Symptoms of these overuse
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 20
K-12 Creative Technology
injuries include pain, swelling, stiffness of the joints, weakness and
numbness.
Eyestrain from computer use
An act of focusing your eyes at the same distance point for long
periods of time causes fatigue. The human eye structurally prefers to look at
objects more than six metres away, so any work performed close up puts
extra demands on your eye muscles. The illuminated computer screen can
also cause eye fatigue.
How Much Have You Learned?
Self-Check 1.2
A. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
B. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
C. List down the common hazards encountered by computer technicians and users
1. __________________________
2. __________________________
3. _________________________
4. __________________________
5. __________________________
Refer to the Answer Key. What is your score?
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 21
K-12 Creative Technology
How Do You Apply What You Have Learned?
Direction: Observe the set-up of your school’s Computer Laboratory.
Observe the procedures and arrangement being practiced and used in the
workplace. Identify and list the hazards and assess the risk based on your
observations.
Spot the Hazard Assess the Risk
A Hazard is anything that could hurt
you
or someone else
Work out how likely it is that the hazard
will hurt someone and how badly
he/she could be hurt
List the hazards ( 5 hazards) Describe the risks
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 22
K-12 Creative Technology
LEARNING OUTCOME 1.3
Decode the meanings conveyed by the different hazards and risks
warning symbols and importance of Personal Protective Equipment
( PPE)
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
What Do You Need to Know?
Read information Sheet 1.3 very well then find out how much you can
remember and how much you learned by doing Self-check 1.3
Information Sheet 1.3
Symbols
Symbols are resources of complex communication that often can have
multiple levels of meaning. A symbol is a mark, sign or word that indicates,
signifies, or is understood as representing an idea, object, or relationship.
Symbols allow people to go beyond what is known or seen by creating
linkages between otherwise very different concepts and experiences. Hazard
symbols or warning symbols are recognizable symbols designed to warn
about hazardous or dangerous materials, locations, or objects, including
electric currents, poisons, and radioactivity. The use of hazard symbols is
often regulated by law and directed by standards organizations. Hazard
symbols may appear with different colors, backgrounds, borders and
supplemental information in order to specify the type of hazard and the level
of threat.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 23
K-12 Creative Technology
Safety Symbols and Their Meanings
The best occupational health and safety programs use a series of signs
and symbols to convey a complete message. Most safety signs and symbols
fall into one of four categories:
 Prohibition
 Warning
 Mandatory
 Emergency
Each category has its own specific colour and sign shape that remains
consistent around the world as per safety regulations. You will be able to
easily identify whether a sign is asking you to stop doing something, start
doing something, take precautions, or advising you of emergency equipment
or facilities through their characteristics which are presented in the table.
Table 1.
Source:https://www.dcmgroup.ca/en/news/safety-symbols-and-their-meanings-2
Why Use Safety Symbols?
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 24
K-12 Creative Technology
Pictures may not say a thousand words, but they are universally
recognized symbols that transcend language. No matter where you’re
working, you’ll be able to understand the potential hazards you face simply by
looking at the posted symbols. There are two different types of safety
symbols: one refers to general safety protocols, while the other is used
specifically for labeling chemicals that may be hazardous. Since most
workplaces have a combination of both, it’s important to understand each of
them.
Hazard Symbols
Figure 1 Source: https://www.pure-chemical.com/blog/hazard-symbols/
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 25
K-12 Creative Technology
Health Hazard - symbol is a clear indication of the substance being
carcinogenic, it induces respiratory irritation, directly causes damage to
organs and also imparts reproductive toxicity.
Acute Toxic – indicates the skull and for acute toxicity. When displayed on
chemical labels the message sent across is, they are toxic to the extent of
being fatal when inhaled, swallowed and on contact with skin.
Flammable - a picture of the flame abruptly indicates the substance is
flammable when it comes into contact with air or it may even heat up by itself
and ignite spontaneously.
Exclamation mark - a generic symbol which in addition to cautioning also
indicates that it causes irritation, acute toxicity, narcotic effect, respiratory tract
irritation and causes damage to internal organs.
Flame over circle - a symbol sends a word of caution for all gases and liquids
that oxidize. Though this reaction does not cause explosions it is capable of
loosing its nature and transforming to another undesired substance.
Gas Cylinder - a pictogram of gas cylinder indicates that the consignment
has liquified gases, compressed gas or dissolved gases.
Exploding Bomb –an explosive hazard symbol indicates an explosion where
the substance contained may react on its own and may cause a noticeable
increase in air pressure.
Environmental hazard -a dead fish in the pictogram indicates that the
substance is hazardous to aquatic life and should not be let into lakes, rivers
etc. Moreover, it indicates that there is a possibility of the ecosystem being
damaged for years.
Corrosion - a clear indication in the picture that the substance contained is
capable of corroding metals and skin.
The Importance of Personal Protective Equipment ( PPE)
Personal Protective Equipment (PPE) is clothing or equipment
designed to protect workers from physical hazards when on a worksite. PPE
should only be considered as a last line of defense between a hazard and the
worker. Attempts to control workplace risks and hazards should always be
addressed first. Making the workplace safe includes providing instructions,
procedures, training and supervision to encourage people to work safely and
responsibly. Safety is a major issue for day laborers and skilled laborers.
Commonly in a year accidents happen frequently in the construction industry
and often times it is due to the absence of Personal Protective Equipment
(PPE) or failure to wear the provided PPE.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 26
K-12 Creative Technology
PPE includes items such as protective helmets, eye protection, high-
visibility clothing, safety footwear, safety harnesses and, sometimes,
respiratory protective equipment.
1. Head Protection
Hard hats are common on construction sites. They are designed
to protect against flying or falling objects that would otherwise impact or
penetrate the worker. Some hard hats are equipped with accessories such as
face shields and earmuffs. Hard hats should be well-fitted; those that are too
large or too small are inappropriate for use.
2. Eye and Face Protection
They are equally as important as head protection. Safety
goggles, spectacles and full face shields can give you the protection needed
for the eyes and face. Metal work, wood-work, hot-work and air-tool
operations all require this type of protection.
3. Respiratory protection
Respiratory protection is vital on sites where toxic substances
are present. Respiratory protections like respirators are designed to protect
you from dust, fumes, paint spray, pesticides and other dangerous
substances that could cause permanent impairment.
4. Hand & Skin protection
Occupational skin diseases such as contact dermatitis, skin
cancers, and other skin injuries and infections are the second most common
type of occupational disease and can be very costly. Gloves commonly used
as PPE include rubber gloves, cut-resistant gloves, chainsaw gloves and
heat-resistant gloves. Using gloves helps to avoid hazards usually involved
when working with chemicals, glass, sheet metal, electricity, hot materials or
slippery objects.
5. Hearing protection
Industrial noise is often discounted as an occupational hazard
since it isn’t visible to the eye. Earplugs and earmuffs are common hearing
protection tools. It is important to note that earmuffs are more effective in
reducing high-frequency noise while earplugs are more effective for reducing
low-frequency noise.
6. Body Protection
PPE includes safety vests and suits and should be used for tasks
that can cause body injuries from extreme temperatures, flames and sparks,
toxic chemicals, insect bites and radiation. Ensure that they are clean and
free from cuts and burns. Always get a good fit to ensure full body protection.
7. Fall Protection
PPE includes safety harnesses and lanyards and should be
strictly used for task that can cause falling from heights and serious injury or
death. When inspecting equipment, ensure that the straps are free from
tears, deformities and burn marks and buckles are connected securely and
tightly. It is very important to dispose them if used after a falling incident.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 27
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.3
Directions: Examine and identify the different signs and symbols for safety
presented below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 28
K-12 Creative Technology
B. Supply the missing data needed to complete the statement.
( Note: write your answer on the assign bullet)
Category Colour Information/Instruction Features Example
Prohibition    
Warning    
Emergency    
Refer to the Answer Key. What is your score?
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 29
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
Activity 1.3
Applying OH&S Policies
1. Group yourselves into six members.
2. Conduct a simulation on: “Applying OHS Policies and Procedures”.
3. The performance will be rated according to the following:
Find out by accomplishing the Scoring Rubric honestly and sincerely.
Remember it is your learning at stake!
Performance Criteria:
Have shown
five OHS
policies in
different
areas
Have shown
four OHS
policies in
different
areas
Have shown
three OH&S
policies in
different
areas
Have shown
two OH&S
policies in
different
areas
Have not
shown any
OH&S
policies
50 40 30 20 10
Find out by accomplishing the Scoring Rubric honestly and sincerely,
remember it is your learning stake!
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 30
K-12 Creative Technology
LEARNING OUTCOME 1.4
Do a survey on the various safety regulations and contingency
measures observed by schools, LGUs, and other offices in the locality.
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
Materials
1. Workshop
2. Tables and Chairs
3. Computers
4. USB Flash Drive
5. Drawing materials
6. Application software
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 31
K-12 Creative Technology
What Do You Need to Know?
Read information Sheet 1.4 very well then find out how much you can
remember and how much you learned by doing Self-check 1.4
Information Sheet 1.4
The fear of stampede is one of the problem that the school faces
especially when students goes in and out of the school campus and when
natural disaster strikes e.g. typhoons, heavy rains, earthquakes, etc.
Stampedes usually happen when the enormous crowd movements are
disrupted, and the situation gets worse when crowd anxiety rises. It is already
an initiative of a person to run to save his/her own life.
Babag National High School is a public secondary institution located at
Babag I, Lapu-Lapu City. It is the only secondary school in the said barangay
that accommodates its own students and the students from the neighboring
barangays and municipality. The school is situated at the back of a
commercial building and Babag Elementary School. A narrow pathway with
an estimated width of 4 meters serves as the main entrance and exit for both
people and vehicles. The main entrance and exit are located near the
National Highway where in most of the vehicles pass by going either to
Cordova or Lapu-Lapu City. Since the population of Babag National High
School has increased, there is already a big probability that stampede may
occur especially during emergencies and evacuation considering the
insufficient size of entrance and exit gates.
One main aim of having this contingency plan is to prepared for the
worst case scenario especially in the midst of stampede. Recently, the school
is already implementing measures in controlling the traffic of going in and
outside the school campus.
As of the moment, the school has already established a SDRRM team,
with their respective positions, who will respond in an event of a disaster in
the school. Various school organizations such as Red Cross Youth (RCY),
Boy Scouts of the Philippines (BSP), Girl Scouts of the Philippines (GSP) and
Junior Emergency Response Team (JERT) were already trained and
equipped with knowledge and skills to respond in the event of disaster. The
school has also linked with the Local Government Unit (LGUs) like the local
Barangay Disaster Risk Reduction Management Council (BDRRMC), Bureau
of Fire Protection (BFP), Philippine National Police (PNP), Philippine Red
Cross etc. to aid the needs of the school during and after the disaster.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 32
K-12 Creative Technology
HAZARD
The School DRRM Team has identified several hazards and ranked them
based on their severity and probability to happen.
HAZARDS
PROBABILITY IMPACT AVERAGE
P +
I
2
R
A
N
K
RATE REMARKS RATE REMARKS
FIRE 3 3 3
EARTHQUAKE 4 4 4 2
STAMPEDE 4 5 4.5 1
FOOD
POISONING
5 1 3
ARMED
CONFLICT
2 2 2
GANG AND
YOUTH
VIOLENCE
3 5 4 3
Hazard Identification
With the hazards identified, it was found out that stampede is the top
most human induced hazard in the school especially when man made or
natural disasters happen. This contingency plan is made to consider the
actions to be taken when stampede occurs.
Contingency plan for stampede aims to prepare an organization to
respond well to an emergency and its potential humanitarian impact. These
encompasses making decisions in advance about the management of human
and financial resources, coordination and communication procedures, and
being aware of a range of technical and logistical responses.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 33
K-12 Creative Technology
HAZARD TO PLAN FOR: STAMPEDE
Based on the assessment made by the SDRRM Members, stampede
requires contingency planning to ensure preparedness for effective response
to lessen possible casualties, protect lives and loss of properties.
The early warning signs that the school has already established
includes the alarm bell, and the noise created by the people like shouting,
running, etc. The triggering factor of this hazard is the occurrence of natural
and man-made disaster. People will be at the state of fear when they feel that
they are unsafe to a specific place.
Furthermore, to somehow control the traffic management of the school,
the presence of guards in the entry and exit points is an advantage. To
constantly remind the students on what to do before, during and after a
disaster, the Junior Emergency Response Team (JERT) conducts continuous
room to room update. The presence of Student Body Organizations which
includes the Boy Scouts of the Philippines (BSP), Girl Scouts of the
Philippines (GSP), Rover Scouts, Supreme Student Government (SSG), Red
Cross Youth (RCY) and Junior Emergency Response Team (JERT) will help
manage the traffic and response to those who are at risk. The creation of the
SDRRM Team is an advantage in mitigating, controlling and managing the
situation. To simulate the evacuation in the event of the disaster, the school
conducts quarterly drills. Students will be exposed to evacuate the school in
actual scenario.
To guide the SDRRM Team, responders and volunteers contemplate
on the exact impact of threat that a stampede may bring, a scenario is
developed thinking through the possible impacts. On the basis of sensible
scenario, it is possible to set out the scale of the impact, the response and the
resources needed. The following question will guide the SDRRM Team and
responders in crafting the Contingency Plan in a systematic way: What is
going to happen? What are we going to do about it? What can we do
ahead of time to get prepared?
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 34
K-12 Creative Technology
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 35
K-12 Creative Technology
PREPAREDNESS MEASURES
Key Areas for Preparedness Gaps
Action To Be Taken/ Preparedness
Measures
Risk Understanding
 Lack of knowledge about stampede;
 Insufficient information about the hazard
and risk in the school campus; and
 Inability to identify possible areas to be
utilized during evacuation phase.
 Conduct room to room information
drive about stampede.
 Inform the learners, teachers and
stakeholders the identified risks and
hazards of the school to address the
problems.
 Involve the learners, teachers and
school head in the planning on what to
do before, during and after the
occurence of stampede.
Contingency Plan and Dissemination
 Lack of knowledge about Contigency plan
for stampede.
 No IEC materials for stampede
 Coordinate with authorities to gain
knowledge about stampede and its
mitigating measures.
 Produce school-based IEC materials
for stampede and disseminate it to the
learners.
Communication
 Lack of knowledge about the early
warning signs for stampede.
 Lack of equipment that can be utilized
during emergencies.
 Conduct information drive to the
learners and teachers about what the
early warning signs for stampede.
 Provisions of the needed equipment
during emergencies.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 36
K-12 Creative Technology
Coordination
 Lack of coordination with the government
agencies and private sectors about the
response and recovery.
 Lack of partnerships and linkage to tap to
during emergencies.
 Coordinate with the local BDRRMO,
City DRRMO, LGUs and private
sectors.
 Establish external partnerships and
linkages with LGUs and Private
sectors.
Monitoring
 Lack of action and monitoring to the
identified hazard and risk in the school.
 Lack of awareness about RADAR
 Constant monitoring of the hazards
and risks identified.
 Attend seminar regarding RDAR
Convergence
 Lack of coordination with the school
offices on what to do in the event of
stampede.
 Some of the appointed SDRRM team
don’t know their respective functions.
 Lack of idea about Incident Command
System (ICS)
 Conduct orientation on the
contingency plan for stampede to the
teachers and their respective roles and
functions.
 Introduction on how the ICS works.
Support for Learning Continuity
 Insufficient areas in the school to be
utilized as Temporary Learning Space
(TLS).
 No organization of where the learning
materials will be kept when disaster
strikes.
 No source/funding for basic provisions in
the event of stampede.
 Identified specific areas inside/outside
the school which can be utilized as
TLS together with the local DRRM and
the barangay.
 Orientation with the teachers on how
to secure the learning materials in the
event of disaster.
 Tap external sources to help/ support
the school in the providing basic needs
to the IDPs in the event of stampede.
Support for schools used as an
Evacuation Centers
 The school and the LGU has no written
agreement on the use of school as an
evacuation.
 Unavailability of the use of School funds
to repair facilities and properties.
 Coordinate with the LGU to let them
have an idea on the utilization of
school as an evacuation center.
 Make a plan to target the need to
repair first school facilities.
Drills
 Lack of participation and cooperation
during the conduct of the drills.
 Lack of coordination with the Local
Government Unit in the conduct of the
drills.
 Constant room to room campaign on
the things to do before, during and
after stampede.
 Coordinate with the LGU to take part
and evaluate the drill.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 37
K-12 Creative Technology
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 38
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.4
Directions: On the box below, make a paragraph explaining the
importance of identifying hazards in school and the possible safety
measures implemented. For the paragraph’s introduction, justify and
narrate school’s location.
Note: Answers vary so long that they explain their ideas/concept comprehensively
_____ _____________________________________
________________________________________________
_______________________________________________
_______________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 39
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
MINI SURVEY
Directions: Conduct a mini survey in your house. Gather the necessary data
which discuss the importance of safety measures and creating a contingency
plan after the hazards identified. Your output will be rated according to the
rubrics below.
Rubrics for your performance Task
Contents Excellent
(5)
Good
(3)
Poor
(1)
Spelling Almost all
words spelled
correctly
Content All
information is
factual and
answered to
the queries
Punctuation Correct
ending
punctuation
in every
sentence but
one.
Grammar Simple
sentences
are
grammatically
correct.
Handwriting Legible.
Good
spacing and
alignment.
Total Points
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 40
K-12 Creative Technology
LEARNING OUTCOME 1.5
Use numerous dynamic computer applications and interactive
designs in the observance of OHS Procedural Plan to avoid hazards
and risks
PERFORMANCE STANDARDS
The learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
Materials
1. Workshop
2. Tables and Chairs
3. Computers
4. USB Flash Drive
5. Drawing materials
6. Application software
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 41
K-12 Creative Technology
What Do You Need to Know?
Read information Sheet 1.5 very well then find out how much you can
remember and how much you learned by doing Self-check 1.5
Information Sheet 1.5
DESKTOP PUBLISHING AND THE MS PUBLISHER SOFTWARE
Desktop Publishing is the process of using the computer and specific types of
software to combine text and graphics to produce documents such as
newsletters, brochures, books, Web pages and many other printed
documents.
 Things to Do with Desktop Publishing
Desktop publishing is or can be:
 designing print communications such as brochures, flyers, ads and
posters
 designing print communications such as catalogues, directories and
annual reports  designing logos, business cards, and letterhead
 designing and publishing newsletters, magazines, and newspapers
 designing books and booklets
 converting print communications to formats including Web and smart
devices such as tablets and phones
 creating resumes and business forms (including invoices, inventory
sheets, memos and labels)
 self-publishing (books, newsletters, ebooks, etc.)
 designing and publishing blogs and Web sites
 designing slide shows, presentations and printing handouts
 creating and printing greeting cards, banners, postcards, candy
wrappers, and iron-on transfers
 making digital scrapbooks and print or digital photo albums
 creating decorative labels, envelopes, trading cards, calendars, and
charts
 designing packaging for retail merchandise from wrappers for bars of
soap to software boxes
 designing store signs, highway signs and billboards
 taking work designed by others and putting into the correct format for
digital or offset printing or for publishing online
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 42
K-12 Creative Technology
Steps and procedures when using Desktop Publishing Software
Step 1 applies to anyone who is new to using page layout programs. Steps 2
and 8 apply to everyone. Pick and choose from among steps 3 to7 to find the
learning techniques that work for you.
1. Have a plan, make a sketch
2. Choose a template
3. Up your document
4. Place text in your document
5. Format your text
6. Place graphics in your document
7. Tweak your graphics placement
8. Apply the rules of desktop publishing
9. Print a draft and proofread it
10. Print your project
WORKING WITH MS PUBLISHER
Opening MS Publisher may vary
depending on the computer you
are working on.
1. Click on the Start
button, select All
Programs menu »
Microsoft Office »
Microsoft Office
Publisher.
You will see an
icon on your
desktop that looks similar to this. Double click on this icon to
open MS Publisher.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 43
K-12 Creative Technology
2. Publisher start up in the Getting Started with the Microsoft
Office Publisher window offering many pre-formatted designs to
use in creating your publication.
Basic Parts and Functions of MS Publisher
The illustration below consists of the important tool bars in working with MS
Publisher.
The Quick Access Toolbar lets you access common commands, no matter
which tab you are using in the Ribbon. By default, it shows the Save, Undo,
and Redo commands.
The Page Navigation pane allows you to view and work with the pages in
your publication. You can add, delete, rearrange, and duplicate pages in the
Page Navigation pane. You can also organize your pages into Sections.
The Ribbon contains multiple tabs, each with several groups of commands.
Some tabs, like "Text Box Tools" or "Picture Tools," may appear only when
you are working with certain items like text boxes or images.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 44
K-12 Creative Technology
Guides are thin lines that help you align various objects.
The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
WORKING WITH TEXT
Text Basics
In order to use MS Publisher, you must have the knowledge in using the
Microsoft Word application.
 Text Basics - Reviews basic topics like inserting, deleting, copying, and
moving text
 Formatting Text - Includes text formatting tasks like changing font style,
size, and color
 Checking Spelling and Grammar - Presents tools you can use to
proofread your text
 Working with Lists - Guides you through creating and formatting lists
 Line and Paragraph Spacing - Explains how to adjust spacing
WORKING WITH TEXT BOXES
Insert a Text Box:
1. On the Ribbon, select the Insert tab and locate the Text group.
2. Click the Draw Text Box command.
3. The cursor will turn into a crosshairs +. Click anywhere on your publication
and drag your mouse to create the text box.
4. You can now start typing inside the text box
WRAPPING TEXT AROUND THE OBJECT
1. Select the object, then click the Format tab that appears on the Ribbon.
2. Locate the Arrange group and click the Wrap Text drop-down command.
3. Select the desired wrap option. The text will adjust based on the option you
have selected.
4. If necessary, reposition the object and adjust the image until the text wraps
correctly
 If you can’t get your text to wrap the way you wish, click the Wrap Text
command and select More Layout Options from the menu. You can make
more precise changes in the Advanced Layout dialog box that appears.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 45
K-12 Creative Technology
CONNECTING TEXT BOXES
Connect to a New Text Box
1. Select your text box
2. Click the Text Box Tools Format tab and locate the Linking group.
3. Click the Create Link command.
4.The Link icon will appear in place of your cursor. Click the spot on your
publication where you would like to add the linked text box.
5.Continue typing your text. Any text that overflows from the original text box
will now appear in the connected box.
WORKING SHAPES AND OBJECTS
To Insert a Shape:
1. Select the Insert tab and locate the Illustrations group
2. Click the Shapes drop-down command
Arranging Objects
To Align Two or More Objects:
1. Click and drag your mouse to form a selection box around the objects you
want to align. All of the objects will now have sizing handles to show that they
are selected.
2. Click the Format tab and locate the Arrange group.
3. Click the Align drop-down command.
4. Select one of the six alignment options.
5. The objects will align to each other based on the option that you have
selected.
To Align Objects to the Page
1. Select the object or objects you want to align.
2. Click the Format tab and locate the Arrange group.
3. Click the Align drop-down command.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 46
K-12 Creative Technology
4. Select one of the six alignment options. The objects will align to the page
based on the option that you have selected
WORKING WITH PICTURES
To Insert a Picture from a File:
1. Select the Insert tab and locate the Illustrations group.
2. Click the Picture command.
The Insert Picture dialog box will appear. Locate and select the picture you
would like to insert, then, click Insert.
To Insert Clip Art
1. Select the Insert tab and locate the Illustrations group.
2. Click the Clip Art command.
3. The Clip Art pane will appear on the right. Use the search tools to
search for a suitable image.
 Enter keywords in the Search for: fields that are related
to the image you wish to find.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 47
K-12 Creative Technology
 Click the drop-down arrow in the Results should be: field,
then, deselect any types of media you do not wish to
see.
4. Click Go to begin your search.
5. Publisher will display pictures that meet your search terms. When you
have found a picture you wish to use, click it.
Saving a File
Save as is used to save a file for the first time or to save it with a different
name or to a different location.
1. Click File.
2. Chose Save As.
3. In the File Name text box, type in the desired filename.
4.Press Enter or click Save.
Print your publication
1. Click the File button to open the Backstage view.
2. Click Print to open the print settings page.
3. In the Print section, set the number of copies to print in Copies of print job.
4. In the Printer section, make sure that the correct printer is selected.
5. In the Settings section:
a. Make sure that the correct set of pages or sections is selected.
b. Select the format for imposing your pages on the sheet.
c. Set the paper size.
d. Set whether to print on one side of the sheet of paper or both, and
when printing on both sides whether to flip the sheet of paper on the
long or short side.
e. If your printer is capable of color printing, choose if you want to print
color or grayscale.
6. Click the Print button to send the publication to your printer.
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 48
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.5
A. Directions: On the box below, make a paragraph explaining the
things you can do with MS Publisher Software.
Note: Answers vary so long that they explain their ideas/concept comprehensively
_____ _____________________________________
________________________________________________
_______________________________________________
_______________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
B. Enumerate the basic parts of MS Publisher and write their functions
Refer to the Answer Key. What is your score?
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 49
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
Directions: Make a brochure on OHS Procedural Plan of your school to
show case the Desktop Publishing skills you have learned from this lesson.
Make sure that your publication will be able to convey the steps and its
importance to avoid hazards and risks. Present it in print and non- print.
Rubrics for your performance Task
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 50
K-12 Creative Technology
Post-Test
A. Directions: Match column A with column B in order to identify the term
/ word being described.
B. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
C. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 51
K-12 Creative Technology
D. Examine and identify the different signs and symbols for safety presented
below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
E. Enumerate the basic parts of MS Publisher and write their functions
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 52
K-12 Creative Technology
REFERENCES
LESSON 4
Web
https://www.osha.gov/sites/default/files/2018-12/fy11_sh-22300-
11_AwarenessLevelTeacherManual.pdf
https://www.ccohs.ca/oshanswers/hsprograms/hazard_identification.
html
https://ehs.princeton.edu/news/know-your-hazard-symbols-
pictogramshttps://ehs.princeton.edu/news/know-your-hazard-
symbols-pictograms
https://www.slideshare.net/safereps/workplace-hazards-26555990
https://www.hiclipart.com/free-transparent-background-png-
clipart-puwtp
https://www.dcmgroup.ca/en/news/safety-symbols-and-their-
meanings-2/
https://www.pure-chemical.com/blog/hazard-symbols/
https://safetyculture.com/topics/ppe-safety/
http://www.oshc.dole.gov.ph/transparency?id=36
http://bwc.dole.gov.ph/index.php/forms?layout=edit&id=53
https://www.hse.gov.uk/toolbox/ppe.htm
https://www.inc.com/encyclopedia/computers-and-computer-
systems.html
https://en.wikibooks.org/wiki/A-
level_Computing/CIE/Computer_systems,_communications_and_software
/Components_of_a_computer_system_and_modes_of_use/Types_of_hardwa
re
http://www.depedbataan.com/resources/9/k_to_12_entrep-
based_desktop_publishing_learning_module.pdf
ecomputernotes.com › fundamental › what-is-computer
Book
Jemma Development Group: Empowement Tecnology 2017
Padasas,Penaflor,Castro,Paquingan, de Ramos, Espiritu, Ph.D:
Operating System and Office Applications 2nd
Edition.
New perspectives on computer concepts 2011, Parson, June Jamrich
Computer concepts: Illustrated.7th ed., Parson, June Jamrich, Dan Oja
Computer appliications in education 2012, ahmad jasim
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 53
K-12 Creative Technology
ANSWER KEYS
Pre-Test and Post - Test
A.
1. A
2.E
3.C
4.L
5.G
6.B
B.
1. T
2. Hazard Identification
3. Safety Hazard
4.T
5. T
C.
1. Safety hazard
2. Ergonomic hazard
3. Biological hazard
4. Physical hazard
5. Psychological hazard
D.
1. Acute toxic
2. Health hazard
3. Flammable
4. Environmental hazard
5. Corrosion
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 54
K-12 Creative Technology
E.
1. The Quick Access Toolbar lets you access common commands, no matter
which tab you are using in the Ribbon. By default, it shows the Save, Undo, and
Redo commands.
2. The Page Navigation pane allows you to view and work with the pages in your
publication. You can add, delete, rearrange, and duplicate pages in the Page
Navigation pane. You can also organize your pages into Sections.
3. The Ribbon contains multiple tabs, each with several groups of commands. Some
tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working
with certain items like text boxes or images.
4. Guides are thin lines that help you align various objects.
5. The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
LO 1.1 Unlock different occupational health and safety procedures for
literacy and awareness using various dynamic computer
applications
Self-check 1.1
A.
1. A
2.E
3.C
4.L
5.G
6.B
LO 1.2 Enumerate the different hazards and risks that may occur in
workstations and places through skit
Self-check 1.2
A.
1. T
2. Hazard Identification
3. Safety Hazard
4.T
5. T
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 55
K-12 Creative Technology
B.
1. Safety hazard
2. Ergonomic hazard
3. Biological hazard
4. Physical hazard
5. Psychological hazard
C.
1. Physical Hazards
2. Mechanical Hazards
3. Electric Shock Hazard
4. Posture-related injuries from computer use
5. Computer-related overuse injuries of the hand or arm
6. Eyestrain from computer use
LO 1.3 Decode the meanings conveyed by the different hazards and
risks warning symbols and importance of Personal Protective
Equipment ( PPE)
Self-check 1.3
A.
1. Acute toxic
2. Health hazard
3. Flammable
4. Environmental hazard
5. Corrosion
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 56
K-12 Creative Technology
B.
Category Colour Information/Instructio
n
Features Example
Prohibition red dangerous round
shape
do not touch
Warning yellow be careful triangular
/square
shape
Electric shock
Emergency green door Rectangular
shape
Emergency
exit/ escape
LO 1.4 Do a survey on the various safety regulations and contingency
measures observed by schools, LGUs, and other offices in the locality
Self-check 1.4
Essay: Make a paragraph explaining the importance of identifying hazards in
school and the possible safety measures implemented.
LO 1.5 Use numerous dynamic computer applications and interactive
designs in the observance of OHS Procedural Plan to avoid hazards and
risks
Self-check 1.5
A. Essay: Make a paragraph explaining the things you can do with MS
Publisher Software
DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 57
K-12 Creative Technology
B.
1. The Quick Access Toolbar lets you access common commands, no matter which
tab you are using in the Ribbon. By default, it shows the Save, Undo, and Redo
commands.
2. The Page Navigation pane allows you to view and work with the pages in your
publication. You can add, delete, rearrange, and duplicate pages in the Page
Navigation pane. You can also organize your pages into Sections.
3. The Ribbon contains multiple tabs, each with several groups of commands. Some
tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working
with certain items like text boxes or images.
4. Guides are thin lines that help you align various objects.
5. The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
Cogratulations! You did a great job!
You did a great job! Rest and relax a while then move on to the next
lesson. Good luck!

More Related Content

What's hot

K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
Dr. Joy Kenneth Sala Biasong
 
Applying quality-standard (css)
Applying quality-standard (css)Applying quality-standard (css)
Applying quality-standard (css)
Bong Bandola
 
Technical Drafting Module 7
Technical Drafting Module 7Technical Drafting Module 7
Technical Drafting Module 7
DepEd
 
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh SilvaICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
Je-Jireh Silva
 
K to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_moduleK to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_moduleJohndion Ruloma
 
Pc hardware servicing learning module (1)
Pc hardware servicing learning module (1)Pc hardware servicing learning module (1)
Pc hardware servicing learning module (1)Denzel Darilag
 
Ict 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsIct 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautions
Yonel Cadapan
 
Curriculum guide ICT 7
Curriculum guide ICT 7Curriculum guide ICT 7
Curriculum guide ICT 7
Annie Elloren
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
DepEd-Bataan
 
Computer Hardware-servicing-learning-module
Computer Hardware-servicing-learning-moduleComputer Hardware-servicing-learning-module
Computer Hardware-servicing-learning-module
Bogs De Castro
 
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersSemi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Anjenette Columnas
 
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripherals
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripheralsIct 9 module 3, lesson 1.3 computer systems, devices, and peripherals
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripherals
Yonel Cadapan
 
Computer System Servicing Hand Tools
Computer System Servicing Hand ToolsComputer System Servicing Hand Tools
Computer System Servicing Hand Tools
Rj Jereos
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
iankeithsomoza
 
Lesson 6_Prepare and Interpret Technical Drawing (LO1)
Lesson 6_Prepare and Interpret Technical Drawing (LO1)Lesson 6_Prepare and Interpret Technical Drawing (LO1)
Lesson 6_Prepare and Interpret Technical Drawing (LO1)
Judie T
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10Bogs De Castro
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
Hanzel Metrio
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
Bogs De Castro
 

What's hot (20)

K to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning ModuleK to 12 PC Hardware Servicing Learning Module
K to 12 PC Hardware Servicing Learning Module
 
Applying quality-standard (css)
Applying quality-standard (css)Applying quality-standard (css)
Applying quality-standard (css)
 
Technical Drafting Module 7
Technical Drafting Module 7Technical Drafting Module 7
Technical Drafting Module 7
 
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh SilvaICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
 
K to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_moduleK to 12_entrep-based_pc_hardware_servicing_learning_module
K to 12_entrep-based_pc_hardware_servicing_learning_module
 
Pc hardware servicing learning module (1)
Pc hardware servicing learning module (1)Pc hardware servicing learning module (1)
Pc hardware servicing learning module (1)
 
Ict 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsIct 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautions
 
Curriculum guide ICT 7
Curriculum guide ICT 7Curriculum guide ICT 7
Curriculum guide ICT 7
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
Computer Hardware-servicing-learning-module
Computer Hardware-servicing-learning-moduleComputer Hardware-servicing-learning-module
Computer Hardware-servicing-learning-module
 
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersSemi-Detailed Lesson Plan - Input and Output Devices of Computers
Semi-Detailed Lesson Plan - Input and Output Devices of Computers
 
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripherals
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripheralsIct 9 module 3, lesson 1.3 computer systems, devices, and peripherals
Ict 9 module 3, lesson 1.3 computer systems, devices, and peripherals
 
Computer System Servicing Hand Tools
Computer System Servicing Hand ToolsComputer System Servicing Hand Tools
Computer System Servicing Hand Tools
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
 
Lesson 6_Prepare and Interpret Technical Drawing (LO1)
Lesson 6_Prepare and Interpret Technical Drawing (LO1)Lesson 6_Prepare and Interpret Technical Drawing (LO1)
Lesson 6_Prepare and Interpret Technical Drawing (LO1)
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
Use of tools chs
Use of tools chsUse of tools chs
Use of tools chs
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
 

Similar to CREATIVE TECHNOLOGY 7 QI-L4

ICT
ICTICT
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
SMKCreations
 
CSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptxCSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptx
RheaMaeSenajon
 
DLL_TLE ICT CSS 10_Q1_D2.docx
DLL_TLE  ICT CSS 10_Q1_D2.docxDLL_TLE  ICT CSS 10_Q1_D2.docx
DLL_TLE ICT CSS 10_Q1_D2.docx
Lorelie Aubrey Almelia
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
kris harden
 
DLL_TLE ICT CSS 9_Q1_D_3.docx
DLL_TLE  ICT CSS 9_Q1_D_3.docxDLL_TLE  ICT CSS 9_Q1_D_3.docx
DLL_TLE ICT CSS 9_Q1_D_3.docx
Lorelie Aubrey Almelia
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 
LESSON 2 OHS.pptx
LESSON 2 OHS.pptxLESSON 2 OHS.pptx
LESSON 2 OHS.pptx
JenniferBataycan
 
CHAP 8..ppt
CHAP 8..pptCHAP 8..ppt
DLL_TLE ICT CSS 9_W2_D1.docx
DLL_TLE  ICT CSS 9_W2_D1.docxDLL_TLE  ICT CSS 9_W2_D1.docx
DLL_TLE ICT CSS 9_W2_D1.docx
Lorelie Aubrey Almelia
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
Ejiro Ndifereke
 
css 1.pptx
css 1.pptxcss 1.pptx
Occupational Health & Safety Procedure.pptx
Occupational Health & Safety Procedure.pptxOccupational Health & Safety Procedure.pptx
Occupational Health & Safety Procedure.pptx
ChristianVelchez2
 
MUDA.pptx
MUDA.pptxMUDA.pptx
MUDA.pptx
EliasHaile7
 
Construction Safety & Health (Bangladesh)
Construction Safety & Health (Bangladesh) Construction Safety & Health (Bangladesh)
Construction Safety & Health (Bangladesh)
Ali Kamal Mostofa Rubel
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
gerardkortney
 
computer css nc2 slides.pptx
computer css nc2 slides.pptxcomputer css nc2 slides.pptx
computer css nc2 slides.pptx
RodjoneBinondo1
 
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdfLatest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
Iowa State University
 
Trends in Workplace Wearable Technologies and Connected‐Worker Solutions
Trends in Workplace Wearable Technologies and Connected‐Worker SolutionsTrends in Workplace Wearable Technologies and Connected‐Worker Solutions
Trends in Workplace Wearable Technologies and Connected‐Worker Solutions
Iowa State University
 
HAZARD COMMUNICATION environmental standard
HAZARD COMMUNICATION  environmental standardHAZARD COMMUNICATION  environmental standard
HAZARD COMMUNICATION environmental standard
ROCENODodongVILLACER
 

Similar to CREATIVE TECHNOLOGY 7 QI-L4 (20)

ICT
ICTICT
ICT
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
CSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptxCSS 1 WEEK 02 2021-2022.pptx
CSS 1 WEEK 02 2021-2022.pptx
 
DLL_TLE ICT CSS 10_Q1_D2.docx
DLL_TLE  ICT CSS 10_Q1_D2.docxDLL_TLE  ICT CSS 10_Q1_D2.docx
DLL_TLE ICT CSS 10_Q1_D2.docx
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
 
DLL_TLE ICT CSS 9_Q1_D_3.docx
DLL_TLE  ICT CSS 9_Q1_D_3.docxDLL_TLE  ICT CSS 9_Q1_D_3.docx
DLL_TLE ICT CSS 9_Q1_D_3.docx
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
LESSON 2 OHS.pptx
LESSON 2 OHS.pptxLESSON 2 OHS.pptx
LESSON 2 OHS.pptx
 
CHAP 8..ppt
CHAP 8..pptCHAP 8..ppt
CHAP 8..ppt
 
DLL_TLE ICT CSS 9_W2_D1.docx
DLL_TLE  ICT CSS 9_W2_D1.docxDLL_TLE  ICT CSS 9_W2_D1.docx
DLL_TLE ICT CSS 9_W2_D1.docx
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
css 1.pptx
css 1.pptxcss 1.pptx
css 1.pptx
 
Occupational Health & Safety Procedure.pptx
Occupational Health & Safety Procedure.pptxOccupational Health & Safety Procedure.pptx
Occupational Health & Safety Procedure.pptx
 
MUDA.pptx
MUDA.pptxMUDA.pptx
MUDA.pptx
 
Construction Safety & Health (Bangladesh)
Construction Safety & Health (Bangladesh) Construction Safety & Health (Bangladesh)
Construction Safety & Health (Bangladesh)
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 
computer css nc2 slides.pptx
computer css nc2 slides.pptxcomputer css nc2 slides.pptx
computer css nc2 slides.pptx
 
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdfLatest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdf
 
Trends in Workplace Wearable Technologies and Connected‐Worker Solutions
Trends in Workplace Wearable Technologies and Connected‐Worker SolutionsTrends in Workplace Wearable Technologies and Connected‐Worker Solutions
Trends in Workplace Wearable Technologies and Connected‐Worker Solutions
 
HAZARD COMMUNICATION environmental standard
HAZARD COMMUNICATION  environmental standardHAZARD COMMUNICATION  environmental standard
HAZARD COMMUNICATION environmental standard
 

More from FLORENCE FERNNADEZ

L2: TD-TOOLS & EQUIPMENT
L2: TD-TOOLS & EQUIPMENTL2: TD-TOOLS & EQUIPMENT
L2: TD-TOOLS & EQUIPMENT
FLORENCE FERNNADEZ
 
week 7-8.docx
week 7-8.docxweek 7-8.docx
week 7-8.docx
FLORENCE FERNNADEZ
 
week 4-5.docx
week 4-5.docxweek 4-5.docx
week 4-5.docx
FLORENCE FERNNADEZ
 
week 2.docx
week 2.docxweek 2.docx
week 2.docx
FLORENCE FERNNADEZ
 
L1-W2-SWOT
L1-W2-SWOTL1-W2-SWOT
L1-W2-SWOT
FLORENCE FERNNADEZ
 
L1:PECS
L1:PECSL1:PECS

More from FLORENCE FERNNADEZ (6)

L2: TD-TOOLS & EQUIPMENT
L2: TD-TOOLS & EQUIPMENTL2: TD-TOOLS & EQUIPMENT
L2: TD-TOOLS & EQUIPMENT
 
week 7-8.docx
week 7-8.docxweek 7-8.docx
week 7-8.docx
 
week 4-5.docx
week 4-5.docxweek 4-5.docx
week 4-5.docx
 
week 2.docx
week 2.docxweek 2.docx
week 2.docx
 
L1-W2-SWOT
L1-W2-SWOTL1-W2-SWOT
L1-W2-SWOT
 
L1:PECS
L1:PECSL1:PECS
L1:PECS
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

CREATIVE TECHNOLOGY 7 QI-L4

  • 1. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 1 LESSON 4 Occupational Health and Safety Procedures
  • 2. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 2 LEARNING OUTCOMES LO 1.1 Unlock different occupational health and safety procedures for literacy and awareness using various dynamic computer applications LO 1.2 Enumerate the different hazards and risks that may occur in workstations and places through skit LO 1.3 Decode the meanings conveyed by the different hazards and risks warning symbols and importance of Personal Protective Equipment ( PPE) LO 1.4 Do a survey on the various safety regulations and contingency measures Observed by schools, LGUs, and other offices in the locality LO 1.5 Use numerous dynamic computer applications and interactive designs in The observance of OHS Procedural Plan to avoid hazards and risks Definition of Terms Occupational health and safety (OHS) - relates to health, safety, and welfare issues in the workplace. Computer security - defines as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. Cybersecurity - is defined as protecting computer systems, which communicate over the computer networks Data Encryption - Encrypting data involves using codes and ciphers. Firewall - is a way of protecting a computer from intrusion through the ports. Harm – physical injury or damage to health. Hazard – a potential source of harm to a worker. Risk assessment - Hazard identification is part of the process used to evaluate if any particular situation, item, thing, etc. may have the potential to cause harm. Symbol - is a mark, sign or word that indicates, signifies, or is understood as representing an idea, object, or relationship. Personal Protective Equipment (PPE) - is clothing or equipment designed to protect workers from physical hazards when on a worksite At the end of the lesson, you are expected to do the following:
  • 3. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 3 Desktop Publishing - is the process of using the computer and specific types of software to combine text and graphics to produce documents such as newsletters, brochures, books, Web pages and many other printed documents What Do You Already Know? Let us determine how much you already know about task preparation and hand tools. Take this test. Pre-Test A. Directions: Match column A with column B in order to identify the term / word being described. A B 1. when an employee intends to cause damage 2. when user damages data or equipment unintentionally 3. attached to small pieces of computer code, software and documents 4. a self-replicating program that is harmful to network 5. it is technically a worm 6. software designed to detect, disable and remove viruses a. Accidental threats b. Antivirus software c. Data encryption d. Firewall e. Malicious threats f. Traffic g. Trojan horse h. Virus i. VPN j. WPA k. WEP l. Worm
  • 4. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 4 B. Direction: Read carefully each statement below. Place T on the line if the statement is TRUE. Write the correct word/s if the statement is FALSE. ______1. Spotting the hazards means working out how likely it is that a hazard will harm someone and how serious the harm could be. ______2. Risk is part of the process used to evaluate if any particular situation, item, thing, etc. may have the potential to cause harm. _______3. Chemical hazards are hazards that create unsafe working conditions. ______4. Harm is a physical injury or damage to health. ______5. Inkjet printer cartridges, or laser printer toner cartridges are hazardous to users. C. Identify what hazard is being illustrated in the situation below . ________________1. Exposed wires or a damaged carpet. ________________2. Poor posture and manual handling ________________3. Bodily fluids and harmful plants. ________________4. Radiation and pressure. ________________5. Stress and workplace violence. D. Examine and identify the different signs and symbols for safety presented below and write your answer on the blank provided for. Source: Warning Sign. Martin Diebel Source: has.ie 1._______________________ 2. ___________________ Source: 123rf.com Source: dreamstine.com
  • 5. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 5 3.__________________________ 4.________________________ Source: favpng.com 5.____________________________ E. Enumerate the basic parts of MS Publisher and write their functions
  • 6. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 6 What Do You Need to Know? Read information Sheet 1.1 very well then find out how much you can remember and how much you learned by doing Self-check 1.1 Information Sheet 1.1 Occupational health and safety (OHS) relates to health, safety, and welfare issues in the workplace. OHS includes the laws, standards, and programs that are aimed at making the workplace better for workers, along with co-workers, family members, customers, and other stakeholders. It improves a company's occupational health and safety standard that ensures good business, a better brand image, and higher employee morale. Occupational health and safety standards are in place to mandate the removal, reduction, or replacement of job site hazards. OHS programs should also include material that helps minimize the effects of the different type of hazards in a workplace. Identifying hazards in a workplace and deciding how dangerous they are will help to eliminate hazards and modify the risks that are present. Furthermore, Our government has rules and regulations implementing Executive Order No.307 which states that Occupational Safety and Health (OSH) is defined as the a) promotion and maintenance of the highest degree of physical, mental and social well-being of workers in all occupations; b) prevention among its workers of any departures from health caused by their working conditions; c) protection among workers in their employment from risks usually from factors adverse to health and d) placing and maintenance of the worker in an occupational environment adapted to his/her physiological ability.
  • 7. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 7 General Safety Guidelines Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury. Here are some general safety guidelines:  Remove your watch or any other jewelry and secure loose clothing.  Turn off the power and unplug equipment before opening the case and performing service.  Cover any sharp edges inside the computer case with tape.  Never open a power supply or a monitor.  Do not touch areas in printers that are hot or those which use high voltage.  Know where the fire extinguisher is located and learn how to use it.  Know where the first aid kit is located.  Keep food and drinks out of your workspace.  Keep your workspace clean and free of clutter.  Lift heavy objects with sturdy leg support to avoid back injury. 12 OHS Procedures In a workplace, each student has a responsibility to their classmates or workgroups to report and act upon any potential hazards. Students need to be aware the procedures needed in the present work environment such as: 1. Do not work alone so that there's someone who can take care of you in case of emergency. 2. Always power off the computer and unplug the computer before working on it. 3. Take away any liquid near your working area to avoid getting electrocuted or accidentally damaging computer parts. 4. Be careful with tools that may cause short circuit. 5. Always ground or discharge yourself before touching any part of the computer. 6. Do not use excessive force if things don't quite slip into place. 7. Clean the area before and after using it to maintain sanitation and prevent accidents. 8. Hold the components on the edges and do not touch the Integrated Circuit (IC) parts. 9. Always wear personal protective equipment (PPE) in accordance with the organization's OHS procedures and practices. 10. Make sure that the pins are properly aligned when connecting a cable connector. 11. Contingency measures during workplace accidents, fire and other emergencies are recognized. 12. Use brush, compressed air or blower in cleaning the computer system. Computer Safety
  • 8. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 8 Computer security allows you to use the computer while keeping it safe from threats. Computer security can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. It keeps your information protected. Oftentimes, people confound computer security with other related terms like information security and cybersecurity. For example:  Information security is securing information from unauthorized access, modification & deletion  Computer Security means securing a standalone machine by keeping it updated and patched  Cybersecurity is defined as protecting computer systems, which communicate over the computer networks Why is cybersecurity important? Listed below are the reasons why cybersecurity is so important in what’s become a predominant digital world:  Cyber attacks can be extremely expensive for businesses to endure. In addition to financial damage suffered by the business, a data breach can also inflict untold reputational damage.  Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more sophisticated ways to initiate cyber attacks.  Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.  Security incidents regularly affect businesses of all sizes and often make the front page causing irreversible reputational damage to the companies involved Computer Security Practices Computer security threats are becoming relentlessly inventive these days. There is much need for one to arm oneself with information and resources to safeguard against these complex and growing computer security threats and stay safe online. Some preventive steps you can take include: 1. Secure your computer physically by: o Installing reliable, reputable security and anti-virus software o Activating your firewall, because a firewall acts as a security guard between the internet and your local area network 2. Stay up-to-date on the latest software and news surrounding your devices and perform software updates as soon as they become available 3. Avoid clicking on email attachments unless you know the source 4. Change passwords regularly, using a unique combination of numbers, letters and case types 5. Use the internet with caution and ignore pop-ups, drive-by downloads while surfing
  • 9. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 9 6. Taking the time to research the basic aspects of computer security and educate yourself on evolving cyber-threats 7. Perform daily full system scans and create a periodic system backup schedule to ensure your data is retrievable should something happen to your computer. Virus protection software, known as antivirus software, is software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. Data Encryption Encrypting data involves using codes and ciphers. Data encryption can help prevent attackers from monitoring or recording traffic between resources and computers. It may not be possible to decipher captured data in time to make any use of it. A security alert may inform you that you are using an encrypted connection. Port Protection Every communication using TCP/IP is associated with a port number. HTTPS, for instance, by default uses port 443. A firewall is a way of protecting a computer from intrusion through the ports. With port protection, the user can control the type of data sent to a computer by selecting which ports will be open and which will be secured. Data being transported on a network is called traffic. How to Enable Firewall for Windows 7 1. Open Windows Firewall by clicking the Start button , and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall.
  • 10. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 10 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want to help protect, and then click OK. If you want the firewall to prevent all programs from communicating, including programs that you have previously allowed to communicate through the firewall, select the Block all incoming connections, including those in the list of allowed programs check box. Computer security threats Computer security threats are possible dangers that can possibly hamper the normal functioning of your computer. In the present age, cyber threats are constantly increasing as the world is going digital. The most harmful types of computer security are: Viruses A computer virus is a malicious program which is loaded into the user’s computer without user’s knowledge. It replicates itself and infects the files and programs on the user’s PC. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. Computer Worm A computer worm is a software program that can copy itself from one computer to another, without human interaction. The potential risk here is that it will use up your computer hard disk space because a worm can replicate in great volume and with great speed.
  • 11. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 11 Phishing Pronounced like fishing, phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Botnet A botnet is a group of computers connected to the internet that have been compromised by a hacker using a computer virus. An individual computer is called ‘zombie computer’. The result of this threat is the victim’s computer, which is the bot will be used for malicious activities and for a larger scale attack like DDoS. Rootkit A rootkit is a computer program designed to provide continued privileged access to a computer while actively hiding its presence. Once a rootkit has been installed, the controller of the rootkit will be able to remotely execute files and change system configurations on the host machine. Keylogger Also known as a keystroke logger, keyloggers can track the real-time activity of a user on his computer. It keeps a record of all the keystrokes made by user keyboard. Keylogger is also a very powerful threat to steal people’s login credential such as username and password.
  • 12. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS K-12 Creative Technology Page 12 Pharming Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Email spoofing It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know. It is also known as fraudulent email activity hiding email origins.
  • 13. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 13 K-12 Creative Technology How Much Have You Learned? Self-Check 1.1 Directions: Match column A with column B in order to identify the term / word being described. Refer to the Answer Key. What is your score? A B 1. when an employee intends to cause damage 2. when user damages data or equipment unintentionally 3. attached to small pieces of computer code, software and documents 4. a self-replicating program that is harmful to network 5. it is technically a worm 6. software designed to detect, disable and remove viruses a. Accidental threats b. Antivirus software c. Data encryption d. Firewall e. Malicious threats f. Traffic g. Trojan horse h. Virus i. VPN j. WPA k. WEP l. Worm
  • 14. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 14 K-12 Creative Technology How Do You Apply What You Have Learned? It is not enough that you learned concepts on Occupational Health and Safety and Computer Safety. Be sure that you are also being able to demonstrate skills and answer the guide questions comprehensively. Activity 1.1 How to Enable Firewall for Windows 7 1. Open Windows Firewall by clicking the Start button , and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. Essential Questions: In the space below, state why turning off the Windows Firewall is not advised.
  • 15. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 15 K-12 Creative Technology 3. Click Turn on Windows Firewall under each network location that you want to help protect, and then click OK. 4. Essential Question: In the space below, list the services that are available. ________________________________________________________ ________________________________________________________ ________________________________________________________ Activity 1.2 Research Firewalls Directions: In this activity, you will use the Internet, newspaper, or a local store to gather information about hardware and software firewalls. Company/Hardware Name Website URL Cost Subscription Length (Month/Year/Lifetime) Hardware Features 1. Using the Internet, research two different hardware firewalls. Based on your research, complete the table below. 2. Which hardware firewall would you purchase? List reasons for your choice.
  • 16. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 16 K-12 Creative Technology LEARNING OUTCOME 1.2 Enumerate the different hazards and risks that may occur in workstations and places through skit PERFORMANCE STANDARDS The Learner independently performs an Operational Health & Safety Procedural Plan using various Dynamic Computer Applications and Interactive Designs What Do You Need To Know? Read information Sheet very well then find out how much you can remember and how much you learned by doing Self-check 1.2 Information Sheet 1.2 What is a hazard? A hazard is any agent that can cause harm or damage to humans, property, or the environment .It is commonly define also as “A hazard is any source of potential damage, harm or adverse health effects on something or someone”. Other government entities state that "Occupational health and safety defines - Hazard identification and elimination and risk assessment and control" uses the following terms:  Harm – physical injury or damage to health.  Hazard – a potential source of harm to a worker. Risk is defined as the probability that exposure to a hazard will lead to a negative consequence, or more simply, a hazard poses no risk if there is no exposure to that hazard.
  • 17. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 17 K-12 Creative Technology Hazard Identification, Risk Assessment, and Risk Control Hazard identification is part of the process used to evaluate if any particular situation, item, thing, etc. may have the potential to cause harm. The term often used to describe the full process is risk assessment:  Identify hazards and risk factors that have the potential to cause harm (hazard identification).  Analyze and evaluate the risk associated with that hazard (risk analysis, and risk evaluation).  Determine appropriate ways to eliminate the hazard, or control the risk when the hazard cannot be eliminated (risk control). Overall, the goal of hazard identification is to find and record possible hazards that may be present in your workplace. It may help to work as a team and include both people familiar with the work area, as well as people who are not – this way you have both the experienced and fresh eye to conduct the inspection. At work you can use these three Think Safe steps to help prevent accidents such as: 1. Spot the Hazard (Hazard Identification) Key Point - A hazard is anything that could hurt you or someone else. Examples of workplace hazards include: frayed electrical cords (could result in electrical shock) boxes stacked precariously (they could fall on someone) noisy machinery (could result in damage to your hearing) During work experience, you must remain alert to anything that may be dangerous. If you see, hear or smell anything odd, take note. If you think it could be a hazard, tell someone. 2. Assess the Risk (Risk Assessment) Key Point Assessing the risk means working out how likely it is that a hazard will harm someone and how serious the harm could be. Whenever you spot a hazard, assess the risk by asking yourself two questions:  How likely is it that the hazard could harm me or someone else?  How badly could I or someone else be harmed? Always tell someone (your employer, your supervisor or your health and safety (representative) about hazards you can't fix yourself, especially if the hazard could cause serious harm to anyone. For example:  Ask your supervisor for instructions and training before using equipment.
  • 18. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 18 K-12 Creative Technology  Ask for help moving or lifting heavy objects.  Tell your supervisor if you think a work practice could be dangerous. If you are not sure of the safest way to do something during work experience, always ask your work experience supervisor. 3. Make the Changes (Risk Control) Key Point It is your employer's responsibility to fix hazards. Sometimes you may be able to fix simple hazards yourself, as long as you don't put yourself or others at risk. For example, you can pick up things from the floor and put them away to eliminate a trip hazard. The six main categories of hazards are: Biological. Biological hazards include viruses, bacteria, insects, animals, etc., that can cause adverse health impacts. For example, mould, blood and other bodily fluids, harmful plants, sewage, dust and vermin. Chemical. Chemical hazards are hazardous substances that can cause harm. These hazards can result in both health and physical impacts, such as skin irritation, respiratory system irritation, blindness, corrosion and explosions. Physical. Physical hazards are environmental factors that can harm an employee without necessarily touching them, including heights, noise, radiation and pressure.
  • 19. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 19 K-12 Creative Technology Safety. These are hazards that create unsafe working conditions. For example, exposed wires or a damaged carpet might result in a tripping hazard. These are sometimes included under the category of physical hazards. Ergonomic. Ergonomic hazards are a result of physical factors that can result in musculoskeletal injuries. For example, a poor workstation setup in an office, poor posture and manual handling. Common hazards encountered by computer technicians and users Physical Hazards One of the most common physical hazards involving computer technicians is cables running across the floor. If someone trips, falls, and hurts himself because of a cable you ran across the floor, someone (you, your employer, or your customer) has a serious legal negligence problem. Mechanical Hazards When working on electronic equipment always be alert to any possibility of being hurt by moving parts, hot components, or sharp edges. Electric Shock Hazard Inside computers and electronic equipment, there is a range of voltages from 3.3 volts to 25 volts, most of these are harmless. But at the power supply, you'll find line voltage, which is a lethal 220 volts. Posture-related injuries from computer use Back and neck pain, headaches, and shoulder and arm pain are common computer-related injuries. Such muscle and joint problems can be caused or made worse by poor workstation (desk) design, bad posture and sitting for long periods of time. Computer-related overuse injuries of the hand or arm Muscles and tendons can become painful with repetitive movements and awkward postures. This is known as ‘overuse injury’ and typically occurs in the elbow, wrist or hand of computer users. Symptoms of these overuse
  • 20. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 20 K-12 Creative Technology injuries include pain, swelling, stiffness of the joints, weakness and numbness. Eyestrain from computer use An act of focusing your eyes at the same distance point for long periods of time causes fatigue. The human eye structurally prefers to look at objects more than six metres away, so any work performed close up puts extra demands on your eye muscles. The illuminated computer screen can also cause eye fatigue. How Much Have You Learned? Self-Check 1.2 A. Direction: Read carefully each statement below. Place T on the line if the statement is TRUE. Write the correct word/s if the statement is FALSE. ______1. Spotting the hazards means working out how likely it is that a hazard will harm someone and how serious the harm could be. ______2. Risk is part of the process used to evaluate if any particular situation, item, thing, etc. may have the potential to cause harm. _______3. Chemical hazards are hazards that create unsafe working conditions. ______4. Harm is a physical injury or damage to health. ______5. Inkjet printer cartridges, or laser printer toner cartridges are hazardous to users. B. Identify what hazard is being illustrated in the situation below . ________________1. Exposed wires or a damaged carpet. ________________2. Poor posture and manual handling ________________3. Bodily fluids and harmful plants. ________________4. Radiation and pressure. ________________5. Stress and workplace violence. C. List down the common hazards encountered by computer technicians and users 1. __________________________ 2. __________________________ 3. _________________________ 4. __________________________ 5. __________________________ Refer to the Answer Key. What is your score?
  • 21. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 21 K-12 Creative Technology How Do You Apply What You Have Learned? Direction: Observe the set-up of your school’s Computer Laboratory. Observe the procedures and arrangement being practiced and used in the workplace. Identify and list the hazards and assess the risk based on your observations. Spot the Hazard Assess the Risk A Hazard is anything that could hurt you or someone else Work out how likely it is that the hazard will hurt someone and how badly he/she could be hurt List the hazards ( 5 hazards) Describe the risks
  • 22. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 22 K-12 Creative Technology LEARNING OUTCOME 1.3 Decode the meanings conveyed by the different hazards and risks warning symbols and importance of Personal Protective Equipment ( PPE) PERFORMANCE STANDARDS The Learner independently performs an Operational Health & Safety Procedural Plan using various Dynamic Computer Applications and Interactive Designs What Do You Need to Know? Read information Sheet 1.3 very well then find out how much you can remember and how much you learned by doing Self-check 1.3 Information Sheet 1.3 Symbols Symbols are resources of complex communication that often can have multiple levels of meaning. A symbol is a mark, sign or word that indicates, signifies, or is understood as representing an idea, object, or relationship. Symbols allow people to go beyond what is known or seen by creating linkages between otherwise very different concepts and experiences. Hazard symbols or warning symbols are recognizable symbols designed to warn about hazardous or dangerous materials, locations, or objects, including electric currents, poisons, and radioactivity. The use of hazard symbols is often regulated by law and directed by standards organizations. Hazard symbols may appear with different colors, backgrounds, borders and supplemental information in order to specify the type of hazard and the level of threat.
  • 23. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 23 K-12 Creative Technology Safety Symbols and Their Meanings The best occupational health and safety programs use a series of signs and symbols to convey a complete message. Most safety signs and symbols fall into one of four categories:  Prohibition  Warning  Mandatory  Emergency Each category has its own specific colour and sign shape that remains consistent around the world as per safety regulations. You will be able to easily identify whether a sign is asking you to stop doing something, start doing something, take precautions, or advising you of emergency equipment or facilities through their characteristics which are presented in the table. Table 1. Source:https://www.dcmgroup.ca/en/news/safety-symbols-and-their-meanings-2 Why Use Safety Symbols?
  • 24. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 24 K-12 Creative Technology Pictures may not say a thousand words, but they are universally recognized symbols that transcend language. No matter where you’re working, you’ll be able to understand the potential hazards you face simply by looking at the posted symbols. There are two different types of safety symbols: one refers to general safety protocols, while the other is used specifically for labeling chemicals that may be hazardous. Since most workplaces have a combination of both, it’s important to understand each of them. Hazard Symbols Figure 1 Source: https://www.pure-chemical.com/blog/hazard-symbols/
  • 25. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 25 K-12 Creative Technology Health Hazard - symbol is a clear indication of the substance being carcinogenic, it induces respiratory irritation, directly causes damage to organs and also imparts reproductive toxicity. Acute Toxic – indicates the skull and for acute toxicity. When displayed on chemical labels the message sent across is, they are toxic to the extent of being fatal when inhaled, swallowed and on contact with skin. Flammable - a picture of the flame abruptly indicates the substance is flammable when it comes into contact with air or it may even heat up by itself and ignite spontaneously. Exclamation mark - a generic symbol which in addition to cautioning also indicates that it causes irritation, acute toxicity, narcotic effect, respiratory tract irritation and causes damage to internal organs. Flame over circle - a symbol sends a word of caution for all gases and liquids that oxidize. Though this reaction does not cause explosions it is capable of loosing its nature and transforming to another undesired substance. Gas Cylinder - a pictogram of gas cylinder indicates that the consignment has liquified gases, compressed gas or dissolved gases. Exploding Bomb –an explosive hazard symbol indicates an explosion where the substance contained may react on its own and may cause a noticeable increase in air pressure. Environmental hazard -a dead fish in the pictogram indicates that the substance is hazardous to aquatic life and should not be let into lakes, rivers etc. Moreover, it indicates that there is a possibility of the ecosystem being damaged for years. Corrosion - a clear indication in the picture that the substance contained is capable of corroding metals and skin. The Importance of Personal Protective Equipment ( PPE) Personal Protective Equipment (PPE) is clothing or equipment designed to protect workers from physical hazards when on a worksite. PPE should only be considered as a last line of defense between a hazard and the worker. Attempts to control workplace risks and hazards should always be addressed first. Making the workplace safe includes providing instructions, procedures, training and supervision to encourage people to work safely and responsibly. Safety is a major issue for day laborers and skilled laborers. Commonly in a year accidents happen frequently in the construction industry and often times it is due to the absence of Personal Protective Equipment (PPE) or failure to wear the provided PPE.
  • 26. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 26 K-12 Creative Technology PPE includes items such as protective helmets, eye protection, high- visibility clothing, safety footwear, safety harnesses and, sometimes, respiratory protective equipment. 1. Head Protection Hard hats are common on construction sites. They are designed to protect against flying or falling objects that would otherwise impact or penetrate the worker. Some hard hats are equipped with accessories such as face shields and earmuffs. Hard hats should be well-fitted; those that are too large or too small are inappropriate for use. 2. Eye and Face Protection They are equally as important as head protection. Safety goggles, spectacles and full face shields can give you the protection needed for the eyes and face. Metal work, wood-work, hot-work and air-tool operations all require this type of protection. 3. Respiratory protection Respiratory protection is vital on sites where toxic substances are present. Respiratory protections like respirators are designed to protect you from dust, fumes, paint spray, pesticides and other dangerous substances that could cause permanent impairment. 4. Hand & Skin protection Occupational skin diseases such as contact dermatitis, skin cancers, and other skin injuries and infections are the second most common type of occupational disease and can be very costly. Gloves commonly used as PPE include rubber gloves, cut-resistant gloves, chainsaw gloves and heat-resistant gloves. Using gloves helps to avoid hazards usually involved when working with chemicals, glass, sheet metal, electricity, hot materials or slippery objects. 5. Hearing protection Industrial noise is often discounted as an occupational hazard since it isn’t visible to the eye. Earplugs and earmuffs are common hearing protection tools. It is important to note that earmuffs are more effective in reducing high-frequency noise while earplugs are more effective for reducing low-frequency noise. 6. Body Protection PPE includes safety vests and suits and should be used for tasks that can cause body injuries from extreme temperatures, flames and sparks, toxic chemicals, insect bites and radiation. Ensure that they are clean and free from cuts and burns. Always get a good fit to ensure full body protection. 7. Fall Protection PPE includes safety harnesses and lanyards and should be strictly used for task that can cause falling from heights and serious injury or death. When inspecting equipment, ensure that the straps are free from tears, deformities and burn marks and buckles are connected securely and tightly. It is very important to dispose them if used after a falling incident.
  • 27. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 27 K-12 Creative Technology How Much Have You Learned? Self-Check 1.3 Directions: Examine and identify the different signs and symbols for safety presented below and write your answer on the blank provided for. Source: Warning Sign. Martin Diebel Source: has.ie 1._______________________ 2. ___________________ Source: 123rf.com Source: dreamstine.com 3.__________________________ 4.________________________ Source: favpng.com 5.____________________________
  • 28. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 28 K-12 Creative Technology B. Supply the missing data needed to complete the statement. ( Note: write your answer on the assign bullet) Category Colour Information/Instruction Features Example Prohibition     Warning     Emergency     Refer to the Answer Key. What is your score?
  • 29. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 29 K-12 Creative Technology How Do You Apply What You Have Learned? It is not enough that you learned. Be sure that you are also being able to demonstrate skills. Activity 1.3 Applying OH&S Policies 1. Group yourselves into six members. 2. Conduct a simulation on: “Applying OHS Policies and Procedures”. 3. The performance will be rated according to the following: Find out by accomplishing the Scoring Rubric honestly and sincerely. Remember it is your learning at stake! Performance Criteria: Have shown five OHS policies in different areas Have shown four OHS policies in different areas Have shown three OH&S policies in different areas Have shown two OH&S policies in different areas Have not shown any OH&S policies 50 40 30 20 10 Find out by accomplishing the Scoring Rubric honestly and sincerely, remember it is your learning stake!
  • 30. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 30 K-12 Creative Technology LEARNING OUTCOME 1.4 Do a survey on the various safety regulations and contingency measures observed by schools, LGUs, and other offices in the locality. PERFORMANCE STANDARDS The Learner independently performs an Operational Health & Safety Procedural Plan using various Dynamic Computer Applications and Interactive Designs Materials 1. Workshop 2. Tables and Chairs 3. Computers 4. USB Flash Drive 5. Drawing materials 6. Application software
  • 31. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 31 K-12 Creative Technology What Do You Need to Know? Read information Sheet 1.4 very well then find out how much you can remember and how much you learned by doing Self-check 1.4 Information Sheet 1.4 The fear of stampede is one of the problem that the school faces especially when students goes in and out of the school campus and when natural disaster strikes e.g. typhoons, heavy rains, earthquakes, etc. Stampedes usually happen when the enormous crowd movements are disrupted, and the situation gets worse when crowd anxiety rises. It is already an initiative of a person to run to save his/her own life. Babag National High School is a public secondary institution located at Babag I, Lapu-Lapu City. It is the only secondary school in the said barangay that accommodates its own students and the students from the neighboring barangays and municipality. The school is situated at the back of a commercial building and Babag Elementary School. A narrow pathway with an estimated width of 4 meters serves as the main entrance and exit for both people and vehicles. The main entrance and exit are located near the National Highway where in most of the vehicles pass by going either to Cordova or Lapu-Lapu City. Since the population of Babag National High School has increased, there is already a big probability that stampede may occur especially during emergencies and evacuation considering the insufficient size of entrance and exit gates. One main aim of having this contingency plan is to prepared for the worst case scenario especially in the midst of stampede. Recently, the school is already implementing measures in controlling the traffic of going in and outside the school campus. As of the moment, the school has already established a SDRRM team, with their respective positions, who will respond in an event of a disaster in the school. Various school organizations such as Red Cross Youth (RCY), Boy Scouts of the Philippines (BSP), Girl Scouts of the Philippines (GSP) and Junior Emergency Response Team (JERT) were already trained and equipped with knowledge and skills to respond in the event of disaster. The school has also linked with the Local Government Unit (LGUs) like the local Barangay Disaster Risk Reduction Management Council (BDRRMC), Bureau of Fire Protection (BFP), Philippine National Police (PNP), Philippine Red Cross etc. to aid the needs of the school during and after the disaster.
  • 32. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 32 K-12 Creative Technology HAZARD The School DRRM Team has identified several hazards and ranked them based on their severity and probability to happen. HAZARDS PROBABILITY IMPACT AVERAGE P + I 2 R A N K RATE REMARKS RATE REMARKS FIRE 3 3 3 EARTHQUAKE 4 4 4 2 STAMPEDE 4 5 4.5 1 FOOD POISONING 5 1 3 ARMED CONFLICT 2 2 2 GANG AND YOUTH VIOLENCE 3 5 4 3 Hazard Identification With the hazards identified, it was found out that stampede is the top most human induced hazard in the school especially when man made or natural disasters happen. This contingency plan is made to consider the actions to be taken when stampede occurs. Contingency plan for stampede aims to prepare an organization to respond well to an emergency and its potential humanitarian impact. These encompasses making decisions in advance about the management of human and financial resources, coordination and communication procedures, and being aware of a range of technical and logistical responses.
  • 33. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 33 K-12 Creative Technology HAZARD TO PLAN FOR: STAMPEDE Based on the assessment made by the SDRRM Members, stampede requires contingency planning to ensure preparedness for effective response to lessen possible casualties, protect lives and loss of properties. The early warning signs that the school has already established includes the alarm bell, and the noise created by the people like shouting, running, etc. The triggering factor of this hazard is the occurrence of natural and man-made disaster. People will be at the state of fear when they feel that they are unsafe to a specific place. Furthermore, to somehow control the traffic management of the school, the presence of guards in the entry and exit points is an advantage. To constantly remind the students on what to do before, during and after a disaster, the Junior Emergency Response Team (JERT) conducts continuous room to room update. The presence of Student Body Organizations which includes the Boy Scouts of the Philippines (BSP), Girl Scouts of the Philippines (GSP), Rover Scouts, Supreme Student Government (SSG), Red Cross Youth (RCY) and Junior Emergency Response Team (JERT) will help manage the traffic and response to those who are at risk. The creation of the SDRRM Team is an advantage in mitigating, controlling and managing the situation. To simulate the evacuation in the event of the disaster, the school conducts quarterly drills. Students will be exposed to evacuate the school in actual scenario. To guide the SDRRM Team, responders and volunteers contemplate on the exact impact of threat that a stampede may bring, a scenario is developed thinking through the possible impacts. On the basis of sensible scenario, it is possible to set out the scale of the impact, the response and the resources needed. The following question will guide the SDRRM Team and responders in crafting the Contingency Plan in a systematic way: What is going to happen? What are we going to do about it? What can we do ahead of time to get prepared?
  • 34. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 34 K-12 Creative Technology
  • 35. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 35 K-12 Creative Technology PREPAREDNESS MEASURES Key Areas for Preparedness Gaps Action To Be Taken/ Preparedness Measures Risk Understanding  Lack of knowledge about stampede;  Insufficient information about the hazard and risk in the school campus; and  Inability to identify possible areas to be utilized during evacuation phase.  Conduct room to room information drive about stampede.  Inform the learners, teachers and stakeholders the identified risks and hazards of the school to address the problems.  Involve the learners, teachers and school head in the planning on what to do before, during and after the occurence of stampede. Contingency Plan and Dissemination  Lack of knowledge about Contigency plan for stampede.  No IEC materials for stampede  Coordinate with authorities to gain knowledge about stampede and its mitigating measures.  Produce school-based IEC materials for stampede and disseminate it to the learners. Communication  Lack of knowledge about the early warning signs for stampede.  Lack of equipment that can be utilized during emergencies.  Conduct information drive to the learners and teachers about what the early warning signs for stampede.  Provisions of the needed equipment during emergencies.
  • 36. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 36 K-12 Creative Technology Coordination  Lack of coordination with the government agencies and private sectors about the response and recovery.  Lack of partnerships and linkage to tap to during emergencies.  Coordinate with the local BDRRMO, City DRRMO, LGUs and private sectors.  Establish external partnerships and linkages with LGUs and Private sectors. Monitoring  Lack of action and monitoring to the identified hazard and risk in the school.  Lack of awareness about RADAR  Constant monitoring of the hazards and risks identified.  Attend seminar regarding RDAR Convergence  Lack of coordination with the school offices on what to do in the event of stampede.  Some of the appointed SDRRM team don’t know their respective functions.  Lack of idea about Incident Command System (ICS)  Conduct orientation on the contingency plan for stampede to the teachers and their respective roles and functions.  Introduction on how the ICS works. Support for Learning Continuity  Insufficient areas in the school to be utilized as Temporary Learning Space (TLS).  No organization of where the learning materials will be kept when disaster strikes.  No source/funding for basic provisions in the event of stampede.  Identified specific areas inside/outside the school which can be utilized as TLS together with the local DRRM and the barangay.  Orientation with the teachers on how to secure the learning materials in the event of disaster.  Tap external sources to help/ support the school in the providing basic needs to the IDPs in the event of stampede. Support for schools used as an Evacuation Centers  The school and the LGU has no written agreement on the use of school as an evacuation.  Unavailability of the use of School funds to repair facilities and properties.  Coordinate with the LGU to let them have an idea on the utilization of school as an evacuation center.  Make a plan to target the need to repair first school facilities. Drills  Lack of participation and cooperation during the conduct of the drills.  Lack of coordination with the Local Government Unit in the conduct of the drills.  Constant room to room campaign on the things to do before, during and after stampede.  Coordinate with the LGU to take part and evaluate the drill.
  • 37. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 37 K-12 Creative Technology
  • 38. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 38 K-12 Creative Technology How Much Have You Learned? Self-Check 1.4 Directions: On the box below, make a paragraph explaining the importance of identifying hazards in school and the possible safety measures implemented. For the paragraph’s introduction, justify and narrate school’s location. Note: Answers vary so long that they explain their ideas/concept comprehensively _____ _____________________________________ ________________________________________________ _______________________________________________ _______________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________
  • 39. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 39 K-12 Creative Technology How Do You Apply What You Have Learned? It is not enough that you learned. Be sure that you are also being able to demonstrate skills. MINI SURVEY Directions: Conduct a mini survey in your house. Gather the necessary data which discuss the importance of safety measures and creating a contingency plan after the hazards identified. Your output will be rated according to the rubrics below. Rubrics for your performance Task Contents Excellent (5) Good (3) Poor (1) Spelling Almost all words spelled correctly Content All information is factual and answered to the queries Punctuation Correct ending punctuation in every sentence but one. Grammar Simple sentences are grammatically correct. Handwriting Legible. Good spacing and alignment. Total Points
  • 40. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 40 K-12 Creative Technology LEARNING OUTCOME 1.5 Use numerous dynamic computer applications and interactive designs in the observance of OHS Procedural Plan to avoid hazards and risks PERFORMANCE STANDARDS The learner independently performs an Operational Health & Safety Procedural Plan using various Dynamic Computer Applications and Interactive Designs Materials 1. Workshop 2. Tables and Chairs 3. Computers 4. USB Flash Drive 5. Drawing materials 6. Application software
  • 41. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 41 K-12 Creative Technology What Do You Need to Know? Read information Sheet 1.5 very well then find out how much you can remember and how much you learned by doing Self-check 1.5 Information Sheet 1.5 DESKTOP PUBLISHING AND THE MS PUBLISHER SOFTWARE Desktop Publishing is the process of using the computer and specific types of software to combine text and graphics to produce documents such as newsletters, brochures, books, Web pages and many other printed documents.  Things to Do with Desktop Publishing Desktop publishing is or can be:  designing print communications such as brochures, flyers, ads and posters  designing print communications such as catalogues, directories and annual reports  designing logos, business cards, and letterhead  designing and publishing newsletters, magazines, and newspapers  designing books and booklets  converting print communications to formats including Web and smart devices such as tablets and phones  creating resumes and business forms (including invoices, inventory sheets, memos and labels)  self-publishing (books, newsletters, ebooks, etc.)  designing and publishing blogs and Web sites  designing slide shows, presentations and printing handouts  creating and printing greeting cards, banners, postcards, candy wrappers, and iron-on transfers  making digital scrapbooks and print or digital photo albums  creating decorative labels, envelopes, trading cards, calendars, and charts  designing packaging for retail merchandise from wrappers for bars of soap to software boxes  designing store signs, highway signs and billboards  taking work designed by others and putting into the correct format for digital or offset printing or for publishing online
  • 42. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 42 K-12 Creative Technology Steps and procedures when using Desktop Publishing Software Step 1 applies to anyone who is new to using page layout programs. Steps 2 and 8 apply to everyone. Pick and choose from among steps 3 to7 to find the learning techniques that work for you. 1. Have a plan, make a sketch 2. Choose a template 3. Up your document 4. Place text in your document 5. Format your text 6. Place graphics in your document 7. Tweak your graphics placement 8. Apply the rules of desktop publishing 9. Print a draft and proofread it 10. Print your project WORKING WITH MS PUBLISHER Opening MS Publisher may vary depending on the computer you are working on. 1. Click on the Start button, select All Programs menu » Microsoft Office » Microsoft Office Publisher. You will see an icon on your desktop that looks similar to this. Double click on this icon to open MS Publisher.
  • 43. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 43 K-12 Creative Technology 2. Publisher start up in the Getting Started with the Microsoft Office Publisher window offering many pre-formatted designs to use in creating your publication. Basic Parts and Functions of MS Publisher The illustration below consists of the important tool bars in working with MS Publisher. The Quick Access Toolbar lets you access common commands, no matter which tab you are using in the Ribbon. By default, it shows the Save, Undo, and Redo commands. The Page Navigation pane allows you to view and work with the pages in your publication. You can add, delete, rearrange, and duplicate pages in the Page Navigation pane. You can also organize your pages into Sections. The Ribbon contains multiple tabs, each with several groups of commands. Some tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working with certain items like text boxes or images.
  • 44. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 44 K-12 Creative Technology Guides are thin lines that help you align various objects. The right task pane shows a larger thumbnail of the selected design and any available settings which can be changed. WORKING WITH TEXT Text Basics In order to use MS Publisher, you must have the knowledge in using the Microsoft Word application.  Text Basics - Reviews basic topics like inserting, deleting, copying, and moving text  Formatting Text - Includes text formatting tasks like changing font style, size, and color  Checking Spelling and Grammar - Presents tools you can use to proofread your text  Working with Lists - Guides you through creating and formatting lists  Line and Paragraph Spacing - Explains how to adjust spacing WORKING WITH TEXT BOXES Insert a Text Box: 1. On the Ribbon, select the Insert tab and locate the Text group. 2. Click the Draw Text Box command. 3. The cursor will turn into a crosshairs +. Click anywhere on your publication and drag your mouse to create the text box. 4. You can now start typing inside the text box WRAPPING TEXT AROUND THE OBJECT 1. Select the object, then click the Format tab that appears on the Ribbon. 2. Locate the Arrange group and click the Wrap Text drop-down command. 3. Select the desired wrap option. The text will adjust based on the option you have selected. 4. If necessary, reposition the object and adjust the image until the text wraps correctly  If you can’t get your text to wrap the way you wish, click the Wrap Text command and select More Layout Options from the menu. You can make more precise changes in the Advanced Layout dialog box that appears.
  • 45. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 45 K-12 Creative Technology CONNECTING TEXT BOXES Connect to a New Text Box 1. Select your text box 2. Click the Text Box Tools Format tab and locate the Linking group. 3. Click the Create Link command. 4.The Link icon will appear in place of your cursor. Click the spot on your publication where you would like to add the linked text box. 5.Continue typing your text. Any text that overflows from the original text box will now appear in the connected box. WORKING SHAPES AND OBJECTS To Insert a Shape: 1. Select the Insert tab and locate the Illustrations group 2. Click the Shapes drop-down command Arranging Objects To Align Two or More Objects: 1. Click and drag your mouse to form a selection box around the objects you want to align. All of the objects will now have sizing handles to show that they are selected. 2. Click the Format tab and locate the Arrange group. 3. Click the Align drop-down command. 4. Select one of the six alignment options. 5. The objects will align to each other based on the option that you have selected. To Align Objects to the Page 1. Select the object or objects you want to align. 2. Click the Format tab and locate the Arrange group. 3. Click the Align drop-down command.
  • 46. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 46 K-12 Creative Technology 4. Select one of the six alignment options. The objects will align to the page based on the option that you have selected WORKING WITH PICTURES To Insert a Picture from a File: 1. Select the Insert tab and locate the Illustrations group. 2. Click the Picture command. The Insert Picture dialog box will appear. Locate and select the picture you would like to insert, then, click Insert. To Insert Clip Art 1. Select the Insert tab and locate the Illustrations group. 2. Click the Clip Art command. 3. The Clip Art pane will appear on the right. Use the search tools to search for a suitable image.  Enter keywords in the Search for: fields that are related to the image you wish to find.
  • 47. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 47 K-12 Creative Technology  Click the drop-down arrow in the Results should be: field, then, deselect any types of media you do not wish to see. 4. Click Go to begin your search. 5. Publisher will display pictures that meet your search terms. When you have found a picture you wish to use, click it. Saving a File Save as is used to save a file for the first time or to save it with a different name or to a different location. 1. Click File. 2. Chose Save As. 3. In the File Name text box, type in the desired filename. 4.Press Enter or click Save. Print your publication 1. Click the File button to open the Backstage view. 2. Click Print to open the print settings page. 3. In the Print section, set the number of copies to print in Copies of print job. 4. In the Printer section, make sure that the correct printer is selected. 5. In the Settings section: a. Make sure that the correct set of pages or sections is selected. b. Select the format for imposing your pages on the sheet. c. Set the paper size. d. Set whether to print on one side of the sheet of paper or both, and when printing on both sides whether to flip the sheet of paper on the long or short side. e. If your printer is capable of color printing, choose if you want to print color or grayscale. 6. Click the Print button to send the publication to your printer.
  • 48. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 48 K-12 Creative Technology How Much Have You Learned? Self-Check 1.5 A. Directions: On the box below, make a paragraph explaining the things you can do with MS Publisher Software. Note: Answers vary so long that they explain their ideas/concept comprehensively _____ _____________________________________ ________________________________________________ _______________________________________________ _______________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ B. Enumerate the basic parts of MS Publisher and write their functions Refer to the Answer Key. What is your score?
  • 49. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 49 K-12 Creative Technology How Do You Apply What You Have Learned? It is not enough that you learned. Be sure that you are also being able to demonstrate skills. Directions: Make a brochure on OHS Procedural Plan of your school to show case the Desktop Publishing skills you have learned from this lesson. Make sure that your publication will be able to convey the steps and its importance to avoid hazards and risks. Present it in print and non- print. Rubrics for your performance Task
  • 50. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 50 K-12 Creative Technology Post-Test A. Directions: Match column A with column B in order to identify the term / word being described. B. Direction: Read carefully each statement below. Place T on the line if the statement is TRUE. Write the correct word/s if the statement is FALSE. ______1. Spotting the hazards means working out how likely it is that a hazard will harm someone and how serious the harm could be. ______2. Risk is part of the process used to evaluate if any particular situation, item, thing, etc. may have the potential to cause harm. _______3. Chemical hazards are hazards that create unsafe working conditions. ______4. Harm is a physical injury or damage to health. ______5. Inkjet printer cartridges, or laser printer toner cartridges are hazardous to users. C. Identify what hazard is being illustrated in the situation below . ________________1. Exposed wires or a damaged carpet. ________________2. Poor posture and manual handling ________________3. Bodily fluids and harmful plants. ________________4. Radiation and pressure. ________________5. Stress and workplace violence. A B 1. when an employee intends to cause damage 2. when user damages data or equipment unintentionally 3. attached to small pieces of computer code, software and documents 4. a self-replicating program that is harmful to network 5. it is technically a worm 6. software designed to detect, disable and remove viruses a. Accidental threats b. Antivirus software c. Data encryption d. Firewall e. Malicious threats f. Traffic g. Trojan horse h. Virus i. VPN j. WPA k. WEP l. Worm
  • 51. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 51 K-12 Creative Technology D. Examine and identify the different signs and symbols for safety presented below and write your answer on the blank provided for. Source: Warning Sign. Martin Diebel Source: has.ie 1._______________________ 2. ___________________ Source: 123rf.com Source: dreamstine.com 3.__________________________ 4.________________________ Source: favpng.com 5.____________________________ E. Enumerate the basic parts of MS Publisher and write their functions
  • 52. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 52 K-12 Creative Technology REFERENCES LESSON 4 Web https://www.osha.gov/sites/default/files/2018-12/fy11_sh-22300- 11_AwarenessLevelTeacherManual.pdf https://www.ccohs.ca/oshanswers/hsprograms/hazard_identification. html https://ehs.princeton.edu/news/know-your-hazard-symbols- pictogramshttps://ehs.princeton.edu/news/know-your-hazard- symbols-pictograms https://www.slideshare.net/safereps/workplace-hazards-26555990 https://www.hiclipart.com/free-transparent-background-png- clipart-puwtp https://www.dcmgroup.ca/en/news/safety-symbols-and-their- meanings-2/ https://www.pure-chemical.com/blog/hazard-symbols/ https://safetyculture.com/topics/ppe-safety/ http://www.oshc.dole.gov.ph/transparency?id=36 http://bwc.dole.gov.ph/index.php/forms?layout=edit&id=53 https://www.hse.gov.uk/toolbox/ppe.htm https://www.inc.com/encyclopedia/computers-and-computer- systems.html https://en.wikibooks.org/wiki/A- level_Computing/CIE/Computer_systems,_communications_and_software /Components_of_a_computer_system_and_modes_of_use/Types_of_hardwa re http://www.depedbataan.com/resources/9/k_to_12_entrep- based_desktop_publishing_learning_module.pdf ecomputernotes.com › fundamental › what-is-computer Book Jemma Development Group: Empowement Tecnology 2017 Padasas,Penaflor,Castro,Paquingan, de Ramos, Espiritu, Ph.D: Operating System and Office Applications 2nd Edition. New perspectives on computer concepts 2011, Parson, June Jamrich Computer concepts: Illustrated.7th ed., Parson, June Jamrich, Dan Oja Computer appliications in education 2012, ahmad jasim
  • 53. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 53 K-12 Creative Technology ANSWER KEYS Pre-Test and Post - Test A. 1. A 2.E 3.C 4.L 5.G 6.B B. 1. T 2. Hazard Identification 3. Safety Hazard 4.T 5. T C. 1. Safety hazard 2. Ergonomic hazard 3. Biological hazard 4. Physical hazard 5. Psychological hazard D. 1. Acute toxic 2. Health hazard 3. Flammable 4. Environmental hazard 5. Corrosion
  • 54. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 54 K-12 Creative Technology E. 1. The Quick Access Toolbar lets you access common commands, no matter which tab you are using in the Ribbon. By default, it shows the Save, Undo, and Redo commands. 2. The Page Navigation pane allows you to view and work with the pages in your publication. You can add, delete, rearrange, and duplicate pages in the Page Navigation pane. You can also organize your pages into Sections. 3. The Ribbon contains multiple tabs, each with several groups of commands. Some tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working with certain items like text boxes or images. 4. Guides are thin lines that help you align various objects. 5. The right task pane shows a larger thumbnail of the selected design and any available settings which can be changed. LO 1.1 Unlock different occupational health and safety procedures for literacy and awareness using various dynamic computer applications Self-check 1.1 A. 1. A 2.E 3.C 4.L 5.G 6.B LO 1.2 Enumerate the different hazards and risks that may occur in workstations and places through skit Self-check 1.2 A. 1. T 2. Hazard Identification 3. Safety Hazard 4.T 5. T
  • 55. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 55 K-12 Creative Technology B. 1. Safety hazard 2. Ergonomic hazard 3. Biological hazard 4. Physical hazard 5. Psychological hazard C. 1. Physical Hazards 2. Mechanical Hazards 3. Electric Shock Hazard 4. Posture-related injuries from computer use 5. Computer-related overuse injuries of the hand or arm 6. Eyestrain from computer use LO 1.3 Decode the meanings conveyed by the different hazards and risks warning symbols and importance of Personal Protective Equipment ( PPE) Self-check 1.3 A. 1. Acute toxic 2. Health hazard 3. Flammable 4. Environmental hazard 5. Corrosion
  • 56. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 56 K-12 Creative Technology B. Category Colour Information/Instructio n Features Example Prohibition red dangerous round shape do not touch Warning yellow be careful triangular /square shape Electric shock Emergency green door Rectangular shape Emergency exit/ escape LO 1.4 Do a survey on the various safety regulations and contingency measures observed by schools, LGUs, and other offices in the locality Self-check 1.4 Essay: Make a paragraph explaining the importance of identifying hazards in school and the possible safety measures implemented. LO 1.5 Use numerous dynamic computer applications and interactive designs in the observance of OHS Procedural Plan to avoid hazards and risks Self-check 1.5 A. Essay: Make a paragraph explaining the things you can do with MS Publisher Software
  • 57. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 57 K-12 Creative Technology B. 1. The Quick Access Toolbar lets you access common commands, no matter which tab you are using in the Ribbon. By default, it shows the Save, Undo, and Redo commands. 2. The Page Navigation pane allows you to view and work with the pages in your publication. You can add, delete, rearrange, and duplicate pages in the Page Navigation pane. You can also organize your pages into Sections. 3. The Ribbon contains multiple tabs, each with several groups of commands. Some tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working with certain items like text boxes or images. 4. Guides are thin lines that help you align various objects. 5. The right task pane shows a larger thumbnail of the selected design and any available settings which can be changed. Cogratulations! You did a great job! You did a great job! Rest and relax a while then move on to the next lesson. Good luck!