Competency Code: TLE_IACSS9-12UHT-IIIa-17
After reading this lesson , you should be able to:
1. Identify the different tools and equipment used in computer systems and networks
2. Determine the different use and functions of these tools and equipment’s
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersAnjenette Columnas
A Semi-Detailed Lesson Plan about Input and Output Devices of Computers in the Computer Subject. I'm now a professional teacher and this lesson plan was used during my teaching demonstration in Sicayab National High School.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
Competency Code: TLE_IACSS9-12UHT-IIIa-17
After reading this lesson , you should be able to:
1. Identify the different tools and equipment used in computer systems and networks
2. Determine the different use and functions of these tools and equipment’s
Semi-Detailed Lesson Plan - Input and Output Devices of ComputersAnjenette Columnas
A Semi-Detailed Lesson Plan about Input and Output Devices of Computers in the Computer Subject. I'm now a professional teacher and this lesson plan was used during my teaching demonstration in Sicayab National High School.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing. Technology in Livelihood Education in Grade 10 Computer Systems Servicing.
Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education G
Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing.Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Grade 9 - Computer System Servicing. Daily lesson log in Technology in Livelihood Education Gr
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
This is a technical report on a 6 month Industrial Training on networking and little of web design. The format used is as stated in the SIWES Handbook.
Latest Workplace Wearable Technologies and Connected‐Worker Solutions.pdfIowa State University
The workplace influences the safety, health, and productivity of workers at multiple levels. To protect and promote total worker health, smart hardware, and software tools have emerged for the identification, elimination, substitution, and control of occupational hazards. Wearable devices enable constant monitoring of individual workers and the environment, whereas connected worker solutions provide contextual information and decision support. Here, the recent trends in commercial workplace technologies to monitor and manage occupational risks, injuries, accidents, and diseases are reviewed. Workplace safety wearables for safe lifting, ergonomics, hazard identification, sleep monitoring, fatigue management, and heat and cold stress are discussed. Examples of workplace productivity wearables for asset tracking, augmented reality, gesture and motion control, brain wave sensing, and work stress management are given. Workplace health wearables designed for work-related musculoskeletal disorders, functional movement disorders, respiratory hazards, cardiovascular health, outdoor sun exposure, and continuous glucose monitoring are shown. Connected worker platforms are discussed with information about the architecture, system modules, intelligent operations, and industry applications. Predictive analytics provide contextual information about occupational safety risks, resource allocation, equipment failure, and predictive maintenance. Altogether, these examples highlight the ground-level benefits of real-time visibility about frontline workers, work environment, distributed assets, workforce efficiency, and safety compliance.
Patel, V., Chesmore, A., Legner, C.M. and Pandey, S. (2022), Trends in Workplace Wearable Technologies and Connected-Worker Solutions for Next-Generation Occupational Safety, Health, and Productivity. Adv. Intell. Syst., 4: 2100099. https://doi.org/10.1002/aisy.202100099
Trends in Workplace Wearable Technologies and Connected‐Worker SolutionsIowa State University
The workplace influences the safety, health, and productivity of workers at multiple levels. To protect and promote total worker health, smart hardware, and software tools have emerged for the identification, elimination, substitution, and control of occupational hazards. Wearable devices enable constant monitoring of individual workers and the environment, whereas connected worker solutions provide contextual information and decision support. Here, the recent trends in commercial workplace technologies to monitor and manage occupational risks, injuries, accidents, and diseases are reviewed. Workplace safety wearables for safe lifting, ergonomics, hazard identification, sleep monitoring, fatigue management, and heat and cold stress are discussed. Examples of workplace productivity wearables for asset tracking, augmented reality, gesture and motion control, brain wave sensing, and work stress management are given. Workplace health wearables designed for work-related musculoskeletal disorders, functional movement disorders, respiratory hazards, cardiovascular health, outdoor sun exposure, and continuous glucose monitoring are shown. Connected worker platforms are discussed with information about the architecture, system modules, intelligent operations, and industry applications. Predictive analytics provide contextual information about occupational safety risks, resource allocation, equipment failure, and predictive maintenance. Altogether, these examples highlight the ground-level benefits of real-time visibility about frontline workers, work environment, distributed assets, workforce efficiency, and safety compliance.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Francesca Gottschalk - How can education support child empowerment.pptx
CREATIVE TECHNOLOGY 7 QI-L4
1. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 1
LESSON 4
Occupational Health and Safety Procedures
2. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 2
LEARNING OUTCOMES
LO 1.1 Unlock different occupational health and safety procedures for literacy and
awareness using various dynamic computer applications
LO 1.2 Enumerate the different hazards and risks that may occur in workstations
and places through skit
LO 1.3 Decode the meanings conveyed by the different hazards and risks warning
symbols and importance of Personal Protective Equipment ( PPE)
LO 1.4 Do a survey on the various safety regulations and contingency measures
Observed by schools, LGUs, and other offices in the locality
LO 1.5 Use numerous dynamic computer applications and interactive designs in
The observance of OHS Procedural Plan to avoid hazards and risks
Definition of Terms
Occupational health and safety (OHS) - relates to health, safety, and welfare issues
in the workplace.
Computer security - defines as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems.
Cybersecurity - is defined as protecting computer systems, which communicate over
the computer networks
Data Encryption - Encrypting data involves using codes and ciphers.
Firewall - is a way of protecting a computer from intrusion through the ports.
Harm – physical injury or damage to health.
Hazard – a potential source of harm to a worker.
Risk assessment - Hazard identification is part of the process used to evaluate if any
particular situation, item, thing, etc. may have the potential to cause harm.
Symbol - is a mark, sign or word that indicates, signifies, or is understood as
representing an idea, object, or relationship.
Personal Protective Equipment (PPE) - is clothing or equipment designed to protect
workers from physical hazards when on a worksite
At the end of the lesson, you are expected
to do the following:
3. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 3
Desktop Publishing - is the process of using the computer and specific types of
software to combine text and graphics to produce documents such as newsletters,
brochures, books, Web pages and many other printed documents
What Do You Already Know?
Let us determine how much you already know about task
preparation and hand tools. Take this test.
Pre-Test
A. Directions: Match column A with column B in order to identify the term
/ word being described.
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
4. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 4
B. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
C. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
D. Examine and identify the different signs and symbols for safety presented
below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
5. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 5
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
E. Enumerate the basic parts of MS Publisher and write their functions
6. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 6
What Do You Need to Know?
Read information Sheet 1.1 very well then find out how much you can
remember and how much you learned by doing Self-check 1.1
Information Sheet 1.1
Occupational health and safety (OHS) relates to health, safety, and
welfare issues in the workplace. OHS includes the laws, standards, and
programs that are aimed at making the workplace better for workers, along
with co-workers, family members, customers, and other stakeholders. It
improves a company's occupational health and safety standard that ensures
good business, a better brand image, and higher employee morale.
Occupational health and safety standards are in place to mandate the
removal, reduction, or replacement of job site hazards. OHS programs should
also include material that helps minimize the effects of the different type of
hazards in a workplace. Identifying hazards in a workplace and deciding how
dangerous they are will help to eliminate hazards and modify the risks that are
present. Furthermore, Our government has rules and regulations
implementing Executive Order No.307 which states that Occupational Safety
and Health (OSH) is defined as the a) promotion and maintenance of the
highest degree of physical, mental and social well-being of workers in all
occupations; b) prevention among its workers of any departures from health
caused by their working conditions; c) protection among workers in their
employment from risks usually from factors adverse to health and d) placing
and maintenance of the worker in an occupational environment adapted to
his/her physiological ability.
7. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 7
General Safety Guidelines
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first aid kit are available in case of fire or injury. Here are
some general safety guidelines:
Remove your watch or any other jewelry and secure loose clothing.
Turn off the power and unplug equipment before opening the case and
performing service.
Cover any sharp edges inside the computer case with tape.
Never open a power supply or a monitor.
Do not touch areas in printers that are hot or those which use high
voltage.
Know where the fire extinguisher is located and learn how to use it.
Know where the first aid kit is located.
Keep food and drinks out of your workspace.
Keep your workspace clean and free of clutter.
Lift heavy objects with sturdy leg support to avoid back injury.
12 OHS Procedures
In a workplace, each student has a responsibility to their classmates or
workgroups to report and act upon any potential hazards. Students need to be
aware the procedures needed in the present work environment such as:
1. Do not work alone so that there's someone who can take care of you in
case of emergency.
2. Always power off the computer and unplug the computer before
working on it.
3. Take away any liquid near your working area to avoid getting
electrocuted or accidentally damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the
computer.
6. Do not use excessive force if things don't quite slip into place.
7. Clean the area before and after using it to maintain sanitation and
prevent accidents.
8. Hold the components on the edges and do not touch the Integrated
Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with
the organization's OHS procedures and practices.
10. Make sure that the pins are properly aligned when connecting a cable
connector.
11. Contingency measures during workplace accidents, fire and other
emergencies are recognized.
12. Use brush, compressed air or blower in cleaning the computer system.
Computer Safety
8. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 8
Computer security allows you to use the computer while keeping
it safe from threats. Computer security can be defined as controls that are put
in place to provide confidentiality, integrity, and availability for all components
of computer systems. It keeps your information protected. Oftentimes, people
confound computer security with other related terms like information security
and cybersecurity. For example:
Information security is securing information from unauthorized access,
modification & deletion
Computer Security means securing a standalone machine by keeping it
updated and patched
Cybersecurity is defined as protecting computer systems, which
communicate over the computer networks
Why is cybersecurity important?
Listed below are the reasons why cybersecurity is so important
in what’s become a predominant digital world:
Cyber attacks can be extremely expensive for businesses to endure. In
addition to financial damage suffered by the business, a data breach
can also inflict untold reputational damage.
Cyber-attacks these days are becoming progressively destructive.
Cybercriminals are using more sophisticated ways to initiate cyber
attacks.
Regulations such as GDPR are forcing organizations into taking better
care of the personal data they hold.
Security incidents regularly affect businesses of all sizes and often
make the front page causing irreversible reputational damage to the
companies involved
Computer Security Practices
Computer security threats are becoming relentlessly inventive these
days. There is much need for one to arm oneself with information and
resources to safeguard against these complex and growing computer security
threats and stay safe online. Some preventive steps you can take include:
1. Secure your computer physically by:
o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security
guard between the internet and your local area network
2. Stay up-to-date on the latest software and news surrounding your
devices and perform software updates as soon as they become
available
3. Avoid clicking on email attachments unless you know the source
4. Change passwords regularly, using a unique combination of numbers,
letters and case types
5. Use the internet with caution and ignore pop-ups, drive-by downloads
while surfing
9. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 9
6. Taking the time to research the basic aspects of computer security
and educate yourself on evolving cyber-threats
7. Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen
to your computer.
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before
they infect a computer.
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. It may not be possible to decipher captured data in
time to make any use of it. A security alert may inform you that you are using
an encrypted connection.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of
protecting a computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured.
Data being transported on a network is called traffic.
How to Enable Firewall for Windows 7
1. Open Windows Firewall by clicking the
Start button , and then clicking
Control Panel. In the search box, type
firewall, and then click Windows
Firewall.
10. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 10
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link
in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
If you want the firewall to prevent all programs from communicating,
including programs that you have previously allowed to communicate through
the firewall, select the Block all incoming connections, including those in
the list of allowed programs check box.
Computer security threats
Computer security threats are possible dangers that can possibly
hamper the normal functioning of your computer. In the present age, cyber
threats are constantly increasing as the world is going digital. The most
harmful types of computer security are:
Viruses
A computer virus is a malicious
program which is loaded into the user’s
computer without user’s knowledge. It
replicates itself and infects the files and
programs on the user’s PC. The ultimate
goal of a virus is to ensure that the victim’s
computer will never be able to operate
properly or even at all.
Computer Worm
A computer worm is a software
program that can copy itself from one
computer to another, without human
interaction. The potential risk here is that it
will use up your computer hard disk space
because a worm can replicate in great
volume and with great speed.
11. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 11
Phishing
Pronounced like fishing, phishing is a
term used to describe a malicious individual or
group of individuals who scam users. They do
so by sending e-mails or creating web
pages that are designed to collect an
individual's online bank, credit card, or other
login information.
Botnet
A botnet is a group of computers
connected to the internet that have been
compromised by a hacker using a computer
virus. An individual computer is called ‘zombie
computer’. The result of this threat is the
victim’s computer, which is the bot will be used
for malicious activities and for a larger scale
attack like DDoS.
Rootkit
A rootkit is a computer program
designed to provide continued privileged
access to a computer while actively hiding
its presence. Once a rootkit has been
installed, the controller of the rootkit will be
able to remotely execute files and change
system configurations on the host machine.
Keylogger
Also known as a keystroke logger,
keyloggers can track the real-time activity
of a user on his computer. It keeps a record
of all the keystrokes made by user
keyboard. Keylogger is also a very powerful
threat to steal people’s login credential
such as username and password.
12. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS
K-12 Creative Technology Page 12
Pharming
Pharming is a scamming practice in
which malicious code is installed on a
personal computer or server, misdirecting
users to fraudulent Web sites without their
knowledge or consent.
Email spoofing
It is a deceitful email practice in which
the sender address is changed, so that it
would appear to have come from a different
source usually someone you know. It is
also known as fraudulent email activity
hiding email origins.
13. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 13
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.1
Directions: Match column A with column B in order to identify the term / word
being described.
Refer to the Answer Key. What is your score?
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
14. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 14
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned concepts on Occupational Health and Safety
and Computer Safety. Be sure that you are also being able to demonstrate
skills and answer the guide questions comprehensively.
Activity 1.1
How to Enable Firewall for Windows 7
1. Open Windows Firewall by clicking the
Start button , and then clicking
Control Panel. In the search box, type
firewall, and then click Windows
Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link
in Windows Firewall.
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
15. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 15
K-12 Creative Technology
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
4. Essential Question:
In the space below, list the services that are available.
________________________________________________________
________________________________________________________
________________________________________________________
Activity 1.2
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local
store to gather information about hardware and software firewalls.
Company/Hardware
Name
Website
URL
Cost Subscription Length
(Month/Year/Lifetime)
Hardware
Features
1. Using the Internet, research two different hardware firewalls. Based on
your research, complete the table below.
2. Which hardware firewall would you purchase? List reasons for your
choice.
16. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 16
K-12 Creative Technology
LEARNING OUTCOME 1.2
Enumerate the different hazards and risks that may occur in
workstations and places through skit
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
What Do You Need To Know?
Read information Sheet very well then find out how much you can
remember and how much you learned by doing Self-check 1.2
Information Sheet 1.2
What is a hazard?
A hazard is any agent that can cause harm or damage to humans,
property, or the environment .It is commonly define also as “A hazard is any
source of potential damage, harm or adverse health effects on something or
someone”. Other government entities state that "Occupational health and
safety defines - Hazard identification and elimination and risk assessment
and control" uses the following terms:
Harm – physical injury or damage to health.
Hazard – a potential source of harm to a worker.
Risk is defined as the probability that exposure to a hazard will lead to a
negative consequence, or more simply, a hazard poses no risk if there is no
exposure to that hazard.
17. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 17
K-12 Creative Technology
Hazard Identification, Risk Assessment, and Risk Control
Hazard identification is part of the process used to evaluate if any
particular situation, item, thing, etc. may have the potential to cause harm.
The term often used to describe the full process is risk assessment:
Identify hazards and risk factors that have the potential to cause harm
(hazard identification).
Analyze and evaluate the risk associated with that hazard (risk
analysis, and risk evaluation).
Determine appropriate ways to eliminate the hazard, or control the risk
when the hazard cannot be eliminated (risk control).
Overall, the goal of hazard identification is to find and record possible
hazards that may be present in your workplace. It may help to work as a team
and include both people familiar with the work area, as well as people who are
not – this way you have both the experienced and fresh eye to conduct the
inspection. At work you can use these three Think Safe steps to help prevent
accidents such as:
1. Spot the Hazard (Hazard
Identification)
Key Point - A hazard is anything
that could hurt you or someone else.
Examples of workplace hazards
include:
frayed electrical cords (could result in
electrical shock)
boxes stacked precariously (they could
fall on someone)
noisy machinery (could result in damage to your hearing)
During work experience, you must remain alert to anything that may be
dangerous. If you see, hear or smell anything odd, take note. If you think it
could be a hazard, tell someone.
2. Assess the Risk (Risk Assessment)
Key Point
Assessing the risk means working out how
likely it is that a hazard will harm someone
and how serious the harm could be.
Whenever you spot a hazard, assess the risk by
asking yourself two questions:
How likely is it that the hazard could harm
me or someone else?
How badly could I or someone else be
harmed?
Always tell someone (your employer, your
supervisor or your health and safety (representative) about hazards you can't
fix yourself, especially if the hazard could cause serious harm to anyone.
For example:
Ask your supervisor for instructions and training before using
equipment.
18. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 18
K-12 Creative Technology
Ask for help moving or lifting heavy objects.
Tell your supervisor if you think a work practice could be dangerous.
If you are not sure of the safest way to do something during work experience,
always ask your work experience supervisor.
3. Make the Changes (Risk Control)
Key Point
It is your employer's responsibility to fix hazards. Sometimes you may be able
to fix simple hazards yourself, as long as you don't put yourself or others at risk. For
example, you can pick up things from the floor and put them away to eliminate a trip
hazard.
The six main categories of hazards are:
Biological. Biological hazards include
viruses, bacteria, insects, animals, etc., that
can cause adverse health impacts. For
example, mould, blood and other bodily
fluids, harmful plants, sewage, dust and
vermin.
Chemical. Chemical hazards are
hazardous substances that can cause harm.
These hazards can result in both health and
physical impacts, such as skin irritation,
respiratory system irritation, blindness,
corrosion and explosions.
Physical. Physical hazards are
environmental factors that can harm an
employee without necessarily touching them,
including heights, noise, radiation and
pressure.
19. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 19
K-12 Creative Technology
Safety. These are hazards that create
unsafe working conditions. For example,
exposed wires or a damaged carpet might
result in a tripping hazard. These are
sometimes included under the category of
physical hazards.
Ergonomic. Ergonomic hazards are
a result of physical factors that can result in
musculoskeletal injuries. For example, a
poor workstation setup in an office, poor
posture and manual handling.
Common hazards encountered by computer technicians and users
Physical Hazards
One of the most common physical hazards involving computer
technicians is cables running across the floor. If someone trips, falls, and
hurts himself because of a cable you ran across the floor, someone (you, your
employer, or your customer) has a serious legal negligence problem.
Mechanical Hazards
When working on electronic equipment always be alert to any
possibility of being hurt by moving parts, hot components, or sharp edges.
Electric Shock Hazard
Inside computers and electronic equipment, there is a range of
voltages from 3.3 volts to 25 volts, most of these are harmless. But at the
power supply, you'll find line voltage, which is a lethal 220 volts.
Posture-related injuries from computer use
Back and neck pain, headaches, and shoulder and arm pain are
common computer-related injuries. Such muscle and joint problems can be
caused or made worse by poor workstation (desk) design, bad posture and
sitting for long periods of time.
Computer-related overuse injuries of the hand or arm
Muscles and tendons can become painful with repetitive movements
and awkward postures. This is known as ‘overuse injury’ and typically occurs
in the elbow, wrist or hand of computer users. Symptoms of these overuse
20. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 20
K-12 Creative Technology
injuries include pain, swelling, stiffness of the joints, weakness and
numbness.
Eyestrain from computer use
An act of focusing your eyes at the same distance point for long
periods of time causes fatigue. The human eye structurally prefers to look at
objects more than six metres away, so any work performed close up puts
extra demands on your eye muscles. The illuminated computer screen can
also cause eye fatigue.
How Much Have You Learned?
Self-Check 1.2
A. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
B. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
C. List down the common hazards encountered by computer technicians and users
1. __________________________
2. __________________________
3. _________________________
4. __________________________
5. __________________________
Refer to the Answer Key. What is your score?
21. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 21
K-12 Creative Technology
How Do You Apply What You Have Learned?
Direction: Observe the set-up of your school’s Computer Laboratory.
Observe the procedures and arrangement being practiced and used in the
workplace. Identify and list the hazards and assess the risk based on your
observations.
Spot the Hazard Assess the Risk
A Hazard is anything that could hurt
you
or someone else
Work out how likely it is that the hazard
will hurt someone and how badly
he/she could be hurt
List the hazards ( 5 hazards) Describe the risks
22. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 22
K-12 Creative Technology
LEARNING OUTCOME 1.3
Decode the meanings conveyed by the different hazards and risks
warning symbols and importance of Personal Protective Equipment
( PPE)
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
What Do You Need to Know?
Read information Sheet 1.3 very well then find out how much you can
remember and how much you learned by doing Self-check 1.3
Information Sheet 1.3
Symbols
Symbols are resources of complex communication that often can have
multiple levels of meaning. A symbol is a mark, sign or word that indicates,
signifies, or is understood as representing an idea, object, or relationship.
Symbols allow people to go beyond what is known or seen by creating
linkages between otherwise very different concepts and experiences. Hazard
symbols or warning symbols are recognizable symbols designed to warn
about hazardous or dangerous materials, locations, or objects, including
electric currents, poisons, and radioactivity. The use of hazard symbols is
often regulated by law and directed by standards organizations. Hazard
symbols may appear with different colors, backgrounds, borders and
supplemental information in order to specify the type of hazard and the level
of threat.
23. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 23
K-12 Creative Technology
Safety Symbols and Their Meanings
The best occupational health and safety programs use a series of signs
and symbols to convey a complete message. Most safety signs and symbols
fall into one of four categories:
Prohibition
Warning
Mandatory
Emergency
Each category has its own specific colour and sign shape that remains
consistent around the world as per safety regulations. You will be able to
easily identify whether a sign is asking you to stop doing something, start
doing something, take precautions, or advising you of emergency equipment
or facilities through their characteristics which are presented in the table.
Table 1.
Source:https://www.dcmgroup.ca/en/news/safety-symbols-and-their-meanings-2
Why Use Safety Symbols?
24. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 24
K-12 Creative Technology
Pictures may not say a thousand words, but they are universally
recognized symbols that transcend language. No matter where you’re
working, you’ll be able to understand the potential hazards you face simply by
looking at the posted symbols. There are two different types of safety
symbols: one refers to general safety protocols, while the other is used
specifically for labeling chemicals that may be hazardous. Since most
workplaces have a combination of both, it’s important to understand each of
them.
Hazard Symbols
Figure 1 Source: https://www.pure-chemical.com/blog/hazard-symbols/
25. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 25
K-12 Creative Technology
Health Hazard - symbol is a clear indication of the substance being
carcinogenic, it induces respiratory irritation, directly causes damage to
organs and also imparts reproductive toxicity.
Acute Toxic – indicates the skull and for acute toxicity. When displayed on
chemical labels the message sent across is, they are toxic to the extent of
being fatal when inhaled, swallowed and on contact with skin.
Flammable - a picture of the flame abruptly indicates the substance is
flammable when it comes into contact with air or it may even heat up by itself
and ignite spontaneously.
Exclamation mark - a generic symbol which in addition to cautioning also
indicates that it causes irritation, acute toxicity, narcotic effect, respiratory tract
irritation and causes damage to internal organs.
Flame over circle - a symbol sends a word of caution for all gases and liquids
that oxidize. Though this reaction does not cause explosions it is capable of
loosing its nature and transforming to another undesired substance.
Gas Cylinder - a pictogram of gas cylinder indicates that the consignment
has liquified gases, compressed gas or dissolved gases.
Exploding Bomb –an explosive hazard symbol indicates an explosion where
the substance contained may react on its own and may cause a noticeable
increase in air pressure.
Environmental hazard -a dead fish in the pictogram indicates that the
substance is hazardous to aquatic life and should not be let into lakes, rivers
etc. Moreover, it indicates that there is a possibility of the ecosystem being
damaged for years.
Corrosion - a clear indication in the picture that the substance contained is
capable of corroding metals and skin.
The Importance of Personal Protective Equipment ( PPE)
Personal Protective Equipment (PPE) is clothing or equipment
designed to protect workers from physical hazards when on a worksite. PPE
should only be considered as a last line of defense between a hazard and the
worker. Attempts to control workplace risks and hazards should always be
addressed first. Making the workplace safe includes providing instructions,
procedures, training and supervision to encourage people to work safely and
responsibly. Safety is a major issue for day laborers and skilled laborers.
Commonly in a year accidents happen frequently in the construction industry
and often times it is due to the absence of Personal Protective Equipment
(PPE) or failure to wear the provided PPE.
26. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 26
K-12 Creative Technology
PPE includes items such as protective helmets, eye protection, high-
visibility clothing, safety footwear, safety harnesses and, sometimes,
respiratory protective equipment.
1. Head Protection
Hard hats are common on construction sites. They are designed
to protect against flying or falling objects that would otherwise impact or
penetrate the worker. Some hard hats are equipped with accessories such as
face shields and earmuffs. Hard hats should be well-fitted; those that are too
large or too small are inappropriate for use.
2. Eye and Face Protection
They are equally as important as head protection. Safety
goggles, spectacles and full face shields can give you the protection needed
for the eyes and face. Metal work, wood-work, hot-work and air-tool
operations all require this type of protection.
3. Respiratory protection
Respiratory protection is vital on sites where toxic substances
are present. Respiratory protections like respirators are designed to protect
you from dust, fumes, paint spray, pesticides and other dangerous
substances that could cause permanent impairment.
4. Hand & Skin protection
Occupational skin diseases such as contact dermatitis, skin
cancers, and other skin injuries and infections are the second most common
type of occupational disease and can be very costly. Gloves commonly used
as PPE include rubber gloves, cut-resistant gloves, chainsaw gloves and
heat-resistant gloves. Using gloves helps to avoid hazards usually involved
when working with chemicals, glass, sheet metal, electricity, hot materials or
slippery objects.
5. Hearing protection
Industrial noise is often discounted as an occupational hazard
since it isn’t visible to the eye. Earplugs and earmuffs are common hearing
protection tools. It is important to note that earmuffs are more effective in
reducing high-frequency noise while earplugs are more effective for reducing
low-frequency noise.
6. Body Protection
PPE includes safety vests and suits and should be used for tasks
that can cause body injuries from extreme temperatures, flames and sparks,
toxic chemicals, insect bites and radiation. Ensure that they are clean and
free from cuts and burns. Always get a good fit to ensure full body protection.
7. Fall Protection
PPE includes safety harnesses and lanyards and should be
strictly used for task that can cause falling from heights and serious injury or
death. When inspecting equipment, ensure that the straps are free from
tears, deformities and burn marks and buckles are connected securely and
tightly. It is very important to dispose them if used after a falling incident.
27. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 27
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.3
Directions: Examine and identify the different signs and symbols for safety
presented below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
28. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 28
K-12 Creative Technology
B. Supply the missing data needed to complete the statement.
( Note: write your answer on the assign bullet)
Category Colour Information/Instruction Features Example
Prohibition
Warning
Emergency
Refer to the Answer Key. What is your score?
29. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 29
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
Activity 1.3
Applying OH&S Policies
1. Group yourselves into six members.
2. Conduct a simulation on: “Applying OHS Policies and Procedures”.
3. The performance will be rated according to the following:
Find out by accomplishing the Scoring Rubric honestly and sincerely.
Remember it is your learning at stake!
Performance Criteria:
Have shown
five OHS
policies in
different
areas
Have shown
four OHS
policies in
different
areas
Have shown
three OH&S
policies in
different
areas
Have shown
two OH&S
policies in
different
areas
Have not
shown any
OH&S
policies
50 40 30 20 10
Find out by accomplishing the Scoring Rubric honestly and sincerely,
remember it is your learning stake!
30. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 30
K-12 Creative Technology
LEARNING OUTCOME 1.4
Do a survey on the various safety regulations and contingency
measures observed by schools, LGUs, and other offices in the locality.
PERFORMANCE STANDARDS
The Learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
Materials
1. Workshop
2. Tables and Chairs
3. Computers
4. USB Flash Drive
5. Drawing materials
6. Application software
31. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 31
K-12 Creative Technology
What Do You Need to Know?
Read information Sheet 1.4 very well then find out how much you can
remember and how much you learned by doing Self-check 1.4
Information Sheet 1.4
The fear of stampede is one of the problem that the school faces
especially when students goes in and out of the school campus and when
natural disaster strikes e.g. typhoons, heavy rains, earthquakes, etc.
Stampedes usually happen when the enormous crowd movements are
disrupted, and the situation gets worse when crowd anxiety rises. It is already
an initiative of a person to run to save his/her own life.
Babag National High School is a public secondary institution located at
Babag I, Lapu-Lapu City. It is the only secondary school in the said barangay
that accommodates its own students and the students from the neighboring
barangays and municipality. The school is situated at the back of a
commercial building and Babag Elementary School. A narrow pathway with
an estimated width of 4 meters serves as the main entrance and exit for both
people and vehicles. The main entrance and exit are located near the
National Highway where in most of the vehicles pass by going either to
Cordova or Lapu-Lapu City. Since the population of Babag National High
School has increased, there is already a big probability that stampede may
occur especially during emergencies and evacuation considering the
insufficient size of entrance and exit gates.
One main aim of having this contingency plan is to prepared for the
worst case scenario especially in the midst of stampede. Recently, the school
is already implementing measures in controlling the traffic of going in and
outside the school campus.
As of the moment, the school has already established a SDRRM team,
with their respective positions, who will respond in an event of a disaster in
the school. Various school organizations such as Red Cross Youth (RCY),
Boy Scouts of the Philippines (BSP), Girl Scouts of the Philippines (GSP) and
Junior Emergency Response Team (JERT) were already trained and
equipped with knowledge and skills to respond in the event of disaster. The
school has also linked with the Local Government Unit (LGUs) like the local
Barangay Disaster Risk Reduction Management Council (BDRRMC), Bureau
of Fire Protection (BFP), Philippine National Police (PNP), Philippine Red
Cross etc. to aid the needs of the school during and after the disaster.
32. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 32
K-12 Creative Technology
HAZARD
The School DRRM Team has identified several hazards and ranked them
based on their severity and probability to happen.
HAZARDS
PROBABILITY IMPACT AVERAGE
P +
I
2
R
A
N
K
RATE REMARKS RATE REMARKS
FIRE 3 3 3
EARTHQUAKE 4 4 4 2
STAMPEDE 4 5 4.5 1
FOOD
POISONING
5 1 3
ARMED
CONFLICT
2 2 2
GANG AND
YOUTH
VIOLENCE
3 5 4 3
Hazard Identification
With the hazards identified, it was found out that stampede is the top
most human induced hazard in the school especially when man made or
natural disasters happen. This contingency plan is made to consider the
actions to be taken when stampede occurs.
Contingency plan for stampede aims to prepare an organization to
respond well to an emergency and its potential humanitarian impact. These
encompasses making decisions in advance about the management of human
and financial resources, coordination and communication procedures, and
being aware of a range of technical and logistical responses.
33. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 33
K-12 Creative Technology
HAZARD TO PLAN FOR: STAMPEDE
Based on the assessment made by the SDRRM Members, stampede
requires contingency planning to ensure preparedness for effective response
to lessen possible casualties, protect lives and loss of properties.
The early warning signs that the school has already established
includes the alarm bell, and the noise created by the people like shouting,
running, etc. The triggering factor of this hazard is the occurrence of natural
and man-made disaster. People will be at the state of fear when they feel that
they are unsafe to a specific place.
Furthermore, to somehow control the traffic management of the school,
the presence of guards in the entry and exit points is an advantage. To
constantly remind the students on what to do before, during and after a
disaster, the Junior Emergency Response Team (JERT) conducts continuous
room to room update. The presence of Student Body Organizations which
includes the Boy Scouts of the Philippines (BSP), Girl Scouts of the
Philippines (GSP), Rover Scouts, Supreme Student Government (SSG), Red
Cross Youth (RCY) and Junior Emergency Response Team (JERT) will help
manage the traffic and response to those who are at risk. The creation of the
SDRRM Team is an advantage in mitigating, controlling and managing the
situation. To simulate the evacuation in the event of the disaster, the school
conducts quarterly drills. Students will be exposed to evacuate the school in
actual scenario.
To guide the SDRRM Team, responders and volunteers contemplate
on the exact impact of threat that a stampede may bring, a scenario is
developed thinking through the possible impacts. On the basis of sensible
scenario, it is possible to set out the scale of the impact, the response and the
resources needed. The following question will guide the SDRRM Team and
responders in crafting the Contingency Plan in a systematic way: What is
going to happen? What are we going to do about it? What can we do
ahead of time to get prepared?
35. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 35
K-12 Creative Technology
PREPAREDNESS MEASURES
Key Areas for Preparedness Gaps
Action To Be Taken/ Preparedness
Measures
Risk Understanding
Lack of knowledge about stampede;
Insufficient information about the hazard
and risk in the school campus; and
Inability to identify possible areas to be
utilized during evacuation phase.
Conduct room to room information
drive about stampede.
Inform the learners, teachers and
stakeholders the identified risks and
hazards of the school to address the
problems.
Involve the learners, teachers and
school head in the planning on what to
do before, during and after the
occurence of stampede.
Contingency Plan and Dissemination
Lack of knowledge about Contigency plan
for stampede.
No IEC materials for stampede
Coordinate with authorities to gain
knowledge about stampede and its
mitigating measures.
Produce school-based IEC materials
for stampede and disseminate it to the
learners.
Communication
Lack of knowledge about the early
warning signs for stampede.
Lack of equipment that can be utilized
during emergencies.
Conduct information drive to the
learners and teachers about what the
early warning signs for stampede.
Provisions of the needed equipment
during emergencies.
36. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 36
K-12 Creative Technology
Coordination
Lack of coordination with the government
agencies and private sectors about the
response and recovery.
Lack of partnerships and linkage to tap to
during emergencies.
Coordinate with the local BDRRMO,
City DRRMO, LGUs and private
sectors.
Establish external partnerships and
linkages with LGUs and Private
sectors.
Monitoring
Lack of action and monitoring to the
identified hazard and risk in the school.
Lack of awareness about RADAR
Constant monitoring of the hazards
and risks identified.
Attend seminar regarding RDAR
Convergence
Lack of coordination with the school
offices on what to do in the event of
stampede.
Some of the appointed SDRRM team
don’t know their respective functions.
Lack of idea about Incident Command
System (ICS)
Conduct orientation on the
contingency plan for stampede to the
teachers and their respective roles and
functions.
Introduction on how the ICS works.
Support for Learning Continuity
Insufficient areas in the school to be
utilized as Temporary Learning Space
(TLS).
No organization of where the learning
materials will be kept when disaster
strikes.
No source/funding for basic provisions in
the event of stampede.
Identified specific areas inside/outside
the school which can be utilized as
TLS together with the local DRRM and
the barangay.
Orientation with the teachers on how
to secure the learning materials in the
event of disaster.
Tap external sources to help/ support
the school in the providing basic needs
to the IDPs in the event of stampede.
Support for schools used as an
Evacuation Centers
The school and the LGU has no written
agreement on the use of school as an
evacuation.
Unavailability of the use of School funds
to repair facilities and properties.
Coordinate with the LGU to let them
have an idea on the utilization of
school as an evacuation center.
Make a plan to target the need to
repair first school facilities.
Drills
Lack of participation and cooperation
during the conduct of the drills.
Lack of coordination with the Local
Government Unit in the conduct of the
drills.
Constant room to room campaign on
the things to do before, during and
after stampede.
Coordinate with the LGU to take part
and evaluate the drill.
38. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 38
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.4
Directions: On the box below, make a paragraph explaining the
importance of identifying hazards in school and the possible safety
measures implemented. For the paragraph’s introduction, justify and
narrate school’s location.
Note: Answers vary so long that they explain their ideas/concept comprehensively
_____ _____________________________________
________________________________________________
_______________________________________________
_______________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
39. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 39
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
MINI SURVEY
Directions: Conduct a mini survey in your house. Gather the necessary data
which discuss the importance of safety measures and creating a contingency
plan after the hazards identified. Your output will be rated according to the
rubrics below.
Rubrics for your performance Task
Contents Excellent
(5)
Good
(3)
Poor
(1)
Spelling Almost all
words spelled
correctly
Content All
information is
factual and
answered to
the queries
Punctuation Correct
ending
punctuation
in every
sentence but
one.
Grammar Simple
sentences
are
grammatically
correct.
Handwriting Legible.
Good
spacing and
alignment.
Total Points
40. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 40
K-12 Creative Technology
LEARNING OUTCOME 1.5
Use numerous dynamic computer applications and interactive
designs in the observance of OHS Procedural Plan to avoid hazards
and risks
PERFORMANCE STANDARDS
The learner independently performs an Operational Health & Safety
Procedural Plan using various Dynamic Computer Applications and
Interactive Designs
Materials
1. Workshop
2. Tables and Chairs
3. Computers
4. USB Flash Drive
5. Drawing materials
6. Application software
41. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 41
K-12 Creative Technology
What Do You Need to Know?
Read information Sheet 1.5 very well then find out how much you can
remember and how much you learned by doing Self-check 1.5
Information Sheet 1.5
DESKTOP PUBLISHING AND THE MS PUBLISHER SOFTWARE
Desktop Publishing is the process of using the computer and specific types of
software to combine text and graphics to produce documents such as
newsletters, brochures, books, Web pages and many other printed
documents.
Things to Do with Desktop Publishing
Desktop publishing is or can be:
designing print communications such as brochures, flyers, ads and
posters
designing print communications such as catalogues, directories and
annual reports designing logos, business cards, and letterhead
designing and publishing newsletters, magazines, and newspapers
designing books and booklets
converting print communications to formats including Web and smart
devices such as tablets and phones
creating resumes and business forms (including invoices, inventory
sheets, memos and labels)
self-publishing (books, newsletters, ebooks, etc.)
designing and publishing blogs and Web sites
designing slide shows, presentations and printing handouts
creating and printing greeting cards, banners, postcards, candy
wrappers, and iron-on transfers
making digital scrapbooks and print or digital photo albums
creating decorative labels, envelopes, trading cards, calendars, and
charts
designing packaging for retail merchandise from wrappers for bars of
soap to software boxes
designing store signs, highway signs and billboards
taking work designed by others and putting into the correct format for
digital or offset printing or for publishing online
42. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 42
K-12 Creative Technology
Steps and procedures when using Desktop Publishing Software
Step 1 applies to anyone who is new to using page layout programs. Steps 2
and 8 apply to everyone. Pick and choose from among steps 3 to7 to find the
learning techniques that work for you.
1. Have a plan, make a sketch
2. Choose a template
3. Up your document
4. Place text in your document
5. Format your text
6. Place graphics in your document
7. Tweak your graphics placement
8. Apply the rules of desktop publishing
9. Print a draft and proofread it
10. Print your project
WORKING WITH MS PUBLISHER
Opening MS Publisher may vary
depending on the computer you
are working on.
1. Click on the Start
button, select All
Programs menu »
Microsoft Office »
Microsoft Office
Publisher.
You will see an
icon on your
desktop that looks similar to this. Double click on this icon to
open MS Publisher.
43. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 43
K-12 Creative Technology
2. Publisher start up in the Getting Started with the Microsoft
Office Publisher window offering many pre-formatted designs to
use in creating your publication.
Basic Parts and Functions of MS Publisher
The illustration below consists of the important tool bars in working with MS
Publisher.
The Quick Access Toolbar lets you access common commands, no matter
which tab you are using in the Ribbon. By default, it shows the Save, Undo,
and Redo commands.
The Page Navigation pane allows you to view and work with the pages in
your publication. You can add, delete, rearrange, and duplicate pages in the
Page Navigation pane. You can also organize your pages into Sections.
The Ribbon contains multiple tabs, each with several groups of commands.
Some tabs, like "Text Box Tools" or "Picture Tools," may appear only when
you are working with certain items like text boxes or images.
44. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 44
K-12 Creative Technology
Guides are thin lines that help you align various objects.
The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
WORKING WITH TEXT
Text Basics
In order to use MS Publisher, you must have the knowledge in using the
Microsoft Word application.
Text Basics - Reviews basic topics like inserting, deleting, copying, and
moving text
Formatting Text - Includes text formatting tasks like changing font style,
size, and color
Checking Spelling and Grammar - Presents tools you can use to
proofread your text
Working with Lists - Guides you through creating and formatting lists
Line and Paragraph Spacing - Explains how to adjust spacing
WORKING WITH TEXT BOXES
Insert a Text Box:
1. On the Ribbon, select the Insert tab and locate the Text group.
2. Click the Draw Text Box command.
3. The cursor will turn into a crosshairs +. Click anywhere on your publication
and drag your mouse to create the text box.
4. You can now start typing inside the text box
WRAPPING TEXT AROUND THE OBJECT
1. Select the object, then click the Format tab that appears on the Ribbon.
2. Locate the Arrange group and click the Wrap Text drop-down command.
3. Select the desired wrap option. The text will adjust based on the option you
have selected.
4. If necessary, reposition the object and adjust the image until the text wraps
correctly
If you can’t get your text to wrap the way you wish, click the Wrap Text
command and select More Layout Options from the menu. You can make
more precise changes in the Advanced Layout dialog box that appears.
45. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 45
K-12 Creative Technology
CONNECTING TEXT BOXES
Connect to a New Text Box
1. Select your text box
2. Click the Text Box Tools Format tab and locate the Linking group.
3. Click the Create Link command.
4.The Link icon will appear in place of your cursor. Click the spot on your
publication where you would like to add the linked text box.
5.Continue typing your text. Any text that overflows from the original text box
will now appear in the connected box.
WORKING SHAPES AND OBJECTS
To Insert a Shape:
1. Select the Insert tab and locate the Illustrations group
2. Click the Shapes drop-down command
Arranging Objects
To Align Two or More Objects:
1. Click and drag your mouse to form a selection box around the objects you
want to align. All of the objects will now have sizing handles to show that they
are selected.
2. Click the Format tab and locate the Arrange group.
3. Click the Align drop-down command.
4. Select one of the six alignment options.
5. The objects will align to each other based on the option that you have
selected.
To Align Objects to the Page
1. Select the object or objects you want to align.
2. Click the Format tab and locate the Arrange group.
3. Click the Align drop-down command.
46. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 46
K-12 Creative Technology
4. Select one of the six alignment options. The objects will align to the page
based on the option that you have selected
WORKING WITH PICTURES
To Insert a Picture from a File:
1. Select the Insert tab and locate the Illustrations group.
2. Click the Picture command.
The Insert Picture dialog box will appear. Locate and select the picture you
would like to insert, then, click Insert.
To Insert Clip Art
1. Select the Insert tab and locate the Illustrations group.
2. Click the Clip Art command.
3. The Clip Art pane will appear on the right. Use the search tools to
search for a suitable image.
Enter keywords in the Search for: fields that are related
to the image you wish to find.
47. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 47
K-12 Creative Technology
Click the drop-down arrow in the Results should be: field,
then, deselect any types of media you do not wish to
see.
4. Click Go to begin your search.
5. Publisher will display pictures that meet your search terms. When you
have found a picture you wish to use, click it.
Saving a File
Save as is used to save a file for the first time or to save it with a different
name or to a different location.
1. Click File.
2. Chose Save As.
3. In the File Name text box, type in the desired filename.
4.Press Enter or click Save.
Print your publication
1. Click the File button to open the Backstage view.
2. Click Print to open the print settings page.
3. In the Print section, set the number of copies to print in Copies of print job.
4. In the Printer section, make sure that the correct printer is selected.
5. In the Settings section:
a. Make sure that the correct set of pages or sections is selected.
b. Select the format for imposing your pages on the sheet.
c. Set the paper size.
d. Set whether to print on one side of the sheet of paper or both, and
when printing on both sides whether to flip the sheet of paper on the
long or short side.
e. If your printer is capable of color printing, choose if you want to print
color or grayscale.
6. Click the Print button to send the publication to your printer.
48. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 48
K-12 Creative Technology
How Much Have You Learned?
Self-Check 1.5
A. Directions: On the box below, make a paragraph explaining the
things you can do with MS Publisher Software.
Note: Answers vary so long that they explain their ideas/concept comprehensively
_____ _____________________________________
________________________________________________
_______________________________________________
_______________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
B. Enumerate the basic parts of MS Publisher and write their functions
Refer to the Answer Key. What is your score?
49. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 49
K-12 Creative Technology
How Do You Apply What You Have Learned?
It is not enough that you learned. Be sure that you are also being able to
demonstrate skills.
Directions: Make a brochure on OHS Procedural Plan of your school to
show case the Desktop Publishing skills you have learned from this lesson.
Make sure that your publication will be able to convey the steps and its
importance to avoid hazards and risks. Present it in print and non- print.
Rubrics for your performance Task
50. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 50
K-12 Creative Technology
Post-Test
A. Directions: Match column A with column B in order to identify the term
/ word being described.
B. Direction: Read carefully each statement below. Place T on the line if
the statement is TRUE. Write the correct word/s if the statement is
FALSE.
______1. Spotting the hazards means working out how likely it is that a
hazard will harm someone and how serious the harm could be.
______2. Risk is part of the process used to evaluate if any particular
situation, item, thing, etc. may have the potential to cause harm.
_______3. Chemical hazards are hazards that create unsafe working
conditions.
______4. Harm is a physical injury or damage to health.
______5. Inkjet printer cartridges, or laser printer toner cartridges are
hazardous to users.
C. Identify what hazard is being illustrated in the situation below .
________________1. Exposed wires or a damaged carpet.
________________2. Poor posture and manual handling
________________3. Bodily fluids and harmful plants.
________________4. Radiation and pressure.
________________5. Stress and workplace violence.
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
6. software designed to detect,
disable and remove viruses
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
k. WEP
l. Worm
51. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 51
K-12 Creative Technology
D. Examine and identify the different signs and symbols for safety presented
below and write your answer on the blank provided for.
Source: Warning Sign. Martin Diebel Source: has.ie
1._______________________ 2. ___________________
Source: 123rf.com Source: dreamstine.com
3.__________________________ 4.________________________
Source: favpng.com
5.____________________________
E. Enumerate the basic parts of MS Publisher and write their functions
52. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 52
K-12 Creative Technology
REFERENCES
LESSON 4
Web
https://www.osha.gov/sites/default/files/2018-12/fy11_sh-22300-
11_AwarenessLevelTeacherManual.pdf
https://www.ccohs.ca/oshanswers/hsprograms/hazard_identification.
html
https://ehs.princeton.edu/news/know-your-hazard-symbols-
pictogramshttps://ehs.princeton.edu/news/know-your-hazard-
symbols-pictograms
https://www.slideshare.net/safereps/workplace-hazards-26555990
https://www.hiclipart.com/free-transparent-background-png-
clipart-puwtp
https://www.dcmgroup.ca/en/news/safety-symbols-and-their-
meanings-2/
https://www.pure-chemical.com/blog/hazard-symbols/
https://safetyculture.com/topics/ppe-safety/
http://www.oshc.dole.gov.ph/transparency?id=36
http://bwc.dole.gov.ph/index.php/forms?layout=edit&id=53
https://www.hse.gov.uk/toolbox/ppe.htm
https://www.inc.com/encyclopedia/computers-and-computer-
systems.html
https://en.wikibooks.org/wiki/A-
level_Computing/CIE/Computer_systems,_communications_and_software
/Components_of_a_computer_system_and_modes_of_use/Types_of_hardwa
re
http://www.depedbataan.com/resources/9/k_to_12_entrep-
based_desktop_publishing_learning_module.pdf
ecomputernotes.com › fundamental › what-is-computer
Book
Jemma Development Group: Empowement Tecnology 2017
Padasas,Penaflor,Castro,Paquingan, de Ramos, Espiritu, Ph.D:
Operating System and Office Applications 2nd
Edition.
New perspectives on computer concepts 2011, Parson, June Jamrich
Computer concepts: Illustrated.7th ed., Parson, June Jamrich, Dan Oja
Computer appliications in education 2012, ahmad jasim
53. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 53
K-12 Creative Technology
ANSWER KEYS
Pre-Test and Post - Test
A.
1. A
2.E
3.C
4.L
5.G
6.B
B.
1. T
2. Hazard Identification
3. Safety Hazard
4.T
5. T
C.
1. Safety hazard
2. Ergonomic hazard
3. Biological hazard
4. Physical hazard
5. Psychological hazard
D.
1. Acute toxic
2. Health hazard
3. Flammable
4. Environmental hazard
5. Corrosion
54. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 54
K-12 Creative Technology
E.
1. The Quick Access Toolbar lets you access common commands, no matter
which tab you are using in the Ribbon. By default, it shows the Save, Undo, and
Redo commands.
2. The Page Navigation pane allows you to view and work with the pages in your
publication. You can add, delete, rearrange, and duplicate pages in the Page
Navigation pane. You can also organize your pages into Sections.
3. The Ribbon contains multiple tabs, each with several groups of commands. Some
tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working
with certain items like text boxes or images.
4. Guides are thin lines that help you align various objects.
5. The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
LO 1.1 Unlock different occupational health and safety procedures for
literacy and awareness using various dynamic computer
applications
Self-check 1.1
A.
1. A
2.E
3.C
4.L
5.G
6.B
LO 1.2 Enumerate the different hazards and risks that may occur in
workstations and places through skit
Self-check 1.2
A.
1. T
2. Hazard Identification
3. Safety Hazard
4.T
5. T
55. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 55
K-12 Creative Technology
B.
1. Safety hazard
2. Ergonomic hazard
3. Biological hazard
4. Physical hazard
5. Psychological hazard
C.
1. Physical Hazards
2. Mechanical Hazards
3. Electric Shock Hazard
4. Posture-related injuries from computer use
5. Computer-related overuse injuries of the hand or arm
6. Eyestrain from computer use
LO 1.3 Decode the meanings conveyed by the different hazards and
risks warning symbols and importance of Personal Protective
Equipment ( PPE)
Self-check 1.3
A.
1. Acute toxic
2. Health hazard
3. Flammable
4. Environmental hazard
5. Corrosion
56. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 56
K-12 Creative Technology
B.
Category Colour Information/Instructio
n
Features Example
Prohibition red dangerous round
shape
do not touch
Warning yellow be careful triangular
/square
shape
Electric shock
Emergency green door Rectangular
shape
Emergency
exit/ escape
LO 1.4 Do a survey on the various safety regulations and contingency
measures observed by schools, LGUs, and other offices in the locality
Self-check 1.4
Essay: Make a paragraph explaining the importance of identifying hazards in
school and the possible safety measures implemented.
LO 1.5 Use numerous dynamic computer applications and interactive
designs in the observance of OHS Procedural Plan to avoid hazards and
risks
Self-check 1.5
A. Essay: Make a paragraph explaining the things you can do with MS
Publisher Software
57. DYNAMIC COMPUTER APPLICATIONS & INTERACTIVE GRAPHICS Page 57
K-12 Creative Technology
B.
1. The Quick Access Toolbar lets you access common commands, no matter which
tab you are using in the Ribbon. By default, it shows the Save, Undo, and Redo
commands.
2. The Page Navigation pane allows you to view and work with the pages in your
publication. You can add, delete, rearrange, and duplicate pages in the Page
Navigation pane. You can also organize your pages into Sections.
3. The Ribbon contains multiple tabs, each with several groups of commands. Some
tabs, like "Text Box Tools" or "Picture Tools," may appear only when you are working
with certain items like text boxes or images.
4. Guides are thin lines that help you align various objects.
5. The right task pane shows a larger thumbnail of the selected design and any
available settings which can be changed.
Cogratulations! You did a great job!
You did a great job! Rest and relax a while then move on to the next
lesson. Good luck!