SlideShare a Scribd company logo
1 of 42
FOUNDATION OF PRETECHNICAL
STUDIES.
Introduction to Pretechnical studies
INTRODUCTION TO PRETECHNICAL STUDIES
•Pretechnical studies is a series of learning areas
written to provide practical experiences that
support the acquisition of skills in technical areas
derived from computer science and business
studies.
COMPONENTS OF PRETECHNICAL STUDIES
• Pretechnical studies is a technical learning area comprising of:
• Pretechnical studies – a learning area that involves acquiring practical
skills and experience in technical area.
• Computer science the study of computers and how computer
technology can be used to solve problems.
• Business study-involves study of activities that involves production,
distribution and consumption of goods and services aimed at making
profits.
THE ROLE OF PRETECHNICAL STUDIES IN DAY
TODAY LIFE
• It gives learners the skills they need to think critically and solve problems as
well as
preparing them for a technical & digital future.
• Facilitates development of appropriate skills and knowledge gained from the
learning areas such as computer science and business studies.
• Offers a wide range of careers in Pretechnical area such as in safety and
material handling,
in computer science such as programmers, software engineering and in business
studies such as accountant, traders, manager, bankers and shopkeeper.
THE ROLE OF PRETECHNICAL STUDIES IN DAY
TODAY LIFE
• Pretechnical studies promotes independence and self-
learning through various skills enhancing chances of
creating employment opportunities and self-
employment in individual.
• It equips learners with skills to use when observing
personal safety and safety in working environment.
SAFETY IN THE WORK ENVIRONMENT
•What is safety?
•Safety is a situation where one avoids
causing harm, discomfort or sickness to self
and to others when carrying out the daily
activities
EXAMPLES OF SAFETY MEASURES INCLUDE:
• Wearing face mask to prevent spreading of airborne diseases or
breathing in dirty air.
• Buckling a safety belt while in a vehicle to avoid falling off the seat
in case of emergency brakes.
• Wearing hand gloves when working to avoid injury and dirt to the
hands when working.
• Wearing gum boots to protect the feet from injury when working
in areas with mud or sharp objects.
• Wearing an overall to guard against soiling clothes.
POTENTIAL SAFETY THREATS IN A WORK
ENVIRONMENT.
Potential safety threats in work environment can
either be physical or online.
Physical threats at workplaces.
Physical safety threats include:
Sharp edged tools and objects that can easily cut
or poke someone.
POTENTIAL SAFETY THREATS IN A WORK
ENVIRONMENT
Disarranged rooms where one can easily tumble and fall.
Naked electric wires that can easily cause electric shock.
Poorly lit rooms where one can easily know oneself against objects.
Poorly stored items on the shelves where they can easily fall off and
hit someone.
Working without protective gear where one can easily be hurt or
injured.
Rooms with wet slippery floors where one can easily slip and fall.
ONLINE THREATS AT A WORKPLACE.
•Every online user should ensure they stay safe
online by protecting themselves and others
from online threats.
• Examples of online threats at work place
include:
• Malware/virus attack.
• Hacking.
ONLINE THREATS AT A WORKPLACE
Data theft.
Cyberbullying.
Friend requests from unknown people.
Phishing attacks.
Ransomware-attempts to encrypt data and calling for
ransom to release it or unlock code
ONLINE SAFETY RULES AND REGULATIONS IN
THE WORK ENVIRONMENT.
•Online safety is keeping safe from possible threats
that a computer user may experience while engaging
in activities through the internet.
• It includes:
• Protecting and managing personal information.
• Avoiding harmful or illegal content
ONLINE SAFETY RULES AND REGULATIONS IN THE
WORK ENVIRONMENT.
• To avoid online fraud, always buy online items from secure and trusted sites.
Also, watch out for scams that come in form of messages and emails.
• Do not accept friend requests from strangers. Some strangers are hackers
who might access your personal information and even take over your
accounts.
• Phishing is an online fraud system used to steal private data such as login
usernames and passwords.
• Use strong passwords that cannot be crashed easily in case your password is
compromised. Consider changing it right away.
• Always back up your data and keep your computer security updated.
PHYSICAL THREATS TO DIGITAL DEVICES
Physical threats to a computer include:
Fluids such as water, milk and juice that can damage different parts
of the devices.
Theft.
Damage caused by natural disasters, fire and impact of falls.
Corrosion caused by excessive humidity and dampness.
Exposed cables in the computer room.
Hardware failure
WAYS OF MITIGATING/REDUCING PHYSICAL
THREATS TO DIGITAL DEVICES
•To prevent physical threats, the following should be done.
• Do not carry water into the computer room or near the
computer.
• Do not use old and loose power extension cables in a
computer room. They produce sparks that can cause fire in
the computer room.
• Replace loose power extension cables because they may
lead to unstable power supply.
WAYS OF MITIGATING/REDUCING PHYSICAL
THREATS TO DIGITAL DEVICES
Use voltage controllers to curb unstable power supply in the computer
room.
Equip computer rooms with fire extinguishers that do not use water,
the computer room can be fit with automatic fire detectors that will
detect fire or smoke and alert the personnel in charge for quick action.
Tuck computer cables in trunks or carefully lay them down under the
desks in order to prevent falls in the computer room.
Place computers on strong furniture to prevent them from falling.
WAYS OF MITIGATING/REDUCING PHYSICAL
THREATS TO DIGITAL DEVICES
• Restrict access to computer rooms.
• Secure the computer room with strong windows and doors to
control theft of computers. To increase the security level, you can
install CCTV cameras and also employ security personnel.
• Use computer cable locks to control theft in the computer room.
• Use dehumidifiers to control excess humidity and dampness.
• Ensure there is enough ventilation or free circulation of air in the
computer room.
•Fit window curtains and air conditioners in the computer
room to control and filter dust particles from entering the
room.
•Cover computers with dust covers when they are not in use
IDEAS AND PRACTICES ON HOW TO PERSONAL AND
SENSITIVE DATA FROM THE PUBLIC WHEN ONLINE
To keep personal and sensitive data from the public when
online, the following can be done:
Protect and manage personal information.
Do not accept friend requests from strangers.
Avoiding harmful or illegal content.
Buy online items from secure and trusted sites.
Installation of antivirus software
IDEAS AND PRACTICES ON HOW TO PERSONAL AND
SENSITIVE DATA FROM THE PUBLIC WHEN ONLINE
Backing up data.
Use of strong passwords.
Log out from your online accounts after using public
internet to browse.
Do not communicate with strangers online
SAFETY RULES AND REGULATIONS AT
WORK
Safety rules and regulations exist in all workplaces. They are principles that
govern the
actions and procedures to keep the works property and the environment safe.
Some of the general safety rules and regulations include:
To ensure that you know how to safely perform the task.
To ensure you know the hazards of the task and how to protect yourself.
To wear the required personal protective equipment necessary for the task.
To always work clear of suspended loads.
SAFETY RULES AND REGULATIONS AT
WORK
To always keep your mind and eyes on the task at hand.
To obey all warning signs and barricades.
To inspect all tools and equipment to ensure they are not defective
before using them.
Do not perform a task under unsafe conditions and report any
unsafe tools, equipment or hazardous conditions.
All chemicals’ containers should be well labelled and covered.
Maintain good housekeeping at workplace all the time
COMPUTER CONCEPTS.
What is a computer?
A computer is an electronic device that process or converts data
into information.
A computer receives, stores, organizes and processes data into
information.
The word computer came from Latin word ‘computare’ which means
to calculate.
A computer uses programs that are sets of instructions which a
computer follows to perform tasks.
WHAT IS DATA?
Data refers to raw facts such as numbers, symbols, images and letters that are not
processed and have no meaning to the user
Data is plural while in singular it is datum.
Data is not meaningful to the user until it is processed.
• Examples of Data include:
• ✓ Texts.
• ✓ Images.
• ✓ Sound.
• ✓ Videos.
WHAT IS INFORMATION?
Information refers to processed data that is meaningful to the user.
Information is meaningful to the user.
List the examples of computers used today.
The following are examples of computers:
Notebook.
Desktop.
Laptop.
Tablets.
PDA (Personal Digital Assistant)
Electronic calculators.
ATM Machines.
Washing machines
LIST THE EXAMPLES OF COMPUTERS USED
TODAY
Microwaves.
Server.
IPad.
MacBook.
Smartphone.
Smart watch.
Workstations.
LIST THE EXAMPLES OF COMPUTERS USED
TODAY
•Microwaves.
• Server.
• IPad.
• MacBook.
• Smartphone.
• Smart watch.
• Workstations
CHARACTERISTICS OF COMPUTERS.
•Speed- computers perform tasks faster compared to
human beings.
• Accuracy- computers performs tasks without any
errors if the correct data is entered.
• Versatility –versatility is the ability of a computer to
perform different tasks. A computer can be applied in
education, agriculture, military and medical fields.
CHARACTERISTICS OF COMPUTERS.
•Reliability- Computers are reliable because they give
consistent output results for similar tasks.
• Diligence –a computer can perform millions of tasks
without getting tired. It does not get fatigue or loss
concentration like human beings.
• Storage - computers have storage facilities or memory for
storing data and information either temporarily or
permanently which can be retrieved to be used later.
CHARACTERISTICS OF COMPUTERS.
•Automation-a computer is an automatic machine.
It starts a task from beginning to end without
requiring human assistance.
• No logical decision-a computer cannot work on
its own without being instructed by a user hence it
is not intelligent enough on its own.
CLASSIFICATION OF COMPUTERS
Computers are classified according to some criteria.
We can classify computer by looking at the following:
Functionality.
Purpose.
Size.
Criteria used to classify computers
By functionality or data
handling
By size By purpose
Analogue computers Micro computers General purpose
computers
Digital computers Mini computers Special purpose
computers.
Hybrid computers Mainframe computers
Super computers
CLASSIFYING COMPUTERS ACCORDING TO
FUNCTIONALITY/DATA HANDLING
Computers are classified as analogue, digital or hybrid based on
functionality/data handling.
Data handling is the form in which data is represented in a computer.
▪ Analogue computers.
✓ They were the first computers to be developed and used in measuring
quantities
such as temperatures, pressure, car speed and voltage.
✓ They accepted data directly without converting it.
✓ Examples of analogue computers include: speedometer and mercury
thermometer
DIGITAL COMPUTERS
•They included modern computers like laptops, tablets,
desktops and smartphones.
• They are designed to perform calculations and logic
operations at high speed.
• They accept the raw data as input and process it with
programs stored in its
memory to produce the desired output
DIGITAL COMPUTERS
HYBRID COMPUTERS.
•They combined best features of the analogue
computers such as speed and those of the digital
computers such as internal memory.
•✓ They are used in specialized applications where both
analogue signals and convert them into digital form
before processing.
•✓ Examples of hybrid computers are fuel pump and
the analogue blood pressure monitoring device
HYBRID COMPUTERS
CLASSIFYING COMPUTERS ACCORDING TO
PURPOSE
1. General purpose computers
They are most common computers that can perform most common tasks
such as word
processing, calculations, draw, play music and send electronic mails.
General purpose computers are mostly used in schools, hotels, hospitals and
at homes.
2. Special purpose computers.
They are computers designed to carry out specific tasks only.
They are mainly used in manufacturing industries, traffic control systems,
weather
forecasting, robotic systems, satellites and ATM machines.
CLASSIFYING COMPUTERS ACCORDING TO
PURPOSE
SUPERCOMPUTER.
It is the biggest.
It is the most expensive.
It is the fastest and most powerful computer for big data processing.
It is able to process many instructions in a second.
It is mainly used in application requiring complex mathematical calculations
such as inflight simulation in aerospace, in weather forecasting and in satellite
launching
MAINFRAME COMPUTERS.
•They are the largest and most expensive after super
computers.
• They have a higher processing power which can handle
thousands of connected peripheral devices or users at the
same time.
• They store large amount of data, instructions and
information.
• Most government institutions use mainframe computers to
store data, calculate interest rates and customer balances.
MINI COMPUTERS.
• They are smaller, less powerful and less expensive than main
frame and super computers.
• They are more expensive and powerful than personal
computers.
• They provide a centralized location for data, information
and programs.
• They are also used to perform calculations and process
business transactions.
MICROCOMPUTERS.
•They are the least powerful, smallest and cheapest
computers.
• They are also called personal computers. They are called
microcomputers because their processing device is called a
microprocessor.
• They are designed to be used by one person at a time.
• They are used in offices, schools, businesses, media houses
or to keep records, prepare lesson plans and to browse

More Related Content

Similar to STRAND 1 Introduction to Pretechnical studies.pptx

Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanErick Solms
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devicesAbdulla Al Hosani
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 

Similar to STRAND 1 Introduction to Pretechnical studies.pptx (20)

CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4
 
Computer security
Computer securityComputer security
Computer security
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
impact.pptx
impact.pptximpact.pptx
impact.pptx
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Safety use of electronic devices
Safety use of electronic devicesSafety use of electronic devices
Safety use of electronic devices
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from kimdan468

SUB-STRAND 4.0 DATA HANDLING.pptx CBC FORE GRADE 4
SUB-STRAND 4.0  DATA HANDLING.pptx CBC FORE GRADE 4SUB-STRAND 4.0  DATA HANDLING.pptx CBC FORE GRADE 4
SUB-STRAND 4.0 DATA HANDLING.pptx CBC FORE GRADE 4kimdan468
 
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4 LEARNERS
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4  LEARNERSSTRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4  LEARNERS
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4 LEARNERSkimdan468
 
STRAND 1.0 NUMBERS.pptx cbc for grade 4,
STRAND 1.0 NUMBERS.pptx cbc for grade 4,STRAND 1.0 NUMBERS.pptx cbc for grade 4,
STRAND 1.0 NUMBERS.pptx cbc for grade 4,kimdan468
 
STRAND 5 DATA HANDLING AND PROBABILITY.pptx
STRAND 5  DATA HANDLING AND PROBABILITY.pptxSTRAND 5  DATA HANDLING AND PROBABILITY.pptx
STRAND 5 DATA HANDLING AND PROBABILITY.pptxkimdan468
 
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERS
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERSSTRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERS
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERSkimdan468
 
STRAND 1 NUMBERS.pptx GRADE 8 CBC FOR LEARNERS
STRAND 1   NUMBERS.pptx GRADE 8 CBC FOR LEARNERSSTRAND 1   NUMBERS.pptx GRADE 8 CBC FOR LEARNERS
STRAND 1 NUMBERS.pptx GRADE 8 CBC FOR LEARNERSkimdan468
 
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5kimdan468
 
STRAND 2 MIXTURES.pptx GRADE 5 CBC LEARNERS
STRAND 2   MIXTURES.pptx GRADE 5 CBC LEARNERSSTRAND 2   MIXTURES.pptx GRADE 5 CBC LEARNERS
STRAND 2 MIXTURES.pptx GRADE 5 CBC LEARNERSkimdan468
 
STRAND 1 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1  LIVING THINGS AND THEIR ENVIRONMENT.pptxSTRAND 1  LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1 LIVING THINGS AND THEIR ENVIRONMENT.pptxkimdan468
 
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERS
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERSSTRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERS
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERSkimdan468
 
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,kimdan468
 
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptxSTRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptxkimdan468
 
STRAND 5 PRODUCTION TECHNIQUES.pptx
STRAND 5 PRODUCTION      TECHNIQUES.pptxSTRAND 5 PRODUCTION      TECHNIQUES.pptx
STRAND 5 PRODUCTION TECHNIQUES.pptxkimdan468
 
STAND 4 Ways of maintaining good grooming as a daily.pptx
STAND 4 Ways of maintaining good grooming as a daily.pptxSTAND 4 Ways of maintaining good grooming as a daily.pptx
STAND 4 Ways of maintaining good grooming as a daily.pptxkimdan468
 
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERS
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERSSTRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERS
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERSkimdan468
 
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptx
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptxSTAND 2,,,,FOOD PRODUCTION PROCESSES.pptx
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptxkimdan468
 
STRAND 1,,,CONSERVATION OF RESOURCES.pptx
STRAND 1,,,CONSERVATION OF RESOURCES.pptxSTRAND 1,,,CONSERVATION OF RESOURCES.pptx
STRAND 1,,,CONSERVATION OF RESOURCES.pptxkimdan468
 
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptx
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptxSTRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptx
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptxkimdan468
 
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDS
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDSSTRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDS
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDSkimdan468
 
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learners
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learnersSTRAND 1.0 CREATING AND EXECUTION.pptx cbc for learners
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learnerskimdan468
 

More from kimdan468 (20)

SUB-STRAND 4.0 DATA HANDLING.pptx CBC FORE GRADE 4
SUB-STRAND 4.0  DATA HANDLING.pptx CBC FORE GRADE 4SUB-STRAND 4.0  DATA HANDLING.pptx CBC FORE GRADE 4
SUB-STRAND 4.0 DATA HANDLING.pptx CBC FORE GRADE 4
 
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4 LEARNERS
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4  LEARNERSSTRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4  LEARNERS
STRAND 3.0 GEOMETRY.pptx CBC FOR GRADE 4 LEARNERS
 
STRAND 1.0 NUMBERS.pptx cbc for grade 4,
STRAND 1.0 NUMBERS.pptx cbc for grade 4,STRAND 1.0 NUMBERS.pptx cbc for grade 4,
STRAND 1.0 NUMBERS.pptx cbc for grade 4,
 
STRAND 5 DATA HANDLING AND PROBABILITY.pptx
STRAND 5  DATA HANDLING AND PROBABILITY.pptxSTRAND 5  DATA HANDLING AND PROBABILITY.pptx
STRAND 5 DATA HANDLING AND PROBABILITY.pptx
 
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERS
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERSSTRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERS
STRAND 4.0 GEOMETRY.pptx GRADE 8 CBC LEARNERS
 
STRAND 1 NUMBERS.pptx GRADE 8 CBC FOR LEARNERS
STRAND 1   NUMBERS.pptx GRADE 8 CBC FOR LEARNERSSTRAND 1   NUMBERS.pptx GRADE 8 CBC FOR LEARNERS
STRAND 1 NUMBERS.pptx GRADE 8 CBC FOR LEARNERS
 
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR GRADE 5
 
STRAND 2 MIXTURES.pptx GRADE 5 CBC LEARNERS
STRAND 2   MIXTURES.pptx GRADE 5 CBC LEARNERSSTRAND 2   MIXTURES.pptx GRADE 5 CBC LEARNERS
STRAND 2 MIXTURES.pptx GRADE 5 CBC LEARNERS
 
STRAND 1 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1  LIVING THINGS AND THEIR ENVIRONMENT.pptxSTRAND 1  LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1 LIVING THINGS AND THEIR ENVIRONMENT.pptx
 
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERS
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERSSTRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERS
STRAND 3.0 FORCE AND ENERGY.pptx CBC FOR LEARNERS
 
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,
STRAND 2.pptx CBC FOR LEARNERS,,,,,,,,,,,
 
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptxSTRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptx
STRAND 1.0 LIVING THINGS AND THEIR ENVIRONMENT.pptx
 
STRAND 5 PRODUCTION TECHNIQUES.pptx
STRAND 5 PRODUCTION      TECHNIQUES.pptxSTRAND 5 PRODUCTION      TECHNIQUES.pptx
STRAND 5 PRODUCTION TECHNIQUES.pptx
 
STAND 4 Ways of maintaining good grooming as a daily.pptx
STAND 4 Ways of maintaining good grooming as a daily.pptxSTAND 4 Ways of maintaining good grooming as a daily.pptx
STAND 4 Ways of maintaining good grooming as a daily.pptx
 
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERS
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERSSTRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERS
STRAND 3 HYGIENE PRACTICES.pptx CBC FOR LEARNERS
 
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptx
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptxSTAND 2,,,,FOOD PRODUCTION PROCESSES.pptx
STAND 2,,,,FOOD PRODUCTION PROCESSES.pptx
 
STRAND 1,,,CONSERVATION OF RESOURCES.pptx
STRAND 1,,,CONSERVATION OF RESOURCES.pptxSTRAND 1,,,CONSERVATION OF RESOURCES.pptx
STRAND 1,,,CONSERVATION OF RESOURCES.pptx
 
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptx
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptxSTRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptx
STRAND 3.0 APPRECIATION IN CREATIVE ARTS.pptx
 
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDS
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDSSTRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDS
STRAND 2.0 PERFORMANCE AND DISPLAY.pptx CBC, FOR KIDS
 
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learners
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learnersSTRAND 1.0 CREATING AND EXECUTION.pptx cbc for learners
STRAND 1.0 CREATING AND EXECUTION.pptx cbc for learners
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

STRAND 1 Introduction to Pretechnical studies.pptx

  • 2. INTRODUCTION TO PRETECHNICAL STUDIES •Pretechnical studies is a series of learning areas written to provide practical experiences that support the acquisition of skills in technical areas derived from computer science and business studies.
  • 3. COMPONENTS OF PRETECHNICAL STUDIES • Pretechnical studies is a technical learning area comprising of: • Pretechnical studies – a learning area that involves acquiring practical skills and experience in technical area. • Computer science the study of computers and how computer technology can be used to solve problems. • Business study-involves study of activities that involves production, distribution and consumption of goods and services aimed at making profits.
  • 4. THE ROLE OF PRETECHNICAL STUDIES IN DAY TODAY LIFE • It gives learners the skills they need to think critically and solve problems as well as preparing them for a technical & digital future. • Facilitates development of appropriate skills and knowledge gained from the learning areas such as computer science and business studies. • Offers a wide range of careers in Pretechnical area such as in safety and material handling, in computer science such as programmers, software engineering and in business studies such as accountant, traders, manager, bankers and shopkeeper.
  • 5. THE ROLE OF PRETECHNICAL STUDIES IN DAY TODAY LIFE • Pretechnical studies promotes independence and self- learning through various skills enhancing chances of creating employment opportunities and self- employment in individual. • It equips learners with skills to use when observing personal safety and safety in working environment.
  • 6. SAFETY IN THE WORK ENVIRONMENT •What is safety? •Safety is a situation where one avoids causing harm, discomfort or sickness to self and to others when carrying out the daily activities
  • 7. EXAMPLES OF SAFETY MEASURES INCLUDE: • Wearing face mask to prevent spreading of airborne diseases or breathing in dirty air. • Buckling a safety belt while in a vehicle to avoid falling off the seat in case of emergency brakes. • Wearing hand gloves when working to avoid injury and dirt to the hands when working. • Wearing gum boots to protect the feet from injury when working in areas with mud or sharp objects. • Wearing an overall to guard against soiling clothes.
  • 8. POTENTIAL SAFETY THREATS IN A WORK ENVIRONMENT. Potential safety threats in work environment can either be physical or online. Physical threats at workplaces. Physical safety threats include: Sharp edged tools and objects that can easily cut or poke someone.
  • 9. POTENTIAL SAFETY THREATS IN A WORK ENVIRONMENT Disarranged rooms where one can easily tumble and fall. Naked electric wires that can easily cause electric shock. Poorly lit rooms where one can easily know oneself against objects. Poorly stored items on the shelves where they can easily fall off and hit someone. Working without protective gear where one can easily be hurt or injured. Rooms with wet slippery floors where one can easily slip and fall.
  • 10. ONLINE THREATS AT A WORKPLACE. •Every online user should ensure they stay safe online by protecting themselves and others from online threats. • Examples of online threats at work place include: • Malware/virus attack. • Hacking.
  • 11. ONLINE THREATS AT A WORKPLACE Data theft. Cyberbullying. Friend requests from unknown people. Phishing attacks. Ransomware-attempts to encrypt data and calling for ransom to release it or unlock code
  • 12. ONLINE SAFETY RULES AND REGULATIONS IN THE WORK ENVIRONMENT. •Online safety is keeping safe from possible threats that a computer user may experience while engaging in activities through the internet. • It includes: • Protecting and managing personal information. • Avoiding harmful or illegal content
  • 13. ONLINE SAFETY RULES AND REGULATIONS IN THE WORK ENVIRONMENT. • To avoid online fraud, always buy online items from secure and trusted sites. Also, watch out for scams that come in form of messages and emails. • Do not accept friend requests from strangers. Some strangers are hackers who might access your personal information and even take over your accounts. • Phishing is an online fraud system used to steal private data such as login usernames and passwords. • Use strong passwords that cannot be crashed easily in case your password is compromised. Consider changing it right away. • Always back up your data and keep your computer security updated.
  • 14. PHYSICAL THREATS TO DIGITAL DEVICES Physical threats to a computer include: Fluids such as water, milk and juice that can damage different parts of the devices. Theft. Damage caused by natural disasters, fire and impact of falls. Corrosion caused by excessive humidity and dampness. Exposed cables in the computer room. Hardware failure
  • 15. WAYS OF MITIGATING/REDUCING PHYSICAL THREATS TO DIGITAL DEVICES •To prevent physical threats, the following should be done. • Do not carry water into the computer room or near the computer. • Do not use old and loose power extension cables in a computer room. They produce sparks that can cause fire in the computer room. • Replace loose power extension cables because they may lead to unstable power supply.
  • 16. WAYS OF MITIGATING/REDUCING PHYSICAL THREATS TO DIGITAL DEVICES Use voltage controllers to curb unstable power supply in the computer room. Equip computer rooms with fire extinguishers that do not use water, the computer room can be fit with automatic fire detectors that will detect fire or smoke and alert the personnel in charge for quick action. Tuck computer cables in trunks or carefully lay them down under the desks in order to prevent falls in the computer room. Place computers on strong furniture to prevent them from falling.
  • 17. WAYS OF MITIGATING/REDUCING PHYSICAL THREATS TO DIGITAL DEVICES • Restrict access to computer rooms. • Secure the computer room with strong windows and doors to control theft of computers. To increase the security level, you can install CCTV cameras and also employ security personnel. • Use computer cable locks to control theft in the computer room. • Use dehumidifiers to control excess humidity and dampness. • Ensure there is enough ventilation or free circulation of air in the computer room.
  • 18. •Fit window curtains and air conditioners in the computer room to control and filter dust particles from entering the room. •Cover computers with dust covers when they are not in use
  • 19. IDEAS AND PRACTICES ON HOW TO PERSONAL AND SENSITIVE DATA FROM THE PUBLIC WHEN ONLINE To keep personal and sensitive data from the public when online, the following can be done: Protect and manage personal information. Do not accept friend requests from strangers. Avoiding harmful or illegal content. Buy online items from secure and trusted sites. Installation of antivirus software
  • 20. IDEAS AND PRACTICES ON HOW TO PERSONAL AND SENSITIVE DATA FROM THE PUBLIC WHEN ONLINE Backing up data. Use of strong passwords. Log out from your online accounts after using public internet to browse. Do not communicate with strangers online
  • 21. SAFETY RULES AND REGULATIONS AT WORK Safety rules and regulations exist in all workplaces. They are principles that govern the actions and procedures to keep the works property and the environment safe. Some of the general safety rules and regulations include: To ensure that you know how to safely perform the task. To ensure you know the hazards of the task and how to protect yourself. To wear the required personal protective equipment necessary for the task. To always work clear of suspended loads.
  • 22. SAFETY RULES AND REGULATIONS AT WORK To always keep your mind and eyes on the task at hand. To obey all warning signs and barricades. To inspect all tools and equipment to ensure they are not defective before using them. Do not perform a task under unsafe conditions and report any unsafe tools, equipment or hazardous conditions. All chemicals’ containers should be well labelled and covered. Maintain good housekeeping at workplace all the time
  • 23. COMPUTER CONCEPTS. What is a computer? A computer is an electronic device that process or converts data into information. A computer receives, stores, organizes and processes data into information. The word computer came from Latin word ‘computare’ which means to calculate. A computer uses programs that are sets of instructions which a computer follows to perform tasks.
  • 24. WHAT IS DATA? Data refers to raw facts such as numbers, symbols, images and letters that are not processed and have no meaning to the user Data is plural while in singular it is datum. Data is not meaningful to the user until it is processed. • Examples of Data include: • ✓ Texts. • ✓ Images. • ✓ Sound. • ✓ Videos.
  • 25. WHAT IS INFORMATION? Information refers to processed data that is meaningful to the user. Information is meaningful to the user. List the examples of computers used today. The following are examples of computers: Notebook. Desktop. Laptop. Tablets. PDA (Personal Digital Assistant) Electronic calculators. ATM Machines. Washing machines
  • 26. LIST THE EXAMPLES OF COMPUTERS USED TODAY Microwaves. Server. IPad. MacBook. Smartphone. Smart watch. Workstations.
  • 27. LIST THE EXAMPLES OF COMPUTERS USED TODAY •Microwaves. • Server. • IPad. • MacBook. • Smartphone. • Smart watch. • Workstations
  • 28. CHARACTERISTICS OF COMPUTERS. •Speed- computers perform tasks faster compared to human beings. • Accuracy- computers performs tasks without any errors if the correct data is entered. • Versatility –versatility is the ability of a computer to perform different tasks. A computer can be applied in education, agriculture, military and medical fields.
  • 29. CHARACTERISTICS OF COMPUTERS. •Reliability- Computers are reliable because they give consistent output results for similar tasks. • Diligence –a computer can perform millions of tasks without getting tired. It does not get fatigue or loss concentration like human beings. • Storage - computers have storage facilities or memory for storing data and information either temporarily or permanently which can be retrieved to be used later.
  • 30. CHARACTERISTICS OF COMPUTERS. •Automation-a computer is an automatic machine. It starts a task from beginning to end without requiring human assistance. • No logical decision-a computer cannot work on its own without being instructed by a user hence it is not intelligent enough on its own.
  • 31. CLASSIFICATION OF COMPUTERS Computers are classified according to some criteria. We can classify computer by looking at the following: Functionality. Purpose. Size.
  • 32. Criteria used to classify computers By functionality or data handling By size By purpose Analogue computers Micro computers General purpose computers Digital computers Mini computers Special purpose computers. Hybrid computers Mainframe computers Super computers
  • 33. CLASSIFYING COMPUTERS ACCORDING TO FUNCTIONALITY/DATA HANDLING Computers are classified as analogue, digital or hybrid based on functionality/data handling. Data handling is the form in which data is represented in a computer. ▪ Analogue computers. ✓ They were the first computers to be developed and used in measuring quantities such as temperatures, pressure, car speed and voltage. ✓ They accepted data directly without converting it. ✓ Examples of analogue computers include: speedometer and mercury thermometer
  • 34. DIGITAL COMPUTERS •They included modern computers like laptops, tablets, desktops and smartphones. • They are designed to perform calculations and logic operations at high speed. • They accept the raw data as input and process it with programs stored in its memory to produce the desired output
  • 36. HYBRID COMPUTERS. •They combined best features of the analogue computers such as speed and those of the digital computers such as internal memory. •✓ They are used in specialized applications where both analogue signals and convert them into digital form before processing. •✓ Examples of hybrid computers are fuel pump and the analogue blood pressure monitoring device
  • 38. CLASSIFYING COMPUTERS ACCORDING TO PURPOSE 1. General purpose computers They are most common computers that can perform most common tasks such as word processing, calculations, draw, play music and send electronic mails. General purpose computers are mostly used in schools, hotels, hospitals and at homes. 2. Special purpose computers. They are computers designed to carry out specific tasks only. They are mainly used in manufacturing industries, traffic control systems, weather forecasting, robotic systems, satellites and ATM machines.
  • 39. CLASSIFYING COMPUTERS ACCORDING TO PURPOSE SUPERCOMPUTER. It is the biggest. It is the most expensive. It is the fastest and most powerful computer for big data processing. It is able to process many instructions in a second. It is mainly used in application requiring complex mathematical calculations such as inflight simulation in aerospace, in weather forecasting and in satellite launching
  • 40. MAINFRAME COMPUTERS. •They are the largest and most expensive after super computers. • They have a higher processing power which can handle thousands of connected peripheral devices or users at the same time. • They store large amount of data, instructions and information. • Most government institutions use mainframe computers to store data, calculate interest rates and customer balances.
  • 41. MINI COMPUTERS. • They are smaller, less powerful and less expensive than main frame and super computers. • They are more expensive and powerful than personal computers. • They provide a centralized location for data, information and programs. • They are also used to perform calculations and process business transactions.
  • 42. MICROCOMPUTERS. •They are the least powerful, smallest and cheapest computers. • They are also called personal computers. They are called microcomputers because their processing device is called a microprocessor. • They are designed to be used by one person at a time. • They are used in offices, schools, businesses, media houses or to keep records, prepare lesson plans and to browse