SlideShare a Scribd company logo
Let
us
Pray.
1.
Direction: Identify the following pictures as to types of business: Manufacturing, Service, and Retailing.
4.
3.
2.
5.
Safe and Responsible Use of
Computer, Internet, and
Email
a means of approach or admission to a place or person.
intent to harm or injure Refrain
to prevent from doing an act
ability to meet one’s duty or obligation
free from harm or danger
Hinder; Forbid
unsuitable; unbecoming
disagreeable; annoying
Refrain
Responsible
Safe
Prohibit
Inappropriate
Offensive
Access
Threats
WORD MATCH
What Is Computer ?
Computer
A basic computer is as an electronic device or machine that
is programmable and can be manipulated information or
data.
A computer has the ability to process, store, and retrieve
data
Has the ability to perform different tasks depending on
programs and application in your computer.
Parts of a Peronal Computer
CPU (Central Processing Unit)
The CPU is the primary component of a computer that processes instructions. It runs the operating
system and applications, constantly receiving input from the user or active software programs. It processes the
data and produces output, which may store by an application or displayed on the screen.
Monitor
An instrument or device used for observing, checking, or keeping a continuous record of a process or
quantity.
Keyboard
A panel of keys that operate a computer or typewriter.
A set of keys on a piano or similar musical instrument.
Mouse
Computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical
user interface) and can move and select text, icons, files, and folders on your computer.
AVR (Automatic Voltage Regulator)
An Automatic Voltage Regulator is an
electronic device or circuit that maintains
an output voltage to be consistent to its
load current.
Basic Steps in Operating a personal Computer
a.Turn the AVR on.
b.Turn on the CPU or the central processing unit of the
computer
c.Switch on the monitor
d.If the computer requires a password, type the necessary
keys to unlock the computer.
e.Choose the program or applicatiom you want to perform.
Dos and Don’ts in Using Computer, Internet, and Email
1. The internet is a very useful place, but remeber that not
everything that may be found in the internet is true. Some
who uses it may not be who they say they and posting of
any information in the internet may be correct but ay be
harmful.
2. Secure your password and keep it to yourself, always log
out and log off your account on any device after use. After
using computer, be sure to lock it so that no one can use it.
3. Refrain from posting incorrect information and using
inappropriate language that can be offensive to anyone.
4. Do not open files that is not yours, be sure ask permission
from the person concerned
Dos and Don’ts in Using Computer, Internet, and Email
5. Do not post any personal information on the internet or in social sites
such as address, phone numbers etc.
6. Be mindful on what you say on the internet
7. Be sure to think carefully in going to different places online. There are
places that you are not permitted to go.
8. Avoid Copying or uploading of published information or materials on
the internet without proper permission. Copyright laws can be applied
9. There is a right time to use the internet.
Our topic is all about……
What ?
What is Computer ?
How ?
How can computer help us ?
Why ?
Why is Internet important ?
As a Vincentian
Student how can we
impart or be a model
in conducting the safe
and responsible use
of computer, Internet
and Email.
Week 4 grade_4

More Related Content

What's hot

Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...Symantec
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Problem Solution Essay
Problem Solution EssayProblem Solution Essay
Problem Solution EssayPadme Amidala
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-bBbAOC
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 

What's hot (20)

Computer safety
Computer safetyComputer safety
Computer safety
 
Protect
ProtectProtect
Protect
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Problem Solution Essay
Problem Solution EssayProblem Solution Essay
Problem Solution Essay
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Ass6
Ass6Ass6
Ass6
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 

Similar to Week 4 grade_4

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxToleraYadessaGonfa
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Suman Mia
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 

Similar to Week 4 grade_4 (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
IT Policy
IT Policy IT Policy
IT Policy
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 

More from lysamusa1101

More from lysamusa1101 (6)

Week 2 grade_4
Week 2 grade_4Week 2 grade_4
Week 2 grade_4
 
Entrepreneurship
Entrepreneurship Entrepreneurship
Entrepreneurship
 
Week 3 grade_4
Week 3 grade_4Week 3 grade_4
Week 3 grade_4
 
Week 5 grade_4
Week 5 grade_4Week 5 grade_4
Week 5 grade_4
 
recycled material
recycled materialrecycled material
recycled material
 
Baking ppastries
Baking ppastries Baking ppastries
Baking ppastries
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsparmarsneha2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxJisc
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Week 4 grade_4

  • 2.
  • 3.
  • 4.
  • 5. 1. Direction: Identify the following pictures as to types of business: Manufacturing, Service, and Retailing. 4. 3. 2. 5.
  • 6.
  • 7.
  • 8. Safe and Responsible Use of Computer, Internet, and Email
  • 9.
  • 10. a means of approach or admission to a place or person. intent to harm or injure Refrain to prevent from doing an act ability to meet one’s duty or obligation free from harm or danger Hinder; Forbid unsuitable; unbecoming disagreeable; annoying Refrain Responsible Safe Prohibit Inappropriate Offensive Access Threats WORD MATCH
  • 12. Computer A basic computer is as an electronic device or machine that is programmable and can be manipulated information or data. A computer has the ability to process, store, and retrieve data Has the ability to perform different tasks depending on programs and application in your computer.
  • 13. Parts of a Peronal Computer
  • 14. CPU (Central Processing Unit) The CPU is the primary component of a computer that processes instructions. It runs the operating system and applications, constantly receiving input from the user or active software programs. It processes the data and produces output, which may store by an application or displayed on the screen. Monitor An instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
  • 15. Keyboard A panel of keys that operate a computer or typewriter. A set of keys on a piano or similar musical instrument. Mouse Computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user interface) and can move and select text, icons, files, and folders on your computer.
  • 16. AVR (Automatic Voltage Regulator) An Automatic Voltage Regulator is an electronic device or circuit that maintains an output voltage to be consistent to its load current.
  • 17. Basic Steps in Operating a personal Computer a.Turn the AVR on. b.Turn on the CPU or the central processing unit of the computer c.Switch on the monitor d.If the computer requires a password, type the necessary keys to unlock the computer. e.Choose the program or applicatiom you want to perform.
  • 18. Dos and Don’ts in Using Computer, Internet, and Email 1. The internet is a very useful place, but remeber that not everything that may be found in the internet is true. Some who uses it may not be who they say they and posting of any information in the internet may be correct but ay be harmful. 2. Secure your password and keep it to yourself, always log out and log off your account on any device after use. After using computer, be sure to lock it so that no one can use it. 3. Refrain from posting incorrect information and using inappropriate language that can be offensive to anyone. 4. Do not open files that is not yours, be sure ask permission from the person concerned
  • 19. Dos and Don’ts in Using Computer, Internet, and Email 5. Do not post any personal information on the internet or in social sites such as address, phone numbers etc. 6. Be mindful on what you say on the internet 7. Be sure to think carefully in going to different places online. There are places that you are not permitted to go. 8. Avoid Copying or uploading of published information or materials on the internet without proper permission. Copyright laws can be applied 9. There is a right time to use the internet.
  • 20. Our topic is all about……
  • 21. What ? What is Computer ? How ? How can computer help us ? Why ? Why is Internet important ?
  • 22. As a Vincentian Student how can we impart or be a model in conducting the safe and responsible use of computer, Internet and Email.