Programming .Net Week 1 LP
Programming .Net Week 1 LP
School
PROGRAMMING
.NET NC III
Quarter 1
Week 1
Performing
Computer Operations
Page |1
Content Standards: The learner demonstrates an understanding of the
principles and concepts in performing computer operations.
Performance Standards: The learners independently perform computer
operations based on TESDA Training Regulations.
Introduction to Computers
What Is a Computer?
Computers are everywhere: at work, at school, and at home. In the
workplace, employees use computers to create correspondence such as e-mail
messages, memos, and letters; manage calendars; calculate payroll; track
inventory; and generate invoices. At school, teachers use computers to assist
with classroom instruction. Students use computers to complete assignments
and research. People also spend hours of leisure time using a computer. They
play games, communicate with friends and relatives online and using e-mail,
purchase goods online, converse in chat rooms, listen to music or radio
broadcasts, watch or create videos and movies, read books and magazines,
share stories, research genealogy, retouch photos, and plan vacations. At work,
at school, and at home, computers are helping people do their work faster,
more ccurhttp://web.cse.ohio-state.edu/cse1111ately, and in some cases, in
ways that previously would not have been possible.
A computer is an electronic device, operating under the control of instructions
stored in its own memory, that can accept data (input), process the data
according to specified rules (process), produce results (output), and store the
results (storage) for future use.
Page |2
Computers perform four basic operations — input, process, output, and
storage. These operations comprise the information processing cycle.
Characteristic of a Computer
A computer derives its power from its capability to perform the information
processing cycle with amazing speed, reliability (low failure rate), and accuracy;
its capacity to store huge amounts of data and information; and its capability
to communicate with other computers.
For a computer to perform operations, it must be given a detailed set of
instructions that tells it exactly what to do. These instructions are called a
program, or software. Before processing for a specific activity begins, the
program corresponding to that activity is stored in the computer.
Once the program is stored, the computer can begin to execute the program’s
first instruction. The computer executes one program instruction after another
until the activity is complete.
Page |3
The Components of a Computer
The six primary components of a computer are input devices, the processor
(control unit and arithmetic/logic unit), memory, output devices, storage devices,
and communications devices.
PROCESSOR
PROCESSOR
INSTRUCTIONS
DATA
INFORMATION
INPUT
INPUT OUTPUT
OUTPUT
DEVICES DATA MEMORY
MEMORY INFORMATION DEVICES
DEVICES
DEVICES
Page |4
WEEK 1 DAY 1 TASKS
1. Define a computer
2. What are the uses of computers in the following fields? Write your
answers inside the circle
education
medicine home
Uses of
Computer
government business
Page |5
Data Information
Definition Definition
Example Example
Desktop Computers
Page |6
A desktop computer is designed so that the system unit, input devices, output
devices, and any other devices fit entirely on or under a desk or table (Figure
4). In some models, the monitor sits on top of the system unit, which is placed
on the desk. The more popular style of system unit is the tall and narrow
tower, which can sit on the floor vertically.
Notebook Computers
A notebook computer, also called a laptop computer, is a portable, personal
computer often designed to fit on your lap (Figure 5). These
computers are thin
and lightweight, yet can be as powerful as the average desktop
computer. A netbook, which is a type of notebook computer, is
smaller, lighter, and often not as powerful as a traditional
notebook computer. Resembling a letter-sized slate, the Tablet
PC is a special type of notebook computer that allows you to
write or draw on the screen using a digital pen.
Mobile Devices Mobile devices, which are
small enough to carry in a pocket, usually
store programs and data permanently on
memory inside the system unit or on small
storage media such as memory cards. You
often can connect a mobile device to a
personal computer to exchange
information. Three popular types of mobile
devices are smart phones, portable media
players, and digital cameras.
A smart phone is a phone that can connect to the Internet and usually also
provides personal information management functions such as a calendar, an
appointment book, an address book, a calculator, and a notepad (Figure 6).
A portable media player is a mobile device on which you can store, organize,
and play digital media (shown in Figure 1 on page COM 2). For example, you
can listen to music; watch videos, movies, and television shows; and view
photos on the device’s screen. A digital camera is a device that allows users to
take pictures and store the photographed images digitally, instead of on
traditional film (shown in Figure 1). Digital cameras typically allow users to
review, and sometimes modify, images while they are in the camera.
Input Devices
An input device is any hardware component that allows you to enter data and
instructions into a computer. Depending on your program and requirements,
the input device you use may vary. Five widely used input devices are the
keyboard, mouse, microphone, scanner, and Web cam.
Page |7
A keyboard is an input device that contains keys users press to enter data and
instructions into the computer.
A stylus is a small metal or plastic device that looks like a tiny ink pen but
uses pressure instead of ink. Some smart phones have one key for each letter
of the alphabet, often called a mini-keyboard. Other phones have keypads that
contain fewer keys than there are letters in the alphabet. For these phones,
each key on the keypad represents multiple characters, which are identified on
the key.
A mouse is a pointing device that fits comfortably under the palm of your
hand. With a mouse, users control the movement of the pointer, which is a
small symbol on the screen whose location and shape change as a user moves
a pointing device.
Most notebook computers have a touchpad, a small, flat, rectangular pointing
device near the keyboard that allows you to move the pointer by sliding a
fingertip on the surface of the pad.
A scanner is an input device that scans documents such as photographs and
pages of text. When a document is scanned, it is converted into a digital
format. This creates an electronic version of the document that can be viewed
and edited on a computer.
A joystick is an input device that can be used for controlling the movement of
the cursor or a pointer in a computer device. The pointer/cursor movement is
controlled by maneuvering a lever on the joystick. The input device is mostly
used for gaming applications and, sometimes, in graphics applications.
A webcam is a small digital video camera directly or indirectly connected to a
computer or a computer network.
System Unit
The system unit is a case that contains electronic
components of the computer used to process data. System
units are available in a variety of shapes and sizes. The case
of the system unit, also called the chassis, is made of metal
Page |8
or plastic and protects the internal components from damage. The
motherboard, sometimes called a system board, is the main circuit board of the
system unit.
Processor
The processor, also called the central processing unit
(CPU), interprets and carries out the basic instructions that
operate a computer. Processors contain a control unit and an
arithmetic/logic unit. The control unit directs and
coordinates most of the operations in the computer. The
arithmetic/logic unit (ALU) performs arithmetic,
comparison, and other operations.
Memory
Memory consists of electronic components that store
instructions waiting to be executed and data needed by
those instructions. Most memory keeps data and
instructions temporarily, which means its contents are
erased when the computer is shut off. When discussing
computer memory, users typically are referring to RAM.
Also called main memory, RAM (random access
memory) consists of memory chips that can be read from
and written to by the processor and other devices.
The amount of memory in computers is measured in kilobytes, megabytes,
gigabytes, or terabytes. A byte usually stores one character, such as the letter
A. One kilobyte (KB or K) equals exactly 1,024 bytes, and one megabyte (MB)
equals approximately one million bytes. One gigabyte (GB) equals
approximately one billion bytes, and one terabyte (TB) equals approximately
one trillion bytes. A computer with 4 GB of RAM, therefore, can store
approximately four billion characters.
Page |9
__________________________________________________________________
__________________________________________________________________
4. laptop computer
__________________________________________________________________
__________________________________________________________________
5. Mobile devices
__________________________________________________________________
__________________________________________________________________
6. smart phone
__________________________________________________________________
__________________________________________________________________
7. portable media player
__________________________________________________________________
__________________________________________________________________
8. input device
__________________________________________________________________
__________________________________________________________________
9. keyboard
__________________________________________________________________
__________________________________________________________________
10. stylus
__________________________________________________________________
__________________________________________________________________
11. mouse
__________________________________________________________________
__________________________________________________________________
12. notebook computers
__________________________________________________________________
__________________________________________________________________
13. scanner
__________________________________________________________________
__________________________________________________________________
14. joystick
__________________________________________________________________
__________________________________________________________________
15. system unit
16. webcam
__________________________________________________________________
__________________________________________________________________
17. system unit
__________________________________________________________________
P a g e | 10
__________________________________________________________________
18. processor
__________________________________________________________________
__________________________________________________________________
19. control unit
__________________________________________________________________
__________________________________________________________________
20. Memory
__________________________________________________________________
__________________________________________________________________
Output Devices
Output devices are hardware components that convey information to one or
more people.
Commonly used output devices include display devices; printers; speakers,
headphones, and earbuds; data projectors; and interactive whiteboards. When
a computer is used for processing tasks such as creating documents, the two
output devices widely used are the printer and a display device.
Printers
A printer is an output device that produces text and graphics
on a physical medium such as paper.
Ink-jet printers produce text and graphics in both black and
white and color on a variety of paper types and sizes (Figure
13).
Figure 1. Inkjet printer
Some ink-jet printers, called photo printers, produce
photolab-quality pictures and are ideal for home or small-
business use.
A laser printer is a high-speed, high-quality printer that
operates in a manner similar to a copy machine (Figure
Figure 2. Laser printer
14).
A multifunction peripheral, also called an all-in-one device,
is a single device that looks like a printer or copy machine
but provides the functionality of a printer, scanner, copy
machine, and perhaps a fax machine. Some use color ink-jet
printer technology, while others include a black-and-white or
color laser printer.
Figure 3. Multifunction
Display Devices printer
A display device is an output device that visually conveys text, graphics, and
video information.
P a g e | 11
A monitor is a display device that is packaged as a separate peripheral. A
widely used monitor is an LCD monitor. The LCD monitor uses a liquid crystal
display to produce images on the screen. A higher resolution provides a
smoother, sharper, clearer image.
Storage Devices
A storage device is the computer hardware that records and/or retrieves items
to and from storage media. A storage medium (media is the plural) is the
physical material on which a computer keeps data, instructions, and
information. Three common types of storage media are hard disks, flash
memory, and optical discs.
A hard disk is a storage device that contains one or more inflexible, circular
platters that use magnetic particles to store data, instructions, and
information. The system unit on most personal computers contains at least one
hard disk, sometimes called an internal hard disk because it is not portable.
Users store documents, spreadsheets, presentations, databases, e-mail
messages, Web pages, digital photos, music, videos, and software on hard
disks.
Portable Hard Disks
Some hard disks are portable. An external hard disk is a separate freestanding
hard disk that connects with a cable to a port on the system unit or
communicates wirelessly. A removable hard disk (Figure 20) is a hard disk that
you insert and remove from a drive. Both internal and external hard disks are
available in miniature sizes to allow users to transport their data easily.
P a g e | 12
WEEK 1 DAY 3 TASKS
_________ 3. Produce text and graphics in both black and white C. Memory card
_ and color on a variety of paper types and sizes
_________ 9. Output device that produces text and graphics on I. Storage device
_ a physical medium such as paper
P a g e | 13
P a g e | 14
Optical Discs
An optical disc is a flat, round, portable metal disc with a
plastic coating. CDs, DVDs, and Blu-ray Discs are three
types of optical discs. A CD can hold from 650 million to
1 billion characters. Some DVDs can store two full-length
movies or 17 billion characters. Blu-ray Discs can store about
46 hours of standard video, or 100 billion characters.
Figure 6. Optical Disks
Many different formats of optical discs exist today.
CD-ROM, or compact disc read-only memory, is a type of optical disc that
users can read but not write (record) or erase — hence, the name read-only.
Manufacturers write the contents of standard CD-ROMs. A standard CD-ROM
is called a single-session disc because manufacturers write all items on the
disc at one time. A typical CD-ROM holds from 650 MB to 1 GB of data,
instructions, and information.
A CD-R (compact disc-recordable) is a multisession optical disc on which users
can write, but not erase, their own items such as text, graphics, and audio.
Multisession means you can write on part of the disc at one time and another
part at a later time. Each part of a CD-R can be written on only one time, and
the disc’s contents cannot be erased.
A CD-RW (compact disc-rewritable) is an erasable multisession disc you can
write on multiple times. To write on a CD-RW disc, you must have optical disc
burning software and a CD-RW drive. Burning is the process of writing on an
optical disc. The process of copying audio and/or video data from a purchased
disc and saving it on a storage medium is called ripping.
A DVD-ROM (digital versatile disk-read-only memory or digital video disc-read-
only memory) is a high-capacity optical disc on which users can read but not
write or erase.
A Blu-ray Disc (BD) has storage capacities of 100 GB, with expectations of
exceeding 200 GB in the future.
Cloud Storage
Cloud storage is an Internet service that provides hard disk storage to
computer users. Fee arrangements vary.
P a g e | 15
Figure 7. Cloud storage providers
Communications Devices
A communications device is a hardware component that enables a computer
to send (transmit) and receive data, instructions, and information to and from
one or more computers or mobile devices. A widely used communications
device is a modem.
Communications occur over transmission media such as cables, telephone
lines, cellular radio networks, and satellites. Some transmission media, such
as satellites and cellular radio networks, are wireless, which means they have
no physical lines or wires. People around the world use computers and
communications devices to communicate with each other using one or more
transmission media.
P a g e | 16
WEEK 1 DAY 4 TASKS
A. Write the types of optical disks and its corresponding meaning.
TYPES OF OPTICAL
MEANING
DISKS
1.
2.
3.
4.
5.
6.
7.
8.
9.
P a g e | 17
Senior High
School
PROGRAMMING
.NET NC III
Quarter 1
Week 2
Performing
Computer Operations
P a g e | 18
Computer Software
Week 2
After completing this module, you will be able to:
1. Discuss computer software and explain the difference between system
software and application software
2. Identify several types of application software
3. Discuss the Internet and World Wide Web
4. Describe various types of Internet and network attacks and how to
protect against them
Software
Software, also called a program, consists of a series of related instructions,
organized for a common purpose, that tells the computer what tasks to perform
and how to perform them. You interact with a program through its user
interface. The user interface controls how you enter data and instructions and
how information is displayed on the screen.
Software today often has a graphical user interface. With a graphical user
interface (GUI pronounced gooey), you interact with the software using text,
graphics, and visual images such as icons. When you buy a computer, it
usually has some software on its hard disk. This enables you to use the
computer the first time you turn it on.
Programs also can be installed after you purchase the computer. Installing is
the process of adding software to a computer, and uninstalling is the process of
removing programs and all associated files from the hard disk. Much software
is available at retail stores and on the Web for purchase and/or download. As
an alternative, some people use a Web application, which is a Web site that
allows users to access and interact with software from any computer or device
that is connected to the Internet. Software can be divided into two categories:
system software and application software.
System Software
System software consists of programs that control the operations of the
computer and its devices. Two types of system software are operating systems
and utility programs.
An operating system is a set of programs that coordinates all the activities
among computer hardware devices. It provides a means for users to
communicate with the computer and other software. Many of today’s
computers use Microsoft Windows When a user starts a computer, portions of
the operating system are copied into memory from the computer’s hard disk.
These parts of the operating system remain in memory while the computer is
on.
P a g e | 19
A utility program allows a user to perform maintenance-type tasks usually
related to managing a computer, its devices, or its programs. For example, you
can use a utility program to burn digital photos on an optical disc. Most
operating systems include several utility programs for managing disk drives,
printers, and other devices and media. You also can buy utility programs that
allow you to perform additional computer management functions.
Application Software
P a g e | 20
Spreadsheet software allows
users to organize data in rows
and columns and perform
calculations on the data. These
rows and columns collectively
are called a worksheet.
P a g e | 21
2. A feature where the user interacts with the software using text, graphics,
and visual images such as icons.
a. Graphical user interface
b. Installer
c. Program
d. Antivirus
3. The process of adding software to a computer, and uninstalling is the
process of removing programs and all associated files from the hard disk.
a. Ripping
b. Downloading
c. Installing
d. Uploading
4. A Web site that allows users to access and interact with software from
any computer or device that is connected to the Internet.
a. Programs
b. Antivirus
c. Application software
d. Web application
5. It is consisting of programs that control the operations of the computer
and its devices.
a. System Software
b. Application software
c. Web applications
d. Installers
6. A set of programs that coordinates all the activities among computer
hardware devices.
a. System Software
b. Application software
c. Web applications
d. Installers
7. It provides a means for users to communicate with the computer and
other software.
a. utility program
b. application software
c. operating systems
d. word processing software
8. It allows a user to perform maintenance-type tasks usually related to
managing a computer, its devices, or its programs.
a. utility program
b. application software
c. operating systems
d. word processing software
P a g e | 22
9. It consists of programs designed to make users more productive and/or
assist them with personal tasks.
a. utility program
b. application software
c. operating systems
d. word processing software
10. It allows users to organize data in rows and columns and perform
calculations on the data.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
11. A software is used to create, edit, format, and print documents.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
12. An application software that allows users to create visual aids for
presentations to communicate ideas, messages, and other information to
a group.
a. Spreadsheet application
b. Presentation software
c. operating systems
d. word processing software
13. A collection of data organized in a manner that allows access,
retrieval, and use of that data.
a. Database application
b. database
c. operating systems
d. word processing software
14. Short for electronic mail) is the transmission of messages
a. operating systems
b. word processing software
c. e-mail
d. database
15. antivirus software is an example of
a. utility software
b. application software
c. operating system
d. database system
P a g e | 23
1. Operating Systems - ___________________________________________
2. Word processing software- ___________________________________________
3. Spreadsheet software - ___________________________________________
4. Database software - ___________________________________________
5. Antivirus software - ___________________________________________
6. presentation - ___________________________________________
7. Web application - ___________________________________________
8. Installers - ___________________________________________
9. Downloading software - ___________________________________________
10. Search engines - ___________________________________________
P a g e | 24
Security Measures
WHAT MAKES A HOME COMPUTER VULNERABLE?
Low level of security awareness
Increasing online activities
Not following any standard security policies or guidelines
Default computer and application settings
Non or very little investment in security terms
SYSTEM ACCESS Ensure that unauthorized users do not get into the system
CONTROLS Force legal users to be conscious about security
P a g e | 25
5. It helps users minimize losses in case of an accident that causes physical
damage to computer systems
Introduction
Today, people rely on computers to create, store, and manage critical
information. Thus, it is crucial users take measures to protect their computers
and data from loss or damage, especially for information that is transmitted
over networks. Every unprotected computer is susceptible to a
computer virus, worm, Trojan horse, and/or rootkit.
A computer virus is a potentially damaging
computer program that affects, or infects, a
computer negatively by altering the way the
computer works without the user’s knowledge or
permission. Once the virus infects the computer, it
can spread throughout and may damage files and system
software, including the operating system.
A worm is a program that copies itself repeatedly, for example in memory or
on a network, using up resources and possibly shutting down the computer
or network.
A Trojan horse (named after the Greek myth) is a program that hides within
or looks like a legitimate program. A certain condition or action usually
triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not
replicate itself to other computers.
A rootkit is a program that hides in a computer and allows someone from a
remote location to take full control of the computer. Once the rootkit is
installed, the rootkit author can execute programs, change settings, monitor
activity, and access files on the remote computer.
Computer viruses, worms, Trojan horses, and rootkits are classified as
malware (short for malicious software), which are programs that act without a
user’s knowledge and deliberately alter the computer’s operations. Users can
take several precautions to protect their home and work computers and mobile
devices from these malicious infections. For example, users should install an
antivirus program and update it frequently. An antivirus program protects a
computer against viruses by identifying and removing any computer viruses
found in memory, on storage media, or on incoming files.
P a g e | 26
Tips for Preventing Viruses and Other Malware
3. Set the macro security in programs so that you can enable or disable
macros. Enable macros only if the document is from a trusted source and
you are expecting it.
7. Before using any removable media, scan the media for malware. Follow
this procedure even for shrink-wrapped software from major developers.
Some commercial software has been infected and distributed to
unsuspecting users.
P a g e | 27
WEEK 2 DAY 2 TASKS
A. Write True if the sentence applies security measure and False if not.
____________ 1. Never open an email from an unknown source.
____________ 2. The firewall program can make the computer speed slower, it is optional.
____________ 3. Never start a computer with removable media inserted in the drives or plugged
in the ports unless the media are uninfected.
____________ 4. Be aware of the new hoax and viruses.
____________ 5. Update your antivirus software.
____________ 6. Computer security awareness helps prevent the loss of information stored on
the systems
____________ 7. To protect you data, ensure that unauthorized users do not get into the system.
____________ 8. If the antivirus program flags an e-mail attachment as infected, delete or
quarantine the attachment immediately.
____________ 9. Scan all downloaded programs for viruses and other malware.
____________ 10. You can download everything you want from the internet, you can delete it
when not needed.
P a g e | 28
Networks and the Internet
A network is a collection of computers and devices connected together,
often wirelessly, via communications devices and transmission media. When a
computer connects to a network, it is online.
A wide area network (WAN) is a network that covers a large geographic area
(such as a city, country, or the world) using a communications channel that
combines many types of media such as telephone lines, cables, and radio
waves.
The Internet
The Internet is a worldwide collection of networks that links millions of
businesses, government agencies, educational institutions, and individuals.
An access provider is a business that provides individuals and
organizations access to the Internet free or for a fee. Access providers are
categorized as ISPs, online service providers, and wireless Internet service
providers. An ISP (Internet service provider) is a regional or national access
provider. A regional ISP usually provides Internet access to a specific
geographic area.
Web page addresses begin with http://, which stands for Hypertext
Transfer Protocol, the set of rules that defines how pages transfer on the
Internet. A Web server is a computer that delivers requested Web pages to
your computer.
A social networking Web site or online social network is an online
community that encourages members to share their interests, ideas, stories,
P a g e | 29
photos, music, and videos with other registered users. A blog is an informal
Web site consisting of time-stamped articles in a diary or journal format.
E-commerce, short for electronic commerce, is a business transaction
that occurs over an electronic network such as the Internet. Anyone with
access to a computer or mobile device, an Internet connection, and a means to
pay for purchased goods or services can participate in e-commerce.
Uses of
Internet
P a g e | 30
B. Give 3 Internet providers in your community
_____________________, _____________________, ___________________________
1. Blog
2. Web server
3. Web page
4. E-commerce
5. network
P a g e | 31
OH and S Principles and Responsibilities
Learning Objectives:
1. Explain the importance of Occupational Health and safety
2. Identify health risks present in a computing environment
3. Identify three steps to manage health and safety at work
4. Identify potential computer-related disorders.
During working hours, you must remain alert to anything that may be
dangerous. If you see, hear or smell anything odd, take note. If you think it
could be a hazard, tell someone.
P a g e | 32
· How likely is it that the hazard could harm me or someone else?
· How badly could I or someone else be harmed?
Always tell someone (your employer, your supervisor or your health and safety
representative) about hazards you can't fix yourself, especially if the hazard
could cause serious harm to anyone.
For example, (1) Ask your supervisor for instructions and training before using
equipment, (2) Ask for help moving or lifting heavy objects, and (3) Tell your
supervisor if you think a work practice could be dangerous.
If you are not sure of the safest way to do something during work experience,
always ask your supervisor.
P a g e | 33
RISK REDUCTION AND INFORMATION
Risk reduction requires the identification of risks via appropriate assessments
(as discussed above), followed by appropriate action if necessary to ensure
workstation compliance with the requirements listed in the previous section.
However, risk reduction also significantly involves ensuring that
users/operators are aware of possible risks that can result in computing
related disorders, and of the actions they need to take to avoid them. Risk
reduction and information provision therefore go hand-in-hand.
P a g e | 34
WEEK 2 DAY 4 TASKS: Occupational Health and Safety
Definition Importance
P a g e | 35
Limb Reduction Risk reduction Stress
Health and safety
Upper limb disorders Eye problems Stress and fatigue
procedure
Occupational Health
Assessing the risk Hazard Skin problems
and Safety
D. Choose the answer from the table above.
____________________ 1. a term used to describe a range of conditions affecting the fingers,
hands, arms and shoulders. Such conditions may range from mild
aches and pains, through to chronic tissue and/or muscular
complaints.
____________________ 2. the responsibility of all persons in the computer and technology
industries
____________________ 3. anything that could hurt you or someone else.
____________________ 4. It is a planned system of working to prevent illness and injury where
your work by recognizing and identifying hazards and risks.
____________________ 5. any form of excessive close work where the eyes are forced to focus
at a fairly fixed distance on a relatively bounded location is likely to
cause at least short-term eye strain and discomfort
____________________ 6. Such conditions can include itching, rashes on the neck, face or
hands, and dry skin
____________________ 7. means working out how likely it is that a hazard will harm someone
and how serious the harm could be.
____________________ 8. this can be as a result of the involved high levels of dextrous activity
and visual concentration.
____________________ 9. requires the identification of risks via appropriate assessments (as
discussed above), followed by appropriate action if necessary to
ensure workstation compliance with the requirements listed in the
previous section.
Answer key. Choose the answer from the table.
1. Upper limb disorders
2. Health and safety procedure
3. hazard
4. Eye problems
5. Skin problems
6. Assessing the risk
7. Stress and fatigue
8. Risk reduction
PHOTO CREDITS
1. www.downloadclipart.net
2. www.kindpng.com
3. www.gograph.com
4. www.iconfinder.com
5. www.netclipart.com
6. www.clipartkey.com
P a g e | 36
7. www.favpng.com
8. www. Quora.com
9. http://web.cse.ohio-state.edu/cse1111
10. https://www.bannersnack.com/email-headers.html
11. www.tweaklibrary.com
12. https://www.google.com/url?sa=i&url=https%3A%2F%2Fsummer-heart-0930.chufeiyun1688.workers.dev%3A443%2Fhttps%2Fwww.act.com%2Fcustomer-database-
software&psig=AOvVaw0DX-3s3GakzewAJWkF5-
yX&ust=1597137554412000&source=images&cd=vfe&ved=0CAMQjB1qFwoTCJjwypmnkOsCFQ
AAAAAdAAAAABAD
13.
14.
RESOURCES
1. www.techopedia.com
2. https://www.slideshare.net/cupaydabu/occupational-health-and-safety-
procedures
3. https://www.explainingcomputers.com/dse.html
4. https://www.slideshare.net/joygracebagui/understanding-the-need-for-
security-measures?from_action=save
5.
P a g e | 37