Use Information Systematically
Use Information Systematically
BASIC COMPETENCIES
INTEGRATED WITH 21st CENTURY SKILLS
Unit of Competency:
Welcome to the Module “USING INFORMATION SYSTEMATICALLY”. This module contains training
materials and activities for you to complete.
This unit covers the knowledge, skills and attitudes required to use technical information systems,
apply information technology (IT) systems and edit, format & check information. It is one of the specialized
modules at National Certificate (NC) Level III.
You are required to go through a series of learning activities to complete each of the learning
outcomes of the module. In each learning outcome there are Information Sheets, Job Sheets, Operation
Sheets and Activity Sheets. Do these activities on your own and answer the Self-Check at the end of each
learning activity.
If you have questions, do not hesitate to ask your teacher for assistance.
You may already have some or most of the knowledge and skills covered in this module. If you can
demonstrate competence to your teacher in a particular skill, talk to him/her so you do not have to undergo
the same training again. If you have a qualification or Certificate of Competency from previous training show
it to him/her. If the skills you acquired are consistent with the relevant to this module, they become part of the
evidence. You can present these for RPL. If you are not sure about your competence/skills, discuss this with
your teacher.
After completing this module, ask your teacher to assess your competence. Result of your
assessment will be recorded in your competency profile. All the learning activities are designed for you to
complete at your own pace.
This module is prepared to help you achieve the required competency, in receiving and relaying
information. This will be the source of information that will enable you to acquire the knowledge, skills and
attitude in USING INFORMATION SYSTEMATICALLY independently at your own pace or with minimum
supervision or help from your teacher.
INTRODUCTION:
This module contains the “know” and “do” units in USING INFORMATION SYSTEMATICALLY.
This unit covers the knowledge, skills and attitudes required to use technical information systems,
apply information technology (IT) systems and edit, format & check information. This module consists of three
(3) Learning Outcomes (LO’s) that contains learning activities for both knowledge and skills supported with
information sheets, job/operation sheets and self-check. Before attempting to perform the manual exercises,
see to it that you have already read and understood the information/operation sheet and correctly answered
the self-check provided in every Learning Activities.
ASSESSMENT CRITERIA:
✔ Information is collated and organized into a suitable form for reference and use
✔ Stored information is classified so that it can be quickly identified and retrieved when needed
✔ Guidance is advised and offered to people who need to find and use information
✔ Technical information system is operated using agreed procedures
✔ Appropriate and valid procedures are operated for inputting, maintaining and archiving information
✔ Software required are utilized to execute the project activities
✔ Information and data obtained are handled, edited, formatted and checked from a range of internal
and external sources
● Personal Computer
● Simulated workplace
METHODOLOGY:
● Discussion
● Case study
ASSESSMENT METHOD:
Direct Observation
Oral interview and written test
Performance Test
Understanding the Process: Information collation involves three main steps: collecting, organizing,
and synthesizing data. Collecting data means gathering relevant information from various sources.
Organizing involves arranging the data in a systematic way, making it easier to understand and
analyze. Synthesizing is the process of combining different pieces of information to form a cohesive
whole.
Steps in Detail:
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 8 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
o Collecting: Identify the purpose of your research and determine the type of information
needed. Use a variety of sources to gather comprehensive data.
o Organizing: Sort the collected data into categories or themes. Use tools such as folders,
binders, or digital software to keep the information structured.
o Synthesizing: Integrate the organized data to draw conclusions, identify trends, and
develop insights.
Sources of Information:
Types of Sources: Information can be derived from primary sources (original data or firsthand
accounts) and secondary sources (interpretations or analyses based on primary data).
o Primary Sources: Include original research articles, interviews, surveys, and direct
observations.
o Secondary Sources: Comprise review articles, books, commentaries, and meta-analyses.
Evaluating Credibility and Relevance: Assess the reliability of sources by checking the author's
credentials, publication venue, citation frequency, and date of publication. Determine relevance by
ensuring the information directly addresses your research question or objective.
Organizational Techniques:
Categorization: Group related pieces of information together based on common themes or topics.
This helps in structuring the data logically.
Mind Mapping: Use diagrams to visually organize information, showing relationships between
different pieces of data. Mind maps can help in brainstorming and identifying connections.
Digital Tools: Employ software such as databases, spreadsheets, and information management
systems to store, organize, and retrieve information efficiently. Tools like Evernote, Trello, and
Microsoft OneNote are useful for managing notes and references.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 9 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Apply Information to Real-world Scenarios
Academic Research: Information collation is crucial in literature reviews, where researchers gather
and synthesize previous studies to provide context for their work. This ensures a comprehensive
understanding of the research topic and identifies gaps in knowledge.
Business Decision-Making: In business, collating market research data, customer feedback, and
sales reports helps in making informed strategic decisions. For example, a company may analyze
competitor data and customer preferences to launch a new product.
Media Reporting: Journalists collate information from interviews, press releases, and other media
reports to provide accurate and balanced news stories. Ensuring multiple perspectives are
considered is key to objective reporting.
Practical Exercises:
Hands-on Activities: Engage in tasks such as creating a research project, developing a business
plan, or writing a news article. Practice collecting data from various sources, organizing it
systematically, and synthesizing it to produce a final report or presentation.
Group Work: Collaborate with peers to gather and collate information on a given topic. This helps
in learning teamwork and understanding different perspectives.
Software Applications: Use databases like PubMed or Google Scholar for academic research,
CRM systems for business information, and news aggregation tools for media reporting.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 10 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Spreadsheets and Databases: Utilize Excel, Google Sheets, or Access to organize and analyze
data. These tools allow for sorting, filtering, and visualizing information effectively.
Critical Analysis:
Analyzing Information: Critically examine the collated information for patterns, trends, and
anomalies. Look for consistency in data and check for any biases or inaccuracies. This step is crucial
for ensuring the reliability and validity of your conclusions.
Identifying Gaps: Recognize areas where information is lacking or where further research is
needed. This helps in refining research questions and focusing future efforts.
Ethical Considerations:
Privacy and Confidentiality: Ensure that the information collected, especially personal data, is
handled ethically. Follow guidelines for data protection and privacy.
Data Security: Protect sensitive information from unauthorized access. Use encryption and secure
storage solutions to safeguard data.
Intellectual Property: Respect copyrights and intellectual property rights by properly citing sources
and obtaining permissions when necessary.
Simulation Exercises: Design simulations where students simulate real-world scenarios (e.g.,
crisis management, market analysis) to practice quick and effective information collation under time
constraints.
Role-Playing: Incorporate role-playing activities where students take on different professional
roles (e.g., researcher, consultant) to collate information and present findings to mock
stakeholders.
Critical Analysis:
Quantitative vs. Qualitative Analysis: Discuss the differences between quantitative (e.g.,
statistical analysis) and qualitative (e.g., thematic analysis) approaches to analyzing collated
information, highlighting when each method is appropriate.
Ethical Considerations:
Data Ownership: Address issues of data ownership and intellectual property rights, particularly in
collaborative research settings where multiple contributors may have vested interests.
Transparency and Reproducibility: Stress the importance of transparency in documenting
methodologies and findings to facilitate reproducibility and peer review.
Emerging Technologies: Discuss the potential impact of emerging technologies (e.g., artificial
intelligence, machine learning) on information collation practices, including opportunities for
automation and predictive analysis.
Policy and Advocacy: Highlight examples where well-collated information has influenced policy
decisions or public advocacy campaigns, underscoring the broader societal implications of effective
information management.
References:
1. Doe, J. (2023). Application of information collation: Identifying and explaining key concepts.
Retrieved from [Link]
Performance Objective:
Write your ideas/insight on Application in collating information.
Inputting information involves systematically entering data into a database or information system
to ensure accuracy and relevance from diverse sources.
Methods of Input: Examples include keyboard entry, document scanning for digital storage, and
automated data feeds from sensors or IoT devices.
Examples:
Education Sector: Inputting student grades into a school's electronic grading system.
Retail Sector: Entering inventory data into a retail management software for stock tracking.
Maintaining information involves ongoing efforts to uphold data accuracy, reliability, and
accessibility.
Tasks Involved: Regular updates, data deduplication, error correction, and implementing security
measures.
Outline of Procedures:
Regular Updates: Scheduled updates to reflect the latest information and prevent data staleness.
Data Cleaning: Using tools to remove redundant data, correct errors, and ensure consistency.
Security Measures: Implementation of encryption, access controls, and backups to secure data
from unauthorized access.
Example:
Healthcare Sector: Maintaining patient records to ensure healthcare providers have current and
accurate medical histories.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 18 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Implementing Archiving Procedures
Archiving information involves storing data no longer in active use but required for future reference
or compliance.
Importance: Facilitates regulatory compliance, preserves historical data, and optimizes active
storage space.
Archiving Procedures:
Selection Criteria: Determining data to archive based on regulatory requirements, business needs,
and historical significance.
Storage Methods: Using secure cloud-based archives or physical media with proper labeling and
indexing for easy retrieval.
Retention Policies: Establishing guidelines for data retention periods and disposal methods to
manage the data lifecycle effectively.
Example:
Legal Sector: Archiving case files and legal documents for future reference and compliance with
legal requirements.
Additional Considerations
Integration with Workflow: How these procedures integrate with daily operations and workflow
efficiency.
References:
1. Smith, J. (2023). Procedures for inputting information. Retrieved from
[Link]
4. Which sector might benefit from implementing procedures for maintaining information?
A. Manufacturing
B. Transportation
C. Healthcare
D. Retail
Performance Objective:
Write your ideas or Procedures for inputting, maintaining and archiving
Collecting Data: Involves systematically gathering information from diverse sources such as books,
articles, databases, interviews, and surveys. This process ensures comprehensive coverage and
richness of data.
Organizing Data: Methods include categorization, tagging, and structuring information for easy
retrieval and analysis. Proper organization facilitates efficient data management and enhances the
reliability of research outcomes.
Exploring Methods of Data Collection: Discuss various research methods such as experimental
studies, observational research, case studies, and meta-analyses. Each method offers unique
advantages and is suitable for different types of research questions.
Importance of Organizing Data: Effective data organization allows researchers to manage large
datasets effectively, identify patterns or trends, and draw meaningful conclusions. It also supports
transparency and replicability in research.
Analyzing Information: Involves examining data to identify patterns, trends, and relationships using
quantitative or qualitative methods. It requires critical thinking and statistical skills to interpret data
accurately.
Synthesizing Information: The process of integrating findings from various sources or data points
to generate new insights or theories. Synthesis requires researchers to evaluate conflicting evidence
and develop a coherent understanding of the research topic.
Elaboration:
Presentation Techniques:
Visual Presentation: Use charts, graphs, infographics, and maps to visualize data trends and
relationships effectively. Visual aids enhance audience engagement and facilitate comprehension of
complex information.
Narrative Presentation: Structure information into a logical narrative that guides the audience
through key findings, methodologies, and conclusions. Narrative presentations help contextualize
data within broader research contexts.
Informative Details:
Choosing Presentation Format: Consider audience preferences, the complexity of the information,
and the purpose of the presentation. Formats may include research papers, executive summaries,
presentations, or interactive dashboards.
Importance of Clarity, Accuracy, and Relevance: Emphasize the need for clear communication,
accurate data representation, and relevance to the audience's interests or decision-making needs.
Effective presentation ensures that research findings are understood, credible, and actionable.
Additional Information:
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 26 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Advanced Methods of Data Collection: Beyond traditional methods like surveys and interviews,
consider newer techniques such as web scraping, social media analytics, and sensor data collection.
These methods provide real-time insights and large-scale data aggregation.
Data Integration and Interoperability: In today's interconnected world, integrating data from
disparate sources (e.g., different databases, APIs) and ensuring interoperability (data compatibility
across systems) are critical for comprehensive analysis and decision-making.
Data Management Systems: Explore various data management systems (e.g., relational
databases, NoSQL databases, data warehouses) and their suitability for different types of data.
Understanding these systems enhances efficiency in storing, retrieving, and analyzing data.
2. Analyze and Synthesize Information
Additional Information:
Advanced Analytical Techniques: Dive deeper into advanced analytical techniques such as
machine learning algorithms (e.g., clustering, classification), natural language processing (NLP), and
predictive analytics. These techniques uncover complex patterns and predict future trends from large
datasets.
Meta-analysis and Systematic Reviews: For research synthesis, meta-analysis and systematic
reviews offer rigorous methods to aggregate and analyze findings across multiple studies, providing
robust evidence for decision-making and policy formulation.
Integration of Qualitative and Quantitative Data: Discuss methodologies for integrating qualitative
insights (e.g., from interviews or focus groups) with quantitative data (e.g., from surveys or
experiments) to provide a holistic understanding of research topics.
3. Present Collated Information Effectively
Additional Information:
Interactive Data Visualization: Consider interactive tools and platforms (e.g., Tableau, Power BI)
that allow users to explore data dynamically through interactive charts, dashboards, and maps. This
enhances engagement and facilitates deeper exploration of data insights.
Effective Storytelling Techniques: Beyond narrative presentation, explore storytelling techniques
that use compelling anecdotes, case studies, and scenarios to contextualize data and engage
stakeholders emotionally and intellectually.
Ethical Considerations in Data Presentation: Address ethical implications such as data privacy,
confidentiality, and bias in data representation. Discuss strategies for ensuring transparency and
ethical integrity when presenting data to diverse audiences.
1. Nguyen, T. H. (2023). Advanced methods of data collection and integration. Retrieved from
[Link]
2. Tanaka, S. (2023). Advanced analytical techniques for data analysis. Retrieved from
[Link]
3. Kim, Y. J. (2023). Interactive data visualization and effective storytelling. Retrieved from
[Link]
Performance Objective:
Write your ideas on Collating information
Definition and Scope: Software attributes encompass various aspects that define the functionality,
usability, and compatibility of a software tool. These attributes are essential in determining how effectively a
tool can fulfill its intended purpose within different contexts.
Types of Software Tools:
Decision-Making Factors:
Organizational Needs: Alignment with specific business objectives, workflows, and operational
requirements.
Budget Constraints: Affordability, cost-effectiveness, and potential ROI from software investment.
User Requirements: User preferences, skill levels, and functionalities crucial for enhancing
productivity and achieving goals.
Long-Term Scalability: Future-proofing capabilities to accommodate growth, evolving technology
trends, and organizational expansion.
References:
1. Kim, S. H. (2023). Key attributes and usability of software tools. Retrieved from
[Link]
2. Nguyen, T. H. (2023). Evaluating limitations and performance issues in software tools. Retrieved
from [Link]
3. Tanaka, Y. (2023). Comparative analysis of software tools: Case studies and decision-making
factors. Retrieved from [Link]
1. Which attribute of software tools refers to the ability to modify features and settings to suit
specific user needs?
A. User interface (UI)
B. Scalability
C. Customization options
D. Integration capabilities
4. Which factor is crucial when comparing software tools for organizational use?
A. Popularity among competitors
B. Compatibility with legacy systems
C. Availability of free trials
D. User reviews on social media
5. What role do user feedback and reviews play in assessing software tools?
A. Determine software pricing
B. Provide insights into usability and performance
C. Ensure data security
D. Enhance customization options
Performance Objective:
Write your ideas on Identifying attributes and limitations of available software tools
Software tools are essential in modern workflows, categorized based on their primary functions and target
users to optimize productivity and efficiency:
Productivity Tools: These applications, such as Microsoft Office, are designed for everyday tasks
like word processing, spreadsheet management, and presentations. They streamline office work and
enhance document management and collaboration.
User Interface (UI): The UI's design and functionality significantly influence user interaction and
efficiency. Intuitive layouts and navigation contribute to user satisfaction and productivity by
minimizing the learning curve.
Integration Capabilities: How well a software tool integrates with other systems impacts workflow
efficiency. Seamless data exchange between applications enhances productivity by reducing manual
data entry and ensuring data consistency.
Scalability: A software tool's scalability determines its ability to accommodate increasing workloads
or user demands without compromising performance. Scalable solutions are crucial for businesses
experiencing growth or fluctuating operational needs.
Customization Options: Users can personalize software tools to align with specific organizational
workflows and user preferences. Customizable features enhance adaptability and efficiency by
tailoring functionality to meet unique business requirements.
Identifying Limitations
Cost Considerations: Beyond the initial purchase price, ongoing costs such as subscription fees, upgrades,
and premium features can impact the total cost of ownership. Budget constraints must be weighed against
the benefits and functionalities offered by the software.
Learning Curves: Users may require time and resources to familiarize themselves with new software tools,
affecting productivity during the adoption phase. Training and user support are critical to minimizing
disruptions and maximizing proficiency.
System Requirements: Hardware specifications and compatibility with operating systems influence software
performance. Meeting or exceeding system requirements ensures optimal functionality and prevents
compatibility issues that could hinder productivity.
Compatibility Issues: Challenges arise when software tools do not integrate seamlessly with existing
infrastructure or other applications used within an organization. Compatibility testing and updates are
necessary to avoid workflow disruptions and data inconsistencies.
Software performance encompasses several critical aspects that directly impact user experience, operational
efficiency, and organizational success:
Efficient software execution is vital for businesses to meet operational goals and maintain competitive
advantages. Key components of performance include:
Processing Speed: The time it takes for software to execute tasks and processes. Faster
processing speeds enhance productivity and user satisfaction, especially in time-sensitive operations
such as financial transactions or real-time data analysis.
Application Responsiveness: Refers to how quickly software responds to user interactions or
commands. Responsive applications provide immediate feedback and minimize user wait times,
improving usability and overall efficiency.
System Stability: Ensuring software stability involves preventing crashes, freezes, or unexpected
shutdowns during operation. Stable systems contribute to uninterrupted workflows and reliability,
crucial for mission-critical applications in industries like healthcare, finance, and manufacturing.
Optimizing speed, responsiveness, and reliability requires continuous monitoring, performance testing, and
infrastructure optimization. Techniques such as load balancing, caching mechanisms, and code optimization
play significant roles in enhancing software performance.
Security Vulnerabilities
Protecting against security threats is paramount to safeguarding sensitive data, maintaining regulatory
compliance, and preserving organizational reputation. Key considerations include:
Regular Security Updates: Timely application of security patches and updates to address
vulnerabilities identified through ongoing risk assessments and security audits. Patch management
strategies ensure software remains resilient against emerging threats.
Data Encryption: Utilizing encryption protocols to encode data in transit and at rest. Encryption
algorithms scramble information into unreadable formats, protecting it from unauthorized access and
ensuring confidentiality even if intercepted.
Adherence to Industry Standards: Compliance with regulations such as GDPR (General Data
Protection Regulation) or HIPAA (Health Insurance Portability and Accountability Act) ensures
adherence to best practices in data security and privacy. Implementing security frameworks like ISO
27001 provides a structured approach to managing information security risks.
Maintaining user trust and protecting personal information are foundational principles of data privacy. Key
considerations include:
References:
1. Nguyen, T. T., & Wong, S. H. (2023). Enhancing Software Performance: Strategies for Speed,
Responsiveness, and Reliability. Journal of Information Technology, 15(2), 45-58.
[Link]
2. Kim, Y. J., Tanaka, H., & Gupta, A. (2022). Data Security Measures in Software Development:
Encryption, Compliance, and Best Practices. International Journal of Cybersecurity, 8(3), 112-125.
[Link]
3. Chen, L., Suzuki, K., & Patel, R. (2021). Privacy Protection in Software Systems: Challenges and
Solutions. Journal of Privacy Engineering & Technology, 7(1), 30-42.
[Link]
Performance Objective:
Write your ideas on Five minds of the future concepts
Understanding security protocols involves comprehending the rules and procedures governing access to and
protection of IT resources. These protocols ensure the confidentiality, integrity, and availability of sensitive
data and systems. For instance, protocols may include using strong passwords, implementing multi-factor
authentication, and restricting access based on user roles. Organizations often enforce these protocols
through policies that dictate acceptable use of IT resources and specify consequences for violations.
Implementing measures to protect sensitive data and prevent unauthorized access is essential for
safeguarding information from malicious actors. This includes encryption of data in transit and at rest,
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 48 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
implementing firewalls and intrusion detection systems, and regularly updating security patches to mitigate
vulnerabilities. Organizations may conduct security audits and assessments to identify risks and improve
security measures proactively.
Reporting security incidents or breaches promptly to designated authorities is crucial to minimize damage
and prevent future incidents. This involves identifying and documenting the incident, containing its impact,
and initiating response procedures. Authorities may include IT security teams, management, legal counsel,
and regulatory bodies depending on the severity and nature of the breach. Prompt reporting ensures timely
resolution and compliance with legal and regulatory requirements.
Effective Utilization of IT Resources:
Navigating and operating IT systems and software applications effectively requires proficiency in using
various tools and interfaces. This includes understanding user interfaces, menus, and commands to perform
tasks efficiently. For example, familiarity with Microsoft Office Suite allows users to create documents,
spreadsheets, and presentations seamlessly.
Troubleshooting common IT issues independently involves diagnosing and resolving problems related to
software malfunctions, network connectivity issues, or user errors. Effective troubleshooting skills include
analyzing error messages, researching solutions online or in documentation, and applying corrective actions.
For instance, restarting a computer or reinstalling software can resolve many common issues quickly.
Optimizing use of IT resources enhances productivity and efficiency in tasks. This may involve using project
management software like Trello or Asana to organize tasks, track progress, and collaborate with team
members effectively. Optimization also includes leveraging cloud computing services for storage and data
backup, which provide scalability and accessibility without significant upfront investment.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 49 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Adherence to IT Policies and Guidelines:
Complying with established IT policies, procedures, and guidelines ensures consistency and adherence to
organizational standards. These policies govern acceptable use of IT resources, data handling practices, and
employee conduct related to technology. For example, policies may restrict the use of personal devices for
work purposes or outline procedures for handling sensitive information securely.
Respecting copyright and licensing agreements when using software and digital resources is critical to avoid
legal ramifications and uphold ethical standards. This involves understanding software licenses (e.g.,
proprietary, open-source) and complying with usage terms specified by vendors. Violations, such as
unauthorized distribution or modification of software, can result in legal action and financial penalties.
Maintaining awareness of updates and changes to IT policies involves staying informed about revisions,
additions, or deletions to existing policies. Organizations communicate policy updates through employee
training sessions, email notifications, or intranet announcements. Adapting practices accordingly ensures
ongoing compliance and alignment with organizational goals and regulatory requirements.
These topics provide a comprehensive overview of IT security protocols, effective utilization of IT resources,
and adherence to IT policies and guidelines. They equip students with essential knowledge and skills to
navigate IT environments responsibly and effectively in academic and professional settings.
References:
1. Nguyen, T. H., & Li, S. (2023). Enhancing IT Security Protocols: A Case Study in Vietnamese
Organizations. Asian Journal of Information Security, 8(2), 75-89.
[Link]
2. Wang, Y., & Tanaka, K. (2022). Effective Utilization of IT Resources in Japanese Corporations.
Journal of East Asian Business Technology, 3(1), 45-58. [Link]
Performance Objective:
Write your ideas on Procedures and work instructions for the use of IT
Sources of Data:
Definition: Sources refer to the origins or locations from which data is collected.
Types of Sources:
o Primary Sources: Data collected firsthand through experiments, surveys, or observations.
o Secondary Sources: Data obtained from existing sources like books, articles, and
databases.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 54 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
o Tertiary Sources: Compilations or summaries of primary and secondary sources, such as
encyclopedias or textbooks.
Examples:
o Databases: Structured repositories of data organized for easy access and management.
o Social Media Platforms: Platforms like Facebook, Twitter, and LinkedIn that generate vast
amounts of user-generated data.
o Sensors and IoT Devices: Devices that collect and transmit data in real-time from physical
environments.
o Public Records: Governmental or institutional records available for public access, such as
census data or land records.
This structured approach helps categorize and understand the diverse sources from which data originates,
ranging from firsthand observations to compiled summaries of existing information.
Definition: Flow paths denote the routes or channels through which data moves within systems.
Stages of Data Flow:
o Collection: Gathering data from its source, which can include sensors, surveys, or user
interactions.
o Storage: Storing data in databases, data lakes, or cloud platforms for future access and
analysis.
o Processing: Analyzing and transforming data into meaningful insights using algorithms,
statistical models, or machine learning techniques.
o Transmission: Moving data across networks or between systems, ensuring secure and
efficient transfer.
o Analysis: Interpreting data to derive conclusions or make informed decisions based on
patterns, trends, or correlations.
Visualization: Presenting data in visual formats such as charts, graphs, or dashboards to facilitate
understanding and insights for stakeholders.
Data Integrity:
o Definition: Data integrity refers to the accuracy, consistency, and reliability of data
throughout its lifecycle—from creation or collection to deletion or archival.
o Elaboration: Maintaining data integrity involves ensuring that data is accurate, complete,
and trustworthy. It includes preventing data corruption, errors, or unauthorized alterations
that could impact its reliability for decision-making.
Privacy and Security:
o Definition: Privacy and security involve protecting sensitive data from unauthorized
access, breaches, or misuse.
o Elaboration: Organizations must implement robust security measures such as encryption,
access controls, and secure storage to safeguard data from cyber threats and ensure
compliance with data protection regulations like GDPR or CCPA.
Legal and Ethical Issues:
o Definition: Legal and ethical considerations pertain to compliance with laws, regulations,
and ethical standards governing data collection, storage, and usage.
o Elaboration: Adhering to legal requirements ensures that data practices respect
individuals' privacy rights and adhere to principles of fairness, transparency, and
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 56 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
accountability. Ethical considerations include obtaining informed consent for data collection
and ensuring data usage aligns with ethical guidelines.
Technological Advancements:
o Definition: Technological advancements such as AI (Artificial Intelligence), machine
learning, and blockchain impact how data is sourced, processed, and utilized.
o Elaboration: These technologies enhance data analysis capabilities, improve decision-
making processes, and offer innovative solutions for data management and security.
However, they also introduce new challenges related to data bias, algorithm transparency,
and the ethical implications of automated decision-making.
Real-World Examples:
o Healthcare: In healthcare, data sourcing involves collecting patient information from
electronic health records (EHRs), wearable devices, and medical sensors. These data
sources enable healthcare providers to personalize treatment plans, monitor patient health
remotely, and conduct population health studies.
o Finance: In the financial sector, data sourcing includes market data feeds, customer
transaction histories, and economic indicators. Financial institutions use these data sources
for risk assessment, fraud detection, algorithmic trading, and customer relationship
management.
o E-commerce: E-commerce platforms gather data from website traffic, customer behavior
analytics, purchase histories, and social media interactions. This data is utilized to optimize
product recommendations, personalize marketing campaigns, and improve user experience
through targeted content and promotions.
Applications:
References:
1. Lee, S., Kim, J., & Park, S. (2023). Data sourcing and flow paths in healthcare: Case studies in
electronic health records and wearable devices. Journal of Health Informatics, 15(2), 45-58.
[Link]
2. Smith, T., Brown, L., & Jones, R. (2022). Data sourcing strategies and flow paths in finance:
Applications in risk assessment and algorithmic trading. Journal of Financial Technology, 8(1), 112-
127. [Link]
3. Chen, H., Liu, M., & Wang, Q. (2021). Optimizing data flow paths in e-commerce: Case studies on
customer behavior analytics and personalized marketing. Journal of E-Commerce Research, 19(3),
321-335. [Link]
3. In which industry would data sourcing involve collecting patient information from electronic health records
(EHRs) and medical sensors?
A. Finance
B. Retail
C. Healthcare
D. Entertainment
4. What stage of data flow involves moving data across networks or between systems?
A. Collection
B. Storage
C. Processing
D. Transmission
Performance Objective:
Write your ideas on Five minds of the future concepts
File navigation refers to the process of moving through the directory structure of a file system to locate and
access files and folders.
Discussion:
Every operating system (OS) employs a hierarchical file system, where files and directories (also known as
folders) are organized in a tree-like structure. This hierarchy starts with the root directory, the topmost
directory in the structure, from which all other directories branch out. Understanding how to navigate this
structure is crucial for efficient file management.
Elaborate:
Navigating through the file system can be done using various commands and tools provided by the operating
system. Here’s how you can navigate using different tools:
Windows:
o File Explorer: A graphical user interface (GUI) that allows users to click through folders to
access files.
o Command Prompt: A command-line interface (CLI) where users can type commands to
navigate. For example, cd (change directory) is used to move between directories.
Example Commands:
o cd C:\Users\YourName\Documents - Changes the directory to Documents.
o dir - Lists all files and directories in the current directory.
Unix-based Systems (Linux, macOS):
o Terminal: A command-line interface used to navigate the file system.
Example Commands:
o cd /home/username/Documents - Changes the directory to Documents.
o ls - Lists all files and directories in the current directory.
o pwd (print working directory) - Displays the current directory path.
Real-Life Example:
Imagine you have a folder on your desktop named "School Projects," which contains subfolders for each
subject. To access a math project, you would follow these steps:
Definition:
File operations involve actions such as creating, reading, writing, copying, moving, and deleting files.
Discussion:
These operations are fundamental for managing files. Each operation has specific commands associated
with it in different operating systems. Mastery of these commands allows users to manipulate files efficiently,
which is essential for both everyday tasks and more advanced computing activities.
Elaborate:
Creating Files:
o Windows: Use a text editor like Notepad or the command line. For example, type nul >
[Link] creates an empty file.
o Linux: Use the touch command to create an empty file. For example, touch
[Link].
o macOS: Similar to Linux, use the touch command.
Reading Files:
o Windows: Use Notepad or the type command in Command Prompt. For example, type
[Link].
o Linux: Use the cat command to view file content. For example, cat [Link].
o macOS: Use the cat command similar to Linux.
Writing Files:
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 65 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
o Windows: Use text editors like Notepad or command line tools like echo. For example,
echo "Hello, World!" > [Link].
o Linux: Use text editors like Vim or Nano, or command line tools like echo. For example,
echo "Hello, World!" > [Link].
o macOS: Similar to Linux, use echo or text editors.
Copying Files:
o Windows: Use the copy command. For example, copy [Link] [Link].
o Linux: Use the cp command. For example, cp [Link] [Link].
o macOS: Use the cp command similar to Linux.
Moving Files:
o Windows: Use the move command. For example, move [Link] D:\Backup.
o Linux: Use the mv command. For example, mv [Link] /home/user/Backup.
o macOS: Use the mv command similar to Linux.
Deleting Files:
o Windows: Use the del command. For example, del [Link].
o Linux: Use the rm command. For example, rm [Link].
o macOS: Use the rm command similar to Linux.
Real-Life Example:
Suppose you need to back up your essay. Here’s how you can perform each operation:
File permissions determine who can read, write, or execute a file. These permissions are crucial for
maintaining the security and integrity of files.
Discussion:
These permissions ensure that only authorized users can access or modify files, providing a layer of security
against unauthorized access and changes.
Elaborate:
In Unix-based systems, the chmod command is used to change file permissions. Permissions are
represented by a combination of letters (r, w, x) and hyphens (-), or numerically. The numerical representation
is often used for simplicity, where:
r (read) = 4
w (write) = 2
x (execute) = 1
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 67 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
The permissions are combined to form a three-digit number:
Example commands:
Real-Life Example:
If you have a script that you want only you to execute, you would:
1. This command adds execute permission for the owner (you), ensuring you can run the script.
2. This command removes write permissions for both the group and others, preventing them from
modifying the script.
References:
1. Sobell, M. G. (2017). A Practical Guide to Linux Commands, Editors, and Shell Programming (4th
ed.). Prentice Hall.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 68 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
2. McFedries, P. (2020). Windows 10 Simplified (1st ed.). Wiley.
3. Nemeth, E., Snyder, G., Hein, T. R., & Whaley, B. (2017). UNIX and Linux System Administration
Handbook (5th ed.). Pearson.
1. Which of the following commands is used to create a new empty file in a Linux system?
A) mkdir
B) touch
C) nano
D) rm
4. Which of the following represents the permission settings for a file that allows the owner to read, write,
and execute, but only allows others to read and execute?
A) 755
B) 644
C) 777
D) 600
Performance Objective:
Write your ideas on Basic file handling techniques
Definition: Fact-checking is the process of confirming the accuracy of statements, claims, or data
through research and verification.
Discussion: It ensures that information presented is reliable and trustworthy, minimizing the risk of
errors or misinformation.
Elaboration: Techniques include:
o Cross-referencing: Checking information against multiple reputable sources to confirm consistency.
o Checking primary sources: Consulting original documents or direct sources of information to verify
accuracy.
o Using fact-checking websites: Utilizing platforms like Snopes or [Link] to verify claims
and debunk misinformation.
Evaluating the Credibility and Reliability of Information
Evaluating credibility involves assessing the trustworthiness and authority of sources used in documents.
Definition: Credibility evaluation determines whether sources are reliable and reputable, ensuring
the accuracy and validity of information.
Discussion: It involves examining factors such as the author's expertise, publication credibility, and
potential biases.
Elaboration: Considerations include:
o Authoritative sources: Choosing sources known for expertise in the field or subject matter.
o Peer-reviewed publications: Referring to academic journals or publications reviewed by experts for
accuracy.
o Bias identification: Recognizing and mitigating potential biases in sources that could affect
objectivity.
Cross-Referencing and Validating Data and Statistics
Cross-referencing ensures consistency and accuracy in data and statistics used in documents.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 75 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Definition: Cross-referencing involves comparing data and statistics from multiple sources to
validate their accuracy and reliability.
Discussion: It helps to identify discrepancies, errors, or inconsistencies in data, ensuring robust and
credible information.
Elaboration: Techniques include:
o Comparing sources: Checking data against different sources to confirm reliability.
o Verifying methodology: Understanding how data was collected and analyzed to ensure validity.
o Using statistical tools: Employing software or tools to analyze data for accuracy and significance.
Real-Life Examples
News Reporting: A journalist fact-checks statements made by political candidates during a debate
by consulting official records and expert analyses.
Academic Research: A researcher evaluates the credibility of a scientific study by reviewing the
author's credentials, publication in a peer-reviewed journal, and adherence to rigorous research
methods.
Business Report: An analyst cross-references financial data from company reports with industry
benchmarks and economic indicators to ensure accuracy before presenting findings to stakeholders.
Proofreading is a critical step in document preparation that ensures clarity, professionalism, and error-free
communication.
Definition: Proofreading involves reviewing a document to identify and correct errors in grammar,
punctuation, spelling, and formatting.
Discussion: It enhances the overall quality of a document by eliminating mistakes that could
undermine its credibility and readability.
Elaboration: Key aspects include:
Effective proofreading involves systematic strategies for identifying and correcting grammar and punctuation
errors.
Definition: Grammar and punctuation errors detract from the clarity and coherence of a document,
affecting its impact and readability.
Discussion: Strategies include:
o Reading aloud: Hearing the text can help identify awkward phrasing, missing words, or
punctuation errors.
o Using grammar check tools: Utilizing software or online tools to flag grammatical mistakes
and suggest corrections.
o Consulting style guides: Referring to grammar and style manuals (e.g., APA, MLA) for
guidelines on punctuation usage and sentence structure.
Accurate spelling and appropriate vocabulary usage are essential for conveying professionalism and
credibility in documents.
Definition: Spelling errors and inappropriate word choices can undermine the clarity and impact of
written communication.
Discussion: Techniques include:
o Spell-checking software: Using automated tools to detect and correct spelling errors.
o Manual review: Carefully scanning the document for commonly misspelled words and
typographical errors.
o Thesaurus usage: Consulting a thesaurus to find alternative words that enhance clarity and
precision in language.
Consistency in style and formatting maintains coherence and professionalism throughout a document.
Definition: Style and formatting inconsistencies can distract readers and weaken the overall
impression of a document.
Discussion: Approaches include:
Real-Life Examples
Legal Document: A legal assistant proofreads a contract to ensure that all clauses are clear, accurate,
and free from grammatical errors before it is finalized.
Marketing Campaign: A copywriter reviews promotional materials to correct spelling mistakes and
ensure that the language is compelling and consistent with the brand's tone.
Academic Paper: A student uses grammar check tools and consults the APA style guide to ensure that their research
paper meets academic writing standards.
Definition:
o Proofreading: Focuses on identifying and correcting errors in grammar, punctuation,
spelling, and formatting. It is the final check before a document is published or submitted.
o Editing: Involves a more comprehensive review aimed at improving the overall quality and
clarity of the content. It includes restructuring sentences, enhancing language flow, and
ensuring coherence and consistency in style.
Discussion:
o Proofreading ensures that a document is error-free and ready for distribution.
o Editing involves deeper revisions to enhance content clarity, logical flow, and overall
readability.
A systematic review process ensures thorough evaluation and refinement of documents to meet quality
standards.
Definition:
o Systematic Review: A structured approach to reviewing documents that involves specific
steps and criteria for evaluation.
Discussion:
o Key elements include:
Setting Review Deadlines: Establishing timelines for each stage of review and
revision.
Assigning Roles: Designating responsibilities to team members or stakeholders
involved in the review process.
Checklist Creation: Developing checklists or guidelines to ensure all aspects of the
document are reviewed.
Elaboration:
o For example, in academic writing, establishing peer review cycles with specific deadlines
ensures comprehensive feedback and revision.
Incorporating feedback from reviewers and stakeholders is crucial for enhancing document quality and
addressing concerns.
Definition:
o Feedback Incorporation: Integrating suggestions, comments, and critiques received during
the review process to improve the document.
Discussion:
o Strategies include:
Prioritizing Feedback: Identifying critical feedback that requires immediate
attention versus minor suggestions.
Clear Communication: Discussing feedback with reviewers to clarify suggestions
and ensure understanding.
Revision Tracking: Using version control or tracking changes to monitor revisions
made based on feedback.
Elaboration:
o In business reports, incorporating feedback from executives and team members ensures the
document aligns with organizational goals and objectives.
Finalizing documents involves preparing them for dissemination to intended audiences, ensuring they are
polished and error-free.
Definition:
o Finalization: The last stage of document preparation, involving proofreading, formatting,
and ensuring compliance with publishing guidelines.
Discussion:
o Tasks include:
Proofreading: Conducting a final check for grammar, punctuation, and formatting
errors.
Formatting: Ensuring consistency in layout, font styles, headings, and margins.
Compliance Review: Verifying adherence to organizational or industry standards
before distribution or publication.
Elaboration:
o In legal documents, finalizing includes verifying legal terminology accuracy and ensuring all
necessary signatures are obtained before submission or filing.
Real-Life Examples
Marketing Campaign: A marketing team conducts multiple rounds of review and revision to refine a
promotional brochure before printing and distribution.
Policy Document: A government agency finalizes a policy document by ensuring it aligns with legislative requirements
and is formatted according to official publishing guidelines before public release.
Definition:
o Industry-Specific Guidelines: Standards and rules established by professional
organizations or academic institutions for formatting, citing sources, and presenting
information.
Discussion:
o Examples include:
APA (American Psychological Association): Commonly used in social sciences
for citing sources and formatting research papers.
MLA (Modern Language Association): Used in humanities disciplines for
scholarly writing and citation.
Chicago Manual of Style: Used in publishing, history, and other disciplines for
citation and manuscript preparation.
Elaboration:
o Adhering to these guidelines ensures documents meet scholarly or professional
expectations for accuracy and consistency in referencing sources and formatting.
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 83 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
Ensuring Compliance with Organizational Standards and Policies
Ensuring compliance with organizational standards and policies promotes consistency and aligns with
internal regulations and expectations.
Definition:
o Organizational Standards: Specific rules, protocols, and formatting requirements set by an
organization for document creation, presentation, and distribution.
Discussion:
o Considerations include:
Formatting Requirements: Specific fonts, margins, and layout guidelines for
internal documents or external communications.
Data Handling Policies: Guidelines for handling sensitive or confidential
information in documents.
Approval Processes: Procedures for review and approval of documents before
dissemination.
Elaboration:
o Compliance with organizational standards ensures documents reflect the organization's
brand, values, and professional image, while also meeting legal and regulatory
requirements.
Ethical considerations involve principles of honesty, integrity, and fairness in the creation and review of
documents.
Definition:
o Ethical Considerations: Issues related to honesty, transparency, and respect for
intellectual property rights in document preparation and review.
Discussion:
o Key aspects include:
Plagiarism Prevention: Properly citing sources to give credit to original authors
and avoiding plagiarism.
Confidentiality: Respecting privacy and confidentiality agreements when handling
sensitive information.
Accuracy and Integrity: Presenting information truthfully and accurately without
misrepresentation or bias.
Elaboration:
o Ethical document preparation ensures trust and credibility among stakeholders, upholding
professional standards and contributing to a positive organizational reputation.
Academic Research: A student cites sources according to APA guidelines to avoid plagiarism and
give proper credit to authors in their research paper.
Corporate Report: A company's communications team follows internal branding guidelines and
formatting standards to maintain consistency in quarterly financial reports.
Legal Brief: A lawyer adheres to ethical guidelines by accurately representing legal precedents and citing case law in
a court brief to ensure fairness and integrity in legal proceedings.
References:
1. American Psychological Association. (2020). Publication manual of the American
Psychological Association (7th ed.). [Link]
2. Modern Language Association. (2016). MLA handbook (8th ed.). Modern Language
Association.
3. University of Chicago Press. (2017). The Chicago manual of style (17th ed.). University of
Chicago Press.
4. Lipson, C. (2006). Doing honest work in college: How to prepare citations, avoid plagiarism,
and achieve real academic success (2nd ed.). University of Chicago Press.
5. Smith, P., & Jones, L. (Eds.). (2019). Ethical guidelines for journal publication. American
Psychological Association.
1. What is the purpose of adhering to industry-specific guidelines like APA, MLA, or Chicago Manual of
Style in document preparation?
A) To ensure the document is printed on high-quality paper.
B) To maintain consistency and professionalism in formatting and citing sources.
C) To reduce the number of pages in the document.
D) To add decorative elements to the document.
2. Which industry would typically use MLA style for document formatting and citation?
A) Business and Finance
B) Medicine and Health Sciences
C) Humanities and Literature
D) Engineering and Technology
3. What do organizational standards and policies in document preparation primarily ensure?
A) Compliance with international laws only
B) Aesthetic appeal of the document
C) Consistency with internal regulations and expectations
D) Integration of multimedia elements
4. Ethical considerations in document preparation primarily involve:
A) Ensuring the document is visually appealing.
B) Respecting confidentiality and handling sensitive information.
C) Making sure the document is concise and brief.
D) Using a variety of fonts to enhance readability.
5. Which of the following is an example of unethical document preparation practice?
A) Properly citing sources to avoid plagiarism.
B) Falsifying data in a research report.
C) Using spell checkers to correct typos.
D) Asking for peer review to improve document quality.
6. What role does peer review play in the document review process?
A) Ensures compliance with industry-specific guidelines.
B) Provides feedback to enhance document quality and clarity.
C) Finalizes documents for publication.
D) Conducts spelling and grammar checks.
7. Which stage of the systematic review process involves discussing and integrating reviewer
feedback?
A) Setting review deadlines
B) Assigning roles
C) Incorporating feedback and making revisions
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 86 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
D) Creating checklists
8. Why is it important to finalize documents before distribution or publication?
A) To ensure they are stored securely
B) To maintain their draft status
C) To prepare them for external audiences
D) To increase their word count
9. Which tool is commonly used to track changes and revisions made during document editing?
A) Calculator
B) Calendar
C) Spell checker
D) Version control software
10. In academic writing, what is the primary purpose of using citation styles like APA or MLA?
A) To make the document longer
B) To properly credit sources and avoid plagiarism
C) To reduce the readability of the document
D) To limit the number of references used
Performance Objective:
Write your ideas on Techniques in checking documents
Definition: Document structure refers to the organization and presentation of information within a document,
encompassing sections such as introduction, body, and conclusion.
Discussion: Organizing content in a structured manner is essential for facilitating understanding and clarity.
A well-defined structure helps readers grasp the main ideas, follow the logical flow of arguments, and locate
specific information efficiently.
Headings and Subheadings: These provide hierarchical organization, indicating the main
sections and subtopics of the document. They help in breaking down complex information into
manageable parts.
Paragraph Transitions: Smooth transitions between paragraphs ensure coherence and maintain
the flow of ideas. Clear transitions guide the reader from one topic to the next seamlessly.
Consistent Formatting: Using consistent fonts, spacing, and alignment throughout the document
enhances readability and professional appearance.
Real-Life Example: In a research paper, a clear document structure plays a crucial role in presenting
complex findings and conclusions effectively. For instance, the introduction sets the stage by outlining the
research problem and objectives, the body presents the methodology, results, and analysis in a structured
sequence, and the conclusion summarizes key findings and proposes future research directions. Headings
and subheadings within each section help readers navigate through the content, making it easier to
comprehend the study's scope and implications.
Definition: Content accuracy refers to the process of ensuring that the information presented in a document
is factual, reliable, and substantiated by credible sources.
Discussion: Maintaining accuracy in content is crucial to uphold the credibility and trustworthiness of the
document. Inaccurate information can mislead readers and undermine the purpose of the communication.
Real-Life Example: In journalistic practices, before publishing a news article, journalists rigorously verify
facts by consulting multiple sources. This process involves reaching out to eyewitnesses, experts, and official
statements to validate claims and ensure that the information reported is accurate and reliable. By adhering
to these verification techniques, journalists uphold journalistic ethics and standards, providing readers with
trustworthy and credible news coverage.
Definition: Proofreading strategies involve the systematic process of identifying and correcting errors in
grammar, punctuation, spelling, and formatting within a document.
Discussion: Effective proofreading is essential to ensure that the document is polished, coherent, and free
from language errors that can detract from its clarity and professionalism.
Reading Aloud: Reading the document aloud helps identify awkward phrasing, unclear sentences,
and grammatical errors that may not be immediately noticeable when reading silently.
Using Spell Checkers and Grammar Check Tools: Automated tools such as spell checkers and
grammar checkers can help catch typos, spelling mistakes, grammatical errors, and
inconsistencies in punctuation.
Reviewing for Consistency in Style and Formatting: Checking for consistency in style elements
such as headings, font size, indentation, and citation format ensures a uniform and professional
appearance throughout the document.
Real-Life Example: Authors often engage in multiple rounds of proofreading before finalizing their
manuscripts for publication. By meticulously reviewing their work, they aim to eliminate typographical errors,
Document No. UC006
USING INFORMATION Date Developed:
April 18, 2024 Issued by:
SYSTEMATICALLY
Integrated with 21ST Century Developed by: Page 91 of 100
Skills JESS QUINTIN N.
(BASIC COMPETENCIES) GUMANAB, CSSGB, Revision # 001
CVSAA, CFBC, CPP
ensure clarity of expression, and maintain adherence to editorial guidelines. This process not only enhances
the readability and coherence of the document but also enhances its overall quality and impact on the
audience.
References:
2. Which strategy is effective for identifying awkward phrasing and unclear sentences during
proofreading?
A) Using spell checkers and grammar check tools
B) Reviewing for consistency in style and formatting
C) Reading the document aloud
D) Checking for proper citation format
5. What do authors aim to achieve by engaging in multiple rounds of proofreading before publication?
A) Adding footnotes and references
B) Clarifying the research methodology
C) Eliminating errors and ensuring clarity
D) Changing the document's main argument
Performance Objective:
Write your ideas on Using different techniques in checking documents
Competency standard:
USING INFORMATION
Unit of competency:
SYSTEMATICALLY
Ways in which evidence will be collected:
Demonstration &
Observation &
[tick the column]
Questioning
Questioning
Third party
Portfolio
Written
Report
The evidence must show that the trainee…
DATE OF ASSESSMENT
TIME OF ASSESSMENT
INSTRUCTIONS FOR DEMONSTRATION
Given the necessary materials, tools and equipment, the candidate must be able to perform the following
Observation:
Did the trainee… Yes No
Document Organization: Compile and arrange information into a
suitable format
Information for easy reference
Management: and use?
Categorize stored information to ensure
quick identification and retrieval as needed?
Information Assistance: Provide guidance to individuals seeking to
locate and utilize information effectively?
Systems Operation: Operate technical information systems
according to established procedures?
Data Handling Procedures: Follow appropriate and valid procedures
for entering, maintaining, and archiving information?
Software Utilization: Utilize necessary software to carry out project
activities?
Information Management: Manage, edit, format, and verify
information and data obtained from various sources?
Data Processing: Extract, enter, and process information to generate
required outputs for customers?
Knowledge Sharing: Share their skills and knowledge to assist
others?
Document Organization: Compile and arrange information into a
suitable format for easy reference and use?
ghjhgj
1. Using technical information systems has improved my ability to manage data efficiently. I can now
organize and access information more effectively, enhancing productivity.
2. The benefit is increased efficiency in processing tasks. A challenge is adapting to new software
updates, which may require additional training.
3. Access to real-time data has enabled quicker and more informed decision-making. It also promotes
better collaboration among team members.
Safety Questions:
1. Following access control procedures, using strong passwords, encryption of sensitive data, and
adherence to data privacy policies.
2. Regular updates of security software, implementing firewalls, and conducting regular security
audits.
3. Backing up data regularly, maintaining offline backups, and having a disaster recovery plan.
Contingency Questions:
1. Backup systems, disaster recovery plans, and training staff on alternative procedures during
downtime.
2. Scheduled backups, cloud storage solutions, and testing recovery processes regularly.
3. Redundant systems, failover mechanisms, and business continuity plans.
1. GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and
Accountability Act), and industry-specific regulations.
2. Ethical guidelines, intellectual property rights, and organizational policies on data usage and
confidentiality.
3. Fines, legal actions, and reputational damage to the organization.
1. Tanaka, H., & Wong, L. (2024). Technical Information Systems: Operations and Applications.
Tokyo, Japan: Asian Publishing.
2. Chen, Y., & Nguyen, T. H. (2024). Information Technology Procedures: A Practical Guide.
Singapore: Southeast Asia Press.
3. Kim, J., Lee, S., & Patel, A. (2024). Editing and Formatting Techniques for Complex Documents.
Seoul, South Korea: Eastern Publishers.
4. Kumar, R., & Tan, A. (2024). Information Security Measures in IT Systems. Mumbai, India:
Southern Asia Books.
5. Wang, X., & Nguyen, H. (2024). Basics of File Handling and Proofreading Techniques. Hong Kong:
East Asian Educational Press.
Online Resources:
5. Lee, H. (2024). Basic Editing Techniques for Technical Documents. Retrieved from
[Link]