0% found this document useful (0 votes)
44 views7 pages

Worksheet 2

Uploaded by

cherrycapacio83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views7 pages

Worksheet 2

Uploaded by

cherrycapacio83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Yllana Bay View College

“Builder of Future Leaders”


East Capitol Road, Enerio Street Balangasan District, Pagadian City
Department of General Education

Module
Computer 1
in
MIDTERM
Handouts &
Activity

Prepared by:
MR. RYAN E. ASTILLERO
SET.B
COMPUTER
Lesson The Proper Finger Keyboard
Position
2&3
The keyboard is a device for entering information into a computer. The
standard layout of letters, numbers, and punctuations is known as
QWERTY keyboard.
Four Basic Parts of a Keyboard

Other Keys on the Keyboard


mSpacebar – can make spaces
mEnter – lets you move down to the next line
mBackspace – erases the character on the left of the cursor
mDel/Delete – erases the character that the cursor is on
mCtrl/Control and Alt – pressed at the same time with another key
mEsc/Escape – used to close most programs
mCaps Lock – used to make all letters big

Windows Shortcuts
● Ctrl + C : Copy selected text or item.
● Ctrl + X : Cut selected text or item.
● Ctrl + V : Paste copied or cut text or item.
● Ctrl + Z : Undo the last action.
● Ctrl + Y : Redo the last undone action.
● Ctrl + A : Select all items in a document or window.
● Alt + Tab : Switch between open applications.
● Windows + D : Show desktop.
● Windows + L : Lock your computer.
SET.B
Microsoft Office (Windows)
● Ctrl + B: Bold selected text.
● Ctrl + I: Italicize selected text.
● Ctrl + U: Underline selected text.
● Ctrl + P: Print the document.
● Ctrl + S: Save the document.

Web Browsers (General)
● Ctrl + T: Open a new tab.
● Ctrl + W: Close the current tab.
● Ctrl + Shift + T: Reopen the last closed tab.
● Ctrl + L: Highlight the URL in the address bar.
● F5: Refresh the page.

Text Editing
● Ctrl + Arrow keys: Move the cursor by one word at a time.
● Shift + Arrow keys: Select text character by character.
● Ctrl + Backspace: Delete the previous word.
● open applications.
- **Command + H**: Hide the front window.
- **Command + Space**: Open Spotlight search.

Microsoft Office (Windows)


- **Ctrl + B**: Bold selected text.
- **Ctrl + I**: Italicize selected text.
- **Ctrl + U**: Underline selected text.
- **Ctrl + P**: Print the document.
- **Ctrl + S**: Save the document.

SET.B
Draw a computer keyboard on 1/8 illustration board and label all key parts, including
letters, numbers, and function keys. (Deadline of submission, Thursday 29 th)

Answer the quiz on the next part. Make sure that you understand the lesson well before
you proceed to the quiz.
Yllana Bay View College
“Builder of Future Leaders”
East Capitol Road, Enerio Street Balangasan District, Pagadian City
Department of General Education
ACTIVITY 2
GE
Computer Application 1
Name: _____________________________________________ Course/Year/Section:
_____________________

Directions: Choose and encircle the best answer from the given choices.

1. **What is the primary purpose of the commandment "Thou shalt not use a computer to
harm other people"?**
- A) To promote coding skills
- B) To discourage online harassment and cyberbullying
- C) To encourage competition
- D) To enhance user engagement
2. **Interfering with another person's computer work is considered:**
- A) A minor inconvenience
- B) Unethical behavior
- C) A competitive advantage
- D) A common practice
3. **Snooping around in someone else's computer files is a violation of:**
- A) User experience
- B) Privacy rights
- C) Software functionality
- D) Network speed
4. **Stealing, in the context of computer ethics, refers to:**
- A) Physical theft only
- B) Intellectual property theft
- C) Software updates
- D) System maintenance
SET.B
5. **Making unauthorized copies of software can lead to:**
- A) Improved software performance
- B) Legal consequences and harm to developers
- C) Enhanced user experience
- D) Increased market share
6. **Using someone else's computer resources without authorization is an example of:**
- A) Collaboration
- B) Ethical hacking
- C) Unethical behavior
- D) Network optimization
7. **Appropriating someone else's intellectual output without credit can lead to:**
- A) Improved creativity
- B) Legal repercussions and loss of trust
- C) Greater collaboration
- D) Enhanced reputation
8. **Considering the social consequences of a program you write means:**
- A) Focusing solely on profitability
- B) Ignoring user feedback
- C) Assessing impacts on privacy and accessibility
- D) Prioritizing technical specifications
9. **Using a computer with consideration and respect means:**
- A) Being mindful of online interactions
- B) Ignoring others' needs
- C) Prioritizing speed over ethics
- D) Focusing on personal gain
10. **The commandment "Thou shalt always use a computer in ways that are ethical" serves
as:**
- A) A guideline for best practices
- B) An optional suggestion
- C) A historical reference
- D) A financial strategy
11. **Why are these commandments particularly relevant in the digital age?**
- A) Technology is static
- B) They provide a moral framework amid rapid technological change
- C) Users prefer old-fashioned ethics
- D) Technology is rarely used
12. **What is a major challenge in enforcing computer ethics?**
- A) Lack of interest
- B) Anonymous online environments
- C) Overabundance of resources
- D) Clear regulations
13. **Evolving ethical standards in technology might include discussions about:**
- A) Network speeds
- B) AI ethics and algorithmic bias
- C) Hardware upgrades
- D) Software patches
14. **Promoting computer ethics through education helps to:**
- A) Increase technical skills only
- B) Create a culture of respect and responsibility
- C) Diminish user engagement
- D) Focus solely on profits
15. **What does the commandment about unauthorized software copying stress?**
- A) Creativity in software development
- B) Respect for intellectual property rights
- C) Freedom to use any software
- D) Ignoring licensing agreements
16. **Which commandment encourages thinking about how software impacts society?**
- A) Thou shalt not steal
SET.B
- B) Thou shalt think about social consequences
- C) Thou shalt not interfere with others
- D) Thou shalt not snoop
17. **What is the consequence of not following the ethical commandment about privacy?**
- A) Improved collaboration
- B) Legal issues and loss of trust
- C) Enhanced software development
- D) Increased market competition
18. Using a computer in ways that show consideration includes:
- A) Ignoring other users' needs
- B) Promoting a positive online environment
- C) Focusing solely on personal gain
- D) Disregarding feedback
19. Which of the following is a form of intellectual property theft?
- A) Sharing software with friends
- B) Writing original content
- C) Plagiarism
-D) Taking notes in class
20. Why is it important to think about the ethical implications of technology?
A) To gain competitive advantages
B) To ensure responsible use and impact on society
C) To focus solely on profits
D) To simplify software design

SET.B
21. Which fingers are primarily used for the letter 'F'?
A) Left Pinky
B) Left Index
C) Right Index
D) Right Pinky

22. What is the home row for touch typing?


A) A, S, D, F, G, H, J, K, L
B) Q, W, E, R, T, Y, U, I, O, P
C) Z, X, C, V, B, N, M
D) A, B, C, D, E, F, G

23. Which finger is used to press the 'Enter' key?


A) Left Pinky
B) Right Pinky
C) Right Index
D) Right Ring

24. For the letter 'K', which finger should you use?
A) Left Index
B) Right Index
C) Right Middle
D) Right Ring

25. What is the primary function of the left pinky finger while typing?
A) Press the space bar
B) Press keys like 'A', 'Q', 'Z', and Shift
C) Press the 'B' key
D) Press the 'N' key

26. Which finger is responsible for the 'C' key?


A) Right Index
B) Left Index
C) Left Middle
D) Left Ring

27. Where should your wrists be positioned while typing?


A) Elevated above the keyboard
B) Resting on the keyboard
C) Floating above the keyboard
D) Angled downward

28. Which keys should the right ring finger press?


A) Y, H, U, J
B) O, L, K, M
C) I, P, O, L
D) G, T, F, R

29. What is the correct way to position your fingers when not typing?
A) Curled over the keyboard
B) Resting lightly on the home row
C) Pointing straight up
D) Clenched into a fist

30. Which finger is used to type the 'Z' key?


A) Left Index
B) Left Ring
C) Left Pinky

SET.B

You might also like