0% found this document useful (0 votes)
8 views

Short note Level 1 for WDDBA (2)

The document outlines key competencies related to workplace organization through the 5S procedure, internet configuration, hardware connection, software installation, and system protection. It details the evolution of the Internet, including the development of ARPANET, TCP/IP, and the World Wide Web, along with essential computer hardware and software concepts. Additionally, it emphasizes the importance of occupational health and safety in the workplace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Short note Level 1 for WDDBA (2)

The document outlines key competencies related to workplace organization through the 5S procedure, internet configuration, hardware connection, software installation, and system protection. It details the evolution of the Internet, including the development of ARPANET, TCP/IP, and the World Wide Web, along with essential computer hardware and software concepts. Additionally, it emphasizes the importance of occupational health and safety in the workplace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Level – 1 Short note

Unit of Competence: Apply 5s procedure


5S is a systematic way of organizing workplaces by eliminating waste, improving flow, and reducing the
number of processes where possible. There are 5 Easy Steps for You and Your kaizen steps:
1. Sort (seiri /tidiness/organize): - is involves keeping only what’s absolutely necessary in the processes in
the work area
2. Set in order (seiton/): - Organize & identify storage for efficient
3. Shine (seiso/cleanliness): - clean & inspect each area regularly
4. Standardize (seiketsu): -activities that help maintain the order & the housekeeping standards
5. Sustain (shitsuke/discipline)
An occupational health and safety (OHS) policy is an employer's written commitment to the health and
safety of both their employees and their workplace.

Unit of Competence: Configure and Use Internet


The Internet "the Net," is a worldwide system of computer networks (a network of networks).
Basic Internet terms
 ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the United
States Department of Defense developed ARPANET. Internet is the successor of ARPANET.
 Internet Service Provider (ISP): A company, which provides users with an access to the Internet, is
known as an Internet service provider or Internet access provider.
 IP Address: It is a way of numerically identifying an entity on a computer network.
 Cyberspace: This term coined by William Gibson, is used to refer to the computer networks
connected to each other and the content they host. It is often used to refer to the Internet.
 WWW (World Wide Web): It is a collection of interlinked documents that are accessible over the
Internet
 Website: is a set of web pages consisting of text, audio and video.
 URL (Uniform Resource Locator): It specifies the location of a resource on the Internet. It consists
of the basic address and path.
 Web Browser: is a software application that facilitates user interaction with the text, audio, video
and other information that is located on the web.
 A search engine: is a tool we use to find websites and information on the Internet.
 Cache: Web browsers maintain a cache of recently visited web pages.
 HTTP: Hypertext Transfer Protocol, abbreviated as, is a communications protocol used for the
transfer of information over the Internet. A client makes an HTTP request using a web browser to
which an HTTP response is sent from the server.

Compiled By. WDDBA_COC Center TG Channale


 Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged between the web
client and the web server. It is sent by the web server to the web client and returned unchanged by
the client each time it accesses the server.
 Session: It is an exchange of information between a computer and its user. It is established for a
certain period of time after which it ends.
 Hyperlink: A reference in a document to another section of the document or to another document is
termed as a hyperlink.
 Domain name: is a unique name associated with a specific IP address by a program that runs on an
Internet host computer.
 This program, which coordinates the IP addresses and domain names for all computers attached to it,
is called DNS (Domain Name System).
 The host computer that runs this software is called domain name server.

The making of the Internet


 The beginning
- The beginning was in mid 1940s which is 1949.
- Initial Goal - to use the downtime of computers efficiently.
- Start of the DARPA project - 1969 Started in California.
-They start with 10 computers interconnected each other.
- They created the first network of computers and called it ARPANET.

 First challenge: - The switching problem.


- Invented Packet Switching (Still in use)

 Second Challenge: - keeping updated list of addresses.


- In 1973, Stanford became the official central record keeper.

 Third Challenge: - packet formatting and transmitting standardization issue.


- Hence, in 1983, the famous Transmission Control Protocol/Internet Protocol (TCP/IP) got developed.
What is TCP/IP
- It has four layers
- The application layer, The transport layer, The network layer, The physical layer
- As a web developer, the layer that you are most interested on are the Application layer protocols.
Mostly HTTP and FTP
- These connected network of computer networks, that follow the TCP/IP protocol to communicate is
called THE INTERNET.

 Fourth Challenge: - Keeping the updated list of all the addresses


- the invented of Domain Name System (DNS)

Compiled By. WDDBA_COC Center TG Channale


 Fifth Challenge: -Lack of information organization on the Internet
- As more and more people got connected to the Internet, more and more useful researches and
information were made publicly available
- These researches were made available in plain text format, but it was hard to navigate through all
these documents easily
- In 1989, Tim Berners-Lee, the God Father of the Internet proposed a way to solve this problem to
CERN, where he used to work at the time.
- To assist his proposal:
- He developed a way to create a Hypertext (link) and Mark the texts using tags. He called it the -
Hypertext Markup Language (HTML)
- He also developed a standard protocol to transmit these Marked documents (HTMLs), He called that
protocol the Hyper Text Transfer Protocol (HTTP)
- In 1993, they released this method of organizing the Internet to the public, it called World Wide Web.

 Sixth Challenge: Information overflow


- Their solution:
1. Crawl and collect all the web pages on the Internet into a single computer
2. Index all of them using key words
3. Backlink ranking
- In 1998, they released their solution to the public for Free
- That application is called: GOOGLE.

Unit of Competence: Connect hardware peripherals


Computer: an electronic device for storing and processing data, typically in binary form, according to
instructions given to it in a variable program.
Hardware: is a physical part of computer that we can touch /observe and see either internal or external
parts.
Software: is a set of computer program (instructions) that can instruct hardware How to do? & What to do.
Basic computer device
Mouse CPU Monitor Motherboard Storage
RAM Keyboard Hard driver GPU System unit
Peripheral device: is an external or tangible devices. Which are attached to the computer system unit.
Peripheral device can be categories in to three:
device driver: is a set of files that tells a piece of hardware how to function by communicating with a
computer's operating system.
Input device: any information or data that is sent to a computer for processing.
Output device: is a piece of computer equipment that receives data from one source and converts it into
another form.
The storage device is a hardware component that allows you to store and retrieve digital information on
your computer.

Compiled By. WDDBA_COC Center TG Channale


Type of storage
Primary storage: main memory or temporary storage device. RAM and ROM (BIOS and POST).
Secondary storage: is known as a Backup memory or Additional memory or Auxiliary memory. It is
permanent storage and non-volatile (not power dependent). SSD, HDD, Flash
Tertiary storage device: is the third storage level just below the secondary storage.
Port & Connector
Port a jack or socket that peripheral hardware plugs into. While connector is any connector used within computers
or to connect computers to networks, printers or other devices.
Types of port or connector on computer
Power port USB PS2 port (either key board or mouse) Ethernet port
VGA port Serial port parallel port HDMI port SD port
ESATA Terminal
CPU (processor) is a brain of computer system w/c can be control over all computer activities.
CPU has three parts
CU: is act as a manager in computer system. circuitry within a computer's processor that directs operations.
ALU: a digital circuit used to perform arithmetic and logic operations.
Register: a storage space for units of memory that are used to transfer data for immediate use by the CPU.

Unit of Competence: Install Software Application


Application: In computer science, a computer program designed to help people perform a certain type of
work. IF your need the latest software on their computer you should check the HCL. it has included:
 Downloading software from the internet or installing from a physical disk.
 Verifying you have the correct system requirements to run the software.
 Following the installation instructions, which typically involve running a setup file.
 Making choices during installation, such as the destination folder or additional components.
 Completing the installation process.

Unit of Competence: Maintain Equipment and Software Inventories


An inventory is basically a detailed list of items
Viewing Computer Details
 Computer Name  Hardware Name  Hardware Type:  Manufacturer
 Operating system  Service Pack  Version  Virtual Memory:  Visible Virtual Memory
Hardware Inventory Reports
 Computers by OS  Computers by Manufacturer  Computers by Memory
 Computers by Age  Computers by Device Type  Computer by Disk Usage
Software is classified into two broad classes: operating system software and application software. Application software is
further broken down into sub-classes such as office, database, software development and so forth. System SW is designed
to run a computer’s hardware & application programs.

Unit of Competence: Protect Application or System Software

Compiled By. WDDBA_COC Center TG Channale


User Access: we do want our users to access the system; it’s just that we want them to have the
appropriate access. the process down to 3 things.
 Physical access
 Authentication
 Authorisation
User account is an identify created for a person in a computer/ system. Types of user account:
1, Standard 2, Administrator 3, Guest
User profile is a collection of settings or information that make the computer look and work the way
you want it to.
User Account Control (UAC) is a feature in Windows that can help you stay in control of your
computer by informing you when a program makes a change that requires administrator-level
permission.
The Common Types of Destructive Software
Virus, Worm, Logic Bomb, Rootkit, trojan Horse, Adware, Key Logger, Spyware
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not
limited to computer viruses, computer worm, trojan horses, spyware and adware.
A Firewall is a software program that sits between the internet and a private network and works as
a barrier to keep destructive viruses away from a computer.
Spam is the use of electronic messaging systems to send unsolicited bulk messages
indiscriminately.
Unit of Competence: Operate Personal Computer
Computer is an electronic device that can store, retrieve and process data, and can be programmed with
instructions that it remembers.
The internal hardware parts of a computer are often referred to as components, while external hardware
devices are usually called peripherals.
Computer hardware’s are classified into to two parts. Internal HW and External HW
Internal HW: Cpu, Hard disk drive, RAM, power supply, motherboard.
External HW: monitor, Keyboard, Mouse, Printer, Scanner.
Software is a set of programs. Any software is just a bunch of 0s and 1s arranged in a different way.
System SW is designed to run a computer HW’s and application programs. Sometimes we call it operating
system (OS). The OS is the first software to be loaded when a computer starts up.
An application software is a computer program designed to help people perform an activity. Examples:
Calculater, chrome, multimedia, ms office .

Compiled By. WDDBA_COC Center TG Channale


Information : is the collection of facts and figures which are organized in a meaningful manner to be used as
a base for guidance and decision making.
How computer works: The computer system needs people, data, hardware and software to operate. The
process for getting data in, processing the data and getting the information out is known as
input/process/output.

Input is the data that is entered into the computer. It is entered through input devices. Someexamples of
input devices are: mouse, keyboard , scanner, touch pad, microphone .

Processing refers to the computer performing operations and calculations (using the data that has been
input and software). This processing of data is done by the central processing unit (CPU) that is housed in
the system unit.

Output is what the computer displays as a result of processing data (eg. calculations or instructions). Some
examples of output devices are: printer, speaker, moniter, etc…
Occupational Safety and Health (OSH) - A planned system of working to prevent illness and injury where
you work by recognizing and identifying hazards and risks.
The six main categories of hazards are: Biological,
chemical, physical, safty, Ergonomic ,Psychosocial .
Shutting down a computer: It is good practice to use the correct shut down procedure when you want to
turn off your computer so that you do not lose data.
Control Panel window contains many icons that represent different controls, players or information about
the computer system. You can access any of these by double right-clicking on an icon.
A computer desktop can display shortcuts to get to application programs and storage devices
Folders and files can be stored on a computer’s desktop or on a storage device which will be able to store
hundreds or thousands of documents.
Storage devices:
Hard disk drive (HDD) The hard drive is where the operating system and application programs are kept.
Floppy disk drive (FDD) A floppy disk is the least expensive storage media

Compiled By. WDDBA_COC Center TG Channale

You might also like