0% found this document useful (0 votes)
76 views7 pages

Computer Operations Safety Guidelines

Uploaded by

saumayfaisah2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views7 pages

Computer Operations Safety Guidelines

Uploaded by

saumayfaisah2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

7/8

Computer
Systems
Servicing NC II
(Exploratory Course)
Module 2: Performing Computer
Operations
OCCUPATIONAL HEALTH AND SAFETY (OHS) GUIDELINES AND PROCEDURES

Occupational Health and Safety is defined as a field in public health that focuses on
illnesses and injuries which happen in the workplace. This aims to prevent injuries and
illnesses from happening. In working with computers, you’ll have to deal with possible
risks and hazards. The following are some of the OHS procedures you should keep in
mind when working with computers.

 Always perform electrostatic discharge. As discussed in the previous


lesson, our bodies have electricity which can cause damage to computer
components. Always perform grounding before touching any component. To
do this, touch any unpainted metal part for 5-10 seconds to prevent static
electricity from building up.
 Check the pin alignment. When connecting cables, you need to check if the
pins have been aligned correctly before putting them in place. This will prevent
damage to the ports and the cables as well.
 Check power connections. Before opening a computer, always make sure
that the computer is turned off and unplugged from the power source.
 Always work with a buddy. Never work alone. This way, when you get in
trouble or need help, someone will be able to help you.
 Never work with liquids. Liquids such as water, juice, soda, etc. can cause
damage to computers or any electronic equipment. It is best to keep them
away from the work area.
 Wear Personal Protective Equipment (PPE) at all times. Personal Protective
Equipment can vary in the workplace. In working with computers, you must
always wear clothes which are not loose, and always wear shoes that can
dissipate electricity. Also, never wear jewelry when working with
computers. This is to avoid being tangled in computer parts and equipment.
 Be familiar with the emergency exits. Emergencies such as fire and
earthquake may come at any time. It is important to know and be familiar
with the fire exits and fire extinguishers at all times. You should also be
aware of the emergency and evacuation plans for your workplace.

COMPUTER HARDWARE

A computer has two basic parts: hardware and software. Hardware components refer to
the tangible or touchable parts of the computer. On the other hand, software refers

2
to parts that can’t be touched physically. Computer hardware can also be classified into
four categories: input, process, storage, and output.

Input Devices

Input devices refer to the hardware components which are used to load information
into the computer. This can be letters, numbers, characters, sounds, images, and other
forms of data. The following are the most common input devices used:

 The keyboard is similar to a typewriter. It


is composed of buttons that have letters,
numbers, and characters. It is used to
input letters, sentences, numbers, and
other special functions to the computer. Keyboard Photo by WikiMedia

 The mouse is a device that is operated using the


hand. It commonly has two buttons: the left-click
button and the right-click button. It also has a
scroll wheel in the center. The mouse is used to
interact with the computer screen. When you move
a mouse, the pointer on the screen also moves. Mouse Photo by [Link]

 The microphone is a device that is used to input audio


into computers. Most microphones come as a set with
earphones.
Headset with microphone Photo by Zephyris

Processing Devices

The data that has been received through the input devices will be processed by the
computer before it will be displayed on the screen or before it could be printed through a
printer. The device responsible for this stage is the processing device. A processing device
transforms input data into output. The following are processing devices:

A motherboard is a device that connects all the


hardware parts of the computer. It contains
components such as the CPU, RAM, and ROM chips. It
also contains ports that are used to connect other
hardware components such as the monitor and hard disk drive.

3
 The Central Processing Unit (CPU) is also known as
the brain of the computer. Just like how the brain
functions in a human body, the CPU also controls
everything the computer does. It receives information
and carries out computer instructions. CPU Photo by
D-Kuru WikiMedia

 Random Access Memory (RAM) is used to store


programs and data that are currently being used
by the CPU. Any data on RAM can be read,
rewritten, or deleted when needed. Any data saved
on RAM is deleted once the computer shuts down. Laptop RAM Photo by
WannaBeEditor WikiMedia

ROM Photo by
 Read-Only Memory (ROM) is where the data needed Christian Bassow
by the computer to start is stored. Unlike the RAM, the
data saved on the ROM can’t be erased even when the
computer has been shut down.

Storage Device

The storage device is where files such as photos, documents, audio, videos, and many more
are stored. This also keeps files needed for the computer to run such as operating
systems files and utility files. The following are some storage devices:

 Hard Disk Drive is a magnetic device that is used to


store data. It is the main storage device on a computer.
It can be found inside the system case.
HDD Photo by
OpenClipartVectors

 Memory Card is commonly used and found on


electronic devices such as smartphones, digital
cameras, and dash cameras.

Memory Card Photo by PxHere

4
Output Device

Output devices are used to display information that has been processed by the computer.
These can send out different kinds of information such as sound, text, images, and videos.
The following are examples of output devices:

 Speakers are output devices. The sound or data that


has been processed by the computer is sent out using
the speakers. Speakers allow users to listen to music,
watch movies, and talk to loved ones via video calls.
Computer Speakers
Photo by Pxhere
Printer Photo by
 Printers are devices that produce information and places OpenClipartVector
them in a piece of paper or any other form of medium.
Printers also allow materials such as tarpaulin, flyers, and
magazines to be reproduced.

 Monitors are devices that allow users to interact with


the computer. Monitors allow users to see what they are
typing, or view different applications, or watch videos.

COMPUTER APPLICATION SOFTWARE

Computer application software is a set of instructions that tells the computer what to
do. It is designed to complete a specific task. For example: in writing a business letter
using a computer, a word processing application is used. If you want to view a movie,
different application software would perform the job which is the media player. There
are many kinds of application software, a few of them are the following:

 Word Processing Application is used to create documents using a


computer. Examples of these documents are letters, reports, books, and
many more. Microsoft Word, Google docs, LibreOffice, and WPS writer are
examples of these. The most commonly used word processor is Microsoft
Word.
 Spreadsheet Application is used mainly for accounting and keeping
records through rows and columns. It is also used to create tables and
charts which can be added to a report to give a graphical representation of
data. It is also used in computing grades, sales reports, etc. Microsoft
Excel is the most commonly used spreadsheet application.
 Web Browser is used to view web pages. It allows users to read, visit, and
view different websites and webpages. Apple Safari, Microsoft Edge, Google
Chrome, and Mozilla Firefox are examples of web browsers.

5
REQUIREMENTS FOR INTERNET SEARCH

The internet is defined as the largest computer network. It connects millions of


computers throughout the globe. With the use of the internet, sharing of data and
connecting with loved ones has become easier. As long as your device is connected to
the internet through a Wi-Fi or wired connection, you have a web browser, and you
have the following you can search almost anything under the sun on the internet.

 Uniform Resource Locator (URL) refers to the exact address of a webpage on


the world wide web. This can be seen on the address bar that is located on the
topmost portion of the browser. The text highlighted below is the URL.

 Search Engine is used to look for items or words on the internet. This
enables a user to search the internet. The most common search engines are
Google, Bing! And Yahoo!. A search engine has a search bar or search box,
where the questions are typed. In the previous figure, this is where “URL
meaning” has been entered using the Google search engine.

COMPUTER MAINTENANCE

A computer, just like any other equipment, also needs to be taken care of. It needs to be
cleaned from the inside to the outside. To do this, you need to conduct the following:

 Disk cleanup refers to a utility program that is used to clean the contents of
the hard disk. This involves deleting temporary files, cached webpages, and
items in the recycle bin.
 Checking disk errors is another utility program that checks the hard disk
for errors and automatically repairs it.
 Dusting the external and internal part of the computer

Common questions

Powered by AI

Input, output, and processing devices are all essential for computer functions, serving distinct roles that collectively enable computing tasks. Input devices are necessary for entering data and commands into the system. Processing devices, such as the CPU, are critical for data manipulation and execution of instructions. Output devices are required to present the processed data to the user. None of these categories can be considered less critical; each is integral to a holistic system, contributing uniquely to ensure the computer's functionality and interaction with users .

Search engines provide the benefit of allowing users to find and access specific information quickly across the vast internet by typing queries in a search bar. This process relies heavily on Uniform Resource Locator (URL) structure, which specifies the exact address of webpages on the Web. A well-defined URL structure enables search engines to efficiently index and retrieve relevant pages, ensuring users receive accurate results. Additionally, by parsing URLs, search engines can better categorize content, enhancing the overall search experience .

Storing data needed for immediate tasks in RAM allows for fast data access and processing by the CPU, as RAM is optimized for speed and immediate data handling. However, this data is volatile and lost when power is cut—hence, it is ideal for temporary data. In contrast, permanent data storage methods, such as on a Hard Disk Drive (HDD), offer non-volatile and durable storage for data that must persist beyond current tasks and power cycles. Utilizing both allows systems to balance speed in operations (from RAM use) while maintaining data persistence (through HDDs), facilitating a robust and efficient computing environment .

Knowing emergency and evacuation plans is essential in environments focused on computer operations because unexpected events, such as fires or earthquakes, can occur at any time. Understanding these plans ensures personal safety and the ability to respond quickly and orderly to protect oneself and colleagues. In addition, knowing the location of emergency exits and fire extinguishers can mitigate risks and reduce panic during emergencies, ultimately contributing to a safer working environment .

Regularly performing disk cleanup is important as it removes unnecessary files, such as temporary files, cached webpages, and those in the recycle bin, freeing up disk space and improving system performance. Checking disk errors is equally critical as it identifies and repairs errors on the hard disk, preventing data loss and ensuring system reliability. Together, these maintenance tasks help maintain optimal operation and extend the lifespan of the computer, reducing the need for frequent repairs or replacements .

A word processing application focuses on creating, editing, and formatting textual documents such as letters, reports, and books. It is ideal for tasks that involve significant amounts of writing and formatting text. In contrast, a spreadsheet application manages data through structured rows and columns, allowing for complex calculations, data analysis, and visualization through charts. It is best suited for tasks involving numerical data analysis, such as accounting, financial forecasting, and inventory management. Each application fulfills different roles based on the type of data management needed .

The key Occupational Health and Safety (OHS) procedures when working with computers include performing electrostatic discharge, checking pin alignment, ensuring proper power connections, working with a buddy, avoiding liquids, wearing Personal Protective Equipment (PPE), and being familiar with emergency exits. Performing electrostatic discharge is critical to prevent static electricity from damaging computer components. Checking pin alignment prevents damage to ports and cables. Ensuring proper power connections is crucial for safety to avoid electrical shocks and equipment damage. Working with a buddy allows assistance in case of accidents or injuries. Avoiding liquids near computers prevents damage from spills. Wearing PPE and appropriate clothing prevents injury and damage from static electricity and avoids getting tangled with computer parts. Finally, knowing emergency exits is important for safety during emergencies like fires or earthquakes .

The CPU, referred to as the 'brain' of the computer, plays a crucial role in executing instructions and managing tasks. It processes data received from input devices, executing programs by reading commands stored in RAM. RAM provides temporary storage for programs and data the CPU actively uses, while ROM contains permanent instructions essential for starting the computer. Unlike RAM, ROM retains its data even when the computer is shut down, providing persistent storage crucial for the boot process. This hierarchical structure allows efficient processing and functioning of the computer .

The use of Personal Protective Equipment (PPE) impacts safety by minimizing risks associated with static electricity and physical injury. Wearing shoes that dissipate electricity and avoiding loose clothing can prevent unwanted static discharges that may damage sensitive computer components. Additionally, wearing PPE and avoiding jewelry prevent accidents such as catching on computer parts or housing. Thus, PPE supports a safer environment by reducing health hazards and promoting effective work practices in computer operations .

Input devices like keyboards and mice allow users to enter data into the computer. This data is processed by the Central Processing Unit (CPU) and temporarily stored in Random Access Memory (RAM) to execute commands. Permanent data storage is managed by storage devices such as Hard Disk Drives (HDDs). Once processing is complete, output devices like monitors and speakers display or present the processed data to the user. This interaction between input, processing, storage, and output devices allows computers to perform tasks efficiently .

You might also like