0% found this document useful (0 votes)
3 views

COMPUTER

Uploaded by

daviderhenven
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

COMPUTER

Uploaded by

daviderhenven
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

1

BY ITANRIN ANDREW BABATUNDE


SCHEME OF WORK

WEEK TOPICS

1 Revision / Internet I

2 Internet II

3 Benefits & Abuses of Internet

4 Internet Environment

5 Network Groups and Search Engines

6
7 File Sharing

8 Computer Ethics (I)

9 Computer Ethics (II)

10 Safety Measures

11 Revision

12 Examination

2
BY ITANRIN ANDREW BABATUNDE
WEEK 1
Topic: Revision / Internet I

Objectives: At the end of the lesson the student should be able to

1. Identify the internet.


2. Understand how the Internet work.

Content

WHAT IS THE INTERNET?

The Internet can be defined as a global computer network providing a variety of


information and communication facilities, consisting of interconnected networks using
standardized communication protocols.

It can also be defined as an international network for communication, where millions of


computers are connected together worldwide. You can access this network via
communications devices and media such as modems, cable, satellite, routers and telephone
lines.

WORLD WIDE WEB (WWW)

The World Wide Web is also known as the Web, WWW or W3. This refers to all the
public websites or pages that users can access on their local computers and other devices
through the Internet. These pages and documents are interconnected by means of
hyperlinks that users click on for information. This information can be in different
formats, including text, images, audio and video.

3
BY ITANRIN ANDREW BABATUNDE
The term World Wide Web isn't synonymous with the Internet. Rather, the World Wide
Web is part of the Internet.

HOW DOES THE INTERNET WORK

4
BY ITANRIN ANDREW BABATUNDE
Making and Sending Requests

So, how does information move around the internet? Imagine you are visiting your
favourite website, and you come across some images. How do those images get to your
computer?

The image is hosted on a web server, your computer sends a request to the web server
for the image. Then the request is sent in a ‘pa
which is jam-packed with lots of important information. The two most important bits are
the IP address of the web server that the image is stored on and the IP address of your
computer.

Special computers called routers, and devices called switches, direct the packet from
your computer to the web server. The web server can be anywhere, so it could be nearby
or millions of miles away on the other side of the world!

A packet can be sent around the world through something called fibre optic cables, these
travel under the sea or even by satellite.

5
BY ITANRIN ANDREW BABATUNDE
Receiving Information

Once the packet has arrived the web server opens and reads your computer’s
request, in
this case, the request would be ‘please send me this
large, so they will need to be split up into lots of packets, often this will be hundreds or
thousands of them. All of these packets include information about how they should be
put back together, as well as where they came f
is that?

The web server sends these packets back to your computer, directed by routers and
switches. The routers try to find the fastest route possible for each packet. They might
even take different routes resulting in some of the packets arriving in a different order in
which they were sent.

Now it's time to put all the packets back together! Now that all the packets have been
received the information attached to them tells your computer how to put them back
together, and the image will appear on your screen.

Now you may think wow, that would take such a long time, but the whole process of
sending a request and receiving the packets usually takes less than a second, the internet
truly is an amazing thing! However sometimes it can go a bit wrong, and some of the
packets aren’t delivered correctly or at all,
et distorted content.
For example, the image hasn’t loaded all the way or th
lag.

6
BY ITANRIN ANDREW BABATUNDE
EVALUATION
1. What is an Internet and World Wide Web.
2. Explain briefly how the Internet work.

7
BY ITANRIN ANDREW BABATUNDE
WEEK 2
Topic: Internet II

Objectives: At the end of the lesson the student should be able to

1. Identify Internet Browser.


2. Differentiate between an e-mail address and a website address.

3. Open an email.

Content

WHAT IS AN INTERNET BROWSER?

An Internet browser also referred to as a web browser it is an application software for


accessing the World-Wide World.

Examples of Internet browsers are:

‡ Microsoft Internet Explorer

‡ Mozilla Firefox

‡ AOL Explorer

‡ Safari

‡ Opera

‡ Konqueror

‡ Lynx

‡ UC browser

‡ Brave

‡ Microsoft Edge

8
BY ITANRIN ANDREW BABATUNDE
Web Address

A Web page has a unique address, which is called a URL (Uniform Resource Locator) or
Web address. For example, the home page for the Nigeria Army website has a web
address of https://army.mil.ng. A web browser retrieves a web page using its web address.
If you know the Web address of a web page, you can type it in the address bar at the top of
the browser window. If you type http://www.google.com as the web address in the
Address bar and then press the enter key, the browser downloads and displays the web
page.

Email
E-mail (short for electronic mail) is the transmission of messages and files via a computer
network. Today, e-mail is a primary communication method for both personal and
business use. You use an e-mail program to create, send, receive, forward, store, print, and
delete e-mail messages. Outlook and Windows Live Mail are two popular desktop e-mail
programs.
Sending an e-mail message using Outlook; Gmail and Windows Live Hotmail are two
popular free e-mail web applications. The message can be simple text or can include an
attachment such as a word processing document, a graphic, an audio clip, or a video clip.
Just as you address a letter when using the postal system, you address an e-mail message
with the e-mail address of your intended recipient.

9
BY ITANRIN ANDREW BABATUNDE
Difference between Email and a Website

The major difference between an email and a website address is seen in the use of @, which
is never a part of a website address. Another difference is that email address is always written
in lowercase whereas one often sees website addresses with mixed letters (maybe to improve
the readability of the address as some addresses become too difficult to read and remember).

Steps in Creating an E-mail Account

1. On the desktop, go to Gmail. Click "Create an account". Enter your name, a Gmail
address, password, and account recovery options.

2. On a phone or tablet, open the Gmail app. Ta


→ "Create an account".
10
BY ITANRIN ANDREW BABATUNDE
3. Enter your first and last name. Type your first name into the "First name" text box
near the top of the page, then enter your last name in the "Last name" box next to it.

1
BY ITANRIN ANDREW BABATUNDE
4. Create a Gmail username. In the "Username" field, type in the username you want
to use for your email address. You can use letters, numbers, and periods. This is the
name which appears before the "@gmail.com" section of the address.

12
BY ITANRIN ANDREW BABATUNDE
5. Enter and confirm your new password. Type your preferred password into the
"Password" text box near the bottom of the page, then type the same password into
the "Confirm password" box to the right of the first password box.

13
BY ITANRIN ANDREW BABATUNDE
6. Click Next. This is the blue button at the bottom of the page.

14
BY ITANRIN ANDREW BABATUNDE
7. Enter account recovery options. While not mandatory, you can add up to two types
of account recovery options to your Gmail profile:
‡ Phone number: Type your phone number into the "Phone number" field near the
top of the page.
‡ Recovery email address: Type any other email address into the "Recovery email
address" field near the top of the page.

15
BY ITANRIN ANDREW BABATUNDE
8. Add your date of birth. Click the "Month" drop-down box and select the month of
your birthday, then type the day and year into the "Day" and "Year" text boxes,
respectively.

16
BY ITANRIN ANDREW BABATUNDE
9. Select a gender and click Next. Click the "Gender" drop-down box, then select one
of the gender options in the resulting drop-down menu. Then, click the blue button
at the bottom of the page.

17
BY ITANRIN ANDREW BABATUNDE
10. Verify your phone number. You'll need to verify your number if you added a phone
number as an account recovery option.
‡ Click Send when prompted. Enter the verification code into the field. This will be
in the format: G-000000. Click Verify.
‡ You may see the Get More from your number page. You can receive video calls
and messages with your number, making Google services more relevant to you. To
opt-out, click Skip.

18
BY ITANRIN ANDREW BABATUNDE
EVALUATION

1. What is an Internet browser.


2. State five (5) examples of an Internet browser.
3. What is the full meaning of E-mail.
4. State the steps in opening a Gmail account.

ASSIGNMENT

1. Write about the History of the Internet browser.

19
BY ITANRIN ANDREW BABATUNDE
WEEK 3
Topic: Benefits & Abuses of Internet

Objectives: At the end of the lesson the student should be able to

1. Identify the benefits of the Internet.


2. Identify and describe the abuses of the internet.

Content

BENEFITS OF INTERNET

More than one billion people around the world use the Internet daily for a variety of
reasons, some of which are listed below:

20
BY ITANRIN ANDREW BABATUNDE
1. Connectivity, communication, and sharing

In the past, it would take days and sometimes even months to receive a letter from
someone else. Today, with the Internet, you can send an e-mail to anyone in the
world and often have it delivered in less than a minute. Other forms of
communication, such as chat and VoIP, also allow instant communication with
anyone in the world.

2. Address, mapping, and contact information

With the help of GPS technology, the Internet helps map and direct you to almost
every place in the world. You can quickly route to your location or find businesses
in your area that may sell or provide a service you need. Today's search engines are
also smart enough to know your location and help give you the most relevant
searches for your area.

3. Banking, bills, and shopping

The Internet provides access to your bank account to view the balance, make
transactions, and send money. Also, many services enable you to view and pay bills
electronically.

Online shopping is another huge advantage of the Internet, allowing people to find
products of interest and buy them without having to visit a store. The Internet
provides easy access to compare prices between companies and see what others
think about a product through online reviews to help make better purchasing
decisions.

21
BY ITANRIN ANDREW BABATUNDE
4. Collaboration, work from home, and access to a global workforce

The Internet is the perfect place to work with other people worldwide. Several
online services help you work with people worldwide, and with instant
communication, it can even make producing new products and services faster.

An Internet connection allows many people to work from home or have a virtual
office. Many businesses allow employees to work from home using their computers
and Internet connection. Working from home can save people money by not having
to pay for child care and save them money and time by eliminating the daily
commute to and from work.

If you are a business that needs employees, many online services can give you
access to people looking for a job all around the world. Hiring someone from
another part of the country or world gives you access to a broader talent pool and
may also be cheaper.

5. Selling and making money

The Internet is a perfect place to sell most goods if you are a business or want to sell
products and services. Because anyone in the world with Internet access can find
your website, you have more potential customers than you ever could with a local
retail store. The Internet is always on and always available, which means you have
the potential to sell goods every day at all times.

6. Internet of Things

The Internet helps connect devices in your home and smarter by giving them access
to the Internet. For example, the Nest thermostat can connect to the Internet to help
control the heating and cooling in your home. Also, once these devices are
connected, they can be controlled remotely using your computer or smartphone.

2
BY ITANRIN ANDREW BABATUNDE
Connecting IoT (Internet of Things) devices to your home, can become smarter and
more efficient and help save energy, money, and time.

7. Cloud computing and cloud storage

The Internet connects your computers and Internet-enabled devices to cloud


services, like cloud computing and cloud storage. With cloud computing, a device
can access more powerful computers and supercomputers to perform complex tasks
while you or your business work on other tasks.

Cloud storage synchronizes data across any Internet-connected devices, so that you
can access your files from anywhere. It makes backing up information easier and
safer your data is securely stored in a professionally-maintained server. So, if you
use a cloud storage backup service and your home or office burns down, you will
not lose all your valuable data.

Abuses of the Internet

This refers to improper use of the internet and may include:

1. Computer Crime or cybercrime- Is any crime that involves a computer and a


network. Use of computers for criminal activity.
2. Cyberbullying- This is the use of the internet to bully and intimidate. The use of
information technology to repeatedly harm or harass other people deliberately.
3. Spam (electronic)- This is the use of electronic messaging systems to send
unsolicited messages (spam), especially advertising, as well as sending messages
repeatedly on the same site. Sending unwanted advertising messages.
4. Malware- Software designed to harm a user’s computer, includ
viruses. Malware, short for malicious software, is any software used to disrupt
computer operations, gather sensitive information, or gain access to private
computer systems. Malware is defined by its malicious intent, acting against the

23
BY ITANRIN ANDREW BABATUNDE
requirements of the computer user, and does not include software that causes
unintentional harm due to some deficiency.
Other ways of Abuse include:
1. You can get harassing/threatening messages from people or stalkers.
2. It is very easy to find sites that promote hatred, violence, drug, sex, and other things
not appropriate for children.
3. There is no restriction on marketing products, such as alcohol, and tobacco to
children on the Internet.
4. Requests for personal information for contests, surveys etc. are used in an
unauthorized way.
5. Pornographic sites are easily found on the internet instead of it being restricted.

EVALUATION

1. List five (5) abuse of the Internet.

2. List five (5) benefits of the Internet

ASSIGNMENT

24
BY ITANRIN ANDREW BABATUNDE
WEEK 4
Topic: Internet Environment

Objectives: At the end of the lesson students should be able to:

1. Recognize the name icon available in the internet environment.

2. Chart Internet.

Content

Internet Environment:
Internet Explorer is one of the most popular web browsers that enable users to use the
internet. With internet explorer one, can search, retrieve, view, download and send
information on the Internet.

25
BY ITANRIN ANDREW BABATUNDE
The following are some of the important parts (features) of an Internet environment:

.1 Title Bar: This appears at the topmost bar of the screen. It indicates the title of the
page viewing and the browser e.g., Yahoo-Microsoft Internet Explorer.
.2 Menu Bar: It usually appears immediately below the title bar. It consists of a list
of menus and submenus, which controls all options, functions and commands for
the entire Internet Explorer program.
.3 Toolbar: This appears below the menu bar. It consists of icons of the most
frequently used commands and browsing functions e.g., stop icon, Refresh icon,
etc.
.4 Address Bar: This appears below the toolbar. It is a portion where you type a site
address.
.5 Link Bar: This appears below the address bar. It takes the user to pages at
Microsoft’s main home site
are applications andwhere
information there
specifically designed for easy use.
.6 Browser window: It appears below the Link bar. It contains information retrieved
from a site. Any texts, images, movies, animations, links or any other application
files will be shown in this window.
.7 Scroll Bars: They appear at the right and bottom parts of the browser window.
They enable the user to view documents vertically (up or down) and horizontally
(left to right) on the screen.
.8 Status Bar: It appears at the bottom of the screen or page. It indicates the current
progress made by the browser while in operation.

26
BY ITANRIN ANDREW BABATUNDE
Internet Icons

Icons are buttons or tools that appear on the screen in form of symbols, signs, pictures,
images, etc., which are used to perform commands or to carry out different tasks or
operations.

.1 Back Button: it takes the user back to a page of a document viewed previously.

.2 Forward Button: This takes the user forward to a page of a document to be viewed
next.

.3 Stop Button: it stops any current operation. It stops any currently loading document
from viewing. It is used whenever a page is taking much time to open.
.4 Home Button: It returns the user to the page selected as the default start-up page for
Internet Explorer.
.5 Search Button: It takes the user to the page selected as the default web search page
for Internet Explorer.
.6 Favorite Button: This is used to view a frequently visited website. It opens up the
favourite menu. The user can choose a favourite addressed to the list. It may also be
organized from the menu.

.7 Font Button: This enables the available font sizes to be shown for use.
.8 Mail Button: This opens a drop-down menu from which the user can select to read
or send an e-mail.

.9 Edit button: This is used to correct errors in a document.


.01 Refresh Button: It reloads a current page if there is an error while downloading
information.
.1 History Button: It is used to locate websites and pages that have been viewed for
some past few days, hours or minutes.
.21 Print Button: It sends pages of information to the printer.

27
BY ITANRIN ANDREW BABATUNDE
EVALUATION

1. State five (5) features of an Internet environment.


2. State five (5) Internet Icons that you know.

ASSIGNMENT

28
BY ITANRIN ANDREW BABATUNDE
WEEK 5-6

Topic: Network Groups & Search Engines

Objectives: At the end of the lesson students should be able to:

1. Identify different network groups.

2. List different search engines.

Content

WHAT IS A NETWORK GROUP?

In computer networking, a network group refers to a collection of devices that are


connected to the same network and can communicate with each other. These devices can
be computers, printers, scanners, servers, or any other device that is connected to the
network.

A Network group allows devices to share resources such as files, printers, and internet
connections. For example, if a printer is connected to a network, all devices in the
network group can print to that printer without needing a direct connection to it.

Types of Network Groups

There are several types of network groups, including local area networks (LANs), wide
area networks (WANs), and wireless networks.

1. Local Area Networks (LANs)

A LAN is a network that connects devices in a relatively small area, such as a building or
campus. A LAN can be wired or wireless and can support a range of devices, including
computers, printers, and servers.

LANs are commonly used in homes, schools, and businesses to connect devices and
share resources. For example, a business might use a LAN to allow employees to share
files, access printers, and communicate with each other.

29
BY ITANRIN ANDREW BABATUNDE
2. Wide Area Networks (WANs)

A WAN is a network that connects devices over a larger geographical area, typically
using a telecommunications network such as the Internet. WANs are commonly used to
connect devices in different locations, such as branch offices of a company.

WANs can be set up using various technologies, such as leased lines, satellite links, or
microwave links. WANs are essential for allowing organizations to communicate and
share resources across multiple locations.

3. Wireless Networks

A wireless network group is a group of devices that are connected wirelessly to the same
network. Wireless networks are commonly used in homes and businesses to connect
devices such as laptops, smartphones, and tablets to the Internet.

Wireless networks use radio waves to transmit data between devices. They can be set up
using various wireless technologies, such as Wi-Fi, Bluetooth, or Zigbee.

Network Group Topologies

Network groups can be set up using various network topologies, such as bus, ring, and
star. Each topology has its advantages and disadvantages in terms of speed, reliability,
and ease of management.

30
BY ITANRIN ANDREW BABATUNDE
Bus Topology

In a bus topology, all devices are connected to a single cable, called a bus. Data is
transmitted over the bus and all devices receive the data. Bus topologies are simple to set
up, but can be slow and are vulnerable to cable failures.

Ring Topology

In a ring topology, devices are connected in a circular loop, with each device connected
to the next. Data is transmitted around the loop in one direction. Ring topologies are
reliable and fast, but can be expensive to set up and difficult to manage.

31
BY ITANRIN ANDREW BABATUNDE
Star Topology

In a star topology, all devices are connected to a central hub or switch. Data is transmitted
to the hub, which then sends the data to the appropriate device. Star topologies are easy to
set up and manage but can be expensive if a lot of devices are involved.

Tree Network

A tree network has a central line connecting a series of star networks. The server is also
connected to this central line Because of its flexibility, and the fact that it has the
advantages of both bus and star networks, this topology is becoming increasingly
popular.

32
BY ITANRIN ANDREW BABATUNDE
Overview of Search Engines

Search engines are software programs that search and retrieve information from the
internet based on specific keywords or phrases entered by the user. These keywords are
used to generate a list of relevant websites, documents, images, videos, and other
information that match the user's search query.

Popular Search Engines

1. Google: Google is the most popular search engine in the world, with over 90%
market share. It offers a range of features, including search predictions, image and
video searches, maps and directions, and voice searches.
2. Bing: Bing is Microsoft's search engine and is the second most popular search
engine in the world. It offers many of the same features as Google, as well as some
unique features, such as the ability to earn rewards for searching.
3. Yahoo!: Yahoo! is a popular search engine that offers a variety of features,
including news, email, and instant messaging.

3
BY ITANRIN ANDREW BABATUNDE
4. DuckDuckGo: DuckDuckGo is a privacy-focused search engine that doesn't track
users or collect their personal information. It offers many of the same features as
other search engines but with a focus on privacy and security.
5. Yandex: Yandex is a search engine based in Russia and is the most popular search
engine in that country. It offers a range of features, including search suggestions,
image search, and maps and directions.

EVALUATION

1. What is a networking group?

2. State four (4) types of network groups.

3. Define search engine and states five (5) examples of search engine.

ASSIGNMENT

Explain the function of the following network devices:

1. Modems
2. Switches

3. Bridges

4. Routers
5. Hub

34
BY ITANRIN ANDREW BABATUNDE
WEEK 7
Topic: File Sharing

Objectives: At the end of the lesson students should be able to:

1. Identify File sharing.


2. Identify the different methods used in File sharing.

Content

FILE SHARING

File sharing refers to the practice of distributing or providing access to digital files such as
documents, photos, music, and videos over a network or the internet. It allows users to
share files with others or access files shared by others.
There are several methods of file sharing, including peer-to-peer (P2P) file sharing, cloud-
based file sharing, direct file transfer and file transfer protocol (FTP) file sharing.
1. Peer-to-peer (P2P) file sharing: In this method, users directly share files over a
network without the need for a central server. P2P file sharing is often used to
share large files such as movies or music, and it typically involves the use of
software such as BitTorrent or uTorrent.
2. Cloud-based file sharing: Cloud-based file sharing involves storing files in a
remote server or data center, which can be accessed by users from anywhere with
an internet connection. Users can upload files to the cloud and share them with
others, who can then download and edit the files as necessary. Examples of cloud-
based file-sharing services include Dropbox, Google Drive, and OneDrive.
3. File Transfer Protocol (FTP) file sharing: FTP file sharing involves using a
client-server protocol to transfer files between computers on a network. Users can
upload and download files to an FTP server, which can be accessed by authorized

35
BY ITANRIN ANDREW BABATUNDE
users from anywhere with an internet connection. Examples of FTP software
include FileZilla and WinSCP.
4. Email file sharing: Email file sharing involves sending files as attachments via
email. This method is often used for sharing small files such as documents or
images.
5. Direct file transfer: Direct file transfer involves transferring files between two
devices using a physical connection such as a USB cable. This method is often
used for transferring files between a computer and a mobile device or a camera.
Benefits of File Sharing

File sharing provides several benefits, including:

1. Collaboration: File sharing enables users to collaborate on projects and share


files with others in real time, regardless of their physical location.
2. Accessibility: Cloud-based file sharing allows users to access files from
anywhere with an internet connection, making it easier to work remotely or on
the go.
3. Cost Savings: File sharing eliminates the need for physical storage media such
as CDs, DVDs, or flash drives, which can be costly and easily lost or damaged.
4. Efficiency: File sharing simplifies the process of sharing and transferring files,
saving time and increasing productivity.

Risks of File Sharing

While file sharing can provide several benefits, it also comes with risks, including:

1. Security: File sharing can expose sensitive or confidential information to


unauthorized users, potentially leading to data breaches or identity theft.

36
BY ITANRIN ANDREW BABATUNDE
2. Copyright Infringement: P2P file sharing can lead to copyright infringement
if users share copyrighted material without permission.

3. Malware: File sharing can also increase the risk of malware infections, as files
shared over P2P networks or downloaded from unknown sources can contain
viruses or other malicious software.

EVALUATION
1. What is File sharing?
2. State five (5) methods of file sharing.
3. Mention three (3) risks of file sharing.

37
BY ITANRIN ANDREW BABATUNDE
WEEK 8
Topic: Computer Ethics

Objectives: At the end of the lesson students should be able to:

1. Analyze responsible ways of using computers & Internet

Content

INTRODUCTION

Ethics is the set of moral principles that govern the behavior of a group or individual.
Therefore, Computer Ethics is a set of moral principles that regulate the use of
computers. Some common issues of computer ethics include Intellectual Properties rights
(such as copyrighted electronic content), privacy concerns and how computers affect
society.

For instance, duplicating digital content is easy, however, computer ethics would suggest
that it is wrong. Also, while it may be possibl
on a computer system, computer ethics advise that such an action is unethical.

As technology advances, computers continue to have a greater impact on society.


Computer ethics promotes the discussion of how much influence computers should have
in areas such as artificial intelligence.

The responsible way to use a computer and the Internet:

1. Avoid liquid spilling on your system.

2. Make sure you use a dust cover.


3. Protection from power problem by using surge suppressor (stabilizer)

4. Unplug the system when not in use.


5. Check your email regularly

6. Give prompt and polite responses to mails


38
BY ITANRIN ANDREW BABATUNDE
7. Do not save your work on any of the hard drives.

Ways of Misusing the Computer and Internet

1. Job loss: The computer is used to combine the work of many people hence making
the organization reduce the amount of manpower.

2. Mirabel: A crime of deceiving people to gain something such as money or goods

3. Pornography: Bad sites that show sexual images in a way that can make people feel
sexually excited.
4. Piracy of software: Unauthorized copying of software, the rights of which belong to
someone else
5. Conspiracy: A secret plan made by two or more people to do something harmful or
illegal.
6. Malware / Virus: A computer virus that affects computers on the internet
7. Terrorism: The use of violence such as damaging, destroying, bombing, etc. to get
something

8. Stealing: Act of taking something that belongs to someone else without permission

Evaluation

1. What is Computer Ethics

2. List any five (5) responsible ways to use a computer room.


Assignment:

1. List ten (10) things that can be found in the computer room.

39
BY ITANRIN ANDREW BABATUNDE
WEEK 9-10
Topic: Safety Measures

Objectives: At the end of the lesson students should be able to:

1. Identify safety measures when making use of a computer.

Content

SAFETY MEASURES

Well-planned facilities for making the use of computer and the users of the computer to
be comfortable with little or no problems during usage of the computer and its
accessories. Some of these safety measures are:

1. The sitting posture/the sitting position of the users must be comfortable: The
sitting posture in a computer room should be upright, and the seat should be
positioned in such a way that one should be able to rest the back, an awkward
sitting arrangement might hurt the user.

2. Using the anti-glare protector to reduce light intensity entering the eyes
3. Positioning of monitor base to the eye of the users 4. Illuminating the computer
room to give adequate light.
5. Maintaining a dust-free environment.

6. Keep liquids away from the computer and its accessories. 7. Provision of fireproof
cabinet in case of a fire outbreak

8. Fire extinguisher must be adequately provided.

9. Backing up the data regularly.

10. Windows updates should be installed at least once a week.

1. Antivirus updates
12. Safely Unplug Computer peripherals
40
BY ITANRIN ANDREW BABATUNDE
Evaluation

1. State five safety measures of computer systems.

Assignment

1. List five computer maintenance tools.

41
BY ITANRIN ANDREW BABATUNDE

You might also like