70% found this document useful (10 votes)
16K views7 pages

G7-Pretechnical Studies Notes Ads

Pretechnical studies provides learners with practical skills in technical areas like computer science and business studies. It covers components like acquiring technical skills, computer science, and business studies. Pretechnical studies plays an important role by developing critical thinking skills, facilitating skill and knowledge development, and offering career opportunities. Safety is important in work environments, and there are physical and online threats to address, like sharp tools, poor lighting, malware, and hacking. Computer concepts are also covered, defining a computer, data, information, and listing common computer types used today.

Uploaded by

Martin Thumbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
70% found this document useful (10 votes)
16K views7 pages

G7-Pretechnical Studies Notes Ads

Pretechnical studies provides learners with practical skills in technical areas like computer science and business studies. It covers components like acquiring technical skills, computer science, and business studies. Pretechnical studies plays an important role by developing critical thinking skills, facilitating skill and knowledge development, and offering career opportunities. Safety is important in work environments, and there are physical and online threats to address, like sharp tools, poor lighting, malware, and hacking. Computer concepts are also covered, defining a computer, data, information, and listing common computer types used today.

Uploaded by

Martin Thumbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Grade

NOTES

Vyntex Softcopies
More Materials Orders WhatsApp: 0710250520/0114935675
https://cbccentre.mystrikingly.com
Strand 1 FOUNDATION OF PRETECHNICAL
STUDIES.
1.1-Introduction to Pretechnical studies
Pretechnical studies is a series of learning areas written to provide practical experiences that
support the acquisition of skills in technical areas derived from computer science and business
studies.

Components of Pretechnical studies.


Pretechnical studies is a technical learning area comprising of:
Pretechnical studies – a learning area that involves acquiring practical skills and experience in
technical areas
Computer science the study of computers and how computer technology can be used to solve
problems.
Business study-involves study of activities that involves production, distribution and
consumption of goods and services aimed at making profits.

The role of Pretechnical studies in day today life.


 It gives learners the skills they need to think critically and solve problems as well as
preparing them for a technical & digital future.
 Facilitates development of appropriate skills and knowledge gained from the learning areas
such as computer science and business studies.
 Offers a wide range of careers in Pretechnical area such as in safety and material handling,
in computer science such as programmers, software engineering and in business studies such
as accountant, traders, manager, bankers and shopkeeper.
 Pretechnical studies promotes independence and self-learning through various skills
enhancing chances of creating employment opportunities and self-employment in individual.
 It equips learners with skills to use when observing personal safety and safety in working
environment.

pg. 1
1.2 - Safety in the work environment.
 What is safety?
Safety is a situation where one avoids causing harm, discomfort or sickness to self and to others
when carrying out the daily activities.

Examples of safety measures include:


 Wearing face mask to prevent spreading of airborne diseases or breathing in dirty air.
 Buckling a safety belt while in a vehicle to avoid falling off the seat in case of emergency
brakes.
 Wearing hand gloves when working to avoid injury and dirt to the hands when working.
 Wearing gum boots to protect the feet from injury when working in areas with mud or sharp
objects.
 Wearing an overall to guard against soiling clothes.

Potential safety threats in a work environment.


 Potential safety threats in work environment can either be physical or online.

Physical threats at workplaces.


 Physical safety threats include:
 Sharp edged tools and objects that can easily cut or poke someone.
 Disarranged rooms where one can easily tumble and fall.
 Naked electric wires that can easily cause electric shock.
 Poorly lit rooms where one can easily know oneself against objects.
 Poorly stored items on the shelves where they can easily fall off and hit someone.
 Working without protective gear where one can easily be hurt or injured.
 Rooms with wet slippery floors where one can easily slip and fall.

Online threats at a workplace.


 Every online user should ensure they stay safe online by protecting themselves and others
from online threats.
 Examples of online threats at work place include:
 Malware/virus attack.
 Hacking.
 Data theft.
 Cyberbullying.
 Friend requests from unknown people.
 Phishing attacks.
 Ransomware-attempts to encrypt data and calling for ransom to release it or unlock code

pg. 2
Online safety rules and regulations in the work environment.
 Online safety is keeping safe from possible threats that a computer user may experience
while engaging in activities through the internet.
 It includes:
 Protecting and managing personal information.
 Avoiding harmful or illegal content.
 To avoid online fraud, always buy online items from secure and trusted sites. Also, watch
out for scams that come in form of messages and emails.
 Do not accept friend requests from strangers. Some strangers are hackers who might access
your personal information and even take over your accounts.
 Phishing is an online fraud system used to steal private data such as login usernames and
passwords.
 Use strong passwords that cannot be crashed easily in case your password is compromised.
Consider changing it right away.
 Always back up your data and keep your computer security updated.

Physical threats to digital devices.


 Physical threats to a computer include:
 Fluids such as water, milk and juice that can damage different parts of the devices.
 Theft.
 Damage caused by natural disasters, fire and impact of falls.
 Corrosion caused by excessive humidity and dampness.
 Exposed cables in the computer room.
 Hardware failure

 Ways of mitigating/reducing physical threats to digital devices.


To prevent physical threats, the following should be done.
 Do not carry water into the computer room or near the computer.
 Do not use old and loose power extension cables in a computer room. They produce sparks
that can cause fire in the computer room.
 Replace loose power extension cables because they may lead to unstable power supply.
 Use voltage controllers to curb unstable power supply in the computer room.
 Equip computer rooms with fire extinguishers that do not use water, the computer room can
be fit with automatic fire detectors that will detect fire or smoke and alert the personnel in
charge for quick action.
 Tuck computer cables in trunks or carefully lay them down under the desks in order to
prevent falls in the computer room.
 Place computers on strong furniture to prevent them from falling.
 Restrict access to computer rooms.

pg. 3
 Secure the computer room with strong windows and doors to control theft of computers. To
increase the security level, you can install CCTV cameras and also employ security
personnel.
 Use computer cable locks to control theft in the computer room.
 Use dehumidifiers to control excess humidity and dampness.
 Ensure there is enough ventilation or free circulation of air in the computer room.
 Fit window curtains and air conditioners in the computer room to control and filter dust
particles from entering the room.
 Cover computers with dust covers when they are not in use.

Ideas and practices on how to personal and sensitive data from the public when online:
To keep personal and sensitive data from the public when online, the following can be done:
 Protect and manage personal information.
 Do not accept friend requests from strangers.
 Avoiding harmful or illegal content.
 Buy online items from secure and trusted sites.
 Installation of antivirus software.
 Backing up data.
 Use of strong passwords.
 Log out from your online accounts after using public internet to browse.
 Do not communicate with strangers online.
Safety Rules and Regulations at Work.
 Safety rules and regulations exist in all workplaces. They are principles that govern the
actions and procedures to keep the works property and the environment safe.
 Some of the general safety rules and regulations include:
 To ensure that you know how to safely perform the task.
 To ensure you know the hazards of the task and how to protect yourself.
 To wear the required personal protective equipment necessary for the task.
 To always work clear of suspended loads.
 To always keep your mind and eyes on the task at hand.
 To obey all warning signs and barricades.
 To inspect all tools and equipment to ensure they are not defective before using them.
 Do not perform a task under unsafe conditions and report any unsafe tools, equipment or
hazardous conditions.
 All chemicals’ containers should be well labelled and covered.
 Maintain good housekeeping at workplace all the time.

pg. 4
1.3 – Computer Concepts.
What is a computer?
 A computer is an electronic device that process or converts data into information.
 A computer receives, stores, organizes and processes data into information.
 The word computer came from Latin word ‘computare’ which means to calculate.
 A computer uses programs that are sets of instructions which a computer follows to perform
tasks.

What is Data?
 Data refers to raw facts such as numbers, symbols, images and letters that are not processed
and have no meaning to the user.
 Data is plural while in singular it is datum.
 Data is not meaningful to the user until it is processed.
Examples of Data include:
✓ Texts.
✓ Images.
✓ Sound.
✓ Videos.
 What is information?
 Information refers to processed data that is meaningful to the user.
 Information is meaningful to the user.

List the examples of computers used today.


✓ The following are examples of computers:
 Notebook.  Microwaves.
 Desktop.  Server.
 Laptop.  IPad.
 Tablets.  MacBook.
 PDA (Personal Digital Assistant)  Smartphone.
 Electronic calculators.  Smart watch.
 ATM Machines.  Workstations.
 Washing machines.
COMPLETE NOTES ORDERED THROGH
WHATSAP
0710250520
pg. 5
0743939160

pg. 2

You might also like