Академический Документы
Профессиональный Документы
Культура Документы
MC
Armstrong’s
Driver
Education
Learner
Guide
TLIK107C Use info technology devices and computer applications in the workplace
Contents
Section 1............................................................................................. 7
Identifying computer equipment and systems........................ 7
Section outline........................................................................ 8
How do I identify computer equipment and systems in my
workplace? ............................................................................. 9
What common computer systems and software are in general
use? ..................................................................................... 13
How are faults identified?..................................................... 15
Where would I find information to correct computer faults? . 17
Section 2........................................................................................... 19
Setting up and shutting down computer equipment ............. 19
Section outline...................................................................... 20
What should I consider when setting up my computer
workstation? ......................................................................... 21
How do I starting up my computer? ..................................... 24
Why should I check for viruses on my computer?................ 26
When do I need to use operating manuals and help screens?28
How do I access software applications and data? ............... 30
Why do I need to save my files? .......................................... 34
Why do I need to log off and shut down my computer? ....... 36
Section 3........................................................................................... 39
Entering and storing data ..................................................... 39
Section outline...................................................................... 40
How do I enter data accurately? .......................................... 41
How do I create and save files on my computer? ................ 46
How do I store information on my computer? ...................... 50
Section 4........................................................................................... 53
Retrieving and presenting files............................................. 53
Section outline...................................................................... 54
How do I access files on my computer?............................... 55
How are files transferred from drive to drive? ...................... 57
Section 5........................................................................................... 65
Implementing workplace procedures for the management and
security of data..................................................................... 65
Section outline...................................................................... 66
How do I implement workplace procedures for the management
and security of my data? ...................................................... 67
Additional resources....................................................................... 69
This
Learner’s
Guide
is
about
the
skills
and
knowledge
required
to
use
infotechnology
devices
and
computer
applications
in
the
workplace.
This
includes
identifying
computer
equipment
and
systems,
setting
up
and
shutting
down
equipment
for
use,
and
entering,
retrieving
and
presenting
data
in
accordance
with
work
requirements.
It
is
important
to
plan
your
learning
before
you
start
because
you
may
already
have
some
of
the
knowledge
and
skills
that
are
covered
in
this
Learner’s
Guide.
This
might
be
because:
• you
have
been
working
in
the
industry
for
some
time,
and/or
• you
have
already
completed
training
in
this
area.
Together
with
your
supervisor
or
trainer,
use
the
checklist
on
the
following
pages
to
help
you
plan
your
study
program.
Your
answers
to
the
questions
in
the
checklist
will
help
you
work
out
which
sections
of
this
Learner’s
Guide
you
need
to
complete.
This
Learner’s
Guide
is
written
with
the
idea
that
learning
is
made
more
relevant
when
you,
the
learner,
are
actually
working
in
the
industry.
This
means
that
you
will
have
people
within
your
enterprise
that
can
show
you
things,
discuss
how
things
are
done
and
answer
any
questions
you
have.
Also
you
can
practise
what
you
learn
and
see
how
what
you
learn
is
applied
in
the
enterprise.
If
you
are
working
through
this
Learner’s
Guide
and
have
not
yet
found
a
job
in
the
industry,
you
will
need
to
talk
to
your
trainer
about
doing
work
experience
or
working
and
learning
in
some
sort
of
simulated
workplace.
Assessment
of
this
unit
of
competency
will
include
observation
of
real
or
simulated
work
processes
using
workplace
procedures
and
questioning
on
underpinning
knowledge
and
skills.
It
must
be
demonstrated
in
an
actual
or
simulated
work
situation
under
supervision.
Section 1
Section outline
Computers
are
in
common
use
across
many
industries
in
Australia.
Computers
may
be
set
up
as
individual
units
on
a
desk,
often
called
workstations.
Many
computers,
connected
together,
are
able
to
share
information.
This
is
referred
to
as
a
network
and
provides
access
for
many
users
to
carry
out
their
daily
tasks
at
the
same
time.
Figure
1:
Workstation
set-‐up
Figure
2:
Networked
computer
set-‐up
Software
is
the
programming
language
that
allows
your
computer
to
operate.
Software
is
not
seen.
It
is
installed
on
your
computer
and
runs
the
operating
system
and
the
applications
for
you
to
perform
your
work.
Connected
to
the
CPU
is
a
computer
screen,
a
keyboard
and
a
mouse,
also
a
floppy
disk
drive
and
a
CD-‐ROM
are
included.
Figure
3:
Workstation
computer
components
Figure
4:
Computer
printer
Figure
5:
Data
projector
Look around your work area and see what types of computerised
equipment are in operation. Discuss computer operation with your
work mates, supervisor and trainer. Use the questions below to
improve your knowledge of this equipment.
On your computer identify the operating system and find all the
software applications you need to do your job.
Faults
appear
on
the
computer
operating
system
or
in
software
applications
from
time
to
time.
It
is
important
that
you
understand
how
to
identify
and
interpret
these
faults.
This
will
quickly
allow
you
to
correct
the
problem.
If
the
fault
is
beyond
your
abilities
to
correct
you
should
seek
the
assistance
from
work
mates,
your
supervisor
or
the
help
desk.
Other
faults
occur
as
well
and
these
will
need
to
be
sorted
out
before
you
can
do
your
work.
Always
seek
advice
if
you
are
not
sure
how
to
fix
a
problem.
Faults may occur for a variety of reasons, some of which may be hard to
identify.
What sources did you use to find out about these faults?
Information
is
always
available
to
help
you
correct
faults
and
to
find
out
more
about
your
operating
systems,
equipment,
systems
and
applications.
You
can
source
this
information
from
your
workmates,
your
supervisor
and
instructors,
from
manuals
and
disks
provided
by
the
manufacturer
and
from
the
Help
facilities
in
applications.
Walk around your work area and talk to the computer operators.
Find out where they get information to solve faults and find our
more about their computer equipment.
What are some of the sources that operators may use to solve their
computer problems? List three.
Section 2
Section outline
Your
computer
must
be
set
up
so
that
it
is
comfortable
to
use.
See
your
OHS
and
workplace
regulations
for
more
details
and
explanations
of
how
best
to
do
this.
Stress
and
fatigue
will
be
reduced
by
correctly
setting
up
your
computer
workstation.
You
will
work
more
effectively.
Some
items
to
consider
include:
• computer
characteristics
− monitor
height
− ability
to
read
the
screen
contents
− keyboard
and
mouse
height
− mouse
placement
and
shape
− placement
of
documents
when
entering
data
• chair
characteristics
− chair
adjustments
− chair
stability
− arm
rests
− improper
use
of
the
chair
• office
lighting
− illumination
level
− dazzle
− glare
− flicker
− reflections
• office
electrical
safety
− spilling
liquids
over
electrical
equipment
− condition
of
electrical
equipment
− extension
leads
− overloading
the
electrical
power
supply.
Figure
6:
Suggested
computer
set-‐up
and
operator
posture
To
start
work
you
will
need
to
turn
on
your
computer
and
log
onto
the
computer
system.
This
process
is
required
to
access
the
directories,
software
applications
and
files
you
need
to
perform
your
work.
Logging
on
is
simply
entering
your
identification
codes
into
the
computer.
These
codes
are
usually
in
the
form
of
a
username
and
a
password.
By
following
this
procedure
you
will
protect
your
computer
against
unauthorised
use.
Logging
on
also
stops
security
breaches
off
sensitive
data.
Figure
7:
Username
and
password
dialog
box
List the steps you would take to turn on your computer and log on
to the operating system.
One
of
the
most
important
things
that
you
must
guard
against
is
virus
software
getting
onto
your
computer.
Viruses
are
programs
that
cause
severe
problems
with
computer
software
and
hardware
and
can
enter
your
computer
through
emails
and
Internet
connections.
Viruses
that
have
found
their
way
into
the
operating
systems
have
disabled
many
computers
and
destroyed
data.
As
the
name
suggests
a
computer
virus
is
exactly
that,
it
makes
your
computer
‘sick’
and
not
function
correctly.
A
virus
could
destroy
the
operating
system
of
your
computer
or
allow
sensitive
information
to
be
sent
off
your
computer
through
an
Internet
connection
or
via
email.
If
your
computer
detects
a
virus,
an
alert
will
be
displayed
on
your
monitor.
The
virus
protection
software
may
automatically
delete
the
virus
for
you,
however
you
may
be
required
to
delete
it
manually.
In
this
case
you
will
be
told,
through
a
message
on
your
computer
monitor,
to
delete
the
virus
software
when
it
is
detected.
Always
notify
your
supervisor
and
the
systems
administrator
is
a
virus
is
detected
on
your
computer.
If
a
virus
is
not
removed
from
your
computer
it
has
the
potential
to
spread,
just
like
a
real
virus,
throughout
the
whole
computer
network
and
cause
serious
damage
to
your
computer
files.
As
a
precaution
you
can
manually
check
your
computer
for
viruses
by
selecting
the
virus
protection
software
and
scanning
your
computer
hard
drive.
If you were asked to check your computer for viruses, what would
you do? List the steps you would take.
Help,
for
software
applications,
is
found
on
the
‘toolbar’
which
is
in
your
software
menu
list
at
the
top
of
the
computer
screen.
This
is
the
same
for
many
software
applications.
If there were no one around to help you where would you look for
assistance?
After
logging
onto
your
computer,
you
need
to
select
an
application
to
work
with
and
then
the
files
you
will
need
to
work
on.
With
practice
this
will
become
second
nature
for
you.
There
are
a
number
of
ways
of
selecting
your
application.
One
method
is
by
selecting
an
application
icon
from
the
computer
desktop
screen.
An
icon
is
a
small
picture
that
represents
the
application.
See
below.
Figure
8:
Selecting
an
application
with
an
icon
Another
method
is
to
select
an
application
through
the
Start
menu
and
All
Programs
option.
Figure
9:
Selecting
an
application
from
the
Start
menu
A
further
method
is
by
opening
the
file
directory
on
your
computer
and
selecting
the
file
you
require
from
a
list.
This
action
will
automatically
open
the
application
at
the
same
time.
Figure
10:
Selecting
the
file
and
application
from
a
directory
Application
icons
and
files
may
be
selected
by
clicking
on
the
file
icon
once
with
the
left
mouse
button
and
then
pressing
the
Enter
button
or
by
double
clicking
the
left
mouse
button.
Now
that
you
have
opened
your
application
you
need
to
select
your
data
files.
These
can
be
selected
with
the
File
Open
option
from
the
toolbar
and
then
select
a
file
from
the
dialog
box
that
appears.
Figure
12:
Dialog
box
with
a
list
of
files
to
choose
from
Opening
the
file
directory
on
your
computer
and
selecting
the
file
you
require
is
another
method
for
accessing
files.
This
action
will
automatically
open
the
application
at
the
same
time
(see
Figure
10).
Once you have found the application you need, what steps would
you take to open it?
Whenever
changes
and
updates
have
been
made
to
your
files
you
should
save
the
changes
to
keep
your
files
up
to
date.
Saving
files
is
very
important
and
may
be
automatic
with
some
applications
but
in
general
it
is
up
to
you
to
make
sure
this
is
done.
Files
are
saved
when
you
instruct
the
computer,
through
menu
options
or
keystrokes,
and
then
naming
them.
To
make
accessing
your
files
easy,
save
the
files
to
a
sensible,
easy
to
remember
name
and
save
them
to
a
directory
or
folder
that
is
relevant
to
the
task
you
are
working
on.
As a general rule, the data in your files is more important than the
computer hardware or software that you use. Lost data is difficult to
replace, so always make sure you save your files.
Before closing down your application what important step must you
take?
Each computer has a series of steps, for saving files that need to
be followed to save your files. List the steps involved on your
computer.
If someone else takes over from you at the end of your shift, the
process is similar, however you will need to log off after you close
your applications rather than turning off the equipment.
Always save your data and close all your files and applications to
avoid data loss or data corruption.
Section 3
Section outline
Now
that
you
have
correctly
set
up
your
computer,
turned
it
on
and
selected
your
applications
and
files,
you
are
ready
to
start
entering
data.
The
most
common
method
of
data
entry
is
through
the
keyboard
and
mouse.
The
mouse
is
used
to
select
an
item
for
change,
and
data
is
entered
via
the
keyboard.
Moving
the
mouse
moves
a
screen
image
called
the
cursor.
The
cursor
is
seen
as
a
small
object
on
the
computer
screen
and
has
a
variety
of
shapes.
The
shape
of
the
cursor
depends
on
the
application
you
are
using
and
may
change
in
appearance
as
you
use
different
functions
of
the
software.
Moving
the
cursor
over
the
item
you
want
and
clicking
the
left
mouse
button
selects
that
item.
You
are
now
able
to
type
in
the
data
you
want
to
add.
Depending
on
the
application
you
are
using,
pressing
Enter,
Tab
or
clicking
the
left
mouse
button
for
the
next
data
item,
finishes
the
step
you
are
working
on
and
moves
you
to
the
next
data
entry
point.
Please
take
the
time
to
find
out
the
correct
method
for
data
entry
before
you
start.
Failure
to
enter
data
accurately
will
cause
errors
to
build
up
and
increase
your
workload
when
you
find
you
need
to
go
back
over
your
work
to
correct
errors.
You
have
come
across
these
devices
before,
when
you
have
gone
shopping
at
the
Supermarket.
Bar
code
readers
offer
a
simple
and
very
fast
method
of
entering
data
with
little
chance
of
error.
They
may
be
hand
held
and
portable
or
fixed.
Figure
13:
Hand
held
barcode
reader
• floppy
disks
store
small
amounts
of
information
and
are
portable
Figure
14:
Floppy
disks
Figure
15:
CD
ROM
• USB
keys,
also
called
memory
sticks
and
flash
drives,
come
in
various
large
storage
sizes
Figure
16:
USB
key
for
data
storage
Figure
18:
Electronic
data
interchange
between
two
computers
Always
follow
your
workplace
procedures
for
creating
and
saving
your
files.
Once
everyone
follows
the
same
process,
then
data
entry
and
file
creation
become
standard,
and
the
possibilities
of
errors
are
reduced.
Observe
computer
users
in
your
area
and
note
how
they
go
about
creating
and
saving
files.
Check
with
your
work
mates
and
your
supervisor
to
find
out
if
there
are
other
ways
of
saving
and
creating
files.
Creating
files,
for
data
storage,
is
easy
to
do.
If
you
are
using
Microsoft
products
you
will
most
likely
use
the
File,
New
option
from
within
your
application
to
create
a
new
file.
Another
method
of
creating
a
new
file
is
to
go
to
your
file
directory
and
creating
a
new
file
there.
This
method
is
a
little
more
complicated
and
you
may
want
to
seek
help
to
get
started.
Save
your
files
regularly.
This
is
a
good
habit
to
get
into.
The
chance
of
losing
large
volumes
of
data
and
having
to
repeat
the
data
entry
will
be
reduced
if
files
are
saved
regularly.
The
most
common
way
of
saving
your
files
is
to
use
the
Save
icon
from
your
toolbar.
Files
are
automatically
saved
to
the
directory
from
which
you
retrieved
them.
Alternatively
you
can
use
the
File,
Save
option
from
your
toolbar
to
do
this.
Below
are
three
screen
captures
demonstrating
how
files
are
created
and
saved.
Figure
19:
Save
icon
Figure
20:
Creating
a
new
file
with
the
File,
New
option
Figure
21:
Saving
an
existing
file
If
you
require
to
save
files
to
a
different
directory
or
if
the
file
is
new,
use
the
File,
Save
As
option
(step
1)
and
navigate
to
the
directory
you
require
(step
2).
Figure
22:
Saving
a
new
file
(step
1)
Figure
23:
Saving
a
new
file
(step
2)
Storing
information
correctly
is
important
for
all
computer
users.
Most
times
information
will
be
stored
directly
on
your
computer
hard
drive
or
accessed
via
the
network
on
another
computer.
The
following
devices
are
specifically
designed
for
storing
information
independent
of
your
computer
hard
drive:
• a
floppy
disk
Figure
24:
Floppy
disks
for
data
storage
• a
CD
ROM
disc
Figure
25:
CD
ROM
for
data
storage
• a
USB
memory
stick
Figure
26:
USB
memory
stick
for
data
storage
Figure
27:
Mini
hard
drive
for
data
storage
Information
stored
outside
of
your
computer
should
be
stored
in
secure
locations
in
your
workplace
and
under
lock
and
key.
Unsecured
data
runs
the
risk
of
being
lost
or
stolen.
There
are
reasons
for
storing
information
separately.
They
include:
• backing
up
of
information
in
case
the
original
data
is
lost
• where
the
amount
of
information
is
large
and
unable
to
be
stored
on
your
own
computer
or
slows
down
the
operation
of
your
computer
• where
the
amount
of
information
is
large
and
there
is
not
enough
space
on
the
computer
network.
All
information
on
your
computer
is
the
property
of
your
employer.
This
information
may
be
of
a
sensitive
nature
and
should
remain
private,
therefore
it
should
be
stored
securely,
especially
when
this
information
is
stored
on
devices
independent
of
your
computer
hard
drive.
What must you take into account when storing information within
the computer network and when storing information independently
of your computer?
Section 4
Section outline
A
directory
is
a
location
on
the
computer
hard
drive
in
which
files
are
stored.
Each
directory
can
be
divided
into
smaller
sub
directories
if
required;
these
are
sometimes
called
folders.
Files
are
stored
within
these
directories.
Directories
should
be
sensibly
named
to
help
you
in
finding
specific
information.
An
example
of
this
could
be
a
directory
set
up
for
Sales
Figures
or
Inventory.
If
you
always
store
your
files
in
the
correct
directory
they
will
always
be
available
when
require
them.
This
simple
amount
of
housekeeping
will
provide
you
with
an
efficient
work
ethic
and
give
you
confidence
to
repeat
your
tasks
without
problem.
With
applications
such
as
Microsoft
Windows,
file
transfer
has
been
made
very
easy.
In
most
cases
to
transfer
your
files
from
directory
to
directory
or
from
hard
drive
to
hard
drive
is
done
by
clicking
on
the
file
icon
with
the
left
mouse
button,
holding
down
the
left
mouse
button
and
dragging
the
icon
to
its
new
location.
Once
there
you
just
release
the
left
mouse
button
and
the
transfer
is
complete.
Figure
28:
Basic
steps
for
transferring
files
A
note
of
caution
regarding
file
transfer:
there
is
a
chance
that
you
may
accidentally
move
your
files
incorrectly
and
not
realise
that
you
have
done
so.
If
files
are
lost
or
misplaced,
running
the
search
facility
of
your
computer
operating
system
will
most
likely
find
them
again.
Once
found,
you
can
move
them
back
to
where
they
belong.
Figure
29:
The
basic
steps
for
searching
using
Microsoft
Explore
All
data
and
information
on
your
work
computer
is
the
property
of
your
employer.
Care
must
be
taken
when
moving
files
on
your
computer
so
that
information
is
not
misplaced,
lost
or
sent
off
site
without
the
permission
of
your
employer.
Was there a chance that you could have moved the file to an
incorrect directory?
What would you do, if the file you were transferring, were placed in
the wrong directory?
During
the
course
of
your
work,
files
may
be
required
to
be
printed
out
for
reports
or
to
be
used
in
presentations.
A
good
practice
to
get
into
is
to
preview
your
files
before
to
printing.
This
allows
you
to
check
over
your
file
for
layout
and
appearance.
Once
you
are
satisfied
you
can
print
off
the
file.
Print-‐preview
is
generally
accessed
through
an
icon
in
the
toolbar
at
the
top
of
your
screen.
Also
print-‐preview
can
be
accessed
through
the
File,
Print
Preview
option
on
your
toolbar.
Your
computer
will
either
be
directly
connected
to
a
printer
or
networked
along
with
other
computers
to
a
shared
printer.
Depending
on
the
type
of
printer
at
your
disposal
you
will
be
able
to
print
black
&
white
or
colour
prints.
Printing
your
file
is
accessed
through
the
Print
icon
in
the
toolbar
of
your
screen.
Also
printing
can
be
accessed
through
the
File,
Print
option
on
your
toolbar.
This
option
allows
you
greater
flexibility
in
printing
by
providing
options
to
alter
the
way
your
print
is
carried
out.
Figure
30:
Printing
and
print
previewing
through
the
menu
options
Figure
31:
Printing
and
print
previewing
through
the
toolbar
icons
Go through the directory structure to find a particular file. List the steps
you took to get there.
Open the files, select ‘Print Preview’ and after checking the file,
change the paper alignment to print two different versions.
As
well
as
printing
off
your
files
you
can
present
your
information
to
a
large
group
of
people
with
computerised
projection
equipment.
Computerised
projection
equipment
is
commonly
referred
to
as
data
projectors.
Data
projectors
are
taking
place
of
overhead
projectors
and
allow
you
to
display
information
directly
from
your
computer
onto
a
large
screen.
The
information
you
are
displaying
is
now
interactive.
Your
audience
will
see
changes
as
you
make
them
to
your
file.
Data
projectors
are
useful
as
a
teaching
tool.
Figure
32:
Data
projector
Section 5
Implementing workplace
procedures for the management
and security of data
Section outline
It
is
important
to
understand
that
there
are
procedures
for
the
management
and
security
of
data
in
your
workplace.
The
processes
that
have
been
established
are
designed
to
keep
your
data
and
computer
work
organised
and
secure
from
loss
or
damage
especially
in
situations
where
you
are
privy
to
sensitive
information.
If
you
are
not
clear
on
these
procedures
it
is
in
your
interest
to
speak
to
your
work
mates
and
your
supervisor
to
have
this
clarified.
As
well
as
managing
and
securing
your
data,
there
are
also
procedures
in
place
to
maintain
the
efficient
working
of
information
systems.
These
procedures
will
be
made
up
of
workplace
procedures
and
manufacturer’s
guidelines
for
equipment
operation.
Check
that
you
understand
what
is
required
in
your
workplace
and
seek
assistance
if
you
are
not
sure.
Data
can
be
lost
or
corrupted
easily
through
poor
work
practices
and
therefore
it
is
up
to
you
to
follow
workplace
guidelines
and
procedures
to
keep
this
to
a
minimum.
Make
sure
you
are
familiar
with
your
workplace
procedures
for
managing
files.
Additional
resources
Web
sites:
• Organisations
− Australian
Government
Comcare
http://www.comcare.gov.au/ohs.html
− Australian
Radiation
Protection
and
Nuclear
Safety
Agency
http://www.arpansa.gov.au/
− The
Office
of
the
Federal
Privacy
Commissioner
http://www.privacy.gov.au
• Antivirus
− Symantec
http://www.symantec.com/index.htm
− Computer
Associates
VET
http://www.vet.com.au/
− McAfee
http://us.mcafee.com/
• Help
assistance
− Microsoft
Corporation
http://www.microsoft.com/
Feedback on
activities
The responses provided in this section are suggested responses.
Because every workplace is different, your responses may vary
according to your specific workplace procedures, the equipment
available and the nature of the business.
The best way to find out what systems and applications are in use
is to look around your organisation.
• Linux
• Unix.
The following steps are required to get your computer running and
ready for use. At this stage virus protection checks can be carried
out.
1. Press the Power button and wait while the computer boots up
and starts the operating system.
The single most important step you must take, before finishing your
work for the day, is to save your files to the correct directory on
your computer.
1. Save the files that you have been working on by either selecting
the Save icon or through the File, Save option on the toolbar.
2. Close the application you have been using. This can be done by
selecting the Cross icon in the top right hand corner of your
screen or through the File, Exit option on the toolbar.
By not shutting down your computer you leave your data files open to use
by unauthorised people and the possibility of these files being corrupted or
deleted and lost.
Every now and then work obligations will require you to create a
new file. The reasons for creating new files include:
• a new file is required to record each daily operation or
individual operation
• file sizes becoming too large to handle efficiently
• starting a new record
• starting a new process.
secure it is best to password protect your files and limit the access
to those files.