OCCUPATIONAL AND HEALTH SAFERTY PROTOCOLS AND COMPUTER SECURITY ISSUES

bfaycocho76 17 views 20 slides Aug 19, 2024
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

OHS in the workplace to prevent accidents and risks. Different types of hazards and how to combat the different types of hazards. also includes basic type of computer and its basic functions and other related terminologies. Computer security measures were also included int he document that identif...


Slide Content

Learning Competency : Plan and prepare for task to be undertaken
At the end of the lesson, the students should be able to:
1.realize the importance of planning and preparing for a task to be taken
undertaken;
2.understand and apply OH and S principles;
3.understand and differentiate Basic types of computer; and
4.identify and utilize Computer systems while applying security measures to
protect data/files.
OBJECTIVES for Lesson1

Review:
A.Directions: Identify the type of hazards. Match Column A with Column B.
Column A Column B
1.cables running across the floor a. mechanical hazard
2.hot components or sharp edges of computers b. physical hazard
3.inkjet printer cartridge c. electric shock hazard
4.exposed power cable d. chemical hazard
5.open casing of computer monitor e. high voltage hazard

Lesson 1A: Hazard Identification, Risk Assessment, and Risk Control
Occupational safety and health (OSH) is a planned system of working to
prevent illness and injury where you work by recognizing and identifying hazards
and risks.
Health and safety procedure is the responsibility of all persons in the computer
and technology industries.
There are three steps used to manage health and safety at work:
1. Spot the Hazard (Hazard Identification)
2. Assess the Risk (Risk Assessment)
3. Make the Changes (Risk Control)

Hazard Identification, Risk Assessment, and Risk Control
Spot the
hazards
Assess
Make the Changes
If you think it could be a hazard, tell someone.
Whenever you spot a hazard,
assess the risk by asking
yourself two questions:
• How likely is it that the hazard
could harm me or someone else?
• How badly could I or someone
else be harmed?
It is your employer's responsibility to fix hazards.
Sometimes you may be able to fix simple hazards
yourself, as long as you don't put yourself or others at
risk. For example, you can pick up things from the floor
and put them away to eliminate a trip hazard.
A hazard is anything that could hurt you
or someone else.
Remain alert to anything that may be dangerous.
Always take note, when you see, hear or smell
anything odd.

Common hazards encountered by Computer Technicians and Users
Physical hazards
Physical Hazards (in Computer technology terminologies)
One of the most common physical hazards involving computer
technicians is cables running across the floor. If someone trips,
falls, and hurts himself because of a cable you ran across the
floor, someone (you, your employer, or your customer) has a
serious legal negligence problem.
mechanical
hazards
You might move your hand past a computer chassis and
lose a chunk of flesh because it is razor sharp. When
working on electronic equipment, always be alert to any
possibility of being hurt by moving parts, hot components,
or sharp edges.

Common hazards encountered by Computer Technicians and Users
Chemical Hazards
These includes display cleaning chemicals, keyboard
cleaning chemicals, compressed gas dirt and dust
removers, and many cleaning solvents. Some of these
chemicals can be harmful if accidentally swallowed, get on
bare skin, or get in eyes.
Electric Shock Hazard
Inside computers and electronic equipment, there is a
range of voltage from 3.3 volts to 25 volts, most of these
are harmless. But at the power supply, you'll find line
voltage, which is a lethal 220 volts.

Common hazards encountered by Computer Technicians and Users
CRT Monitor High-Voltage Hazard
CRT monitors are becoming less common nowadays, but
should you run into one, it is best NOT to open it up.
Instead, outsource any CRT repair job to a qualified CRT
repair service.
A CRT monitor has a high-voltage anode inside it, which
can carry a charge of up to 25,000 volts, and it can still be
holding a high charge days after the power is removed.

Lesson 1B: 4 Basic types of Computer
1.Super Computer
2.Mainframe Computer
3.Minicomputer
4.Microcomputer

Lesson 1B: 4 Basic types of Computer
Japan’s Fugaku still the World’s
Fastest Supercomputer as of
November 2020
A supercomputer is a computer with a very high-level
computational capacity. Performance of a supercomputer
is measured in floating point operations per second
(FLOPS).
The system, built by Fujitsu for Japan’s RIKEN Center for
Computational Science, posted a maximum sustained
performance level of 442,010 teraflops per second on the
Linpack benchmark.

Lesson 1B: 4 Basic types of Computer
Modern mainframe design is generally less defined
by single-task computational speed (typically defined
as million instructions per second (MIPS) rate or
FLOPS in the case of floating point calculations), and
more by:

•Redundant internal engineering resulting in high
reliability and security
•Extensive input-output facilities with the ability to
offload to separate engines
•Strict backward compatibility with older software
•High hardware and computational utilization rates
through virtualization to support massive
throughput.
IBM’s latest in line of mainframe computers,z15.

Lesson 1B: 4 Basic types of Computer
Minicomputers are also called as “Midrange
Computers”. These are small machines and can be
accommodated on a disk with not as processing and
data storage capabilities as super-computers &
Mainframes.

Lesson 1B: 4 Basic types of Computer
Micro Computers

Personal Computers like Desktop computers, laptops, personal
digital assistant (PDA), Gaming consoles, Sound & Navigation
system of a car, Netbooks, Notebooks, PDA’s, Tablet PC’s,
Smartphones, Calculators are all types of microcomputers.
These computers are the cheapest among the other three
types of computers.
The Micro-computers are specially designed for general usage
like entertainment, education and work purposes. Well known
manufacturers of Micro-computer are Dell, Apple, Samsung,
Sony & Toshiba.

Lesson 1B: 4 Basic types of Computer
Computer Systems
A computer system of interconnected computers that
share a central storage system and various peripheral
devices such as a printers, scanners, or routers.
A computer system is one that is able to take a set of
inputs, process them and create a set of outputs. This is
done by a combination of hardware and software.
The idea of a computer system in its most basic form

Computer systems fall into two categories: clients and servers.

Clients are the user's laptop, desktop and tablet computers and
smartphones
Servers share their data and applications with multiple users.
Servers range from entry-level rack mounts to mainframes.

Platform
Every application is written to run under a specific CPU/operating system environment. The largest client
platforms are x86/Windows, x86/Mac, ARM/Android and ARM/iOS. The largest server platforms are x86/Linux and
x86/Windows. See platform, x86 and ARM(Advanced RISC (reduced instruction set computing) Machines).

Number of CPU Cores
The more CPU cores, the more simultaneous processing. Modern desktop computer CPUs have two, four or
eight processing cores, and servers can have from two to 64 or more. In addition, multiple machines can be tied
together to work as one

Clock Speed
The gigahertz (GHz) rate of the CPU determines internal processing speed.

Disk and Memory
The disk capacity determines the amount of information immediately available to all users. A computer's memory
capacity determines how many applications can run efficiently at the same time.

Fault Tolerance
The use of redundant processors, peripherals and power supplies provide continued operation in the event of
hardware failure.

Computer Security
Also known as cyber safety or IT security, is security applied to computing devices such as computers and
smartphones, as well as computer networks such as private and public networks, including the whole Internet.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data.
Security measures
Firewalls are by far the most common prevention systems from a network security perspective as they shield access
to internal network services, and block certain kinds of attacks through packet filtering. Firewalls can be both
hardware- or software-based.

Intrusion Detection Systems (IDSs) are designed to detect network attacks in progress and assist in post-attack
forensics, while audit trails and logs serve a similar function for individual systems.
In Windows OS or in any other OS, it enables you to create your own account with password, face recognition, or
biometrics security features for access to authorized users only.
For specific files associated with certain applications like MS WORD, MS EXCEL, MS POWERPOINT, and others
enable you to save a file with passwords.
Lesson 1C: Computer Security

Lab Activity : Create a security measure to your important file
using WORD, EXCEL and Powerpoint

Summary
There are three steps used to manage health and safety at work: 1. Spot the Hazard (Hazard Identification), 2.
Assess the Risk (Risk Assessment), and 3.Make the Changes (Risk Control)
Common hazards encountered by Computer Technicians and Users are: physical hazards, mechanical hazard, chemical
hazard, Electric Shock Hazard, and CRT Monitor High-Voltage Hazard.
These are the basic types of computers : 1. Super Computer, 2.Mainframe Computer, 3. Minicomputer, and
4.Microcomputer.
A computer system is one that is able to take a set of inputs, process them and create a set of outputs.
Computer systems fall into two categories: clients and servers.
Computer Security is security applied to computing devices such as computers and smartphones, as well as
computer networks and the Internet. Firewall, Intrusion Detection Systems, creating accounts with passwords and
other available security measures of the operating system like face recognitions and other biometric security features

Pop Quiz
Choose the term that best describes the statements.
Cybersecurity Client Mainframe Computer Personal Computer
Firewall ServerOHS/OSH Super Computer
1.It is a planned system of working to prevent illness and injury where you work by
recognizing and identifying hazards and risks.
2.Fugaku is what type of computer?
3.Laptops is what type of computer
4.A type of computer system that shares their data and applications with multiple
users.
5.It is the most common prevention systems from a network security perspective.

Answers to Pop Quiz
Choose the term that best describes the statements.
1.It is a planned system of working to prevent illness and injury where you work by
recognizing and identifying hazards and risks.
2. Fugaku is what type of computer?
3.Laptops is what type of computer.
4.A type of computer system that shares their data and applications with multiple
users.
5.It is the most common prevention systems from a network security perspective.
OHS/OSH
Super Computer
Personal Computer
Server
Firewall