computer systems servicing€¦ · computer systems servicing - grade 12 . alternative delivery...

38
Computer Systems Servicing Quarter 1 - Module 3 Performing Computer Operations PART 3 Department of Education ● Republic of the Philippines Senior High School

Upload: others

Post on 18-Nov-2020

49 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Computer Systems Servicing

Quarter 1 - Module 3 Performing Computer Operations

PART 3

Department of Education ● Republic of the Philippines

Senior High School

Page 2: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Computer Systems Servicing- Grade 12 Alternative Delivery Mode Quarter 1 - Module 3: Performing Computer Operations First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalty.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education – Division of Cagayan de Oro Schools Division Superintendent: Dr. Cherry Mae L. Limbaco, CESO V Development Team of the Module Author/s: Chemby Mae S. Pequiro Sam Uriel U. Reyes Reviewers:

Illustrator and Layout Artists: Chemby Mae S. Pequiro Management Team Chairperson: Cherry Mae L. Limbaco, PhD, CESO V Schools Division Superintendent Co-Chairperson: Alicia E. Anghay, PhD, CESE Assistant Schools Division Superintendent

Printed in the Philippines by Department of Education – Division of Cagayan de Oro City Office Address: Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro Telefax: (08822)855-0048 E-mail Address: [email protected]

Page 3: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Computer Systems Servicing NC II

Quarter 1 - Module 3 Performing Computer Operations – Part 3

This instructional material was collaboratively developed and reviewed by educators from the public schools. We encourage teachers and other education stakeholders to email their feedback, comments, and recommendations to the Department of Education at [email protected]

We value your feedback and recommendations. Department of Education ● Republic of the Philippines

Senior High School

Page 4: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020
Page 5: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Table of Contents What This Module is About .................................................................................................... i What I Need to Know ............................................................................................................. ii How to Learn from this Module ............................................................................................. ii Icons of this Module .............................................................................................................. iii What I Know ......................................................................................................................... .iv Lesson 1: Performing Computer Operations-Transfer Files to Other Devices .............................

What I Need to Know .................................................................................... 6

What’s New …. ............................................................................................. 6 What Is It ....................................................................................................... 6 What’s More: ................................................................................................. 8-9 What I Have Learned ................................................................................... 9-10

What I Can Do ............................................................................................... 11

Lesson 2: Performing Computer Operations-Using WWW-browser to Locate Information........

What I Need to Know .................................................................................... 14

What’s New ................................................................................................. 14 What Is It ....................................................................................................... 15 What’s More .................................................................................................. 16 What Is It ....................................................................................................... 17

What I Have Learned ................................................................................... 19 What I Can Do ............................................................................................... 19

Lesson 3: Performing Computer Operations-Computer Basic Maintenance ................................

What I Need to Know .................................................................................... 20 What’s New: ................................................................................................ 20 What Is It ....................................................................................................... 23 What I Have Learned ................................................................................... 23

What I Can Do ............................................................................................... 24

Summary ............................................................................................................................ ..25 Assessment: (Post-Test) ................................................................................................... ..26 Key to Answers ................................................................................................................... ..30 References .......................................................................................................................... . 31

Page 6: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What This Module is About

This module contains information and suggested learning activities on Computer

Systems Servicing. It includes training materials and activities for you to complete. Completion of this module will help you better understand the succeeding module on

Computer Systems Servicing. This module consists of three 3 learning outcomes. Each learning outcome contains

learning activities supported by concept notes in the What’s New section. Before you perform the learning activities, read the What’s New section provided to ascertain to yourself and your teacher that you have acquired the knowledge necessary to perform the skill portion of the particular learning outcome.

Upon completion of this module, submit your portfolio to your teacher for the checking

of your achievement of knowledge and skills requirement of this module.

i

Page 7: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What I Need to Know

At the end of this module, the learners shall be able to apply quality standards in computer systems servicing:

1. Transfer files and data between compatible systems using computer software, hardware/peripheral devices in accordance with standard operating procedures TLE

2. Establish information requirements for internet search 3. Launch browser 4. Load search engine 5. Enter appropriate search criteria/or URL of site 6. Follow relevant links to locate required information 7. Bookmark useful pages and print as required 8. Implement procedures for ensuring security of data, including regular backups and

virus checks in accordance with standard operating procedures 9. Implement basic file maintenance procedures in line with the standards operating

procedures How to Learn from this Module To achieve the objectives cited above, you are to do the following:

• Take your time reading the lessons carefully.

• Follow the directions and/or instructions in the activities and exercises diligently. • Answer all the given tests and exercises.

ii

Page 8: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Icons of this Module What I Need to This part contains learning objectives that Know are set for you to learn as you go along the module. What I know This is an assessment as to your level of knowledge to the subject matter at hand, meant specifically to gauge prior related knowledge What’s In This part connects previous lesson with that of the current one.

What’s New An introduction of the new lesson through various activities, before it will be presented to you What is It These are discussions of the activities as a way to deepen your discovery and under- standing of the concept. What’s More These are follow-up activities that are in- tended for you to practice further in order to master the competencies. What I Have Activities designed to process what you Learned have learned from the lesson.

What I can do These are tasks that are designed to show- case your skills and knowledge gained, and applied into real-life concerns and situations.

iii

Page 9: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What I Know

Assessment: (Pre-Test)

Multiple Choice.

Direction: Select the best answer for each question. Write your answer on a separate sheet of

paper.

1. What is the complete name of WWW?

a. World Wire Web b. World Wire Wed c. World Wide Web

2. Who discovered the World Wide Web?

a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee

3. What year that the first World Wide Web was published?

a. 1990 b. 1991 c. 1992

4. Which is the following does not belong to the group?

a. Google chrome b. Mozilla corporation c. Microsoft Edge

5. What is the complete of HTML?

a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c.

Hyperlink Transfer Protocol

6. What is the example of online storage?

a. one drive b.google.com c. twitter

7. It is a wireless technology that allows the exchange of data between different

devices.

a. Wi-Fi b. share it c. Bluetooth

8. The transferring of files is has many ways.

a. True b. False

9. Which is the following does not belong to the group?

a. Flash drive b. icloud c. dropbox

10. It is an application use to share files between cellphones when only the Bluetooth is

on.

a. Shareit b. OneDrive c. shareme

11. It is a process which you create a copy of your computer files

a. System Update

b. Virus scan

c. Data Backup

d. All of the above

Page 10: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

12. What will happen if you avoid computer updates?

a. It slows down your computer system

b. It will give a disk clean up

c. It speeds up your computer system

d. Nothing happens

13. It is a malicious code in our computer system which infiltrates personal data.

a. Anti-Virus

b. Software

c. Malware

d. All of the above

14. As a computer technician we should maintain our computer systems by

a. Scan viruses regularly

b. Maintain software updates

c. Check both hardware and software problems

d. All of the above

15. A process of computer system which cleans up your disk and improves performance.

a. Malware maintenance

b. Disk maintenance

c. Data maintenance

d. None of the above

16. To avoid data infiltration from viruses you must

a. Install anti-virus/spyware program

b. Install operating system

c. Install system updater

d. Install disk defragment program

17. It is a type of data backup which takes once a month.

a. System image backup

b. Full File Backup

c. Differential file backup

d. None of the above

18. It is a type of data backup which takes every week.

a. System image backup

b. Full File Backup

c. Differential file backup

d. None of the above

iv

Page 11: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

19. How often should you run an Anti-virus software?

a. Once a week, full scan

b. Every hour, deep scan

c. Everyday, full scan and deep scan

d. Not at all

20. A type of malware which steals your internet data usage and sensitive information

a. Trojan b. Worm c. Spyware d. Spam

v

Page 12: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Lesson 1

Transfer Data to Other Devices

What I Need to Know

After making or creating a new document and all the encoded information, designed

a cover page or edit some photo, you need to know how to transfer files from device to

another.

There are ways on how to transfer files from a certain device to another. Files need

to be kept and stored securely to prevent others from acquiring it illegally.

In this topic, you will learn what are ways on how to transfer files and data between

compatible systems using computer software, hardware/peripheral devices.

What’s New

Activity 1 – Identification Identify five hardware or peripheral devices or software that is use to transfer data.

1. Bluetooth

2.

3.

4.

5.

Table 1. Identification of hardware or devices use to transfer data.

6

Page 13: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What Is It

Transfer Files and Data

There are several ways on how to transfer files and data between compatible

systems using computer software, hardware and peripherals devices. You need to know the

following:

1. Files such as documents, pictures, music and email.

2. Peripherals or hardware this is where you can transfer from one device to

another just like computer to flash disk or vice versa, cellphone to cellphone,

computer to computer and so on.

Ways to transfer Files and Data 1. Computer to computer

In this way, you will use a local connection or router either wired or wireless

connections where the computers are connected to the same network to meet

and can transfer files to each other. Some are using third party to install and use

in transferring files from each other like Zinstall Winwin. You can download the

software in this website http://www.zinstall.com/download-zinstall-winwin.

Figure 1. Transfer files from computer to computer

7

Page 14: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

2. Computer to External storage device

Here, you need of course an external storage just like flash disk or memory

card where you can transfer files from computer to external storage or vice versa.

How to tranfer?

1. Make sure you have wire connectors if you want to transfer files from

mobile phone and external hard drive to computer and vice versa.

Figure 2. Transfer files from computer to external drives

3. Mobile Phone to Mobile Phone In these two same devices, Bluetooth connection should be turned on in order

to transfer files from each other. Others prefer to use the ShareIt applications

because it is very fast and easy to install.

Others are preferred to use a third party software called ShareIt

Figure 3. Transfer files from Mobile Phone to Mobile

4. Computer, Cellphone, Laptop to Online Storage

You can transfer files from computers and cellphones or vice versa easily

using cloud storage services like OneDrive, Dropbox or Google drive.

8

Page 15: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

How to transfer files?

1. When transferring files from different devices to online storage, make

sure you are connected to the internet.

2. Internet access is needed when saving and transferring files.

3. Applications are available to download and install for easy access of the

online storage.

Figure 4. Transfer files from different storage to Online storage

What’s More

Activity 2: Know Me.

In this activity, Identify the following images of the hardware/peripherals that is use to transfer files from the computer system to other peripherals. Choose your answers from the WORD BANK. Write your answer properly.

WORD BANK

Universal Serial Bus (USB) External Hard Drive Share it Cellphones Bluetooth

9

Page 16: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

1. Answer: USB

2. Answer: _________

3. Answer:__________

4. Answer: _________

5. Answer: _________

Table 1. Identification of hardware/peripherals and software use to transfer files

What Is It

Activity 3 – Meet and Match

In this activity, match the given the logo of the online storage or repository where you can store and transfer files or data from PC, cellphones or laptops immediately only when you are connected to the internet. Draw a line to meet the logo and the word.

Google drive

icloud drive

Dropbox

OneDrive

Nextdrive

Table 2. Match the images and name of the online storage use to transfer files

10

Page 17: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What I Have Learned

Activity 4: Create a blog site using a www.blogger.com Website. You can watch the video on the blogger tutorial using the link:

1. In your task today, go to the website www.blogger.com.

2. On the website, you are required to sign in your Gmail account. If you have

not created any account yet, you will first create an account by clicking the

“create new account”.

3. After creating the account, you are now

ready to create a blog address. In

creating a blog address, use ICT-

CSSYoursurname] (e.g ICTCSSpequiro).

Do not include spaces in between and

special characters. You may capitalize

the first letter of your surname. In case

your blog address is not available, you

may add a number or any letters to make

it unique.

4. Your blog Title is ICT-CSS because this is intended for ICT Computer System

Servicing subject only. You can create another blog address if you want to for

other purposes.

10

11

Page 18: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

5. Then click if available button. If it is available, then you can proceed.

6. Choose now your template.

7. This time, create a new post.

8. Explore the other features of the blog to familiarize each of the icon

functionalities

What I Can Do

Activity 5- Create and Publish Blog Using Blogger.com

In this activity, you are going to create your first post that will be

published online. Please answer the guide questions below. Make your blog

attractive.

Blog Reflection Questions:

a. Identify five (5) different online storage where you can store and transfer

files online and describe how to transfer the data and files online. Please

be creative in creating blog.

12

Page 19: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

b. Answer the following:

a. How do you transfer files :

i. from computer to USB?

ii. from Cellphone to laptop?

iii. From cellphone to cellphone?

Rating Criteria

Relevance and Content – 70%

Creativity - 30%

Total 100%

13

Page 20: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Lesson 2

Using WWW browser to locate information

What I Need to Know

In the early age, researching of information is quite hard and challenging. You need to

locate the book and the author name in order to research in the library. Today locating

information is being made easy. In just one click, you can see many options to choose from

the same topic.

This new era of technology, makes everything easy and simply but sometimes it

makes us lazier enough to understand and comprehend because we are bombarded with so

much information from the web.

In this topic, you will learn the basic function of World Wide Web browsers to locate

information

What’s New

Activity 6 – Identification of browsers

Identify five browsers that is now available in the World Wide Web. Write your

answers in the empty spaces.

1. Google Chrome

2.

3.

4.

5.

Table 3. Identification of browsers

14

Page 21: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What Is It

World Wide Web

Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web

in October 1990. He wrote the first web page editor/browser which is WorldWideWeb.app and

the first server which httpd. The first web page was served on the open internet by the end of

1990.

It was in the year 1993 that CERN, a European Organization for Nuclear Research,

where Sir Tim was working, to announced the global wave of creativity, collaboration and

innovation.

In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World

Wide Web Consortium (W3C), an international community devoted to developing open web

standards. He remains the Director of W3C to this day.

Parts of Web browser:

• HyperText Markup Language (HTML)

o This is the markup or format language for the web.

• Uniform Resource Identifier (URI)

o A kind of “address” that is unique and used to identify to each resource on the

web. It is also commonly called a URL.

• Hypertext Transfer Protocol (HTTP)

o Allows for the retrieval of linked resources from across the web.

15

Page 22: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What’s More

Activity 7: Know Me.

In this activity, Identify the owner or company of the following browser images. Choose

your answers from the WORD BANK. Write your answer properly.

WORD BANK

1. Answer: Pichai Sundararajan

(subsidiary Google LLC)

2. Answer: _________

3. Answer:__________

4. Answer: _________

6. Answer: _________

Table 4. Identification of browsers owners/company

- Mozilla Corporation - Pichai Sundararajan (subsidiary

Google LLC) - Apple company - Microsoft Company - Norwegian company (owned by

a Chinese group)A

16

Page 23: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What Is It

Activity 8 – Steps on Locating Information

In this activity, you will determine the steps on researching a certain topic online.

Choose from the WORD BANK the enumerated steps. Write the step number only.

WORD BANK

Step 1 - Select browser

Step 2 - Launch browser

Step 3- Load search engine

Step 4- Enter appropriate search criteria/or URL of site

Step 5 - Follow relevant links to locate required information

Step 6 - Bookmark useful pages and print as required.

INDICATE WHICH STEP SHOULD BE PERFORMED IN LOCATING INFORMATION

USING THE FOLLOWING IMAGES.

1. STEP ____

2. STEP ____

Topic “ICT”

3. STEP ____

17

Page 24: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

4. STEP ____

6.STEP ____

5. STEP ____

Bookmarked Website

18

Page 25: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What I Have Learned

Activity 9 - Steps in Locating Information in World Wide Web

In this activity, enumerate the different steps in locating information in the World Wide

Web. Write your answers.

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Table 5. Steps in locating information in WWW

What I Can Do

Activity 10- Locate Information using World Wide Web-browser

In this activity, you will locate the information using any browsers with the topic “What is ICT?”. Answer the following questions.

1. What browser did you use in locating the information? Ans. ______________. 2. What website location did you click? Ans. ________________ 3. What copyright year or name of the website? Ans. _____________ 4. How did you bookmark the located link of information? Enumerate the two steps

you’ve done. a. Step 1: ___________________ b. Step 2: ___________________

5. After bookmarking the website, where will you see the bookmarked website? 6. What is the purpose of bookmarking a certain website? State in maximum of 2

sentences only. Answer. __________________________________ __________________________________________________________

19

Page 26: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Lesson 3

Basic Computer Maintenance

What I Need to Know

Activity 11. Investigate and Interpret: Computer Systems Check.

In this worksheet, you will check and write down the current status of your computer systems before the updates and after the updates with regard to the different area listed below.

AREA STATUS (Before Updates)

STATUS (After Updates)

Security

1. Anti-Spyware Programs

2. Anti-Virus

Maintenance

1. System Maintenance

What’s New

Maintenance of Computer System

Perhaps you have handpicked the finest computer with the selected fastest

processor and graphic card and with a few gigabytes of memory. So, you thought to

yourself that your machine is probably going to sustain you for the next five (5) years.

But little did you discover that some six months down the road, your computer is

behaving like a Pentium computer, perpetually flustering you with its choppy images,

frustrating pop-ups and tremendously slow disk access. Gradually, your computer

crashes and all your data is lost on one fine afternoon.

20

Page 27: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

One thing you have probably missed out is the need for system maintenance. The basic

routine maintenance comprises of the 3 basic processes.

3 Basic Processes

1. Data Backup

2. Malware Maintenance

3. Disk or File Maintenance

Data Backup

Backing up basically means creating a redundant copy of a data so that in case

anything happens to the original data, you have a spare copy. This is typically a

simple thing to do.

What data should I back up?

In general, you should back up any work or data that cannot be replaced easily.

Some examples are word processing documents, spreadsheets, databases (for financial

data), customer data, and personal files such as pictures, music files, emails, etc.

As a rule of thumb, do not backup programs or system folders. Programs will need

to be reinstalled before you can run them and system folders can be restored from your

operating system install disc. Be sure to save program installation discs, operating system

discs, and registration information in a safe place. If you have downloaded any of your

applications, you should save the install files whenever possible.

Malware Maintenance

Malware refers to any kind of malicious codes, objects or content that infiltrates

your computer, resulting in damage and causing your system to act in an undesirable

manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and

many more. When you are infected, you can lose your privacy, confidential data, and

access to your system when software and hardware are damaged. Fortunately, there

are a couple of preventive measures you can take to protect yourself from malware.

21

Page 28: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

One thing you can do to scan the file for any virus infection before you attempt to

open it. If the scan shows nothing, it is probably a safe file. But then again, it may be a

new virus yet to be updated in your virus scan. You can either wait and apply the next

virus signature update and perform a second scan or risk it all and open the file.

Disk Maintenance Did anyone tell you that your hard disk is a tricky machine? When you first

installed your operating system, you may be pleased to know how smooth and efficient

your software applications are running. But gradually, it slows down and this bothers

you. What truly causes the decline in performance? You may argue that your disk is just

a couple of months old. This has much to do with the way you operate on your system.

Try to imagine a big tool bucket filled with gadgets.

Initially, the bucket only contains a few spanners, a hammer and some screws.

So every time you search for a particular item, it is relatively easy to find. But soon as

you keep filling the bucket with all sorts of items and especially when the amount of

items grows, you will discover that you may need more time just to search for a

particular screw head. In such cases, uninstall any unnecessary software and

defragment your disk. Typically, your system performance will decline when the amount

of data in your hard disk starts to grow.

22

Page 29: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What Is It

Activity 12. Identify the Malware Maintenance In this activity, identify the four types of Malware. Write your answer on a

piece of paper.

1. worms____________________ 3. ___________________________

2. _________________________ 4. ___________________________

5.________________________

What I have Learned

Activity 13. Essay Writing Activity Write an essay about the importance of Data Backup. Relate your statements to

the most treasured skills you acquired in the lesson. Give also your own title for the

essay (minimum of 400 words).

Rating Criteria - Rubrics

CONTENTS Excellent (3)

Good (2) Poor (1)

Spelling Almost all words spelled

correctly

Capitalization Begins all sentences but one

with uppercase letters.

Punctuation Correct ending punctuation in

every sentence but one.

Grammar Simple sentences are

grammatically correct.

Handwriting Legible. Good spacing and

alignment

Total Points

23

Page 30: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

What I Can Do

Activity 14. Perform Disk Maintenance

In this activity, you will determine the step number on how to perform computer disk

maintenance. Given the enumerated steps, write which step number and the complete

description of the steps or procedure on a piece of paper.

STEP # DESCRIPTIONS

At the Drives list, select which drive you want to run Disk Cleanup on

1 Type Disk Cleanup in the Search Bar

Select which files you want to delete

To delete system files that are no longer needed on your computer, click Clean

up system files.

Click Delete files

24

Page 31: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

SUMMARY 1. Bluetooth is a wireless technology that allows the exchange of data between different

devices. However it is only on a short distance for the devices to stay connected.

2. Online Storage it is a cloud storage of the files and data especially for back up

purposes. It is for free. Most of the websites allowed limited storage only.

3. External Storage devices come in many forms, both removable and non-

removable. It includes flash drive, floppy disk, hard drive or compact drive.

4. World Wide Web is called as WEB. It is an information system on the Internet which

allows documents or pages to be connected to other documents using hypertext links,

which enable the user to search for information or data by moving from one document to

another.

5. HyperText Markup Language (HTML). This is the markup (formatting) language for the

web.

6. Uniform Resource Identifier (URI). A kind of “address” that is unique and used to

identify to each resource on the web. It is also commonly called a URL.

7. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linked resources from

across the web.

8. Tim Berners-Lee. A British computer scientist and He invented the World Wide Web in

October 1990.

9. Malware refers to any kind of malicious codes, objects or content that infiltrates your

computer, resulting in damage and causing your system to act in an undesirable

manner. 10. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility included in Microsoft

Windows designed to free up disk space on a computer's hard drive.

11. Back up It means creating a redundant copy of a data so that in case anything

happens to the original data, you have a spare copy

25

Page 32: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Assessment: (Post-Test)

Multiple Choice

Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.

1. What is the complete name of WWW?

a. World Wire Web b. World Wire Wed c. World Wide Web

2. Who discovered the World Wide Web?

a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee

3. What year that the first World Wide Web was published?

a. 1990 b. 1991 c. 1992

4. Which is the following does not belong to the group?

a. Google chrome b. Mozilla corporation c. Microsoft Edge

5. What is the complete of HTML?

a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c. Hyperlink Transfer

Protocol

6. What is the example of online storage?

a. one drive b.google.com c. twitter

7. It is a wireless technology that allows the exchange of data between different devices.

a. Wi-Fi b. share it c. Bluetooth

8. The transferring of files is has many ways.

a. True b. False

9. Which is the following does not belong to the group?

a. Flash drive b. icloud c. dropbox

10. It is an application use to share files between cellphones when only the Bluetooth is on.

a. Shareit b. OneDrive c. shareme

11. It is a process which you create a copy of your computer files

a. System Update

b. Virus scan

c. Data Backup

d. All of the above

12. What will happen if you avoid computer updates?

a. It slows down your computer system

b. It will give a disk clean up

c. It speeds up your computer system

d. Nothing happens

26

Page 33: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

13. It is a malicious code in our computer system which infiltrates personal data.

a. Anti-Virus

b. Software

c. Malware

d. All of the above

14. As a computer technician we should maintain our computer systems by

a. Scan viruses regularly

b. Maintain software updates

c. Check both hardware and software problems

d. All of the above

15. A process of computer system which cleans up your disk and improves performance.

a. Malware maintenance

b. Disk maintenance

c. Data maintenance

d. None of the above

16. To avoid data infiltration from viruses you must

a. Install anti-virus/spyware program

b. Install operating system

c. Install system updater

d. Install disk defragment program

17. It is a type of data backup which takes once a month.

a. System image backup

b. Full File Backup

c. Differential file backup

d. None of the above

18. It is a type of data backup which takes every week.

a. System image backup

b. Full File Backup

c. Differential file backup

d. None of the above

19. How often should you run an Anti-virus software?

a. Once a week, full scan

b. Every hour, deep scan

c. Everyday, full scan and deep scan

d. Not at all

20. A type of malware which steals your internet data usage and sensitive information

b. Trojan b. Worm c. Spyware d. Spam

27

Page 34: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Answer Key

Pre-test and Post Test

Activity 1. Identification of hardware or devices use to transfer data.(in any order)

Activity 2. Identification of hardware/peripherals and software use to transfer files

1.C 2.B 3.A 4.B 5.A 6.A 7.C 8.A 9.A 10.A 11.C 12.A 13.C 14.D 15.B 16.A 17.A 18.B 19.A 20.C

21.Universal Serial Bus (USB)

22.External Hard Drive 23.Share it 24.Cellphones 25.Bluetooth

26.Universal Serial Bus (USB)

27.External Hard Drive 28.Share it 29.Cellphones 30.Bluetooth

28

Page 35: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Activity 3 – Meet and Match

Activity 6 – Identification of browsers (I any order)

Activity 7: Know Me.

Activity 8 – Steps on Locating Information

1.Next drive 2.Onedrive 3.Dropbox 4.Icloud 5.Google drive

6.Next drive 7.Onedrive 8.Dropbox 9.Icloud 10.Google drive

1.Pichai Sundararajan (subsidiary Google LLC)

2.Norwegian company (owned by a Chinese group)

3.Apple Company 4.Microsoft Company 5.Mozilla Corporation

1.Step 1 2.Step 2 3.Step 4 4.Step 3 5.Step 6 6.Step 5

29

Page 36: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

Activity 9 - Steps in Locating Information in World Wide Web

Activity 12. Identify the Malware Maintenance

Step 1 - Select browser Step 2 - Launch browser Step 3- Load search engine Step 4- Enter appropriate search criteria/or URL of site Step 5 - Follow relevant links to lo cate required information Step 6 - Bookmark useful pages and print as required.

1.Worms 2.Trojan viruses 3.Spyware 4.Adware 5.Ransomware

30

Page 37: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

References Websites: Paul Goodman 2019 https://turbofuture.com/computers/Computer-Basics-10-Examples-of-Output-Devices

© 2020 CBS Interactive. https://www.zdnet.com/article/best-cloud-storage-services/

©2008-2020 World Wide Web Foundation. This work is licensed under a Creative Commons Attribution 4.0 International Licence https://webfoundation.org/about/vision/history-of-the-web/ https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html#:~:text=Malware%20is%20a%20contraction%20for,spyware%2C%20adware%2C%20and%20ransomware. https://neosmart.net/wiki/disk-cleanup/ https://en.wikipedia.org/wiki/Disk_Cleanup e-chsmodules, www.coursehero.com, deped.gov.ph/ComputerSystemServicing module

12

Page 38: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020

For inquiries and feedback, please write or call: Department of Education – Division of Cagayan de Oro City Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro Telefax: ((08822)855-0048 E-mail Address: [email protected]