computer systems servicing€¦ · computer systems servicing - grade 12 . alternative delivery...
TRANSCRIPT
![Page 1: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/1.jpg)
Computer Systems Servicing
Quarter 1 - Module 3 Performing Computer Operations
PART 3
Department of Education ● Republic of the Philippines
Senior High School
![Page 2: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/2.jpg)
Computer Systems Servicing- Grade 12 Alternative Delivery Mode Quarter 1 - Module 3: Performing Computer Operations First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education – Division of Cagayan de Oro Schools Division Superintendent: Dr. Cherry Mae L. Limbaco, CESO V Development Team of the Module Author/s: Chemby Mae S. Pequiro Sam Uriel U. Reyes Reviewers:
Illustrator and Layout Artists: Chemby Mae S. Pequiro Management Team Chairperson: Cherry Mae L. Limbaco, PhD, CESO V Schools Division Superintendent Co-Chairperson: Alicia E. Anghay, PhD, CESE Assistant Schools Division Superintendent
Printed in the Philippines by Department of Education – Division of Cagayan de Oro City Office Address: Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro Telefax: (08822)855-0048 E-mail Address: [email protected]
![Page 3: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/3.jpg)
Computer Systems Servicing NC II
Quarter 1 - Module 3 Performing Computer Operations – Part 3
This instructional material was collaboratively developed and reviewed by educators from the public schools. We encourage teachers and other education stakeholders to email their feedback, comments, and recommendations to the Department of Education at [email protected]
We value your feedback and recommendations. Department of Education ● Republic of the Philippines
Senior High School
![Page 4: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/4.jpg)
![Page 5: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/5.jpg)
Table of Contents What This Module is About .................................................................................................... i What I Need to Know ............................................................................................................. ii How to Learn from this Module ............................................................................................. ii Icons of this Module .............................................................................................................. iii What I Know ......................................................................................................................... .iv Lesson 1: Performing Computer Operations-Transfer Files to Other Devices .............................
What I Need to Know .................................................................................... 6
What’s New …. ............................................................................................. 6 What Is It ....................................................................................................... 6 What’s More: ................................................................................................. 8-9 What I Have Learned ................................................................................... 9-10
What I Can Do ............................................................................................... 11
Lesson 2: Performing Computer Operations-Using WWW-browser to Locate Information........
What I Need to Know .................................................................................... 14
What’s New ................................................................................................. 14 What Is It ....................................................................................................... 15 What’s More .................................................................................................. 16 What Is It ....................................................................................................... 17
What I Have Learned ................................................................................... 19 What I Can Do ............................................................................................... 19
Lesson 3: Performing Computer Operations-Computer Basic Maintenance ................................
What I Need to Know .................................................................................... 20 What’s New: ................................................................................................ 20 What Is It ....................................................................................................... 23 What I Have Learned ................................................................................... 23
What I Can Do ............................................................................................... 24
Summary ............................................................................................................................ ..25 Assessment: (Post-Test) ................................................................................................... ..26 Key to Answers ................................................................................................................... ..30 References .......................................................................................................................... . 31
![Page 6: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/6.jpg)
What This Module is About
This module contains information and suggested learning activities on Computer
Systems Servicing. It includes training materials and activities for you to complete. Completion of this module will help you better understand the succeeding module on
Computer Systems Servicing. This module consists of three 3 learning outcomes. Each learning outcome contains
learning activities supported by concept notes in the What’s New section. Before you perform the learning activities, read the What’s New section provided to ascertain to yourself and your teacher that you have acquired the knowledge necessary to perform the skill portion of the particular learning outcome.
Upon completion of this module, submit your portfolio to your teacher for the checking
of your achievement of knowledge and skills requirement of this module.
i
![Page 7: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/7.jpg)
What I Need to Know
At the end of this module, the learners shall be able to apply quality standards in computer systems servicing:
1. Transfer files and data between compatible systems using computer software, hardware/peripheral devices in accordance with standard operating procedures TLE
2. Establish information requirements for internet search 3. Launch browser 4. Load search engine 5. Enter appropriate search criteria/or URL of site 6. Follow relevant links to locate required information 7. Bookmark useful pages and print as required 8. Implement procedures for ensuring security of data, including regular backups and
virus checks in accordance with standard operating procedures 9. Implement basic file maintenance procedures in line with the standards operating
procedures How to Learn from this Module To achieve the objectives cited above, you are to do the following:
• Take your time reading the lessons carefully.
• Follow the directions and/or instructions in the activities and exercises diligently. • Answer all the given tests and exercises.
ii
![Page 8: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/8.jpg)
Icons of this Module What I Need to This part contains learning objectives that Know are set for you to learn as you go along the module. What I know This is an assessment as to your level of knowledge to the subject matter at hand, meant specifically to gauge prior related knowledge What’s In This part connects previous lesson with that of the current one.
What’s New An introduction of the new lesson through various activities, before it will be presented to you What is It These are discussions of the activities as a way to deepen your discovery and under- standing of the concept. What’s More These are follow-up activities that are in- tended for you to practice further in order to master the competencies. What I Have Activities designed to process what you Learned have learned from the lesson.
What I can do These are tasks that are designed to show- case your skills and knowledge gained, and applied into real-life concerns and situations.
iii
![Page 9: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/9.jpg)
What I Know
Assessment: (Pre-Test)
Multiple Choice.
Direction: Select the best answer for each question. Write your answer on a separate sheet of
paper.
1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c.
Hyperlink Transfer Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different
devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is
on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
![Page 10: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/10.jpg)
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
iv
![Page 11: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/11.jpg)
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
a. Trojan b. Worm c. Spyware d. Spam
v
![Page 12: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/12.jpg)
Lesson 1
Transfer Data to Other Devices
What I Need to Know
After making or creating a new document and all the encoded information, designed
a cover page or edit some photo, you need to know how to transfer files from device to
another.
There are ways on how to transfer files from a certain device to another. Files need
to be kept and stored securely to prevent others from acquiring it illegally.
In this topic, you will learn what are ways on how to transfer files and data between
compatible systems using computer software, hardware/peripheral devices.
What’s New
Activity 1 – Identification Identify five hardware or peripheral devices or software that is use to transfer data.
1. Bluetooth
2.
3.
4.
5.
Table 1. Identification of hardware or devices use to transfer data.
6
![Page 13: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/13.jpg)
What Is It
Transfer Files and Data
There are several ways on how to transfer files and data between compatible
systems using computer software, hardware and peripherals devices. You need to know the
following:
1. Files such as documents, pictures, music and email.
2. Peripherals or hardware this is where you can transfer from one device to
another just like computer to flash disk or vice versa, cellphone to cellphone,
computer to computer and so on.
Ways to transfer Files and Data 1. Computer to computer
In this way, you will use a local connection or router either wired or wireless
connections where the computers are connected to the same network to meet
and can transfer files to each other. Some are using third party to install and use
in transferring files from each other like Zinstall Winwin. You can download the
software in this website http://www.zinstall.com/download-zinstall-winwin.
Figure 1. Transfer files from computer to computer
7
![Page 14: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/14.jpg)
2. Computer to External storage device
Here, you need of course an external storage just like flash disk or memory
card where you can transfer files from computer to external storage or vice versa.
How to tranfer?
1. Make sure you have wire connectors if you want to transfer files from
mobile phone and external hard drive to computer and vice versa.
Figure 2. Transfer files from computer to external drives
3. Mobile Phone to Mobile Phone In these two same devices, Bluetooth connection should be turned on in order
to transfer files from each other. Others prefer to use the ShareIt applications
because it is very fast and easy to install.
Others are preferred to use a third party software called ShareIt
Figure 3. Transfer files from Mobile Phone to Mobile
4. Computer, Cellphone, Laptop to Online Storage
You can transfer files from computers and cellphones or vice versa easily
using cloud storage services like OneDrive, Dropbox or Google drive.
8
![Page 15: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/15.jpg)
How to transfer files?
1. When transferring files from different devices to online storage, make
sure you are connected to the internet.
2. Internet access is needed when saving and transferring files.
3. Applications are available to download and install for easy access of the
online storage.
Figure 4. Transfer files from different storage to Online storage
What’s More
Activity 2: Know Me.
In this activity, Identify the following images of the hardware/peripherals that is use to transfer files from the computer system to other peripherals. Choose your answers from the WORD BANK. Write your answer properly.
WORD BANK
Universal Serial Bus (USB) External Hard Drive Share it Cellphones Bluetooth
9
![Page 16: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/16.jpg)
1. Answer: USB
2. Answer: _________
3. Answer:__________
4. Answer: _________
5. Answer: _________
Table 1. Identification of hardware/peripherals and software use to transfer files
What Is It
Activity 3 – Meet and Match
In this activity, match the given the logo of the online storage or repository where you can store and transfer files or data from PC, cellphones or laptops immediately only when you are connected to the internet. Draw a line to meet the logo and the word.
Google drive
icloud drive
Dropbox
OneDrive
Nextdrive
Table 2. Match the images and name of the online storage use to transfer files
10
![Page 17: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/17.jpg)
What I Have Learned
Activity 4: Create a blog site using a www.blogger.com Website. You can watch the video on the blogger tutorial using the link:
1. In your task today, go to the website www.blogger.com.
2. On the website, you are required to sign in your Gmail account. If you have
not created any account yet, you will first create an account by clicking the
“create new account”.
3. After creating the account, you are now
ready to create a blog address. In
creating a blog address, use ICT-
CSSYoursurname] (e.g ICTCSSpequiro).
Do not include spaces in between and
special characters. You may capitalize
the first letter of your surname. In case
your blog address is not available, you
may add a number or any letters to make
it unique.
4. Your blog Title is ICT-CSS because this is intended for ICT Computer System
Servicing subject only. You can create another blog address if you want to for
other purposes.
10
11
![Page 18: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/18.jpg)
5. Then click if available button. If it is available, then you can proceed.
6. Choose now your template.
7. This time, create a new post.
8. Explore the other features of the blog to familiarize each of the icon
functionalities
What I Can Do
Activity 5- Create and Publish Blog Using Blogger.com
In this activity, you are going to create your first post that will be
published online. Please answer the guide questions below. Make your blog
attractive.
Blog Reflection Questions:
a. Identify five (5) different online storage where you can store and transfer
files online and describe how to transfer the data and files online. Please
be creative in creating blog.
12
![Page 19: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/19.jpg)
b. Answer the following:
a. How do you transfer files :
i. from computer to USB?
ii. from Cellphone to laptop?
iii. From cellphone to cellphone?
Rating Criteria
Relevance and Content – 70%
Creativity - 30%
Total 100%
13
![Page 20: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/20.jpg)
Lesson 2
Using WWW browser to locate information
What I Need to Know
In the early age, researching of information is quite hard and challenging. You need to
locate the book and the author name in order to research in the library. Today locating
information is being made easy. In just one click, you can see many options to choose from
the same topic.
This new era of technology, makes everything easy and simply but sometimes it
makes us lazier enough to understand and comprehend because we are bombarded with so
much information from the web.
In this topic, you will learn the basic function of World Wide Web browsers to locate
information
What’s New
Activity 6 – Identification of browsers
Identify five browsers that is now available in the World Wide Web. Write your
answers in the empty spaces.
1. Google Chrome
2.
3.
4.
5.
Table 3. Identification of browsers
14
![Page 21: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/21.jpg)
What Is It
World Wide Web
Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web
in October 1990. He wrote the first web page editor/browser which is WorldWideWeb.app and
the first server which httpd. The first web page was served on the open internet by the end of
1990.
It was in the year 1993 that CERN, a European Organization for Nuclear Research,
where Sir Tim was working, to announced the global wave of creativity, collaboration and
innovation.
In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World
Wide Web Consortium (W3C), an international community devoted to developing open web
standards. He remains the Director of W3C to this day.
Parts of Web browser:
• HyperText Markup Language (HTML)
o This is the markup or format language for the web.
• Uniform Resource Identifier (URI)
o A kind of “address” that is unique and used to identify to each resource on the
web. It is also commonly called a URL.
• Hypertext Transfer Protocol (HTTP)
o Allows for the retrieval of linked resources from across the web.
15
![Page 22: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/22.jpg)
What’s More
Activity 7: Know Me.
In this activity, Identify the owner or company of the following browser images. Choose
your answers from the WORD BANK. Write your answer properly.
WORD BANK
1. Answer: Pichai Sundararajan
(subsidiary Google LLC)
2. Answer: _________
3. Answer:__________
4. Answer: _________
6. Answer: _________
Table 4. Identification of browsers owners/company
- Mozilla Corporation - Pichai Sundararajan (subsidiary
Google LLC) - Apple company - Microsoft Company - Norwegian company (owned by
a Chinese group)A
16
![Page 23: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/23.jpg)
What Is It
Activity 8 – Steps on Locating Information
In this activity, you will determine the steps on researching a certain topic online.
Choose from the WORD BANK the enumerated steps. Write the step number only.
WORD BANK
Step 1 - Select browser
Step 2 - Launch browser
Step 3- Load search engine
Step 4- Enter appropriate search criteria/or URL of site
Step 5 - Follow relevant links to locate required information
Step 6 - Bookmark useful pages and print as required.
INDICATE WHICH STEP SHOULD BE PERFORMED IN LOCATING INFORMATION
USING THE FOLLOWING IMAGES.
1. STEP ____
2. STEP ____
Topic “ICT”
3. STEP ____
17
![Page 24: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/24.jpg)
4. STEP ____
6.STEP ____
5. STEP ____
Bookmarked Website
18
![Page 25: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/25.jpg)
What I Have Learned
Activity 9 - Steps in Locating Information in World Wide Web
In this activity, enumerate the different steps in locating information in the World Wide
Web. Write your answers.
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Table 5. Steps in locating information in WWW
What I Can Do
Activity 10- Locate Information using World Wide Web-browser
In this activity, you will locate the information using any browsers with the topic “What is ICT?”. Answer the following questions.
1. What browser did you use in locating the information? Ans. ______________. 2. What website location did you click? Ans. ________________ 3. What copyright year or name of the website? Ans. _____________ 4. How did you bookmark the located link of information? Enumerate the two steps
you’ve done. a. Step 1: ___________________ b. Step 2: ___________________
5. After bookmarking the website, where will you see the bookmarked website? 6. What is the purpose of bookmarking a certain website? State in maximum of 2
sentences only. Answer. __________________________________ __________________________________________________________
19
![Page 26: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/26.jpg)
Lesson 3
Basic Computer Maintenance
What I Need to Know
Activity 11. Investigate and Interpret: Computer Systems Check.
In this worksheet, you will check and write down the current status of your computer systems before the updates and after the updates with regard to the different area listed below.
AREA STATUS (Before Updates)
STATUS (After Updates)
Security
1. Anti-Spyware Programs
2. Anti-Virus
Maintenance
1. System Maintenance
What’s New
Maintenance of Computer System
Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5) years.
But little did you discover that some six months down the road, your computer is
behaving like a Pentium computer, perpetually flustering you with its choppy images,
frustrating pop-ups and tremendously slow disk access. Gradually, your computer
crashes and all your data is lost on one fine afternoon.
20
![Page 27: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/27.jpg)
One thing you have probably missed out is the need for system maintenance. The basic
routine maintenance comprises of the 3 basic processes.
3 Basic Processes
1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
Data Backup
Backing up basically means creating a redundant copy of a data so that in case
anything happens to the original data, you have a spare copy. This is typically a
simple thing to do.
What data should I back up?
In general, you should back up any work or data that cannot be replaced easily.
Some examples are word processing documents, spreadsheets, databases (for financial
data), customer data, and personal files such as pictures, music files, emails, etc.
As a rule of thumb, do not backup programs or system folders. Programs will need
to be reinstalled before you can run them and system folders can be restored from your
operating system install disc. Be sure to save program installation discs, operating system
discs, and registration information in a safe place. If you have downloaded any of your
applications, you should save the install files whenever possible.
Malware Maintenance
Malware refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an undesirable
manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and
many more. When you are infected, you can lose your privacy, confidential data, and
access to your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from malware.
21
![Page 28: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/28.jpg)
One thing you can do to scan the file for any virus infection before you attempt to
open it. If the scan shows nothing, it is probably a safe file. But then again, it may be a
new virus yet to be updated in your virus scan. You can either wait and apply the next
virus signature update and perform a second scan or risk it all and open the file.
Disk Maintenance Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and efficient
your software applications are running. But gradually, it slows down and this bothers
you. What truly causes the decline in performance? You may argue that your disk is just
a couple of months old. This has much to do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets.
Initially, the bucket only contains a few spanners, a hammer and some screws.
So every time you search for a particular item, it is relatively easy to find. But soon as
you keep filling the bucket with all sorts of items and especially when the amount of
items grows, you will discover that you may need more time just to search for a
particular screw head. In such cases, uninstall any unnecessary software and
defragment your disk. Typically, your system performance will decline when the amount
of data in your hard disk starts to grow.
22
![Page 29: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/29.jpg)
What Is It
Activity 12. Identify the Malware Maintenance In this activity, identify the four types of Malware. Write your answer on a
piece of paper.
1. worms____________________ 3. ___________________________
2. _________________________ 4. ___________________________
5.________________________
What I have Learned
Activity 13. Essay Writing Activity Write an essay about the importance of Data Backup. Relate your statements to
the most treasured skills you acquired in the lesson. Give also your own title for the
essay (minimum of 400 words).
Rating Criteria - Rubrics
CONTENTS Excellent (3)
Good (2) Poor (1)
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but one
with uppercase letters.
Punctuation Correct ending punctuation in
every sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing and
alignment
Total Points
23
![Page 30: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/30.jpg)
What I Can Do
Activity 14. Perform Disk Maintenance
In this activity, you will determine the step number on how to perform computer disk
maintenance. Given the enumerated steps, write which step number and the complete
description of the steps or procedure on a piece of paper.
STEP # DESCRIPTIONS
At the Drives list, select which drive you want to run Disk Cleanup on
1 Type Disk Cleanup in the Search Bar
Select which files you want to delete
To delete system files that are no longer needed on your computer, click Clean
up system files.
Click Delete files
24
![Page 31: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/31.jpg)
SUMMARY 1. Bluetooth is a wireless technology that allows the exchange of data between different
devices. However it is only on a short distance for the devices to stay connected.
2. Online Storage it is a cloud storage of the files and data especially for back up
purposes. It is for free. Most of the websites allowed limited storage only.
3. External Storage devices come in many forms, both removable and non-
removable. It includes flash drive, floppy disk, hard drive or compact drive.
4. World Wide Web is called as WEB. It is an information system on the Internet which
allows documents or pages to be connected to other documents using hypertext links,
which enable the user to search for information or data by moving from one document to
another.
5. HyperText Markup Language (HTML). This is the markup (formatting) language for the
web.
6. Uniform Resource Identifier (URI). A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.
7. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linked resources from
across the web.
8. Tim Berners-Lee. A British computer scientist and He invented the World Wide Web in
October 1990.
9. Malware refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner. 10. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's hard drive.
11. Back up It means creating a redundant copy of a data so that in case anything
happens to the original data, you have a spare copy
25
![Page 32: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/32.jpg)
Assessment: (Post-Test)
Multiple Choice
Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.
1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c. Hyperlink Transfer
Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
26
![Page 33: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/33.jpg)
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
b. Trojan b. Worm c. Spyware d. Spam
27
![Page 34: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/34.jpg)
Answer Key
Pre-test and Post Test
Activity 1. Identification of hardware or devices use to transfer data.(in any order)
Activity 2. Identification of hardware/peripherals and software use to transfer files
1.C 2.B 3.A 4.B 5.A 6.A 7.C 8.A 9.A 10.A 11.C 12.A 13.C 14.D 15.B 16.A 17.A 18.B 19.A 20.C
21.Universal Serial Bus (USB)
22.External Hard Drive 23.Share it 24.Cellphones 25.Bluetooth
26.Universal Serial Bus (USB)
27.External Hard Drive 28.Share it 29.Cellphones 30.Bluetooth
28
![Page 35: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/35.jpg)
Activity 3 – Meet and Match
Activity 6 – Identification of browsers (I any order)
Activity 7: Know Me.
Activity 8 – Steps on Locating Information
1.Next drive 2.Onedrive 3.Dropbox 4.Icloud 5.Google drive
6.Next drive 7.Onedrive 8.Dropbox 9.Icloud 10.Google drive
1.Pichai Sundararajan (subsidiary Google LLC)
2.Norwegian company (owned by a Chinese group)
3.Apple Company 4.Microsoft Company 5.Mozilla Corporation
1.Step 1 2.Step 2 3.Step 4 4.Step 3 5.Step 6 6.Step 5
29
![Page 36: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/36.jpg)
Activity 9 - Steps in Locating Information in World Wide Web
Activity 12. Identify the Malware Maintenance
Step 1 - Select browser Step 2 - Launch browser Step 3- Load search engine Step 4- Enter appropriate search criteria/or URL of site Step 5 - Follow relevant links to lo cate required information Step 6 - Bookmark useful pages and print as required.
1.Worms 2.Trojan viruses 3.Spyware 4.Adware 5.Ransomware
30
![Page 37: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/37.jpg)
References Websites: Paul Goodman 2019 https://turbofuture.com/computers/Computer-Basics-10-Examples-of-Output-Devices
© 2020 CBS Interactive. https://www.zdnet.com/article/best-cloud-storage-services/
©2008-2020 World Wide Web Foundation. This work is licensed under a Creative Commons Attribution 4.0 International Licence https://webfoundation.org/about/vision/history-of-the-web/ https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html#:~:text=Malware%20is%20a%20contraction%20for,spyware%2C%20adware%2C%20and%20ransomware. https://neosmart.net/wiki/disk-cleanup/ https://en.wikipedia.org/wiki/Disk_Cleanup e-chsmodules, www.coursehero.com, deped.gov.ph/ComputerSystemServicing module
12
![Page 38: Computer Systems Servicing€¦ · Computer Systems Servicing - Grade 12 . Alternative Delivery Mode . Quarter 1 - Module 3: Performing Computer Operations . First Edition, 2020](https://reader034.vdocuments.us/reader034/viewer/2022052303/608bf892622b30670c30d2da/html5/thumbnails/38.jpg)
For inquiries and feedback, please write or call: Department of Education – Division of Cagayan de Oro City Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro Telefax: ((08822)855-0048 E-mail Address: [email protected]