Professional Documents
Culture Documents
Tle TVL 9-12ia - CSS - Q1 - Wk7day1 - 4
Tle TVL 9-12ia - CSS - Q1 - Wk7day1 - 4
FIRST QUARTER
Quarter: 1 Week: 7 Day: 1 Activity No. 25
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: Familiarize the procedure in installing Office 2013
Topic: Application Software (Office 2013)
Reference CG, https://www.wikihow.com/Install-Microsoft-Office
Copyright: For classroom use only
Concept Notes:
Installing Office 2013 on Windows
5.Click Yes when prompted. Doing so will run the setup file and
begin installing Office
on your computer.
Activity: Directions: Arrange the steps in installing Office 2013 by numbering them from 1-7.
_____ Click Install again. Your Office setup file will begin downloading.
_____ Click Close when prompted. Your Microsoft Office programs have now been installed on your
computer. You're free to begin using these programs right away.
_____ Go to your account's Office page. Go to http://www.office.com/myaccount/.
_____ Wait for Microsoft Office to finish installing. This process may take several minutes.
_____ Double-click the Office setup file. You'll find it in your computer's default download location.
_____ Click Yes when prompted. Doing so will run the setup file and begin installing Office on your computer.
_____ Click Install. It's an orange button below your subscription's name.
COMPUTER SYSTEMS SERVICING 11
FIRST QUARTER
Quarter: 1 Week: 7 Day: 2 Activity No. 26
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: To know what computer viruses do, and how to avoid computer viruses.
Topic: Computer Virus
Reference CG, https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/
Copyright: For classroom use only
Concept Notes:
A computer virus is a malicious program that self-replicates by copying itself to another program.
In other words, the computer virus spreads by itself into other executable code or documents. The purpose of
creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data.
Hackers design computer viruses with malicious intent and prey on online users by tricking them.
One of the ideal methods by which viruses spread is through emails – opening the attachment in
the email, visiting an infected website, clicking on an executable file, or viewing an infected advertisement
can cause the virus to spread to your system. Besides that, infections also spread while connecting with
already infected removable storage devices, such as USB drives.
A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive;
when this replication succeeds, the affected areas are then said to be "infected".
Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, displaying political or humorous messages
on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a
destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-
replicating computer programs which install themselves without the user's consent.
Activity:
Concept Notes:
Computer Viruses are classified according to their nature of infection and behavior. Different
types of computer virus classification are given below.
1. Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot
Record (MBR) is stored. The Master Boot Record (MBR) stores the disk's primary partition table and to
store bootstrapping instructions which are executed after the computer's BIOS passes execution to machine
code. If a computer is infected with Boot Sector Virus, when the computer is turned on, the virus launches
immediately and is loaded into memory, enabling it to control the computer.
2. Direct Action Virus – This is also called non-resident virus, it gets installed or stays hidden in the
computer memory. It stays attached to the specific type of files that it infect. It does not affect the
user experience and system’s performance
3. File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part
of Operating System or data files.
4. Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail
addresses which are stored in the address book and replicate by e-mailing themselves to the
addresses stored in the address book of the e-mail program.
5. Macro viruses: Macro viruses are written by using the Macro programming languages like VBA,
which is a feature of MS office package. A macro is a way to automate and simplify a task that you
perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as
part of the document or spreadsheet and can travel to other systems when these files are transferred to
another computers.
6. Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and
change their code every time they infect a different system. This helps the Polymorphic Viruses to
hide from anti-virus software.
7. Armored Viruses: Armored Viruses are type of viruses that are designed and written to make
itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself
from antivirus programs, making it more difficult to disinfect.
8. Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus
software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic
nature which helps them to hide from heuristic detection.
9. Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-
virus application by encrypting parts of the virus itself. This is known as mutation.
10. Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application
running on the computer. A retrovirus can be considered anti-antivirus.
11. Overwrite Virus – This type of virus deletes all the files that it infects. The only possible mechanism
to remove is to delete the infected files and the end-user has to lose all the contents in it. Identifying
the overwrite virus is difficult as it spreads through emails.
Essay:
1. In your own opinion how is it important to have anti-virus software?
COMPUTER SYSTEMS SERVICING 12
FIRST QUARTER
Quarter: 1 Week: 7 Day: 4 Activity No. 28
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: Define Virtualization
Topic: Virtualization Software
Reference CG, Computer System Servicing
Copyright: For classroom use only
Concept Notes:
Virtualization is a broad term (virtual memory, storage, network, etc) basically allows one computer to do
the job of multiple computers, by sharing the resources of a single hardware across multiple environments
Brief History of Virtualization
The concept of virtualization is generally believed to have its origins in the mainframe days in the late
1960s and early 1970s, when IBM invested a lot of time and effort in developing robust time-sharing
solutions. Time-sharing refers to the shared usage of computer resources among a large group of users,
aiming to increase the efficiency of both the users and the expensive
computer resources they share. This model represented a major breakthrough in computer technology: the
cost of providing computing capability dropped considerably and it became possible for organizations, and
even individuals, to use a computer without actually owning one.
Advantages and Disadvantages of
VIRTUALIZATION Main Advantages:
◼ Less hardware is needed (easy maintaining and reduced costs)
◼ High flexibility when the infrastructure is under construction due to fast provision of neVMs
◼ Easy maintaining of the reduced hardware
Disadvantages:
◼ Less performance, usually overhead of 5 to 10 percent
◼ Failure of one server concludes the shutdown of all VM’s running on it
VIRTUALIZATION SOFTWARE
It allows a single host computer to create and run one or more virtual environments. It is most often used to
emulate a complete computer system in order to allow a guest operating system to be run.
What are virtual machines?
A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software container
with an operating system and application inside.
Key Properties of Virtual Machines
A. Partitioning –
➢
Run multiple operating systems on one physical machine.
➢
Divide system resources between virtual machines
B. Isolation –
➢
Provide fault and security isolation at the hardware level.
➢
Preserve perf ormance with advanced resource controls
C. Encapsulation –
➢
Save the entire state of a virtual machine to files.
➢
Move and copy virtual machines as easily as moving and copying files
Enumeration: