Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

COMPUTER SYSTEMS SERVICING 11

FIRST QUARTER
Quarter: 1 Week: 7 Day: 1 Activity No. 25
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: Familiarize the procedure in installing Office 2013
Topic: Application Software (Office 2013)
Reference CG, https://www.wikihow.com/Install-Microsoft-Office
Copyright: For classroom use only

Concept Notes:
Installing Office 2013 on Windows

1. Go to your account's Office page. Go


to http://www.office.com/myaccount/. This will open a page
with your Office purchase.

2. Click Install. It's an orange button below your


subscription's name.

3. Click Install again. Your Office setup file will begin


downloading.
• If you purchased the Student version of Microsoft Office, skip
this step.

4.Double-click the Office setup file. You'll find it in


your computer's default download location.

5.Click Yes when prompted. Doing so will run the setup file and
begin installing Office
on your computer.

6.Wait for Microsoft Office to finish installing. This process may


take several minutes.

7.Click Close when prompted. Your Microsoft Office programs


have now been installed on your computer. You're free to begin
using these programs right away.

Activity: Directions: Arrange the steps in installing Office 2013 by numbering them from 1-7.
_____ Click Install again. Your Office setup file will begin downloading.
_____ Click Close when prompted. Your Microsoft Office programs have now been installed on your
computer. You're free to begin using these programs right away.
_____ Go to your account's Office page. Go to http://www.office.com/myaccount/.
_____ Wait for Microsoft Office to finish installing. This process may take several minutes.
_____ Double-click the Office setup file. You'll find it in your computer's default download location.
_____ Click Yes when prompted. Doing so will run the setup file and begin installing Office on your computer.
_____ Click Install. It's an orange button below your subscription's name.
COMPUTER SYSTEMS SERVICING 11
FIRST QUARTER
Quarter: 1 Week: 7 Day: 2 Activity No. 26
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: To know what computer viruses do, and how to avoid computer viruses.
Topic: Computer Virus
Reference CG, https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/
Copyright: For classroom use only

Concept Notes:
A computer virus is a malicious program that self-replicates by copying itself to another program.
In other words, the computer virus spreads by itself into other executable code or documents. The purpose of
creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data.
Hackers design computer viruses with malicious intent and prey on online users by tricking them.
One of the ideal methods by which viruses spread is through emails – opening the attachment in
the email, visiting an infected website, clicking on an executable file, or viewing an infected advertisement
can cause the virus to spread to your system. Besides that, infections also spread while connecting with
already infected removable storage devices, such as USB drives.
A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive;
when this replication succeeds, the affected areas are then said to be "infected".
Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, displaying political or humorous messages
on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a
destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-
replicating computer programs which install themselves without the user's consent.

What do computer viruses do?



Computer viruses are often spread by attachments in email messages or instant messaging
messages. That is why it is essential that you never open email attachments unless you know who
it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or
other files or programs you might download.

How to avoid computer viruses?


➢ To help avoid computer viruses, it's essential that you keep your computer current with the
latest updates and antivirus tools,
➢ Stay informed about recent threats, run your computer as a standard user (not as administrator),
and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
➢ Make sure you have updated antivirus and spyware removal software running, all the latest
updates to your operating system, a firewall, and only open attachments or click on pop-ups that you
know are safe.

How do I remove a computer virus?



Use an anti-virus and anti-malware program to remove the infections

Make sure you are using an anti-virus program and that the anti-virus program is updated to use the
latest definitions.

If your computer is infected with a virus, A fast way to check for viruses is to scan your computer.

Activity:

1. Define what Computer Virus is.


2. As a student like you how will you protect your computer?
COMPUTER SYSTEMS SERVICING 12
FIRST QUARTER
Quarter: 1 Week: 7 Day: 3 Activity No. 27
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: Know the different types of virus
Topic: Types of Virus
Reference CG, https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/
Copyright: For classroom use only

Concept Notes:
Computer Viruses are classified according to their nature of infection and behavior. Different
types of computer virus classification are given below.
1. Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot
Record (MBR) is stored. The Master Boot Record (MBR) stores the disk's primary partition table and to
store bootstrapping instructions which are executed after the computer's BIOS passes execution to machine
code. If a computer is infected with Boot Sector Virus, when the computer is turned on, the virus launches
immediately and is loaded into memory, enabling it to control the computer.

2. Direct Action Virus – This is also called non-resident virus, it gets installed or stays hidden in the
computer memory. It stays attached to the specific type of files that it infect. It does not affect the
user experience and system’s performance

3. File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part
of Operating System or data files.

4. Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail
addresses which are stored in the address book and replicate by e-mailing themselves to the
addresses stored in the address book of the e-mail program.

5. Macro viruses: Macro viruses are written by using the Macro programming languages like VBA,
which is a feature of MS office package. A macro is a way to automate and simplify a task that you
perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as
part of the document or spreadsheet and can travel to other systems when these files are transferred to
another computers.

6. Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and
change their code every time they infect a different system. This helps the Polymorphic Viruses to
hide from anti-virus software.

7. Armored Viruses: Armored Viruses are type of viruses that are designed and written to make
itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself
from antivirus programs, making it more difficult to disinfect.

8. Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus
software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic
nature which helps them to hide from heuristic detection.

9. Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-
virus application by encrypting parts of the virus itself. This is known as mutation.

10. Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application
running on the computer. A retrovirus can be considered anti-antivirus.

11. Overwrite Virus – This type of virus deletes all the files that it infects. The only possible mechanism
to remove is to delete the infected files and the end-user has to lose all the contents in it. Identifying
the overwrite virus is difficult as it spreads through emails.

Essay:
1. In your own opinion how is it important to have anti-virus software?
COMPUTER SYSTEMS SERVICING 12
FIRST QUARTER
Quarter: 1 Week: 7 Day: 4 Activity No. 28
Competency: Install application software ( TLE_IACSS9-12ICCS-IIIa-e-31 )
Objective: Define Virtualization
Topic: Virtualization Software
Reference CG, Computer System Servicing
Copyright: For classroom use only

Concept Notes:
Virtualization is a broad term (virtual memory, storage, network, etc) basically allows one computer to do
the job of multiple computers, by sharing the resources of a single hardware across multiple environments
Brief History of Virtualization
The concept of virtualization is generally believed to have its origins in the mainframe days in the late
1960s and early 1970s, when IBM invested a lot of time and effort in developing robust time-sharing
solutions. Time-sharing refers to the shared usage of computer resources among a large group of users,
aiming to increase the efficiency of both the users and the expensive
computer resources they share. This model represented a major breakthrough in computer technology: the
cost of providing computing capability dropped considerably and it became possible for organizations, and
even individuals, to use a computer without actually owning one.
Advantages and Disadvantages of
VIRTUALIZATION Main Advantages:
◼ Less hardware is needed (easy maintaining and reduced costs)
◼ High flexibility when the infrastructure is under construction due to fast provision of neVMs
◼ Easy maintaining of the reduced hardware
Disadvantages:
◼ Less performance, usually overhead of 5 to 10 percent
◼ Failure of one server concludes the shutdown of all VM’s running on it
VIRTUALIZATION SOFTWARE
It allows a single host computer to create and run one or more virtual environments. It is most often used to
emulate a complete computer system in order to allow a guest operating system to be run.
What are virtual machines?
A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software container
with an operating system and application inside.
Key Properties of Virtual Machines
A. Partitioning –

Run multiple operating systems on one physical machine.

Divide system resources between virtual machines
B. Isolation –

Provide fault and security isolation at the hardware level.

Preserve perf ormance with advanced resource controls
C. Encapsulation –

Save the entire state of a virtual machine to files.

Move and copy virtual machines as easily as moving and copying files

Identification: Write your answer on the space provided.


______________ 1. allows one computer to do the job of multiple computers, by sharing the resources of a
single hardware across multiple environments.
______________ 2. It allows a single host computer to create and run one or more virtual environments.
______________ 3. known as a “virtual machine” (VM): a tightly isolated software container with an operating
system and application inside.

Enumeration:

1. What are they key Properties of Virtual Machines?

You might also like