Professional Documents
Culture Documents
TVL CapsLET G12 Q3 CSS WEEK 2
TVL CapsLET G12 Q3 CSS WEEK 2
CapSLET
Capsulized Self - Learning
Empowerment
Toolkit
TO P IC M a in te n a n c e o f c o m p u te r s ys te m s a n d n e tw ork s
CODE
L E A R N IN G 2 .2 C h e c k n o rm a l fu n c tio n o f c o m p u te r T L E _ IA C S S 9 -
COM PETENCY s ys te m s a n d n e tw ork s in a c co rd a n c e w ith
m a n u fa c tu re r’s in s tru c tio n s 1 2 M R C N -IIf-j-4 1
IM P O R TA N T : Do not write anything on this material. Write your answers on the learner’s activity and
assessment sheets provided separately.
UNDERSTAND
M A IN T E N A N C E O F C O M P U T E R S Y S T E M
Perhaps you have handpicked the finest computer with the selected fastest processor and graphic
card and with a few gigabytes of memory. So you thought to yourself that your machine is probably
going to sustain you for the next five (5) years. But little did you discover that some six months down
the road, your computer is behaving like a Pentium 2 computer, perpetually flustering you with its
choppy images, frustrating pop-ups and tremendously slow disk access. Gradually, your computer
crashes and all your data is lost on one fine afternoon.
One thing you have probably missed out is the need for system maintenance. The basic routine
maintenance comprises of the 3 basic
processes:
1. Data Backup
2. Malware Maintenance
3. Disk or File System Maintenance
Let us address each of the processes in detail so that you can better understand how you can apply
them in your system to extend its longevity.
S A Q -2 : W h at is a M alw are?
2|Pa g e
DATA BACKUP
Backing up basically means creating a redundant copy of a data so that in case anything happens to
the original data, you have a spare copy. This is typically a simple thing to do. If you feel that you
should backup your valuable data, then you should decide and select what are the data to be backup.
Depending on your needs, you may choose to backup your windows registry, or your Outlook
Express mail data, or even your windows security keys.
But when these files gradually occupies a lot of disk space, you may need to seek help from archiver
utilities such as Winzip which enables you to compact your files into a single compressed file.
You can then break up this large file into several pieces to be stored in several mediums such as a
span of CD or DVD-Recordable. Winzip also allows you to protect your file with encryption and a
software password to prevent any unauthorized access. There are a number of backup methods you
could use.
S te p b y S te p P ro c es s o n H o w to C re a te a S ys te m Im a g e B a c ku p in W in d o w s 7 , 8 , o r 1 0
S te p O n e : O p e n S ys te m Im a g e B a c ku p
The process of finding the System Image Backup tool is different in Windows 7 than in Windows 8
and 10, so we’ll show you to find the tool in all versions, and then explain how to create and use the
system image.
O p e n S ys te m Im a g e B a c ku p in W in d o w s 1 0
In Windows 10, hit Start, type “backup,” and then select the entry.
In Windows 8, hit Start, type “file history,” and then select the “File
History” entry.
3|Pa g e
In the “File History” window, click the “System Image Backup” link.
O p e n S ys te m Im a g e B a c ku p in W in d o w s 7
Hit Start, click the arrow to the right of the “Getting Started” item, and
then click “Back up your files.”
In the “Backup and Restore” window, click the “Create a system image” link.
S te p T w o : C re a te a S ys te m Im ag e B a c k u p
Once you’ve opened the system image tool, the steps for creating a system image are the same in
Windows 7, 8, or 10.
1. When you first open the tool, it will scan your system for
external drives. You can then decide where you want to save the image. It can be to an external
drive, multiple DVD’s, or on a network location. Select where you want to save your backup and then
click “Next.”
4|Pa g e
2. By default, the tool only backs up your system drive. You can
include other drives if you want, but remember that this will add to the size of the final image.
Typically, we like to create separate image backups for each drive.
S te p T h re e: C re a te a S ys te m R e p a ir D is c
6. Select the drive you want to use to create the disc and then click
the “Create Disc” button.
5|Pa g e
7. When it comes time to restore the image, you can start your PC
from the recovery disc to get access to a number of recovery tools—including “System Image
Recovery.”
M A L W A R E M A IN T E N A N C E
6|Pa g e
Click Scan from the menu above.
7|Pa g e
4. On the left-side, choose Registry menu and
click Scan for Issues
L e t’s P ra ctic e !
A C T IV IT Y : R e a rra n g e th e P ro c ed u re s
A . S c an n in g th e c o m p u te r s ys te m a n d n e tw ork u s in g a n A n ti-viru s
8|Pa g e
_____Click Scan from the menu above.
B . S te p b y S te p P ro c es s o n H o w to C re a te a S ys te m Im a g e B a c k u p in W in d o w s 7 , 8 o r 1 0
_ _ __By default, the tool only backs up your system drive. You can include other drives if you want,
but remember that this will add to the size of the final image. Typically, we like to create separate
image backups for each drive.
_ _ __You’ll see a progress meter as the tool creates the image.It can take a while. In this example,
we’re backing up a drive with about 319 GB of data. It took about 2.5 hours when backed up to an
external hard disk connected to our PC via USB. Your time will vary depending on your PC and the
type of storage to which you’re backing up.
____When you first open the tool, it will scan your system for external drives. You can then decide
where you want to save the image. It can be to an external drive, multiple DVD’s, or on a network
location. Select where you want to save your backup and then click “Next.”
____Select the drive you want to use to create the disc and then click the “Create Disc” button.
____At the confirmation screen, notice the amount of space the image may take. If anything doesn’t
look right, you can still go back and make adjustments. If everything looks okay, click the “Start
Backup” button.
____When it comes time to restore the image, you can start your PC from the recovery disc to get
access to a number of recovery tools—including “System Image Recovery.”
REMEMBER
K ey P o in ts
V iru s - is a program or piece of code that is loaded onto your computer without your knowledge and
runs against your wishes.
R e g is try- is a database used by Windows operating system to store configuration information
M a lw are- refers to any kind of malicious codes, objects or content that infiltrates your computer,
resulting in damage and causing your system to act in an undesirable manner. Commonly, these
include viruses, spyware, worms, trojan horses, spams and many more.
D is k C le a n u p - is a computer maintenance utility that is included in the Microsoft Windows operating
system and is designed to free up space on the hard drive. Disk Cleanup helps free up space on your
hard drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache
files, and unnecessary program files that you can safely delete. The cleanup process involves
searching and analyzing the hard drive for files that are no longer needed. Then it proceeds to
remove them and thus freeing up disk space on the hard drive.
M A K IN G A D IS K IM A G E B A C K U P
Making a duplicate image or cloning a drive is often used in data recovery to ensure that the
original media where data has been lost is untouched while recovery is done on the cloned drive.
BACKUP
Creating a backup of files is one of the most important things people do not do, even though it
should be their top priority. Never recover lost data on the original media. Make a copy or image of it
on another storage media, and recover from that copy.
C h e c k M o d e o f F a ilu re
Before you engage in any self-recovery jobs, do the following first:
a) Check if you have heard any sound prior to your data loss.
9|Pa g e
b) Notice if the performance of the system degrade.
c) Encountered any problems while opening files, folders or saving.
This is simply to make sure that the loss is logical in nature, and not physical. If you encounter any
data loss arising from physical data loss, please send it to a professional data recovery outfit.
TRY
Let’s see how much have you learned today!
(A n s w er o n th e L e a rn er’s A c tivity a n d A s s e s s m en t s h e ets .)
A s s e s s m en t: M u ltip le C h o ic e
D ire c tio n s : C h o o s e th e le tte r o f th e c o rre ct a n sw e r. W rite y o u r a n s w ers o n th e L e a rn er’s
A c tiv ity a n d A s s es sm e n t s h ee ts .
1. It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in
damage and causing your system to act in an undesirable manner.
a. Software b. Malware c. Spyware d. Firmware
2.It is a system-defined database which is used by an Operating System to store all the information
needed to configure the Windows settings.
a. Registry b. Registration c. Register d. Registering
3.It is a computer maintenance utility that is included in the Microsoft Windows operating system and
it is designed to free up space on the hard drive.
a. Network software tool b. Scan Disk c. Data Backup d. Disk Cleanup
4. It means creating a redundant copy of a data so that in case anything happens to the original data,
you have a spare copy.
a. Network software tool b. Scan Disk c. Data Backup d. Disk Cleanup
5. It is a software utility designed to protect your computer or network against computer viruses.
a. Software b. Antivirus Program c. Virus d. Antivirus Ransomware
6. It is third-party software for Microsoft Windows that searches for Registry entries that
are redundant or no longer used, and removes or resolves them.
10 | P a g e
h ttp s ://w w w .h o w to g e e k.c o m /h o w to /4 2 41 /h o w -to -c re ate -a -s ys te m -im a g e -in -
w in d o w s-7 /
R E F E R E N C E /S h ttp s ://w w w .slid e sh a re .n e t/s kyro c k e r00 0 4/c o m p u te r-h a rd w are -se rvic in g -
le a rn e rs -m ate ria l-g rad e -1 0
This LR is produced and distributed locally without profit and will be used for
educational purposes only. No malicious infringement is intended by the writer.
D IS C L A IM E R
Credits and respect to the original creator / owner of the materials found in this
learning resource.
Written by:
11 | P a g e
L e a rn e r’s A c tivity a n d A s s e s s m e n t S h e e ts
S A Q 2 : W h at is a M alw are?
_________________________________________________________________________
________________________________________________________________________
L e t’s P ra ctic e !
A C T IV IT Y : R e a rran g e th e P ro c ed u re s
A . S c an n in g th e c o m p u te r s ys te m a n d n e tw ork u s in g a n A n ti-viru s
B . S te p b y S te p P ro c es s o n H o w to C re a te a S ys te m Im a g e B a c ku p in W in d o w s 7 , 8 o r 1 0
_ _ __By default, the tool only backs up your system drive. You can include other drives if you want,
but remember that this will add to the size of the final image. Typically, we like to create separate
image backups for each drive.
_ _ __You’ll see a progress meter as the tool creates the image.It can take a while. In this example,
we’re backing up a drive with about 319 GB of data. It took about 2.5 hours when backed up to an
external hard disk connected to our PC via USB. Your time will vary depending on your PC and the
type of storage to which you’re backing up.
____When you first open the tool, it will scan your system for external drives. You can then decide
where you want to save the image. It can be to an external drive, multiple DVD’s, or on a network
location. Select where you want to save your backup and then click “Next.”
____Select the drive you want to use to create the disc and then click the “Create Disc” button.
____At the confirmation screen, notice the amount of space the image may take. If anything doesn’t
look right, you can still go back and make adjustments. If everything looks okay, click the “Start
12 | P a g e
Backup” button.
____When it comes time to restore the image, you can start your PC from the recovery disc to get
access to a number of recovery tools—including “System Image Recovery.”
TRY
L e t’s s e e h o w m u c h h a ve yo u le arn e d to d a y!
A s s e s s m en t: M u ltip le C h o ic e
D ire c tio n s : C h o o s e th e lette r o f th e c o rre ct a n s w e r. W rite y o u r a n s w ers o n th e s p a ce p ro v id e d
fo r.
______1.It refers to any kind of malicious codes, objects or content that infiltrates your computer,
resulting in damage and causing your system to act in an undesirable manner.
b. Software b. Malware c. Spyware d. Firmware
______2.It is a system-defined database which is used by an Operating System to store all the
information needed to configure the Windows settings.
a. Registry b. Registration c. Register d. Registering
______3.It is a computer maintenance utility that is included in the Microsoft Windows operating
system and it is designed to free up space on the hard drive.
a. Network software tool b. Scan Disk c. Data Backup d. Disk Cleanup
______4.It means creating a redundant copy of a data so that in case anything happens to the
original data, you have a spare copy.
a. Network software tool b. Scan Disk c. Data Backup d. Disk Cleanup
______5.It is a software utility designed to protect your computer or network against computer
viruses.
a. Software b. Antivirus Program c. Virus d. Antivirus Ransomware
______6.It is third-party software for Microsoft Windows that searches for Registry
entries that are redundant or no longer used, and removes or resolves them.
13 | P a g e
Topic: M A IN T A IN IN G A N D R E P A IR IN G C O M P U T E R S Y S T E M S A N D N E T W O R K S (M R C N )
Learning Competency: M a in ta in c o m p u te r s ys te m s a n d n e tw ork s
ANSWER KEY
S A Q -1: W h at is D ata B acku p ? A s s e s s m en t: M u ltip le C h o ic e
3 Choose Scan for Viruses to inspect or scan C 4. It means creating a redundant copy of a
data so that in case anything happens to the
the system
original data, you have a spare copy.
2 Click Scan from the menu above.
a. Network software tool b. Scan Disk
B . S te p b y S te p P ro c es s o n H o w to C re a te a c. Data Backup d. Disk Cleanup
S ys te m Im a g e B a c k u p in W in d o w s 7 , 8 o r 1 0
B 5. It is a software utility designed to protect
2 By default, the tool only backs up your your computer or network against computer
system drive. You can include other drives if you viruses.
want, but remember that this will add to the size a. Software b. Antivirus Program
of the final image. Typically, we like to create
separate image backups for each drive. c. Virus d. Antivirus Ransomware
15 | P a g e
NOTE:
Standards in writing the EPP/TLE/TVL CapsLET
Use long bondpaper
Arial font style
12 font size
.5 margins in all sides
16 | P a g e
Republic of the Philippines
Department of Education
Division of Zamboanga City
Instructions:
1. Read carefully the learning resource (LR) page by page to evaluate the LR for compliance to standards
indicated in the criterion items under each factor below.
2. Put a check mark (/) in the appropriate column beside each criterion item. If your answer is NO, cite
specific page/s, briefly indicate the errors found, and give your recommendations in the attached
Summary of Findings form.
3. Write Not Applicable (NA) for criterion items that does not apply in the LR evaluated.
Factor V. Assessment
1. The LR provides useful measures and information that
help the teacher evaluate learner’s progress in mastering
the target competencies.
2. Assessment aligns with the learning competency/ies.
18 | P a g e
Note: At least 4 criterion items must be marked YES to Complied Not
indicate compliance to this factor Complied
Minor revision. This material is found compliant to the minimum requirements in all six factors. Revision
based on the recommendations included in the Summary of Content Findings form and LR with marginal notes
must be implemented.
Major revision. This material is non-compliant to the requirements in one or more factors. Revision based on
the recommendations included in the Summary of Content Findings form and LR with marginal notes must be
implemented.
For field validation. This material is found compliant to all factors with NO corrections.
I certify that this evaluation report and the recommendation(s) in the summary report are my own and have been
made without any undue influence from others.
Name/s Signature/s
19 | P a g e
Evaluator/s: SALVADOR G. FORGOSA ________________________
Note:
This tool is anchored on the Guidelines in ADM Content Evaluation, Guidelines in ADM
Layout Evaluation and Level 2 DepEd Evaluation Rating Sheet for 2 DepEd Evaluation Rating
Sheet for Story Books and Big Books.
.
20 | P a g e
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________
Prepared by: Date accomplished:
_________________________ _____________________
(Signature Over Printed Name)
21 | P a g e