Professional Documents
Culture Documents
2 Co-Q2-Ict8-Mod1-Performing-Computer-Operations
2 Co-Q2-Ict8-Mod1-Performing-Computer-Operations
8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations
CO_Q0_ICT8_Module3
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
CO_Q0_ICT8_Module3
8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 2- Module 1
Performing Computer Operations
CO_Q0_ICT8_Module3
Introductory Message
This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that you
will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they can
best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any part
of this SLM. Use a separate sheet of paper in answering the exercises and tests. And
read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering the
tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.
1 CO_Q0_ICT8_Module3
2 CO_Q0_ICT8_Module3
What I Know
Pretest
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.
3. What search engine task that is based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing
7. What software application which deals with data analysis, planning and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing
8. Which of the following type of system image that backs-up every single file
and folder?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup
CO_Q0_ICT8_Module3
3
11. Which of the following refers to a diagnostic tool used to anticipate possible
failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance
14. It refers to a saved shortcut that directs the browser to a specific webpage.
A. Bookmark C. Cookies
B. Cache D. Settings
4 CO_Q0_ICT8_Module3
Lesson
PERFORMING COMPUTER
2 OPERATIONS (PCO)
This lesson will provide a systematic knowledge about performing the basic
operations of computer system. It will help the learners to explore and understand
the techniques and strategies in handling both hardware and software application.
What’s In
Directions: Identify the shortcut keys given below. Choose your answer inside the
box. Write the correct answer in your activity notebook.
5 CO_Q0_ICT8_Module3
What’s New
Directions: Copy the crossword puzzle and supply the missing letters to form a word
using the clues given below. Do this in your activity notebook.
ACROSS
1. It is the collection of physical parts of a computer system.
2. It uses a light beam to help transfer images to paper, producing
extremely high-quality results.
3. A program that manages the resources of the computer system and
simplify applications programming.
4. A collected data which is converted into machine-readable form by an
input device and send it into the machine.
5. A collection of related records that gives a complete set of information
about a certain item or entity.
DOWN
1. It deals with data analysis, planning, and modelling.
2. This refers to the use of spraying ink from multiple jet nozzles.
3. This is a type of information in any form.
4. It involves getting the data/facts needed for processing from the point of
its origin to the computer.
5. A device that produces printed paper output, known in the computer
industry as hard copy.
6. The capacity for two systems to work together without having to be
altered to do so.
6 CO_Q0_ICT8_Module3
What is It
Key Terms:
7 CO_Q0_ICT8_Module3
1. Manual Data Processing - The data is processed manually without using any
machine or tool to get required results.
2. Mechanical Data Processing - The data is process by using different devices
like typewriters, mechanical printers or other mechanical devices.
3. Electronic Data Processing - It is the modern technique to process data.
ENTER or RETURN Moves the cursor down one line bringing it to the left margin.
Enter also process commands such as choosing an option in
a dialog (message) boxes and submitting a form.
BKSP or BACKSPACE Deletes the character to the left of cursor and all highlighted
text.
SPACE BAR Moves the cursor one space at a time to the right SHIFT KEY.
Use the shift keys to type capital letters and to type the
upper character on keys with two characters on them.
CAPS LOCK Locks the keyboard so it types capital letters (a light goes on
when caps lock is on)
TAB Moves the cursor five spaces to the right (number of spaces
are usually adjustable). Tab moves to the next field in a form
or table (Shift-Tab for previous field).
ARROW KEYS Moves the cursor around document without changing text.
8 CO_Q0_ICT8_Module3
1. Spreadsheets is an
application in which data are
used for analysis, planning
and modelling.
Examples:
• Microsoft Excel
• Google Sheets
• Open Office-Spreadsheet
Microsoft Excel
2. Word processing is an
application that computerize
the creation, edition, and
printing of documents by
electronically processing text
data.
Examples:
• Microsoft Word
• Google Docs
• Open Office - Writer
Microsoft Word Dashboard/Interfacce
3. Desktop Publishing is an
application used to produce a
printed material like
newsletters, brochures,
manuals, and books with
several type styles, graphics,
and colors on each page.
Examples:
• Microsoft Publisher
• IStudio Publisher
• Adobe Indesign Microsoft Publisher
9 CO_Q0_ICT8_Module3
4. Presentation Software is an
application software that is
specifically designed to allow
users to create a presentation
of ideas by stringing together
text, images and audio/video.
Examples:
• Microsoft PowerPoint
• Google Slides
• Corel Presentation Microsoft PowerPoint
10 CO_Q0_ICT8_Module3
11 CO_Q0_ICT8_Module3
Transfer Files and Data Between Compatible Systems Using Computer Software
and Hardware/Peripheral Devices
Note: It is a must for you to know the type of operating system and application
software you are using because of the compatibility issues of hardware and
software.
Transferring files from one hard drive to another can be possible now. There
are many ways to connect/transfer data from one drive to another storage drives.
File transfer is the transmission of a computer file through a communication channel
from one computer system to another.
1. Web Browser
2. Internet Connection
3. Internet Service Provider
4. Web Search engine
12 CO_Q0_ICT8_Module3
Internet Explorer is a product from software giant Microsoft and the most
commonly used browser in the universe.
Opera is smaller and faster than most other browsers, yet it is full-
featured.
13 CO_Q0_ICT8_Module3
A web search engine is an online tool that searches for results in its database
based on the search query (keyword) submitted by the internet user. The results are
usually websites that semantically match with the search query.
There may be some differences in how the search engines work but the
fundamentals remain the same. Each of them has to do the following tasks:
14 CO_Q0_ICT8_Module3
1. Google 6. Ask
2. Baidu 7. MSN
3. Bing 8. Naver
4. Yahoo! 9. AOL
5. Yandex 10. Dogpile
Bookmark
15 CO_Q0_ICT8_Module3
Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures
16 CO_Q0_ICT8_Module3
Data Security
A data security is about keeping your data safe from accidental or malicious
damage. Security is a consideration at all stages of your research, particularly if
working with disclosure or licensed data.
A data is the most important aspect of your computer. An attacker could crash a
computer’s operating system or data may be corrupted or wiped out by a hardware
problem. Data loss can be caused by many things, ranging from computer viruses to
hardware failures, file corruption to fire, flood, or theft.
Data Backup
A data backup is the action of copying files and folders for the purpose of being
able to restore them in case of data loss. Data loss can be a huge setback and in
some cases can even lead to a business failure or transaction catastrophe.
17 CO_Q0_ICT8_Module3
To increase the chances of recovering lost or corrupted data. Below are some
of the backup options to mitigate data loss.
CO_Q0_ICT8_Module3
18
and identify threatening viruses and programs. It is the core feature of anti-virus
software.
Virus scanning relies entirely on the strength of an anti-virus engine that
uses a repository of descriptions of known viruses, malware and other malicious
content.
1. Full Scan will take a few hours to complete if you happen to have a lot of
data stored on your system.
2. Custom Scan is a great way to check quickly the pen drives or hard drives.
3. Quick Scan targets the entire system but it does not take as much time as
a full scan.
1. Update your antivirus and run a scan - The anti-virus updates contain the
latest files needed to combat new viruses and protect your computer.
2. Run spyware removal software - Protect your files from unwanted copy.
19 CO_Q0_ICT8_Module3
3. Empty your Recycle Bin - This will delete all unnecessary files from your
computer.
4. Conduct Disk cleanup - It finds files that are no longer needed.
5. Run Disk Defragmentation - It picks up all of the pieces of data that are spread
across your hard drive and puts them back together again.
What’s More
A U V A S L Z O D D
A N W B C M Y B B E
S I T C A N B W A F
S I X I N O A V C R
I T Y D V P C U K A
K S Z E C I K T U G
L C L E A N R P P M
C L E A N U P U E E
N P Q G K S S R S N
O R E F O R M A T T
20 CO_Q0_ICT8_Module3
Directions: Match the meaning in column A with its terms in column B. Write the
correct answers in your activity notebook.
COLUMN A
1. Moves the cursor down one line bringing it
COLUMN B
to the left margin.
2. Locks the keyboard so it types capital a. Del or delete
letters (a light goes on when caps lock is on) b. Space bar
3. Moves the cursor five spaces to the right c. Bksp or backspace
(number of spaces are usually adjustable) d. Esc or escape
4. Cancels a menu or dialog box.
e. Caps lock
5. Deletes the character at the right of the f. Function keys or f keys
cursor and all the highlighted (or selected)
text. g. Ctrl C
6. Deletes the character at the left of cursor h. Arrow keys
and all highlighted text (or selected) text. i. Ctrl + N
7. Moves the cursor one space at a time to the j. Tab
right SHIFT KEY. k. Enter or return
21 CO_Q0_ICT8_Module3
Directions: Read the statements below and choose the appropriate word from the
box. Write your answer in your activity notebook.
1. The action of copying files and folders for the purpose of being able to restore them
in case of data loss.
2. It is the process of using anti-virus software to scan and identify viruses in a
computing device.
3. It moves the cursor around document without changing text.
4. It is when an exact copy is made of the source data.
5. A device that produces printed-paper as an output.
6. It targets the entire system but it does not take as much time as a full scan.
7. It is an online tool that searches for results in its database based on the search query
submitted by the internet user.
8. A saved shortcut that directs your browser to a specific webpage.
9. It is an application that computerize the creation, edition, and printing of
documents by electronically processing text data.
10. It is a computer program used to retrieve and display information from the
Internet.
22 CO_Q0_ICT8_Module3
What I Can Do
Directions: Complete the boxes below with what is asked. Write your answers in
your activity notebook
Types of
Computer
Maintenance
23 CO_Q0_ICT8_Module3
Assessment
Posttest:
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.
7. What type of search engine task based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing
24 CO_Q0_ICT8_Module3
11. What software application that deals with data analysis, planning, and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing
12. Which of the following type of system image that every single file and folder
is being back-up?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup
13. It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk
14. What do you call a process of using anti-virus software to scan and identify
viruses in a computing device?
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan
15. Which of the following refers to a diagnostic tool used to anticipate possible
failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance
25 CO_Q0_ICT8_Module3
Additional Activities
Directions: Copy and complete the semantic web. Write your answers in your
activity notebook.
2.
Search
Criteria
6.
3.
4. Use Quotation
5. Marks
26 CO_Q0_ICT8_Module3
References 28
How Computers Work: Input and Output. Accessed on June 15, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
Printing a Picture. Mark Edward Soper. Oct 12, 2010. Retrieved from:
https://www.informit.com/articles/article.aspx?p=1629004&seqNum=4
Basic Concepts of File Management. Accessed on June 20, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
The Best Ways to Transfer Data from One Computer to Another. Accessed on June 29,
2020. Retrieved from: https://www.recordnations.com/articles/data-transfer/
Gorana Celebic et.al.Web Browsing and Communication. Open Society for Idea
Exchange (ODRAZI), Zagreb, 2011.
Seven Ways to Find What You Want on the Internet. Accessed on June 28, 2020.
Retrieved from: https://www.mindtools.com/pages/article/internet-searching.htm
Things to Maintain and Repair Computer System and Networks. Accessed on June
28, 2020. Retrieved from:https://cssnc2site.wordpress.com/maintain-and-repair-
computer-systems-and-networks/
Learning about Types of Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.mapcon.com/us-en/learning-about-types-of-computer-
maintenance
Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.ukdatacentercleaning.co.uk/computer-cleaning/computer-
maintenance/
CO_Q0_ICT8_Module3
The Four most common types of backup. Accessed on July 6, 2020. Retrieved from:
https://intrinium.com/the-four-most-common-types-of-data-backup/
29
CO_Q0_ICT8_Module3