Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

lOMoARcPSD|17432115

CO Q2 ICT8 Mod1 Performing Computer Operations

Agriculture (Cotabato State University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)
lOMoARcPSD|17432115

8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations

CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

ICT-Computer Systems Servicing-Grade 8


Alternative Delivery Mode
Quarter 0-Module 3: Performing Computer Operations
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module

Writers: Eva Rose S. Lumocso


Editors: Nilo R. Verdon, Bernie R. Pamplona, Avelina C.Duquesa,
Rowena S. Timcang, Jeho Ranin, Arlyn C. Galbo, Junel M. Anino,
Reynan S. Basilio, Junaline J. Mores, Ofelia B. Duarte

Reviewers: Grace A. Ando, Rose Jean V. Robles, Ivy H. Beldad

Illustrator: Eduardo D. Ayo, Jr. and Franz Vincent Roman T. More


Layout Artist: Bernie R. Pamplona and Junel M. Anino
Management Team: Francis Cesar B. Bringas
Isidro M. Biol Jr.
Maripaz F. Magno
Josephine Chonie M. Obseňares
Romeo O. Aprovechar
Rayfrocina T. Abao
Avelina C. Duquesa
Nilo R. Verdon

Printed in the Philippines by ________________________


Department of Education–Caraga Region XIII, Learning Resource Management System

Office Address: J.P. Rosales Avenue, Butuan City, Philippines 8600


Telefax / Telephone: (085) 817-7141
E-mail Address: caraga@deped.gov.ph

CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 2- Module 1
Performing Computer Operations

CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Introductory Message

This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that you
will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they can
best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any part
of this SLM. Use a separate sheet of paper in answering the exercises and tests. And
read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering the
tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.

1 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What I Need to Know


This module was designed and written with you in mind. It is here to help you
master basic computer operation. The scope of this module permits it to be used in
many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

This competency is covered in one lesson:


Learning Outcome 4: Produce output/data using computer system
(TLE_IACSS9 - 12PCO -If – 7)

After going through this module, you are expected to:


4.1. process entered data using appropriate software commands;
4.2. print out data as required using computer hardware /peripheral devices
in accordance with standard operating procedures;
4.3. transfer files and data between compatible systems using computer
software, hardware/peripheral devices in accordance with standard
operating procedures.

Learning Outcome 5: Use basic functions of a World Wide Web browser to


locate information (TLE_IACSS9-12PCO-Ig-h-8)

After going through this module, you are expected to:


5.1. establish information requirements for internet search;
5.2. launch browser;
5.3. load search engine;
5.4. enter appropriate search criteria/or URL of site;
5.5. follow relevant links to locate required information;
5.6. bookmark useful pages and print as required.

Learning Outcome 6: Maintain computer equipment and systems


(TLE_IACSS9-12PCO-Ii-j-9)

After going through this module, you are expected to:


6.1. implement procedures for ensuring security of data, including regular
backups and virus checks in accordance with standard operating
procedures;
6.2. implement basic file maintenance procedures in line with the standards
operating procedures.

2 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What I Know

Pretest
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.

1. It is a page that appears when the browser is launched.


A. Bookmark C. Navigation bar
B. Home page D. Navigation button

2. The following are examples of web browsers, EXCEPT:


A. Apple Safari C. Microsoft Window
B. Google Chrome D. Mozilla Firefox

3. What search engine task that is based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing

4. The following are ways to prevent virus infections, EXCEPT:


A. A firewall may also be used to block dangerous downloads.
B. Strict policies should be put in place to prevent virus infection.
C. Keeping antivirus up to date and running scans on a regular basis.
D. All your documents should be stored in one location so that it is easy to
backup.

5. It is a processing method of a typewriter.


A. Electronic data processing C. Manual data processing
B. Electronic data transmission D. Mechanical data processing

6. The following are examples of application software, EXCEPT:


A. Microsoft Excel C. Microsoft Windows
B. Microsoft PowerPoint D. Microsoft Word

7. What software application which deals with data analysis, planning and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing

8. Which of the following type of system image that backs-up every single file
and folder?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup

CO_Q0_ICT8_Module3
3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

9. It is a type of back-up that allows users to save their data to hardware in a


remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk

10. It is a process of using anti-virus software to scan and identify viruses in a


computing device.
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan

11. Which of the following refers to a diagnostic tool used to anticipate possible
failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance

12. What does FTP stand for?


A. Fast Track Protocol C. File Transfer Protocol
B. File Track Protocol D. File Transmission Protocol

13. A key that locks the keyboard to type capital letters.


A. Caps lock C. Space bar
B. Del or Return D. Tab

14. It refers to a saved shortcut that directs the browser to a specific webpage.
A. Bookmark C. Cookies
B. Cache D. Settings

15. HTTP stands for ____________.


A. Hyperlink Transfer Protocol C. Hypertext Transfer Protocol
B. Hypertext Track Protocol D. Hypertext Transmission Protocol

4 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Lesson
PERFORMING COMPUTER
2 OPERATIONS (PCO)

This lesson will provide a systematic knowledge about performing the basic
operations of computer system. It will help the learners to explore and understand
the techniques and strategies in handling both hardware and software application.

What’s In

Activity: Identify me!

Directions: Identify the shortcut keys given below. Choose your answer inside the
box. Write the correct answer in your activity notebook.

Ctrl + A Ctrl + C Ctrl + P Ctrl + V Ctrl + S Ctrl + X

1. What shortcut key will you use to COPY a file? __________________


2. What shortcut key will you use to CUT a file? ___________________
3. What shortcut key will you use to PASTE a file? ___________________
4. What shortcut key will you use to SELECT all text in the file?
___________________
5. What shortcut key will you use to SAVE a file? ___________________

5 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What’s New

Activity: Get Puzzled!

Directions: Copy the crossword puzzle and supply the missing letters to form a word
using the clues given below. Do this in your activity notebook.

ACROSS
1. It is the collection of physical parts of a computer system.
2. It uses a light beam to help transfer images to paper, producing
extremely high-quality results.
3. A program that manages the resources of the computer system and
simplify applications programming.
4. A collected data which is converted into machine-readable form by an
input device and send it into the machine.
5. A collection of related records that gives a complete set of information
about a certain item or entity.
DOWN
1. It deals with data analysis, planning, and modelling.
2. This refers to the use of spraying ink from multiple jet nozzles.
3. This is a type of information in any form.
4. It involves getting the data/facts needed for processing from the point of
its origin to the computer.
5. A device that produces printed paper output, known in the computer
industry as hard copy.
6. The capacity for two systems to work together without having to be
altered to do so.

6 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What is It

Key Terms:

• Internet is a set of millions of computers worldwide connected into a network


with the purpose of exchanging data among users.
• World Wide Web (WWW) is one of the services on the Internet which we use
to browse web pages (set of HTML documents connected with hyperlinks).
• Hypertext Transfer Protocol (HTTP) is a protocol (set of rules) that allows
transmission of information published on the Web.
• Uniform Resource Locator (URL)- is a web address of a particular object (Web
pages, images, or Word or PDF document) published on the Internet.
• File Transfer Protocol (FTP) is a protocol that allows data transfer between
computers over the Internet.
• Hyperlink or link is a part of the text or graphics on a web page; when we
activate a hyperlink image.
• Web browser is a software (program) which allows us to browse web pages.
The most widely used: Google Chrome, Mozilla Firefox, Opera, Internet
Explorer
• Web search engine contains content categorization of many Web pages.
• Internet Service Provider (ISP) is a company that provides Internet access
for its users (T-Com, Carnet.)
• Web Search is used to locate information.
• Web Address is used to locate a particular webpage. It is sometimes referred
to as a “URL” (Uniform Resource Locator).
• Input is an information or programs that entered into the computer system
through input devices such as the keyboard.

• Output is a display information on the screen (monitor) or the printer and


sends information to other computers.

Process Entered Data Using Appropriate Software Commands

Computer data is information processed or stored by a computer. This


information may be in the form of text documents, images, audio clips, software
programs, or other types of data. Data input is a collected data which is converted
into machine-readable form by an input device and send into the machine.

Data processing is a manipulation of data by a computer. It transforms raw data


into meaningful output.

7 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Data Processing Methods

1. Manual Data Processing - The data is processed manually without using any
machine or tool to get required results.
2. Mechanical Data Processing - The data is process by using different devices
like typewriters, mechanical printers or other mechanical devices.
3. Electronic Data Processing - It is the modern technique to process data.

Basic Keyboard Commands in Data Processing

ENTER or RETURN Moves the cursor down one line bringing it to the left margin.
Enter also process commands such as choosing an option in
a dialog (message) boxes and submitting a form.

DEL or DELETE Deletes the character at cursor and/or characters to the


right of the cursor and all highlighted (or selected) text.

BKSP or BACKSPACE Deletes the character to the left of cursor and all highlighted
text.

SPACE BAR Moves the cursor one space at a time to the right SHIFT KEY.
Use the shift keys to type capital letters and to type the
upper character on keys with two characters on them.

CAPS LOCK Locks the keyboard so it types capital letters (a light goes on
when caps lock is on)

TAB Moves the cursor five spaces to the right (number of spaces
are usually adjustable). Tab moves to the next field in a form
or table (Shift-Tab for previous field).

ESC or ESCAPE Cancels a menu or dialog box.

ARROW KEYS Moves the cursor around document without changing text.

FUNCTION KEYS or F Access commands by themselves or in combination with the


KEYS three command keys; CTRL, SHIFT, and ALT

CTRL + N Allow the user to create document

Different Ways to Input a Data Using Appropriate Software Applications

Computer Software is a program needed to accomplish the input, processing,


output, storage, and control activities of information systems.

8 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Software are divided into two types:

1. Systems software is a program that manages the resources of the computer


system and simplify applications programming.
Example: Operating System such as Linux, Macintosh, Microsoft Windows
2. Application software is a program that directs the performance of a
particular use, or application of computers to meet the information processing
needs of end users. Example: MSWord, MS Excel, Adobe Reader
These are the commonly used applications software in data manipulation. Data
can be inputted and manipulated through this following software applications.

1. Spreadsheets is an
application in which data are
used for analysis, planning
and modelling.
Examples:
• Microsoft Excel
• Google Sheets
• Open Office-Spreadsheet

Microsoft Excel
2. Word processing is an
application that computerize
the creation, edition, and
printing of documents by
electronically processing text
data.
Examples:
• Microsoft Word
• Google Docs
• Open Office - Writer
Microsoft Word Dashboard/Interfacce
3. Desktop Publishing is an
application used to produce a
printed material like
newsletters, brochures,
manuals, and books with
several type styles, graphics,
and colors on each page.
Examples:
• Microsoft Publisher
• IStudio Publisher
• Adobe Indesign Microsoft Publisher

9 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

4. Presentation Software is an
application software that is
specifically designed to allow
users to create a presentation
of ideas by stringing together
text, images and audio/video.

Examples:
• Microsoft PowerPoint
• Google Slides
• Corel Presentation Microsoft PowerPoint

Print Out Data as Required Using Computer Hardware/Peripheral Devices

Computer hardware is the collection of physical parts of a computer system.


It is the collection of all the parts you can physically touch. Output devices refers to
a device that receive information from the computer, and carry data that has been
processed by the computer to the user. Monitors and printers are two of the most
commonly-known output devices used with a computer.

Printer is a device that produces printed-paper as output, tangible and


permanent unlike soft copy that is displayed on a screen. Hard Copy is a printed
copy of information from a computer. Sometimes referred to as a printout.

Steps in Printing a Document

Step 1: Open an existing Microsoft Word


document

To do so, click on W icon in the menu at the


upper-left of the screen. Click on Open to open
an existing document or New to create a new one.

Step 2: Click on File. It is in the menu bar at the


upper-left of the screen or a tab at the upper-left
of the window.

10 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Step 3: Click on Print. The Print dialog box will


open.

Step 4: Select your printing options. Use the


selections in the dialog box to select:

• the default printer is displayed. Click on its


name to select another printer from the
drop-down menu.
• number of copies to print
• which pages to print
• size of paper to print on
• number of pages to print per sheet
• orientation of the paper. Select either
Portrait (paper length vertical) or Landscape
(paper width vertical)
• margins. You can adjust the top, bottom,
left, and right margins

Step 5: Click on Print or OK. The button label will


vary based on the version of Word you're using.
Your document will print to the printer you
selected.

Steps on Printing a Photo/Image

1. Select the picture or pictures you want to print.


2. Click Print. The Print Picture Wizard opens.
3. Select the printer you want to use.
4. Select the paper size.
5. Choose the print quality.
6. Choose the paper type.
7. Select the number of copies of each picture to print.
8. Select the layout.
9. Click Print.

11 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Note: The procedures may vary depending on your printer brand.

Transfer Files and Data Between Compatible Systems Using Computer Software
and Hardware/Peripheral Devices

A file is a collection of related records that gives a complete set of information


about a certain item or entity. Once a file will be saved in the machine, it has a file
extension. A file extension refers to the format of the file such as txt, .xlm, and .xlms.

Operating System is a platform that enables other programs to run on the


computer. Compatibility is the capacity for two systems to work together without
having to be altered to do so.

Note: It is a must for you to know the type of operating system and application
software you are using because of the compatibility issues of hardware and
software.

Transferring files from one hard drive to another can be possible now. There
are many ways to connect/transfer data from one drive to another storage drives.
File transfer is the transmission of a computer file through a communication channel
from one computer system to another.

Different Ways to Transfer Data

1. E-Mail is an information stored on a computer that is exchanged between


two users over telecommunications.
2. File sharing sites or File Transfer Protocol is a type of data transfer system
usually utilized for websites and complicated file system.
3. External media or storage devices can transfer files by copying data into
external hard drives, thumb drives, or other storage devices.
4. Cloud Storage is one of the most popular and easiest to use method for file
sharing in today’s digital world.

Establish Information Requirements for Internet Search

Requirements for Internet Search

1. Web Browser
2. Internet Connection
3. Internet Service Provider
4. Web Search engine

12 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Launching the Browser

To access the Internet, you need to open or


“launch” the browser. To do so, click on the icon
(picture) that appears on your computer either on
your home screen or in the bar across the bottom
of the screen.

A web browser is a computer program used to retrieve and displays


information from the Internet. The most popular web browsers are Mozilla Firefox,
Google Chrome, Microsoft Internet Explorer and Apple Safari. Your computer will
have a pre-installed web browser, but you may also add other browsers.

Different Types of Web Browser

Google Chrome is a web browser developed by Google and known to be


one of the most popular web browsers.

Mozilla Firefox is a new browser derived from Mozilla. It was released in


2004 and has grown to be the second most popular browser on the
Internet.

Safari is a web browser developed by Apple Inc. and included in Mac OS


X.

Internet Explorer is a product from software giant Microsoft and the most
commonly used browser in the universe.

Opera is smaller and faster than most other browsers, yet it is full-
featured.

Basic Parts of Browser and their Functions

Navigation Bar is located at the top of


your computer screen. Its functions allow
you to navigate the web.

13 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Navigation Buttons are used to go back


and forth between webpages.
• To go back, click on the left arrow
• To go forward, click on the right arrow
New Tab Button allows you to have
multiple web pages.

Home Page appears when the web


browser is launch.

Favorites is a feature that allows you to


bookmark websites to provide one-click
access later.

History provides a list of the websites


you have visited.

Address Bar/Search Bar is used to type


in a Web Address or to perform a Web
Search.

Web Search Engine

A web search engine is an online tool that searches for results in its database
based on the search query (keyword) submitted by the internet user. The results are
usually websites that semantically match with the search query.

Search Engine Work

There may be some differences in how the search engines work but the
fundamentals remain the same. Each of them has to do the following tasks:

1. Crawling is based on finding hypertext links that refer to other websites.


2. Indexing website has to be indexed in order to be displayed in the search
engine results page.
3. Creating results is a process of checking the query against all website records
in the index.

14 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

The Most Popular Search Engines

1. Google 6. Ask
2. Baidu 7. MSN
3. Bing 8. Naver
4. Yahoo! 9. AOL
5. Yandex 10. Dogpile

Appropriate Search Criteria or URL of Site

1. Vary your search engine


2. Use specific keywords
3. Simplify your search terms
4. Use quotation marks
5. Remove unhelpful words
6. Refine your search using operators
7. Avoid search pitfalls

Bookmark

A bookmark is a saved shortcut that directs your browser to a specific webpage.


It stores the title, and favorites of the corresponding page. The bookmark feature
allows you to save web pages without having to type the web address repeatedly in
the location bar.

How to Add Bookmarks


1. Go to a webpage you want to
bookmark.

2. Click the bookmark icon. It is


located in the location bar.

15 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

3. The page is bookmarked.

Procedures for Ensuring Security of Data, Including Regular Backups and Virus
Checks in Accordance with Standard Operating Procedures

Computer maintenance involves keeping a computer in a good state of repair


and physical health. Meaning, it is a set of maintenance tasks and procedures that
help to keep the computer software and hardware updated and operational.

Types of Computer Maintenance

1. Predictive Maintenance This refers to using a diagnostic tool to anticipate


possible failures and avoid some possible issues.
2. Preventive Maintenance It prevents possible failures, improve the function
of a system and prolong the life of various
computer components.
Disk cleanup is a maintenance utility that scans
your computer’s hard drive for files that you no
longer needed.
Defragmentation is the process of consolidating
fragmented files on the user's hard drive.
3. Corrective Maintenance It refers to the set of tasks destined to correct the
defects to be found in the different equipment.
For example: If the operating system failed and
we want it to work again in the same condition,
we apply the necessary measures such as
computer reformat.
Computer Reformat is the process of erasing all
information on the drive by formatting the drive
to prepare that disk to be used for other
data. Reformat is commonly performed to correct
a major data corruption, check to see if the disk
is bad, or clean the disk drive.
4. Evolutionary Maintenance This type concerns both hardware and software,
so you can update Windows and change various
parts of the PC for better performance.

16 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Data Security

A data security is about keeping your data safe from accidental or malicious
damage. Security is a consideration at all stages of your research, particularly if
working with disclosure or licensed data.

Procedures in Ensuring Data Security

1. Creating Passwords are the foundation of security. Getting a good one is a


great basis for keeping your data safe, but a weak password is like an
unlocked door.
2. Data Encryption maintains the security of data and documentation through
an algorithm to transforming information into something unreadable
requiring a “key” to decrypt and return to comprehension.
3. Data Backup is a process of duplicating data to allow retrieval of the duplicate
set after a data loss event.

A data is the most important aspect of your computer. An attacker could crash a
computer’s operating system or data may be corrupted or wiped out by a hardware
problem. Data loss can be caused by many things, ranging from computer viruses to
hardware failures, file corruption to fire, flood, or theft.

Data Backup

A data backup is the action of copying files and folders for the purpose of being
able to restore them in case of data loss. Data loss can be a huge setback and in
some cases can even lead to a business failure or transaction catastrophe.

The Most Common Types of Data Backup

1. Full backup - It is when every single file


and folder in the system is backed up.

17 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

2. Incremental backup - The process of


restoring lost data from backup is longer
but the process is much quicker.

3. Differential backup - This type of backup


requires more storage space than
incremental backup does, however, but it
also allows for a faster restore time.

4. Mirror backup - A mirror backup, as the


name implies, is when an exact copy is
made of the source data.

Data Back-up Options

To increase the chances of recovering lost or corrupted data. Below are some
of the backup options to mitigate data loss.

1. External hard drive - A portable, easy to use, and capable of storing


large files. It can be moved from computer to
computer, making it convenient to transport data.
2. Cloud backup - It allows users to back up their data to hardware
that’s in a remote location. Most cloud storage
services provide a large amount of storage space
and encrypt the content for data security.
3. Flash drive - A small portable storage device mostly used to
transfer files from device to another device.
Scanning of a Virus

Computer Virus is a type of malicious code or program written to alter the


way a computer operates and is designed to spread from one computer to another.
A virus scan is the process of using anti-virus software to scan and identify viruses
in a computing device. It is an information security process that aims to review

CO_Q0_ICT8_Module3
18

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

and identify threatening viruses and programs. It is the core feature of anti-virus
software.
Virus scanning relies entirely on the strength of an anti-virus engine that
uses a repository of descriptions of known viruses, malware and other malicious
content.

Antivirus software is a program or set of programs that are designed to


prevent, search for, detect, and remove software viruses, and other malicious
software like worms, Trojans, adware, and more.

Three Different Types of Virus Scanning

1. Full Scan will take a few hours to complete if you happen to have a lot of
data stored on your system.
2. Custom Scan is a great way to check quickly the pen drives or hard drives.
3. Quick Scan targets the entire system but it does not take as much time as
a full scan.

Ways to Prevent Virus Infections

1. Keeping antivirus up to date and running scans on a regular basis.


2. Strict policies should be put in place to prevent virus infection e.g. prohibiting
the use of flash drives, or require flash disk to be scanned before use.
3. Other policy to consider is the prohibiting of downloading since unsuspecting
users can accidentally download malware.
4. A firewall may also be used to block dangerous downloads.

Basic File Maintenance Procedures in Line with the Standards Operating


Procedures

File Maintenance is the software processes concerned with maintaining file


integrity and file efficiency, usually of data files. It is concerned with the internal
organization of files.

There are Two Types of File Maintenance

1. Partition Maintenance includes periodic checking of the file system's


underlying structure and metadata, modifying the partition layout, and low-
level backups.
2. Content Maintenance involves monitoring and controlling the space used by
files as well as file backup and recovery.

Basic Procedures in File Maintenance

1. Update your antivirus and run a scan - The anti-virus updates contain the
latest files needed to combat new viruses and protect your computer.
2. Run spyware removal software - Protect your files from unwanted copy.

19 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

3. Empty your Recycle Bin - This will delete all unnecessary files from your
computer.
4. Conduct Disk cleanup - It finds files that are no longer needed.
5. Run Disk Defragmentation - It picks up all of the pieces of data that are spread
across your hard drive and puts them back together again.

What’s More

Activity 1: Find Me!


Directions: Examine carefully the puzzle below. Find ten (10) words either
horizontally, vertically and diagonally that are associated to Computer Maintenance.
Write it in your activity notebook.

A U V A S L Z O D D
A N W B C M Y B B E
S I T C A N B W A F
S I X I N O A V C R
I T Y D V P C U K A
K S Z E C I K T U G
L C L E A N R P P M
C L E A N U P U E E
N P Q G K S S R S N
O R E F O R M A T T

Activity 2: Arrange Me!


Directions: Copy the set of steps in printing a document and photo/image in your
activity notebook and arrange them by numbering 1, 2 and so on.

Part A. Steps in Printing a Document

________ a. Click on Print or OK.


________ b. Select the number of copies of each picture to print.
________ c. Click on File.
________ d. Click on Print.
________ e. Open an existing Microsoft Word document.

20 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Part B. Steps in Printing a Photo/Image

________ a. Choose the paper type.


________ b. Select the number of copies of each picture to print.
________ c. Select the picture or pictures you want to print.
________ d. Click Print. The Print Picture Wizard opens.
________ e. Select the layout.
________ f. Click Print.
________ g. Select the printer you want to use.
________ h. Select the paper size.
________ i. Choose the print quality.

Activity 3: Match Me!

Directions: Match the meaning in column A with its terms in column B. Write the
correct answers in your activity notebook.

COLUMN A
1. Moves the cursor down one line bringing it
COLUMN B
to the left margin.
2. Locks the keyboard so it types capital a. Del or delete
letters (a light goes on when caps lock is on) b. Space bar
3. Moves the cursor five spaces to the right c. Bksp or backspace
(number of spaces are usually adjustable) d. Esc or escape
4. Cancels a menu or dialog box.
e. Caps lock
5. Deletes the character at the right of the f. Function keys or f keys
cursor and all the highlighted (or selected)
text. g. Ctrl C
6. Deletes the character at the left of cursor h. Arrow keys
and all highlighted text (or selected) text. i. Ctrl + N
7. Moves the cursor one space at a time to the j. Tab
right SHIFT KEY. k. Enter or return

8. Moves the cursor around the document


without changing text.
9. Access commands by themselves or in
combination with the three command
keys; CTRL, SHIFT, and ALT

10. Access a new document using the


appropriate shortcut command.

21 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What I Have Learned

Activity: Identify Me!

Directions: Read the statements below and choose the appropriate word from the
box. Write your answer in your activity notebook.

Data Security Printer Virus scan Data backup Web browser


Arrow Keys Mirror backup Quick scan Bookmark
Web Search Engine Word processing

1. The action of copying files and folders for the purpose of being able to restore them
in case of data loss.
2. It is the process of using anti-virus software to scan and identify viruses in a
computing device.
3. It moves the cursor around document without changing text.
4. It is when an exact copy is made of the source data.
5. A device that produces printed-paper as an output.
6. It targets the entire system but it does not take as much time as a full scan.
7. It is an online tool that searches for results in its database based on the search query
submitted by the internet user.
8. A saved shortcut that directs your browser to a specific webpage.
9. It is an application that computerize the creation, edition, and printing of
documents by electronically processing text data.
10. It is a computer program used to retrieve and display information from the
Internet.

22 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

What I Can Do

Activity 1: Describe Me!


Directions: Differentiate web browser from web search engine and give at least two
examples. Write the answer in your activity notebook.

Web browser Web search engine

Activity 2: Fill in the box!

Directions: Complete the boxes below with what is asked. Write your answers in
your activity notebook

Types of
Computer
Maintenance

23 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Assessment

Posttest:
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.

1. What does FTP stand for?


A. Fast Track Protocol C. File Transfer Protocol
B. File Track Protocol D. File Transmission Protocol

2. A key that locks the keyboard to type capital letters.


A. Caps lock C. Space bar
B. Del or Return D. Tab

3. It refers to a saved shortcut that directs the browser to a specific webpage.


A. Bookmark C. Cookies
B. Cache D. Settings

4. HTTP stands for ____________.


A. Hyperlink Transfer Protocol C. Hypertext Transfer Protocol
B. Hypertext Track Protocol D. Hypertext Transmission Protocol

5. It is a page that appears when the browser is launched.


A. Bookmark C. Navigation bar
B. Home page D. Navigation button

6. The following are examples of web browsers, EXCEPT:


A. Apple Safari C. Microsoft Window
B. Google Chrome D. Mozilla Firefox

7. What type of search engine task based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing

8. The following are ways to prevent virus infections, EXCEPT:


A. A firewall may also be used to block dangerous downloads.
B. Strict policies should be put in place to prevent virus infection.
C. Keeping antivirus up to date and running scans on a regular basis.
D. All your documents should be stored in one location so that it is easy
to backup.

24 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

9. What type of processing method does a typewriter belong to?


A. Electronic data processing C. Manual data processing
B. Electronic data transmission D. Mechanical data processing

10. The following are examples of application software, EXCEPT:


A. Microsoft Excel C. Microsoft Windows
B. Microsoft PowerPoint D. Microsoft Word

11. What software application that deals with data analysis, planning, and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing

12. Which of the following type of system image that every single file and folder
is being back-up?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup

13. It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk

14. What do you call a process of using anti-virus software to scan and identify
viruses in a computing device?
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan

15. Which of the following refers to a diagnostic tool used to anticipate possible
failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance

25 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

Additional Activities

Activity: Think More.

Directions: Copy and complete the semantic web. Write your answers in your
activity notebook.

1. Vary Your Search


Engine
7. Avoid Search 1.
Pitfalls

2.

Search
Criteria
6.

3.

4. Use Quotation
5. Marks

26 CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

References 28

Department of Education. K to 12 Basic Education Curriculum Technology and


Livelihood Education Learning Module. Pasig City: DepEd, 2013.

How Computers Work: Input and Output. Accessed on June 15, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm

How to Print a Word Document. November 1, 2019. Retrieved from:


https://www.wikihow.com/Print-a-Word-Document

Printing a Picture. Mark Edward Soper. Oct 12, 2010. Retrieved from:
https://www.informit.com/articles/article.aspx?p=1629004&seqNum=4

Basic Concepts of File Management. Accessed on June 20, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm

The Best Ways to Transfer Data from One Computer to Another. Accessed on June 29,
2020. Retrieved from: https://www.recordnations.com/articles/data-transfer/

Gorana Celebic et.al.Web Browsing and Communication. Open Society for Idea
Exchange (ODRAZI), Zagreb, 2011.

Bookmark. Accessed on June 28, 2020. Retrieved from:


https://techterms.com/definition/bookmark

Search Engine. Accessed on June 28, 2020. Retrieved from:


https://mangools.com/blog/seopedia/search-engines/

Seven Ways to Find What You Want on the Internet. Accessed on June 28, 2020.
Retrieved from: https://www.mindtools.com/pages/article/internet-searching.htm
Things to Maintain and Repair Computer System and Networks. Accessed on June
28, 2020. Retrieved from:https://cssnc2site.wordpress.com/maintain-and-repair-
computer-systems-and-networks/
Learning about Types of Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.mapcon.com/us-en/learning-about-types-of-computer-
maintenance
Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.ukdatacentercleaning.co.uk/computer-cleaning/computer-
maintenance/

File Maintenance. Accessed on July 5, 2020. Retrieved from:


https://www.computerhope.com/jargon/f/filemain.htm
Types of Maintenance. Accessed on July 5, 2020. Retrieved
from:https://www.mantenimientopetroquimica.com/en/typesofmaintenance.html
What is data backup? Accessed on July 6, 2020. Retrieved
from:https://www.jungledisk.com/blog/2017/09/14/what-is-data-backup/

CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)


lOMoARcPSD|17432115

The Four most common types of backup. Accessed on July 6, 2020. Retrieved from:
https://intrinium.com/the-four-most-common-types-of-data-backup/

29

For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985

Email Address: blr.lrqad@deped.gov.ph * blr.lrpd@deped.gov.ph

CO_Q0_ICT8_Module3

Downloaded by Ana Loraine Laurel (laurel.analoraine@gmail.com)

You might also like