CO Q0 ICT8 Mod3 Performing Computer Operations
CO Q0 ICT8 Mod3 Performing Computer Operations
CO Q0 ICT8 Mod3 Performing Computer Operations
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations
CO_Q0_ICT8_Module3
ICT-Computer Systems Servicing-Grade 8
Alternative Delivery Mode
Quarter 0-Module 3: Performing Computer Operations
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
CO_Q0_ICT8_Module3
8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations
CO_Q0_ICT8_Module3
Introductory Message
This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions,
directions, exercises, and discussions are carefully stated for you to understand
each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-
check your learning. Answer keys are provided for each activity and test. We trust
that you will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they
can best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any
part of this SLM. Use a separate sheet of paper in answering the exercises and
tests. And read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering
the tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.
CO_Q0_ICT8_Module3
What I Need to1Know
This module was designed and written with you in mind. It is here to help
you master basic computer operation. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.
CO_Q0_ICT8_Module3
2
What I Know
Pretest
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.
3. What search engine task that is based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing
7. What software application which deals with data analysis, planning and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing
8. Which of the following type of system image that backs-up every single file
and folder?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup
CO_Q0_ICT8_Module3
3
9. It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk
14. It refers to a saved shortcut that directs the browser to a specific webpage.
A. Bookmark C. Cookies
B. Cache D. Settings
CO_Q0_ICT8_Module3
Lesson
PERFORMING COMPUTER
2 OPERATIONS (PCO)
This lesson will provide a systematic knowledge about performing the basic
operations of computer system. It will help the learners to explore and understand
the techniques and strategies in handling both hardware and software application.
What’s In
Directions: Identify the shortcut keys given below. Choose your answer inside the
box. Write the correct answer in your activity notebook.
CO_Q0_ICT8_Module3
What’s New
5
Activity: Get Puzzled!
Directions: Copy the crossword puzzle and supply the missing letters to form a
word using the clues given below. Do this in your activity notebook.
ACROSS
1. It is the collection of physical parts of a computer system.
2. It uses a light beam to help transfer images to paper, producing extremely
high-quality results.
3. A program that manages the resources of the computer system and
simplify applications programming.
4. A collected data which is converted into machine-readable form by an
input device and send it into the machine.
5. A collection of related records that gives a complete set of information
about a certain item or entity.
DOWN
1. It deals with data analysis, planning, and modelling.
CO_Q0_ICT8_Module3
2. This refers to the use of spraying ink from multiple jet nozzles.
3. This is a type of information in any form.
4. It involves getting the data/facts needed for processing from the point of
6
What is It
Key Terms:
CO_Q0_ICT8_Module3
Output is a display information on the screen (monitor) or the printer and
sends information to other computers.
ENTER or RETURN Moves the cursor down one line bringing it to the left
margin. Enter also process commands such as choosing an
option in a dialog (message) boxes and submitting a form.
BKSP or BACKSPACE Deletes the character to the left of cursor and all
highlighted text.
SPACE BAR Moves the cursor one space at a time to the right SHIFT
KEY. Use the shift keys to type capital letters and to type
the upper character on keys with two characters on them.
CAPS LOCK Locks the keyboard so it types capital letters (a light goes
on when caps lock is on)
TAB Moves the cursor five spaces to the right (number of spaces
are usually adjustable). Tab moves to the next field in a
form or table (Shift-Tab for previous field).
CO_Q0_ICT8_Module3
ARROW KEYS Moves the cursor around document without changing text.
8
Software are divided into two types:
1. Spreadsheets is an
application in which data are
used for analysis, planning
and modelling.
Examples:
Microsoft Excel
Google Sheets
Open Office-Spreadsheet
Microsoft Excel
2. Word processing is an
application that computerize
the creation, edition, and
printing of documents by
electronically processing text
data.
Examples:
Microsoft Word
Google Docs
Open Office - Writer
CO_Q0_ICT8_Module3
Microsoft Word Dashboard/Interfacce
3. Desktop Publishing is an
application used to produce a
printed material like
newsletters, brochures,
manuals, and books with
several type styles, graphics,
and colors on each page.
Examples:
Microsoft Publisher
IStudio Publisher
Adobe Indesign Microsoft Publisher
4. Presentation Software is an
application software that is
specifically designed to allow
users to create a presentation
of ideas by stringing together
text, images and audio/video.
Examples:
Microsoft PowerPoint
Google Slides
Corel Presentation Microsoft PowerPoint
CO_Q0_ICT8_Module3
Step 2: Click on File. It is in the menu bar at the
upper-left of the screen or a tab at the upper-left
of the window.
CO_Q0_ICT8_Module3
3. Select the printer you want to use.
4. Select the paper size.
5. Choose the print quality.
6. Choose the paper type.
7. Select the number of copies of each picture to print.
8. Select the layout.
9. Click Print.
Note: It is a must for you to know the type of operating system and
application software you are using because of the compatibility issues of
hardware and software.
Transferring files from one hard drive to another can be possible now.
There are many ways to connect/transfer data from one drive to another storage
drives. File transfer is the transmission of a computer file through a
communication channel from one computer system to another.
1. Web Browser
2. Internet Connection
CO_Q0_ICT8_Module3
3. Internet Service Provider
4. Web Search engine
Opera is smaller and faster than most other browsers, yet it is full-
featured.
CO_Q0_ICT8_Module3
13
Navigation Bar is located at the top of
your computer screen. Its functions
allow you to navigate the web.
CO_Q0_ICT8_Module3
Navigation Buttons are used to go back
and forth between webpages.
• To go back, click on the left arrow
• To go forward, click on the right arrow
New Tab Button allows you to have
multiple web pages.
A web search engine is an online tool that searches for results in its database
based on the search query (keyword) submitted by the internet user. The results are
usually websites that semantically match with the search query.
There may be some differences in how the search engines work but the
fundamentals remain the same. Each of them has to do the following tasks:
14 CO_Q0_ICT8_Module3
The Most Popular Search Engines
1. Google 6. Ask
2. Baidu 7. MSN
3. Bing 8. Naver
4. Yahoo! 9. AOL
5. Yandex 10. Dogpile
Bookmark
CO_Q0_ICT8_Module3
15
3. The page is bookmarked.
help to keep the computer software and hardware updated and operational.
CO_Q0_ICT8_Module3
Data Security
16
A data security is about keeping your data safe from accidental or malicious
damage. Security is a consideration at all stages of your research, particularly if
working with disclosure or licensed data.
A data is the most important aspect of your computer. An attacker could crash
a computer’s operating system or data may be corrupted or wiped out by a
hardware problem. Data loss can be caused by many things, ranging from
computer viruses to hardware failures, file corruption to fire, flood, or theft.
Data Backup
A data backup is the action of copying files and folders for the purpose of
being able to restore them in case of data loss. Data loss can be a huge setback and
in some cases can even lead to a business failure or transaction catastrophe.
CO_Q0_ICT8_Module3
17
2. Incremental backup - The process of
restoring lost data from backup is longer
but the process is much quicker.
To increase the chances of recovering lost or corrupted data. Below are some
of the backup options to mitigate data loss.
CO_Q0_ICT8_Module3
18
identify viruses in a computing device. It is an information security process that
aims to review and identify threatening viruses and programs. It is the core
feature of anti-virus software.
Virus scanning relies entirely on the strength of an anti-virus engine that
uses a repository of descriptions of known viruses, malware and other malicious
content.
1. Full Scan will take a few hours to complete if you happen to have a lot of
data stored on your system.
2. Custom Scan is a great way to check quickly the pen drives or hard
drives.
3. Quick Scan targets the entire system but it does not take as much time
as a full scan.
CO_Q0_ICT8_Module3
1. Update your antivirus and run a scan - The anti-virus updates contain the
latest files needed to combat new viruses and protect your computer.
2. Run spyware removal software - Protect your files from unwanted copy.
3. Empty your Recycle Bin - This will delete all unnecessary files from your
19
computer.
4. Conduct Disk cleanup - It finds files that are no longer needed.
5. Run Disk Defragmentation - It picks up all of the pieces of data that are
spread across your hard drive and puts them back together again.
What’s
More
A U V A S L Z O D D
A N W B C M Y B B E
S I T C A N B W A F
S I X I N O A V C R
I T Y D V P C U K A
K S Z E C I K T U G
L C L E A N R P P M
C L E A N U P U E E
N P Q G K S S R S N
O R E F O R M A T T
CO_Q0_ICT8_Module3
Part B. Steps in Printing a Photo/Image
Directions: Match the meaning in column A with its terms in column B. Write the
correct answers in your activity notebook.
COLUMN A
1. Moves the cursor down one line bringing it
COLUMN B
to the left margin.
2. Locks the keyboard so it types capital a. Del or delete
letters (a light goes on when caps lock is b. Space bar
on) c. Bksp or backspace
3. Moves the cursor five spaces to the right d. Esc or escape
(number of spaces are usually adjustable)
4. Cancels a menu or dialog box. e. Caps lock
f. Function keys or f keys
5. Deletes the character at the right of the
cursor and all the highlighted (or selected) g. Ctrl C
text. h. Arrow keys
6. Deletes the character at the left of cursor i. Ctrl + N
and all highlighted text (or selected) text. j. Tab
7. Moves the cursor one space at a time to k. Enter or return
the right SHIFT KEY.
21 CO_Q0_ICT8_Module3
What I Have Learned
Directions: Read the statements below and choose the appropriate word from the
box. Write your answer in your activity notebook.
1. The action of copying files and folders for the purpose of being able to restore
them in case of data loss.
2. It is the process of using anti-virus software to scan and identify viruses in a
computing device.
3. It moves the cursor around document without changing text.
4. It is when an exact copy is made of the source data.
5. A device that produces printed-paper as an output.
6. It targets the entire system but it does not take as much time as a full scan.
7. It is an online tool that searches for results in its database based on the search
query submitted by the internet user.
8. A saved shortcut that directs your browser to a specific webpage.
9. It is an application that computerize the creation, edition, and printing of
documents by electronically processing text data.
10.It is a computer program used to retrieve and display information from the
Internet.
CO_Q0_ICT8_Module3
What I Can Do22
Directions: Complete the boxes below with what is asked. Write your answers in
your activity notebook
Types of
Computer
Maintenance
CO_Q0_ICT8_Module3
23
Assessment
Posttest:
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.
7. What type of search engine task based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing
CO_Q0_ICT8_Module3
D. All your documents should be stored in one location so that it is easy
to backup.
11.What software application that deals with data analysis, planning, and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing
12.Which of the following type of system image that every single file and folder
is being back-up?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup
13.It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk
14.What do you call a process of using anti-virus software to scan and identify
viruses in a computing device?
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan
CO_Q0_ICT8_Module3
25
Additional Activities
Directions: Copy and complete the semantic web. Write your answers in your
activity notebook.
2.
Search
Criteria
6.
3.
4. Use Quotation
5. Marks
CO_Q0_ICT8_Module3
26
Answer Key
CO_Q0_ICT8_Module3
What’s New What’s In
Assessment 1.What
CtrlI +
Know
C What I have Learned
ACROSS 2. Ctrl + X
1. 1.C Output device 3.1.BCtrl + V 1. Data backup
2. 2.A Laser 4.2.CCtrl + A 2. Virus scan
3. 3.A System software 5.3.ACtrl + S 3. Arrow keys
4. 4.C Data input 4.D 4. Mirror backup
5. B 5.D 5. Printer
5. File
6. C 6.C 6. Quick Scan
7.
DOWNA 7.C 7. Web search engine
8. D1. Spreadsheet 8.B 8. Bookmark
9. D2. Inkjet 9.B 9. Word processing
10. C
3. Text 10.D 10. Web browser
11. C 11.C
4. Data collection
12. B 12.C
5. Printer
13. B 13.A
14. 6.
D Compatibility 14.A
15. C 15C
27
CO_Q0_ICT8_Module3
What I can do Additional Activities
PART I
1. Vary Your Search Engine
Web Browser- is a computer program used 2. Use Specific Keywords
to retrieve and display information from 3. Simplify Your Search Terms
the Internet.
4. Use Quotation Marks
Ex. Google chrome
Firefox 5. Remove Unhelpful Words
Opera 6. Refine Your Search Using Operators
Safari 7. Avoid Search Pitfalls
Internet Explorer
PART II
Types of Computer Maintenance
- Predictive Maintenance
- Preventive Maintenance
- Corrective Maintenance
- Evolutionary maintenance
What's More
CO_Q0_ICT8_Module3
References 28
How Computers Work: Input and Output. Accessed on June 15, 2020. Retrieved
from: https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
Printing a Picture. Mark Edward Soper. Oct 12, 2010. Retrieved from:
https://www.informit.com/articles/article.aspx?p=1629004&seqNum=4
Basic Concepts of File Management. Accessed on June 20, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm
The Best Ways to Transfer Data from One Computer to Another. Accessed on June
29, 2020. Retrieved from: https://www.recordnations.com/articles/data-transfer/
Gorana Celebic et.al.Web Browsing and Communication. Open Society for Idea
Exchange (ODRAZI), Zagreb, 2011.
Seven Ways to Find What You Want on the Internet. Accessed on June 28, 2020.
Retrieved from: https://www.mindtools.com/pages/article/internet-searching.htm
Things to Maintain and Repair Computer System and Networks. Accessed on June
28, 2020. Retrieved from:https://cssnc2site.wordpress.com/maintain-and-repair-
computer-systems-and-networks/
Learning about Types of Computer Maintenance. Accessed on July 4, 2020.
Retrieved from:https://www.mapcon.com/us-en/learning-about-types-of-
computer-maintenance
Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.ukdatacentercleaning.co.uk/computer-cleaning/computer-
maintenance/
CO_Q0_ICT8_Module3
The Four most common types of backup. Accessed on July 6, 2020. Retrieved from:
https://intrinium.com/the-four-most-common-types-of-data-backup/
29
CO_Q0_ICT8_Module3