CO Q0 ICT8 Mod3 Performing Computer Operations

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

8

Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations

CO_Q0_ICT8_Module3
ICT-Computer Systems Servicing-Grade 8
Alternative Delivery Mode
Quarter 0-Module 3: Performing Computer Operations
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module

Writers: Eva Rose S. Lumocso


Editors: Nilo R. Verdon, Bernie R. Pamplona, Avelina C.Duquesa,
Rowena S. Timcang, Jeho Ranin, Arlyn C. Galbo, Junel M. Anino,
Reynan S. Basilio, Junaline J. Mores, Ofelia B. Duarte

Reviewers: Grace A. Ando, Rose Jean V. Robles, Ivy H. Beldad

Illustrator: Eduardo D. Ayo, Jr. and Franz Vincent Roman T. More


Layout Artist: Bernie R. Pamplona and Junel M. Anino
Management Team: Francis Cesar B. Bringas
Isidro M. Biol Jr.
Maripaz F. Magno
Josephine Chonie M. Obseňares
Romeo O. Aprovechar
Rayfrocina T. Abao
Avelina C. Duquesa
Nilo R. Verdon

Printed in the Philippines by ________________________


Department of Education–Caraga Region XIII, Learning Resource Management System

Office Address: J.P. Rosales Avenue, Butuan City, Philippines 8600


Telefax / Telephone: (085) 817-7141
E-mail Address: [email protected]

CO_Q0_ICT8_Module3
8
Information and
Communication
Technology
Computer Systems Servicing (CSS)
Quarter 0- Module 3
Performing Computer Operations

CO_Q0_ICT8_Module3
Introductory Message

This Self-Learning Module (SLM) is prepared so that you, our dear learners,
can continue your studies and learn while at home. Activities, questions,
directions, exercises, and discussions are carefully stated for you to understand
each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-
step as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each
SLM. This will tell you if you need to proceed on completing this module or if you
need to ask your facilitator or your teacher’s assistance for better understanding of
the lesson. At the end of each module, you need to answer the post-test to self-
check your learning. Answer keys are provided for each activity and test. We trust
that you will be honest in using these.
In addition to the material in the main text, Notes to the Teacher are also
provided to our facilitators and parents for strategies and reminders on how they
can best help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any
part of this SLM. Use a separate sheet of paper in answering the exercises and
tests. And read the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering
the tasks in this module, do not hesitate to consult your teacher or facilitator.
Thank you.

CO_Q0_ICT8_Module3
What I Need to1Know
This module was designed and written with you in mind. It is here to help
you master basic computer operation. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.

This competency is covered in one lesson:


Learning Outcome 4: Produce output/data using computer system
(TLE_IACSS9 - 12PCO -If – 7)

After going through this module, you are expected to:


4.1. process entered data using appropriate software commands;
4.2. print out data as required using computer hardware /peripheral devices
in accordance with standard operating procedures;
4.3. transfer files and data between compatible systems using computer
software, hardware/peripheral devices in accordance with standard
operating procedures.

Learning Outcome 5: Use basic functions of a World Wide Web browser to


locate information (TLE_IACSS9-12PCO-Ig-h-8)

After going through this module, you are expected to:


5.1. establish information requirements for internet search;
5.2. launch browser;
5.3. load search engine;
5.4. enter appropriate search criteria/or URL of site;
5.5. follow relevant links to locate required information;
5.6. bookmark useful pages and print as required.

Learning Outcome 6: Maintain computer equipment and systems


(TLE_IACSS9-12PCO-Ii-j-9)

After going through this module, you are expected to:


6.1. implement procedures for ensuring security of data, including regular
backups and virus checks in accordance with standard operating
procedures;
6.2. implement basic file maintenance procedures in line with the
standards operating procedures.

CO_Q0_ICT8_Module3
2
What I Know

Pretest
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.

1. It is a page that appears when the browser is launched.


A. Bookmark C. Navigation bar
B. Home page D. Navigation button

2. The following are examples of web browsers, EXCEPT:


A. Apple Safari C. Microsoft Window
B. Google Chrome D. Mozilla Firefox

3. What search engine task that is based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing

4. The following are ways to prevent virus infections, EXCEPT:


A. A firewall may also be used to block dangerous downloads.
B. Strict policies should be put in place to prevent virus infection.
C. Keeping antivirus up to date and running scans on a regular basis.
D. All your documents should be stored in one location so that it is easy to
backup.

5. It is a processing method of a typewriter.


A. Electronic data processing C. Manual data processing
B. Electronic data transmission D. Mechanical data processing

6. The following are examples of application software, EXCEPT:


A. Microsoft Excel C. Microsoft Windows
B. Microsoft PowerPoint D. Microsoft Word

7. What software application which deals with data analysis, planning and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing

8. Which of the following type of system image that backs-up every single file
and folder?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup

CO_Q0_ICT8_Module3
3
9. It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk

10.It is a process of using anti-virus software to scan and identify viruses in a


computing device.
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan

11.Which of the following refers to a diagnostic tool used to anticipate possible


failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance

12.What does FTP stand for?


A. Fast Track Protocol C. File Transfer Protocol
B. File Track Protocol D. File Transmission Protocol

13.A key that locks the keyboard to type capital letters.


A. Caps lock C. Space bar
B. Del or Return D. Tab

14. It refers to a saved shortcut that directs the browser to a specific webpage.
A. Bookmark C. Cookies
B. Cache D. Settings

15.HTTP stands for ____________.


A. Hyperlink Transfer Protocol C. Hypertext Transfer Protocol
B. Hypertext Track Protocol D. Hypertext Transmission Protocol

CO_Q0_ICT8_Module3
Lesson
PERFORMING COMPUTER
2 OPERATIONS (PCO)

This lesson will provide a systematic knowledge about performing the basic
operations of computer system. It will help the learners to explore and understand
the techniques and strategies in handling both hardware and software application.

What’s In

Activity: Identify me!

Directions: Identify the shortcut keys given below. Choose your answer inside the
box. Write the correct answer in your activity notebook.

Ctrl + A Ctrl + C Ctrl + P Ctrl + V Ctrl + S Ctrl + X

1. What shortcut key will you use to COPY a file? __________________


2. What shortcut key will you use to CUT a file? ___________________
3. What shortcut key will you use to PASTE a file? ___________________
4. What shortcut key will you use to SELECT all text in the file?
___________________
5. What shortcut key will you use to SAVE a file? ___________________

CO_Q0_ICT8_Module3
What’s New

5
Activity: Get Puzzled!

Directions: Copy the crossword puzzle and supply the missing letters to form a
word using the clues given below. Do this in your activity notebook.

ACROSS
1. It is the collection of physical parts of a computer system.
2. It uses a light beam to help transfer images to paper, producing extremely
high-quality results.
3. A program that manages the resources of the computer system and
simplify applications programming.
4. A collected data which is converted into machine-readable form by an
input device and send it into the machine.
5. A collection of related records that gives a complete set of information
about a certain item or entity.
DOWN
1. It deals with data analysis, planning, and modelling.
CO_Q0_ICT8_Module3
2. This refers to the use of spraying ink from multiple jet nozzles.
3. This is a type of information in any form.
4. It involves getting the data/facts needed for processing from the point of
6

What is It
Key Terms:

 Internet is a set of millions of computers worldwide connected into a


network with the purpose of exchanging data among users.
 World Wide Web (WWW) is one of the services on the Internet which we use
to browse web pages (set of HTML documents connected with hyperlinks).
 Hypertext Transfer Protocol (HTTP) is a protocol (set of rules) that allows
transmission of information published on the Web.
 Uniform Resource Locator (URL)- is a web address of a particular object
(Web pages, images, or Word or PDF document) published on the Internet.
 File Transfer Protocol (FTP) is a protocol that allows data transfer between
computers over the Internet.
 Hyperlink or link is a part of the text or graphics on a web page; when we
activate a hyperlink image.
 Web browser is a software (program) which allows us to browse web pages.
The most widely used: Google Chrome, Mozilla Firefox, Opera, Internet
Explorer
 Web search engine contains content categorization of many Web pages.
 Internet Service Provider (ISP) is a company that provides Internet access
for its users (T-Com, Carnet.)
 Web Search is used to locate information.
 Web Address is used to locate a particular webpage. It is sometimes referred
to as a “URL” (Uniform Resource Locator).
 Input is an information or programs that entered into the computer system
through input devices such as the keyboard.

CO_Q0_ICT8_Module3
 Output is a display information on the screen (monitor) or the printer and
sends information to other computers.

Process Entered Data Using Appropriate Software Commands

Computer data is information processed or stored by a computer. This


information may be in the form of text documents, images, audio clips, software
programs, or other types of data. Data input is a collected data which is converted
into machine-readable form by an input device and send into the machine.

Data processing is a manipulation of data by a computer. It transforms raw


data into meaningful output.

Data Processing Methods

1. Manual Data Processing - The data 7 is processed manually without using


any machine or tool to get required results.
2. Mechanical Data Processing - The data is process by using different
devices like typewriters, mechanical printers or other mechanical devices.
3. Electronic Data Processing - It is the modern technique to process data.

Basic Keyboard Commands in Data Processing

ENTER or RETURN Moves the cursor down one line bringing it to the left
margin. Enter also process commands such as choosing an
option in a dialog (message) boxes and submitting a form.

DEL or DELETE Deletes the character at cursor and/or characters to the


right of the cursor and all highlighted (or selected) text.

BKSP or BACKSPACE Deletes the character to the left of cursor and all
highlighted text.

SPACE BAR Moves the cursor one space at a time to the right SHIFT
KEY. Use the shift keys to type capital letters and to type
the upper character on keys with two characters on them.

CAPS LOCK Locks the keyboard so it types capital letters (a light goes
on when caps lock is on)

TAB Moves the cursor five spaces to the right (number of spaces
are usually adjustable). Tab moves to the next field in a
form or table (Shift-Tab for previous field).

ESC or ESCAPE Cancels a menu or dialog box.

CO_Q0_ICT8_Module3
ARROW KEYS Moves the cursor around document without changing text.

FUNCTION KEYS or F Access commands by themselves or in combination with


KEYS the three command keys; CTRL, SHIFT, and ALT

CTRL + N Allow the user to create document

Different Ways to Input a Data Using Appropriate Software Applications

Computer Software is a program needed to accomplish the input,


processing, output, storage, and control activities of information systems.

8
Software are divided into two types:

1. Systems software is a program that manages the resources of the computer


system and simplify applications programming.
Example: Operating System such as Linux, Macintosh, Microsoft Windows
2. Application software is a program that directs the performance of a
particular use, or application of computers to meet the information
processing needs of end users. Example: MSWord, MS Excel, Adobe Reader
These are the commonly used applications software in data manipulation. Data
can be inputted and manipulated through this following software applications.

1. Spreadsheets is an
application in which data are
used for analysis, planning
and modelling.
Examples:
 Microsoft Excel
 Google Sheets
 Open Office-Spreadsheet
Microsoft Excel
2. Word processing is an
application that computerize
the creation, edition, and
printing of documents by
electronically processing text
data.
Examples:
 Microsoft Word
 Google Docs
 Open Office - Writer

CO_Q0_ICT8_Module3
Microsoft Word Dashboard/Interfacce
3. Desktop Publishing is an
application used to produce a
printed material like
newsletters, brochures,
manuals, and books with
several type styles, graphics,
and colors on each page.
Examples:
 Microsoft Publisher
 IStudio Publisher
 Adobe Indesign Microsoft Publisher
4. Presentation Software is an
application software that is
specifically designed to allow
users to create a presentation
of ideas by stringing together
text, images and audio/video.

Examples:
 Microsoft PowerPoint
 Google Slides
 Corel Presentation Microsoft PowerPoint

Print Out Data as Required Using Computer Hardware/Peripheral Devices

Computer hardware is the collection of physical parts of a computer system.


It is the collection of all the parts you can physically touch. Output devices refers to
a device that receive information from the computer, and carry data that has been
processed by the computer to the user. Monitors and printers are two of the most
commonly-known output devices used with a computer.

Printer is a device that produces printed-paper as output, tangible and


permanent unlike soft copy that is displayed on a screen. Hard Copy is a printed
copy of information from a computer. Sometimes referred to as a printout.

Steps in Printing a Document


Step 1: Open an existing Microsoft Word
document

To do so, click on W icon in the menu at the


upper-left of the screen. Click on Open to open
an existing document or New to create a new one.

CO_Q0_ICT8_Module3
Step 2: Click on File. It is in the menu bar at the
upper-left of the screen or a tab at the upper-left
of the window.

Step 3: Click on Print. The Print dialog box will


open.

Step 4: Select your printing options. Use the


selections in the dialog box to select:

 the default printer is displayed. Click on


its name to select another printer from the
drop-down menu.
 number of copies to print
 which pages to print
 size of paper to print on
 number of pages to print per sheet
 orientation of the paper. Select either
Portrait (paper length vertical) or
Landscape (paper width vertical)
 margins. You can adjust the top, bottom,
left, and right margins

Step 5: Click on Print or OK. The button label


will vary based on the version of Word you're
using. Your document will print to the printer
you selected.

Steps on Printing a Photo/Image

1. Select the picture or pictures you want to print.


2. Click Print. The Print Picture Wizard opens.

CO_Q0_ICT8_Module3
3. Select the printer you want to use.
4. Select the paper size.
5. Choose the print quality.
6. Choose the paper type.
7. Select the number of copies of each picture to print.
8. Select the layout.
9. Click Print.

Note: The procedures may vary depending


11 on your printer brand.

Transfer Files and Data Between Compatible Systems Using Computer


Software and Hardware/Peripheral Devices

A file is a collection of related records that gives a complete set of


information about a certain item or entity. Once a file will be saved in the machine,
it has a file extension. A file extension refers to the format of the file such as
txt, .xlm, and .xlms.

Operating System is a platform that enables other programs to run on the


computer. Compatibility is the capacity for two systems to work together without
having to be altered to do so.

Note: It is a must for you to know the type of operating system and
application software you are using because of the compatibility issues of
hardware and software.

Transferring files from one hard drive to another can be possible now.
There are many ways to connect/transfer data from one drive to another storage
drives. File transfer is the transmission of a computer file through a
communication channel from one computer system to another.

Different Ways to Transfer Data

1. E-Mail is an information stored on a computer that is exchanged between


two users over telecommunications.
2. File sharing sites or File Transfer Protocol is a type of data transfer system
usually utilized for websites and complicated file system.
3. External media or storage devices can transfer files by copying data into
external hard drives, thumb drives, or other storage devices.
4. Cloud Storage is one of the most popular and easiest to use method for file
sharing in today’s digital world.

Establish Information Requirements for Internet Search

Requirements for Internet Search

1. Web Browser
2. Internet Connection

CO_Q0_ICT8_Module3
3. Internet Service Provider
4. Web Search engine

Launching the Browser

To access the Internet, you need to open or


“launch” the browser. To do so, click on the icon
(picture) that appears on your computer either
on your home screen or in the bar across the
bottom of the screen.
12

A web browser is a computer program used to retrieve and displays


information from the Internet. The most popular web browsers are Mozilla Firefox,
Google Chrome, Microsoft Internet Explorer and Apple Safari. Your computer will
have a pre-installed web browser, but you may also add other browsers.

Different Types of Web Browser

Google Chrome is a web browser developed by Google and known to be


one of the most popular web browsers.

Mozilla Firefox is a new browser derived from Mozilla. It was released in


2004 and has grown to be the second most popular browser on the
Internet.

Safari is a web browser developed by Apple Inc. and included in Mac OS


X.

Internet Explorer is a product from software giant Microsoft and the


most commonly used browser in the universe.

Opera is smaller and faster than most other browsers, yet it is full-
featured.

Basic Parts of Browser and their Functions

CO_Q0_ICT8_Module3

13
Navigation Bar is located at the top of
your computer screen. Its functions
allow you to navigate the web.

CO_Q0_ICT8_Module3
Navigation Buttons are used to go back
and forth between webpages.
• To go back, click on the left arrow
• To go forward, click on the right arrow
New Tab Button allows you to have
multiple web pages.

Home Page appears when the web


browser is launch.

Favorites is a feature that allows you to


bookmark websites to provide one-click
access later.

History provides a list of the websites


you have visited.

Address Bar/Search Bar is used to type


in a Web Address or to perform a Web
Search.

Web Search Engine

A web search engine is an online tool that searches for results in its database
based on the search query (keyword) submitted by the internet user. The results are
usually websites that semantically match with the search query.

Search Engine Work

There may be some differences in how the search engines work but the
fundamentals remain the same. Each of them has to do the following tasks:

1. Crawling is based on finding hypertext links that refer to other websites.


2. Indexing website has to be indexed in order to be displayed in the search
engine results page.
3. Creating results is a process of checking the query against all website records
in the index.

14 CO_Q0_ICT8_Module3
The Most Popular Search Engines

1. Google 6. Ask
2. Baidu 7. MSN
3. Bing 8. Naver
4. Yahoo! 9. AOL
5. Yandex 10. Dogpile

Appropriate Search Criteria or URL of Site

1. Vary your search engine


2. Use specific keywords
3. Simplify your search terms
4. Use quotation marks
5. Remove unhelpful words
6. Refine your search using operators
7. Avoid search pitfalls

Bookmark

A bookmark is a saved shortcut that directs your browser to a specific webpage.


It stores the title, and favorites of the corresponding page. The bookmark feature
allows you to save web pages without having to type the web address repeatedly in
the location bar.

How to Add Bookmarks


1. Go to a webpage you want to
bookmark.

2. Click the bookmark icon. It is


located in the location bar.

CO_Q0_ICT8_Module3
15
3. The page is bookmarked.

Procedures for Ensuring Security of Data, Including Regular Backups and


Virus Checks in Accordance with Standard Operating Procedures

Computer maintenance involves keeping a computer in a good state of repair


and physical health. Meaning, it is a set of maintenance tasks and procedures that

help to keep the computer software and hardware updated and operational.

Types of Computer Maintenance


1. Predictive Maintenance This refers to using a diagnostic tool to
anticipate possible failures and avoid some
possible issues.
2. Preventive Maintenance It prevents possible failures, improve the
function of a system and prolong the life of
various computer components.
Disk cleanup is a maintenance utility that scans
your computer’s hard drive for files that you no
longer needed.
Defragmentation is the process of consolidating
fragmented files on the user's hard drive.
3. Corrective Maintenance It refers to the set of tasks destined to correct
the defects to be found in the different
equipment.
For example: If the operating system failed and
we want it to work again in the same condition,
we apply the necessary measures such as
computer reformat.
Computer Reformat is the process of erasing all
information on the drive by formatting the drive
to prepare that disk to be used for other
data. Reformat is commonly performed to
correct a major data corruption, check to see if
the disk is bad, or clean the disk drive.
4. Evolutionary Maintenance This type concerns both hardware and software,
so you can update Windows and change various
parts of the PC for better performance.

CO_Q0_ICT8_Module3
Data Security
16
A data security is about keeping your data safe from accidental or malicious
damage. Security is a consideration at all stages of your research, particularly if
working with disclosure or licensed data.

Procedures in Ensuring Data Security

1. Creating Passwords are the foundation of security. Getting a good one is a


great basis for keeping your data safe, but a weak password is like an
unlocked door.
2. Data Encryption maintains the security of data and documentation through
an algorithm to transforming information into something unreadable
requiring a “key” to decrypt and return to comprehension.
3. Data Backup is a process of duplicating data to allow retrieval of the
duplicate set after a data loss event.

A data is the most important aspect of your computer. An attacker could crash
a computer’s operating system or data may be corrupted or wiped out by a
hardware problem. Data loss can be caused by many things, ranging from
computer viruses to hardware failures, file corruption to fire, flood, or theft.

Data Backup

A data backup is the action of copying files and folders for the purpose of
being able to restore them in case of data loss. Data loss can be a huge setback and
in some cases can even lead to a business failure or transaction catastrophe.

The Most Common Types of Data Backup

1. Full backup - It is when every single file


and folder in the system is backed up.

CO_Q0_ICT8_Module3

17
2. Incremental backup - The process of
restoring lost data from backup is longer
but the process is much quicker.

3. Differential backup - This type of backup


requires more storage space than
incremental backup does, however, but it
also allows for a faster restore time.

4. Mirror backup - A mirror backup, as the


name implies, is when an exact copy is
made of the source data.

Data Back-up Options

To increase the chances of recovering lost or corrupted data. Below are some
of the backup options to mitigate data loss.

1. External hard drive - A portable, easy to use, and capable of storing


large files. It can be moved from computer to
computer, making it convenient to transport
data.
2. Cloud backup - It allows users to back up their data to hardware
that’s in a remote location. Most cloud storage
services provide a large amount of storage space
and encrypt the content for data security.
3. Flash drive - A small portable storage device mostly used to
transfer files from device to another device.
Scanning of a Virus

Computer Virus is a type of malicious code or program written to alter the


way a computer operates and is designed to spread from one computer to
another. A virus scan is the process of using anti-virus software to scan and

CO_Q0_ICT8_Module3

18
identify viruses in a computing device. It is an information security process that
aims to review and identify threatening viruses and programs. It is the core
feature of anti-virus software.
Virus scanning relies entirely on the strength of an anti-virus engine that
uses a repository of descriptions of known viruses, malware and other malicious
content.

Antivirus software is a program or set of programs that are designed to


prevent, search for, detect, and remove software viruses, and other malicious
software like worms, Trojans, adware, and more.

Three Different Types of Virus Scanning

1. Full Scan will take a few hours to complete if you happen to have a lot of
data stored on your system.
2. Custom Scan is a great way to check quickly the pen drives or hard
drives.
3. Quick Scan targets the entire system but it does not take as much time
as a full scan.

Ways to Prevent Virus Infections

1. Keeping antivirus up to date and running scans on a regular basis.


2. Strict policies should be put in place to prevent virus infection e.g.
prohibiting the use of flash drives, or require flash disk to be scanned before
use.
3. Other policy to consider is the prohibiting of downloading since
unsuspecting users can accidentally download malware.
4. A firewall may also be used to block dangerous downloads.

Basic File Maintenance Procedures in Line with the Standards Operating


Procedures

File Maintenance is the software processes concerned with maintaining file


integrity and file efficiency, usually of data files. It is concerned with the internal
organization of files.

There are Two Types of File Maintenance

1. Partition Maintenance includes periodic checking of the file system's


underlying structure and metadata, modifying the partition layout, and
low-level backups.
2. Content Maintenance involves monitoring and controlling the space used
by files as well as file backup and recovery.

Basic Procedures in File Maintenance

CO_Q0_ICT8_Module3
1. Update your antivirus and run a scan - The anti-virus updates contain the
latest files needed to combat new viruses and protect your computer.

2. Run spyware removal software - Protect your files from unwanted copy.
3. Empty your Recycle Bin - This will delete all unnecessary files from your
19
computer.
4. Conduct Disk cleanup - It finds files that are no longer needed.
5. Run Disk Defragmentation - It picks up all of the pieces of data that are
spread across your hard drive and puts them back together again.

What’s
More

Activity 1: Find Me!


Directions: Examine carefully the puzzle below. Find ten (10) words either
horizontally, vertically and diagonally that are associated to Computer
Maintenance. Write it in your activity notebook.

A U V A S L Z O D D
A N W B C M Y B B E
S I T C A N B W A F
S I X I N O A V C R
I T Y D V P C U K A
K S Z E C I K T U G
L C L E A N R P P M
C L E A N U P U E E
N P Q G K S S R S N
O R E F O R M A T T

Activity 2: Arrange Me!


Directions: Copy the set of steps in printing a document and photo/image in your
activity notebook and arrange them by numbering 1, 2 and so on.

Part A. Steps in Printing a Document

________ a. Click on Print or OK.


________ b. Select the number of copies of each picture to print.
________ c. Click on File.
________ d. Click on Print.
________ e. Open an existing Microsoft Word document.

CO_Q0_ICT8_Module3
Part B. Steps in Printing a Photo/Image

________ a. Choose the paper type.


________ b. Select the number of copies of each picture to print.
________ c. Select the picture or pictures you want to print.
________ d. Click Print. The Print Picture Wizard opens.
________ e. Select the layout.
________ f. Click Print.
________ g. Select the printer you want to use.
________ h. Select the paper size.
________ i. Choose the print quality.
20

Activity 3: Match Me!

Directions: Match the meaning in column A with its terms in column B. Write the
correct answers in your activity notebook.

COLUMN A
1. Moves the cursor down one line bringing it
COLUMN B
to the left margin.
2. Locks the keyboard so it types capital a. Del or delete
letters (a light goes on when caps lock is b. Space bar
on) c. Bksp or backspace
3. Moves the cursor five spaces to the right d. Esc or escape
(number of spaces are usually adjustable)
4. Cancels a menu or dialog box. e. Caps lock
f. Function keys or f keys
5. Deletes the character at the right of the
cursor and all the highlighted (or selected) g. Ctrl C
text. h. Arrow keys
6. Deletes the character at the left of cursor i. Ctrl + N
and all highlighted text (or selected) text. j. Tab
7. Moves the cursor one space at a time to k. Enter or return
the right SHIFT KEY.

8. Moves the cursor around the document


without changing text.
9. Access commands by themselves or in
combination with the three command
keys; CTRL, SHIFT, and ALT

10.Access a new document using the


appropriate shortcut command.

21 CO_Q0_ICT8_Module3
What I Have Learned

Activity: Identify Me!

Directions: Read the statements below and choose the appropriate word from the
box. Write your answer in your activity notebook.

Data Security Printer Virus scan Data backup Web browser


Arrow Keys Mirror backup Quick scan Bookmark
Web Search Engine Word processing

1. The action of copying files and folders for the purpose of being able to restore
them in case of data loss.
2. It is the process of using anti-virus software to scan and identify viruses in a
computing device.
3. It moves the cursor around document without changing text.
4. It is when an exact copy is made of the source data.
5. A device that produces printed-paper as an output.
6. It targets the entire system but it does not take as much time as a full scan.
7. It is an online tool that searches for results in its database based on the search
query submitted by the internet user.
8. A saved shortcut that directs your browser to a specific webpage.
9. It is an application that computerize the creation, edition, and printing of
documents by electronically processing text data.
10.It is a computer program used to retrieve and display information from the
Internet.

CO_Q0_ICT8_Module3
What I Can Do22

Activity 1: Describe Me!


Directions: Differentiate web browser from web search engine and give at least two
examples. Write the answer in your activity notebook.

Web browser Web search engine

Activity 2: Fill in the box!

Directions: Complete the boxes below with what is asked. Write your answers in
your activity notebook

Types of
Computer
Maintenance

CO_Q0_ICT8_Module3
23

Assessment
Posttest:
Directions: Read the question carefully. Choose and write the letter of the correct
answer in your activity notebook.

1. What does FTP stand for?


A. Fast Track Protocol C. File Transfer Protocol
B. File Track Protocol D. File Transmission Protocol

2. A key that locks the keyboard to type capital letters.


A. Caps lock C. Space bar
B. Del or Return D. Tab

3. It refers to a saved shortcut that directs the browser to a specific webpage.


A. Bookmark C. Cookies
B. Cache D. Settings

4. HTTP stands for ____________.


A. Hyperlink Transfer Protocol C. Hypertext Transfer Protocol
B. Hypertext Track Protocol D. Hypertext Transmission Protocol

5. It is a page that appears when the browser is launched.


A. Bookmark C. Navigation bar
B. Home page D. Navigation button

6. The following are examples of web browsers, EXCEPT:


A. Apple Safari C. Microsoft Window
B. Google Chrome D. Mozilla Firefox

7. What type of search engine task based on finding a hypertext link to other
websites?
A. Crawling C. Indexing
B. Creating Results D. Refreshing

8. The following are ways to prevent virus infections, EXCEPT:


A. A firewall may also be used to block dangerous downloads.
B. Strict policies should be put in place to prevent virus infection.
C. Keeping antivirus up to date and running scans on a regular basis.

CO_Q0_ICT8_Module3
D. All your documents should be stored in one location so that it is easy
to backup.

9. What type of processing method does a typewriter belong to?


A. Electronic data processing 24 C. Manual data processing
B. Electronic data transmission D. Mechanical data processing

10.The following are examples of application software, EXCEPT:


A. Microsoft Excel C. Microsoft Windows
B. Microsoft PowerPoint D. Microsoft Word

11.What software application that deals with data analysis, planning, and
modeling?
A. Desktop publishing C. Spreadsheet
B. Presentation software D. Word processing

12.Which of the following type of system image that every single file and folder
is being back-up?
A. Differential backup C. Incremental backup
B. Full backup D. Mirror backup

13.It is a type of back-up that allows users to save their data to hardware in a
remote location.
A. Backup services C. Flash disk
B. Cloud backup D. External hard disk

14.What do you call a process of using anti-virus software to scan and identify
viruses in a computing device?
A. Custom scan C. Quick scan
B. Full Scan D. Virus scan

15.Which of the following refers to a diagnostic tool used to anticipate possible


failures and avoid some possible issues?
A. Corrective maintenance C. Predictive maintenance
B. Evolutionary maintenance D. Preventive maintenance

CO_Q0_ICT8_Module3
25

Additional Activities

Activity: Think More.

Directions: Copy and complete the semantic web. Write your answers in your
activity notebook.

1. Vary Your Search


Engine
7. Avoid Search 1.
Pitfalls

2.

Search
Criteria
6.

3.

4. Use Quotation
5. Marks

CO_Q0_ICT8_Module3
26

Answer Key

CO_Q0_ICT8_Module3
What’s New What’s In

Assessment 1.What
CtrlI +
Know
C What I have Learned
ACROSS 2. Ctrl + X
1. 1.C Output device 3.1.BCtrl + V 1. Data backup
2. 2.A Laser 4.2.CCtrl + A 2. Virus scan
3. 3.A System software 5.3.ACtrl + S 3. Arrow keys
4. 4.C Data input 4.D 4. Mirror backup
5. B 5.D 5. Printer
5. File
6. C 6.C 6. Quick Scan
7.
DOWNA 7.C 7. Web search engine
8. D1. Spreadsheet 8.B 8. Bookmark
9. D2. Inkjet 9.B 9. Word processing
10. C
3. Text 10.D 10. Web browser
11. C 11.C
4. Data collection
12. B 12.C
5. Printer
13. B 13.A
14. 6.
D Compatibility 14.A
15. C 15C

27

CO_Q0_ICT8_Module3
What I can do Additional Activities

PART I
1. Vary Your Search Engine
Web Browser- is a computer program used 2. Use Specific Keywords
to retrieve and display information from 3. Simplify Your Search Terms
the Internet.
4. Use Quotation Marks
Ex. Google chrome
Firefox 5. Remove Unhelpful Words
Opera 6. Refine Your Search Using Operators
Safari 7. Avoid Search Pitfalls
Internet Explorer

Web Search Engine - is an online tool that


searches for results in its database based on
the search query submitted by the internet
user.
Ex. Google
Yahoo
MSN

PART II
Types of Computer Maintenance

- Predictive Maintenance
- Preventive Maintenance
- Corrective Maintenance
- Evolutionary maintenance

What's More

Activity 1 Activity 2 Activity 3


Part I- Steps in Printing a Document
1. Antivirus 1. Open or create a Microsoft Word document 1. K
2. Scan 2. Click on File. 2. E
3. Cleanup 3. J
3. Click on Print.
4. D
4. Reformat 4. Select your printing options. 5. A
5. Backup 5. Click on Print or OK. 6. C
6. Defragment 7. B
Part I- Steps in Printing a Document
7. Quick scan 8. H
1. Select the picture or pictures you want to
8. File 9. F
print. 10. I
maintenance
2. Click Print. The Print Picture Wizard opens.
9. Encryption
3. Select the printer you want to use.
10. Password
4. Select the paper size.
5. Choose the print quality.
6. Choose the paper type.
7. Select the number of copies of each picture
to print.
8. Select the layout.
9. Click Print.

CO_Q0_ICT8_Module3
References 28

Department of Education. K to 12 Basic Education Curriculum Technology and


Livelihood Education Learning Module. Pasig City: DepEd, 2013.

How Computers Work: Input and Output. Accessed on June 15, 2020. Retrieved
from: https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm

How to Print a Word Document. November 1, 2019. Retrieved from:


https://www.wikihow.com/Print-a-Word-Document

Printing a Picture. Mark Edward Soper. Oct 12, 2010. Retrieved from:
https://www.informit.com/articles/article.aspx?p=1629004&seqNum=4

Basic Concepts of File Management. Accessed on June 20, 2020. Retrieved from:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading06.htm

The Best Ways to Transfer Data from One Computer to Another. Accessed on June
29, 2020. Retrieved from: https://www.recordnations.com/articles/data-transfer/

Gorana Celebic et.al.Web Browsing and Communication. Open Society for Idea
Exchange (ODRAZI), Zagreb, 2011.

Bookmark. Accessed on June 28, 2020. Retrieved from:


https://techterms.com/definition/bookmark

Search Engine. Accessed on June 28, 2020. Retrieved from:


https://mangools.com/blog/seopedia/search-engines/

Seven Ways to Find What You Want on the Internet. Accessed on June 28, 2020.
Retrieved from: https://www.mindtools.com/pages/article/internet-searching.htm
Things to Maintain and Repair Computer System and Networks. Accessed on June
28, 2020. Retrieved from:https://cssnc2site.wordpress.com/maintain-and-repair-
computer-systems-and-networks/
Learning about Types of Computer Maintenance. Accessed on July 4, 2020.
Retrieved from:https://www.mapcon.com/us-en/learning-about-types-of-
computer-maintenance
Computer Maintenance. Accessed on July 4, 2020. Retrieved
from:https://www.ukdatacentercleaning.co.uk/computer-cleaning/computer-
maintenance/

File Maintenance. Accessed on July 5, 2020. Retrieved from:


https://www.computerhope.com/jargon/f/filemain.htm
Types of Maintenance. Accessed on July 5, 2020. Retrieved
from:https://www.mantenimientopetroquimica.com/en/typesofmaintenance.html
What is data backup? Accessed on July 6, 2020. Retrieved
from:https://www.jungledisk.com/blog/2017/09/14/what-is-data-backup/

CO_Q0_ICT8_Module3
The Four most common types of backup. Accessed on July 6, 2020. Retrieved from:
https://intrinium.com/the-four-most-common-types-of-data-backup/

29

For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985

Email Address: [email protected] * [email protected]

CO_Q0_ICT8_Module3

You might also like