Ste10 Q3 CSS Week4
Ste10 Q3 CSS Week4
Ste10 Q3 CSS Week4
1
TVL 12 – ICT (Computer System Servicing)
Activity Sheet No. 7
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
This Learning Activity Sheet is developed by DepEd Region 6 – Western
Visayas.
The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning Competency
(MELC) with minimal or no face-to-face encounter between you and learner. This will
be made available to the learners with the references/links to ease the independent
learning.
3
Quarter 2, Week 7
Learning Activity Sheets (LAS) No. 7
Name of Learner:______________________________________________________
Grade and Section:_________________________________ Date: ______________
4
Computer Network Overview:
5
2. Confidentiality of the information (solution of a problem of not
authorized access to the information);
The tools required to install copper and fiber-optic cable may cause
danger through improper use. When working with cables, strictly follow these
safety rules:
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
6
o Dangerous chemicals
o Tools with sharp edges
o Light which you cannot see that can
burn your eyes
o Glass shards produced by cutting fiber-
optic cable that can cause bodily harm.
Specific types of tools and chemicals are used when working with fiber-optic
cable. These materials must be handled with care.
Chemicals - The solvents and glues used with fiber optics are dangerous. You
should handle them with extreme care.
Tools - When working with any tool, safety should always be your first priority.
Any compromise in safety could result in serious injury or even death. The tools
used for working with fiber optics have sharp cutting surfaces that are used to
scribe glass. Other tools pinch cables with high pressure to fasten connectors to
them.
Glass Shards - The process of cutting and trimming the strands of fiber-optic
cables can produce tiny fragments of glass or plastic that can penetrate your
eyes or skin and cause severe irritation. The fibers can be extremely difficult to
see on your skin because they are clear and small. When you work with fiber-
optic cabling, the working surface should be a dark mat so that you can see the
tiny glass or plastic fragments.
Harmful light - Protect your eyes from the harmful light that may be in the fiber-
optic strands. The light is a color that humans cannot see. It can damage your
eyes before you can feel it. When you use a magnifier to inspect fiber-optic cable
and connectors, the light emitted from the fiber could be directed into your eyes.
When working with fiber, be sure to disconnect the light source. Use special
detectors to help you tell if a fiber is energized.
7
3. Get up-to-date anti-virus and anti-
spyware software.
4. Use a firewall.
5. Ensure your browser and operating
system are always up-to-date.
6. Protect your Internet connection -
especially with a wireless home
network.
7. Protect yourself from online fraud.
8
Get up-to-date anti-virus and anti-spyware software
9
browser. Most operating systems and browser versions offer the ability to be
notified automatically of product updates.
You should always use a web browser that supports 256-bit encryption or
greater when accessing secure websites. Most browsers now come with 256-bit
encryption, which provides adequate protection when transmitting confidential
data over the Internet.
Wireless Networks
The default configuration of most
wireless home networks is not secure.
Contact your wireless software vendor for
specific information about enabling
encryption and strengthening the overall
security of your wireless home network.
Taking a few simple precautions when using wireless hotspots can help
protect your computer:
10
Protect yourself from online fraud
o Never enter personal information unless you are sure the website is
legitimate. You should also be certain that the site is encrypted. Look for
the letter "s" at the end of "https" at the beginning of the URL address
(e.g. "https://www.qtrade.ca.") This ensures that the site is running in
secure mode.
o Be suspicious of email attachments from unknown sources. If you do not
know or recognize the sender of the email, do not open the attachment.
o Use security software products, when navigating through the Internet to:
(i) block fake websites and crime ware; (ii) keep passwords safe; and (iii)
authenticate trusted websites.
o Do not set your email program to "auto-run" attachments. Always check
that emails you have received do not contain viruses by running your
anti-virus software when the email attachment is received.
o Frequently check your account and actively monitor your transaction
history including promptly reviewing correspondence, notices and
account statements, or confirmations from us.
11
2. Create a maintenance checklist.
To determine if the maintenance program is implemented according to what is
planned, an assessment must be done. The assessment is through regular inspections
which assure that the maintenance activities are done on the date and time it was planned
and that the performance levels adhered to the defined standard.
The checklist provided will help us to confirm if the maintenance activities have
been performed in order to prolong the life of the particular equipment.
12
o Maintain your hard disk
Design a systematic maintenance plan for your software.
o Backup your files
o Install or secure passwords
o Delete temporary files
o Update anti-virus and spy ware
13
Schedule
Activities Daily Weekly Monthly Quarterly Yearly Remarks
Update virus and spyware
and firewall
Do incremental backup –
back up updated files for
each date.
Reboot upon crash- Reboot
the computer to fix your pc
upon crash.
Full virus and spyware scan
Complete backup of files
Patch up –Get latest
software update for your
operating system.
Clean your PC inside and
out. (Especially dust).
Defrag your hard drive to
speed up its operation.
Check your programs –
clean up unused programs
Reformat your hard drive
and reinstall the operating
system
Make a full diagnostic
check on hardware and
software
Activity 2
List down at least 5 problems you encountered in your computer network
operations including your (android/smartphones etc.), then what are the
solutions you did.
14
NETWORK COMPUTER OPERATION PROVIDED SOLUTIONS
PROBLEMS
Assessment:
Direction: Read each sentence. Write True if the statement is correct
False otherwise.
15
V. Reflection: Write your answers on your journal/ notebook.
Every moment that we have in our life is valuable, were we can exchange
ideas and thoughts for single transactions of data and information in a
technology era. Therefore, it is vital to have a safe computer network operation
that needs to be done just to preserve the data integrity, availability and
confidentiality of the information we shared.
c. What difficulties did you encounter and how did you overcome
them?
16
17
Assessment
1. True
2. True
3. False
4. True
5. True
6. False
7. False
8. True
9. False
10. True
Activity 1 & 2
Answers will vary according
to student’s output.
Answer Key VI.