You are on page 1of 38

Senior High School

Computer Systems
Servicing
Quarter 1 - Module 3
Performing Computer Operations
PART 3

Department of Education ● Republic of the Philippines


Computer Systems Servicing- Grade 12
Alternative Delivery Mode
Quarter 1 - Module 3: Performing Computer Operations
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalty.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education – Division of Cagayan de Oro Schools


Division Superintendent: Dr. Cherry Mae L. Limbaco, CESO V

Development Team of the Module

Author/s: Chemby Mae S. Pequiro


Sam Uriel U. Reyes
Reviewers:

Illustrator and Layout Artists:


Chemby Mae S. Pequiro

Management Team
Chairperson: Cherry Mae L. Limbaco, PhD, CESO V
Schools Division Superintendent

Co-Chairperson: Alicia E. Anghay, PhD, CESE


Assistant Schools Division Superintendent

Printed in the Philippines by


Department of Education – Division of Cagayan de Oro City
Office Address: Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro
Telefax: (08822)855-0048
E-mail Address: cagayandeoro.city@deped.gov.ph
Senior High School

Computer
Systems
Servicing NC II
Quarter 1 - Module 3
Performing Computer Operations – Part 3

This instructional material was collaboratively developed and reviewed


by educators from the public schools. We encourage teachers and other
education stakeholders to email their feedback, comments, and
recommendations to the Department of Education at
cagayandeoro.city@deped.gov.ph

We value your feedback and recommendations.

Department of Education ● Republic of the Philippines


Table of Contents

What This Module is About .................................................................................................... i


What I Need to Know ............................................................................................................. ii
How to Learn from this Module ............................................................................................. ii
Icons of this Module .............................................................................................................. iii

What I Know ......................................................................................................................... .iv

Lesson 1:
Performing Computer Operations-Transfer Files to Other Devices .............................
What I Need to Know .................................................................................... 6
What’s New …. ............................................................................................. 6
What Is It ....................................................................................................... 6
What’s More: ................................................................................................. 8-9
What I Have Learned ................................................................................... 9-10
What I Can Do ............................................................................................... 11
Lesson 2:
Performing Computer Operations-Using WWW-browser to Locate Information........
What I Need to Know .................................................................................... 14
What’s New ................................................................................................. 14
What Is It ....................................................................................................... 15
What’s More .................................................................................................. 16
What Is It ....................................................................................................... 17
What I Have Learned ................................................................................... 19
What I Can Do ............................................................................................... 19
Lesson 3:
Performing Computer Operations-Computer Basic Maintenance ................................
What I Need to Know .................................................................................... 20
What’s New: ................................................................................................ 20
What Is It ....................................................................................................... 23
What I Have Learned ................................................................................... 23
What I Can Do ............................................................................................... 24

Summary ............................................................................................................................ ..25


Assessment: (Post-Test) ................................................................................................... ..26
Key to Answers ................................................................................................................... ..30
References .......................................................................................................................... . 31
What This Module is About

This module contains information and suggested learning activities on Computer


Systems Servicing. It includes training materials and activities for you to complete.

Completion of this module will help you better understand the succeeding module on
Computer Systems Servicing.

This module consists of three 3 learning outcomes. Each learning outcome contains
learning activities supported by concept notes in the What’s New section. Before you perform
the learning activities, read the What’s New section provided to ascertain to yourself and your
teacher that you have acquired the knowledge necessary to perform the skill portion of the
particular learning outcome.

Upon completion of this module, submit your portfolio to your teacher for the checking
of your achievement of knowledge and skills requirement of this module.

i
What I Need to Know

At the end of this module, the learners shall be able to apply quality standards in computer
systems servicing:
1. Transfer files and data between compatible systems using computer software,
hardware/peripheral devices in accordance with standard operating procedures TLE
2. Establish information requirements for internet search
3. Launch browser
4. Load search engine
5. Enter appropriate search criteria/or URL of site
6. Follow relevant links to locate required information
7. Bookmark useful pages and print as required
8. Implement procedures for ensuring security of data, including regular backups and
virus checks in accordance with standard operating procedures
9. Implement basic file maintenance procedures in line with the standards operating
procedures

How to Learn from this Module


To achieve the objectives cited above, you are to do the following:
• Take your time reading the lessons carefully.
• Follow the directions and/or instructions in the activities and exercises diligently.
• Answer all the given tests and exercises.

ii
Icons of this Module

What I Need to This part contains learning objectives that


Know are set for you to learn as you go along the
module.

What I know This is an assessment as to your level of


knowledge to the subject matter at hand,
meant specifically to gauge prior related
knowledge
What’s In This part connects previous lesson with that
of the current one.

What’s New An introduction of the new lesson through


various activities, before it will be presented
to you

What is It These are discussions of the activities as a


way to deepen your discovery and under-
standing of the concept.

What’s More These are follow-up activities that are in-


tended for you to practice further in order to
master the competencies.

What I Have Activities designed to process what you


Learned have learned from the lesson.

What I can do These are tasks that are designed to show-


case your skills and knowledge gained, and
applied into real-life concerns and situations.

iii
What I Know

Assessment: (Pre-Test)

Multiple Choice.

Direction: Select the best answer for each question. Write your answer on a separate sheet of
paper.

1. What is the complete name of WWW?


a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c.
Hyperlink Transfer Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different
devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is
on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above

iv
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
a. Trojan b. Worm c. Spyware d. Spam

v
Lesson Transfer Data to Other
1 Devices

What I Need to Know

After making or creating a new document and all the encoded information, designed
a cover page or edit some photo, you need to know how to transfer files from device to
another.
There are ways on how to transfer files from a certain device to another. Files need
to be kept and stored securely to prevent others from acquiring it illegally.
In this topic, you will learn what are ways on how to transfer files and data between
compatible systems using computer software, hardware/peripheral devices.

What’s New

Activity 1 – Identification
Identify five hardware or peripheral devices or software that is use to transfer data.

1. Bluetooth
2.
3.
4.
5.

Table 1. Identification of hardware or devices use to transfer data.

6
What Is It

Transfer Files and Data

There are several ways on how to transfer files and data between compatible
systems using computer software, hardware and peripherals devices. You need to know the
following:
1. Files such as documents, pictures, music and email.
2. Peripherals or hardware this is where you can transfer from one device to
another just like computer to flash disk or vice versa, cellphone to cellphone,
computer to computer and so on.

Ways to transfer Files and Data

1. Computer to computer
In this way, you will use a local connection or router either wired or wireless
connections where the computers are connected to the same network to meet
and can transfer files to each other. Some are using third party to install and use
in transferring files from each other like Zinstall Winwin. You can download the
software in this website http://www.zinstall.com/download-zinstall-winwin.

Figure 1. Transfer files from computer to computer

7
2. Computer to External storage device
Here, you need of course an external storage just like flash disk or memory
card where you can transfer files from computer to external storage or vice versa.
How to tranfer?
1. Make sure you have wire connectors if you want to transfer files from
mobile phone and external hard drive to computer and vice versa.

Figure 2. Transfer files from computer to external drives

3. Mobile Phone to Mobile Phone


In these two same devices, Bluetooth connection should be turned on in order
to transfer files from each other. Others prefer to use the ShareIt applications
because it is very fast and easy to install.

Others are preferred to use a third party software called ShareIt

Figure 3. Transfer files from Mobile Phone to Mobile

4. Computer, Cellphone, Laptop to Online Storage


You can transfer files from computers and cellphones or vice versa easily
using cloud storage services like OneDrive, Dropbox or Google drive.

8
How to transfer files?
1. When transferring files from different devices to online storage, make
sure you are connected to the internet.
2. Internet access is needed when saving and transferring files.
3. Applications are available to download and install for easy access of the
online storage.

Figure 4. Transfer files from different storage to Online storage

What’s More
Activity 2: Know Me.

In this activity, Identify the following images of the hardware/peripherals that is use to
transfer files from the computer system to other peripherals. Choose your answers from the
WORD BANK. Write your answer properly.

WORD BANK
Universal Serial Bus (USB)
External Hard Drive
Share it
Cellphones
Bluetooth

9
1. Answer: USB

2. Answer: _________

3. Answer:__________

4. Answer: _________

5. Answer: _________

Table 1. Identification of hardware/peripherals and software use to transfer files

What Is It

Activity 3 – Meet and Match

In this activity, match the given the logo of the online storage or repository where you
can store and transfer files or data from PC, cellphones or laptops immediately only when
you are connected to the internet. Draw a line to meet the logo and the word.

Google drive

icloud drive

Dropbox

OneDrive

Nextdrive

Table 2. Match the images and name of the online storage use to transfer files

10
What I Have Learned

Activity 4: Create a blog site using a www.blogger.com Website. You can watch the
video on the blogger tutorial using the link:

1. In your task today, go to the website www.blogger.com.

2. On the website, you are required to sign in your Gmail account. If you have
not created any account yet, you will first create an account by clicking the
“create new account”.

10
3. After creating the account, you are now
ready to create a blog address. In
creating a blog address, use ICT-
CSSYoursurname] (e.g ICTCSSpequiro).
Do not include spaces in between and
special characters. You may capitalize
the first letter of your surname. In case
your blog address is not available, you
may add a number or any letters to make
it unique.
4. Your blog Title is ICT-CSS because this is intended for ICT Computer System
Servicing subject only. You can create another blog address if you want to for
other purposes.

11
5. Then click if available button. If it is available, then you can proceed.
6. Choose now your template.
7. This time, create a new post.
8. Explore the other features of the blog to familiarize each of the icon
functionalities

What I Can Do

Activity 5- Create and Publish Blog Using Blogger.com


In this activity, you are going to create your first post that will be
published online. Please answer the guide questions below. Make your blog
attractive.

Blog Reflection Questions:

a. Identify five (5) different online storage where you can store and transfer
files online and describe how to transfer the data and files online. Please
be creative in creating blog.

12
b. Answer the following:
a. How do you transfer files :
i. from computer to USB?
ii. from Cellphone to laptop?
iii. From cellphone to cellphone?

Rating Criteria

Relevance and Content – 70%

Creativity - 30%

Total 100%

13
Lesson Using WWW browser to
2 locate information

What I Need to Know

In the early age, researching of information is quite hard and challenging. You need to

locate the book and the author name in order to research in the library. Today locating

information is being made easy. In just one click, you can see many options to choose from

the same topic.

This new era of technology, makes everything easy and simply but sometimes it

makes us lazier enough to understand and comprehend because we are bombarded with so

much information from the web.

In this topic, you will learn the basic function of World Wide Web browsers to locate

information

What’s New

Activity 6 – Identification of browsers

Identify five browsers that is now available in the World Wide Web. Write your

answers in the empty spaces.

1. Google Chrome

2.

3.

4.

5.

Table 3. Identification of browsers

14
What Is It

World Wide Web

Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web

in October 1990. He wrote the first web page editor/browser which is WorldWideWeb.app and

the first server which httpd. The first web page was served on the open internet by the end of

1990.

It was in the year 1993 that CERN, a European Organization for Nuclear Research,

where Sir Tim was working, to announced the global wave of creativity, collaboration and

innovation.

In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World

Wide Web Consortium (W3C), an international community devoted to developing open web

standards. He remains the Director of W3C to this day.

Parts of Web browser:

• HyperText Markup Language (HTML)

o This is the markup or format language for the web.

• Uniform Resource Identifier (URI)

o A kind of “address” that is unique and used to identify to each resource on the

web. It is also commonly called a URL.

• Hypertext Transfer Protocol (HTTP)

o Allows for the retrieval of linked resources from across the web.

15
What’s More

Activity 7: Know Me.

In this activity, Identify the owner or company of the following browser images. Choose

your answers from the WORD BANK. Write your answer properly.

WORD BANK

- Mozilla Corporation
- Pichai Sundararajan (subsidiary
Google LLC)
- Apple company
- Microsoft Company
- Norwegian company (owned by
a Chinese group)A

1. Answer: Pichai Sundararajan

(subsidiary Google LLC)

2. Answer: _________

3. Answer:__________

4. Answer: _________

6. Answer: _________

Table 4. Identification of browsers owners/company

16
What Is It

Activity 8 – Steps on Locating Information

In this activity, you will determine the steps on researching a certain topic online.

Choose from the WORD BANK the enumerated steps. Write the step number only.

WORD BANK

Step 1 - Select browser

Step 2 - Launch browser

Step 3- Load search engine

Step 4- Enter appropriate search criteria/or URL of site

Step 5 - Follow relevant links to locate required information

Step 6 - Bookmark useful pages and print as required.

INDICATE WHICH STEP SHOULD BE PERFORMED IN LOCATING INFORMATION

USING THE FOLLOWING IMAGES.

1. STEP ____

2. STEP ____

Topic “ICT”

3. STEP ____

17
4. STEP ____

5. STEP ____

Bookmarked Website

6.STEP ____

18
What I Have Learned

Activity 9 - Steps in Locating Information in World Wide Web

In this activity, enumerate the different steps in locating information in the World Wide

Web. Write your answers.

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Table 5. Steps in locating information in WWW

What I Can Do

Activity 10- Locate Information using World Wide Web-browser

In this activity, you will locate the information using any browsers with the
topic “What is ICT?”. Answer the following questions.

1. What browser did you use in locating the information? Ans. ______________.
2. What website location did you click? Ans. ________________
3. What copyright year or name of the website? Ans. _____________
4. How did you bookmark the located link of information? Enumerate the two steps
you’ve done.
a. Step 1: ___________________
b. Step 2: ___________________
5. After bookmarking the website, where will you see the bookmarked website?
6. What is the purpose of bookmarking a certain website? State in maximum of 2
sentences only. Answer. __________________________________
__________________________________________________________

19
Lesson
Basic Computer Maintenance
3

What I Need to Know

Activity 11. Investigate and Interpret: Computer Systems Check.

In this worksheet, you will check and write down the current status of your computer
systems before the updates and after the updates with regard to the different area listed
below.

AREA STATUS (Before STATUS (After Updates)


Updates)

Security

1. Anti-
Spyware
Programs

2. Anti-Virus

Maintenance

1. System
Maintenance

What’s New

Maintenance of Computer System

Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5) years.
But little did you discover that some six months down the road, your computer is
behaving like a Pentium computer, perpetually flustering you with its choppy images,
frustrating pop-ups and tremendously slow disk access. Gradually, your computer
crashes and all your data is lost on one fine afternoon.

20
One thing you have probably missed out is the need for system maintenance. The basic
routine maintenance comprises of the 3 basic processes.
3 Basic Processes
1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance

Data Backup

Backing up basically means creating a redundant copy of a data so that in case


anything happens to the original data, you have a spare copy. This is typically a
simple thing to do.

What data should I back up?

In general, you should back up any work or data that cannot be replaced easily.
Some examples are word processing documents, spreadsheets, databases (for financial
data), customer data, and personal files such as pictures, music files, emails, etc.

As a rule of thumb, do not backup programs or system folders. Programs will need
to be reinstalled before you can run them and system folders can be restored from your
operating system install disc. Be sure to save program installation discs, operating system
discs, and registration information in a safe place. If you have downloaded any of your
applications, you should save the install files whenever possible.

Malware Maintenance

Malware refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an undesirable
manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and
many more. When you are infected, you can lose your privacy, confidential data, and
access to your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from malware.

21
One thing you can do to scan the file for any virus infection before you attempt to
open it. If the scan shows nothing, it is probably a safe file. But then again, it may be a
new virus yet to be updated in your virus scan. You can either wait and apply the next
virus signature update and perform a second scan or risk it all and open the file.

Disk Maintenance
Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and efficient
your software applications are running. But gradually, it slows down and this bothers
you. What truly causes the decline in performance? You may argue that your disk is just
a couple of months old. This has much to do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets.
Initially, the bucket only contains a few spanners, a hammer and some screws.
So every time you search for a particular item, it is relatively easy to find. But soon as
you keep filling the bucket with all sorts of items and especially when the amount of
items grows, you will discover that you may need more time just to search for a
particular screw head. In such cases, uninstall any unnecessary software and
defragment your disk. Typically, your system performance will decline when the amount
of data in your hard disk starts to grow.

22
What Is It

Activity 12. Identify the Malware Maintenance

In this activity, identify the four types of Malware. Write your answer on a
piece of paper.

1. worms____________________ 3. ___________________________
2. _________________________ 4. ___________________________
5.________________________

What I have Learned

Activity 13. Essay Writing Activity


Write an essay about the importance of Data Backup. Relate your statements to
the most treasured skills you acquired in the lesson. Give also your own title for the
essay (minimum of 400 words).

Rating Criteria - Rubrics

CONTENTS Excellent Good (2) Poor


(3) (1)
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but one
with uppercase letters.
Punctuation Correct ending punctuation in
every sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing and
alignment
Total Points

23
What I Can Do

Activity 14. Perform Disk Maintenance

In this activity, you will determine the step number on how to perform computer disk
maintenance. Given the enumerated steps, write which step number and the complete
description of the steps or procedure on a piece of paper.

STEP # DESCRIPTIONS
At the Drives list, select which drive you want to run Disk Cleanup on
1 Type Disk Cleanup in the Search Bar
Select which files you want to delete
To delete system files that are no longer needed on your computer, click Clean
up system files.
Click Delete files

24
SUMMARY

1. Bluetooth is a wireless technology that allows the exchange of data between different
devices. However it is only on a short distance for the devices to stay connected.
2. Online Storage it is a cloud storage of the files and data especially for back up
purposes. It is for free. Most of the websites allowed limited storage only.
3. External Storage devices come in many forms, both removable and non-
removable. It includes flash drive, floppy disk, hard drive or compact drive.
4. World Wide Web is called as WEB. It is an information system on the Internet which
allows documents or pages to be connected to other documents using hypertext links,
which enable the user to search for information or data by moving from one document to
another.
5. HyperText Markup Language (HTML). This is the markup (formatting) language for the
web.
6. Uniform Resource Identifier (URI). A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.
7. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linked resources from
across the web.
8. Tim Berners-Lee. A British computer scientist and He invented the World Wide Web in
October 1990.
9. Malware refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
10. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's hard drive.
11. Back up It means creating a redundant copy of a data so that in case anything
happens to the original data, you have a spare copy

25
Assessment: (Post-Test)

Multiple Choice

Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.
1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c. Hyperlink Transfer
Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
26
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
b. Trojan b. Worm c. Spyware d. Spam

27
28
26. Universal Serial Bus
(USB)
27. External Hard Drive
28. Share it
29. Cellphones
30. Bluetooth
Activity 2. Identification of hardware/peripherals and software use to transfer files
21. Universal Serial Bus
(USB)
22. External Hard Drive
23. Share it
24. Cellphones
25. Bluetooth
Activity 1. Identification of hardware or devices use to transfer data.(in any order)
1. C
2. B
3. A
4. B
5. A
6. A
7. C
8. A
9. A
10. A
11. C
12. A
13. C
14. D
15. B
16. A
17. A
18. B
19. A
20. C
Pre-test and Post Test
Answer Key
29
1. Step 1
2. Step 2
3. Step 4
4. Step 3
5. Step 6
6. Step 5
Activity 8 – Steps on Locating Information
1. Pichai Sundararajan
(subsidiary Google LLC)
2. Norwegian
company (owned by
a Chinese group)
3. Apple Company
4. Microsoft Company
5. Mozilla Corporation
Activity 7: Know Me.
6. Next drive
7. Onedrive
8. Dropbox
9. Icloud
10. Google drive
Activity 6 – Identification of browsers (I any order)
1. Next drive
2. Onedrive
3. Dropbox
4. Icloud
5. Google drive
Activity 3 – Meet and Match
30
1. Worms
2. Trojan viruses
3. Spyware
4. Adware
5. Ransomware
Activity 12. Identify the Malware Maintenance
Step 1 - Select browser
Step 2 - Launch browser
Step 3- Load search engine
Step 4- Enter appropriate search
criteria/or URL of site
Step 5 - Follow relevant links to lo
cate required information
Step 6 - Bookmark useful pages and
print as required.
Activity 9 - Steps in Locating Information in World Wide Web
References

Websites:

Paul Goodman 2019 https://turbofuture.com/computers/Computer-Basics-10-Examples-of-


Output-Devices

© 2020 CBS Interactive. https://www.zdnet.com/article/best-cloud-storage-services/

©2008-2020 World Wide Web Foundation. This work is licensed under a Creative Commons
Attribution 4.0 International Licence https://webfoundation.org/about/vision/history-of-the-
web/

https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-
malware.html#:~:text=Malware%20is%20a%20contraction%20for,spyware%2C%20adware
%2C%20and%20ransomware.

https://neosmart.net/wiki/disk-cleanup/

https://en.wikipedia.org/wiki/Disk_Cleanup

e-chsmodules,

www.coursehero.com,

deped.gov.ph/ComputerSystemServicing module

12
For inquiries and feedback, please write or call:

Department of Education – Division of Cagayan de Oro City


Fr. William F. Masterson Ave Upper Balulang Cagayan de Oro
Telefax: ((08822)855-0048
E-mail Address: cagayandeoro.city@deped.gov.ph

You might also like