Professional Documents
Culture Documents
Computer Systems
Servicing
Quarter 1 - Module 3
Performing Computer Operations
PART 3
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Management Team
Chairperson: Cherry Mae L. Limbaco, PhD, CESO V
Schools Division Superintendent
Computer
Systems
Servicing NC II
Quarter 1 - Module 3
Performing Computer Operations – Part 3
Lesson 1:
Performing Computer Operations-Transfer Files to Other Devices .............................
What I Need to Know .................................................................................... 6
What’s New …. ............................................................................................. 6
What Is It ....................................................................................................... 6
What’s More: ................................................................................................. 8-9
What I Have Learned ................................................................................... 9-10
What I Can Do ............................................................................................... 11
Lesson 2:
Performing Computer Operations-Using WWW-browser to Locate Information........
What I Need to Know .................................................................................... 14
What’s New ................................................................................................. 14
What Is It ....................................................................................................... 15
What’s More .................................................................................................. 16
What Is It ....................................................................................................... 17
What I Have Learned ................................................................................... 19
What I Can Do ............................................................................................... 19
Lesson 3:
Performing Computer Operations-Computer Basic Maintenance ................................
What I Need to Know .................................................................................... 20
What’s New: ................................................................................................ 20
What Is It ....................................................................................................... 23
What I Have Learned ................................................................................... 23
What I Can Do ............................................................................................... 24
Completion of this module will help you better understand the succeeding module on
Computer Systems Servicing.
This module consists of three 3 learning outcomes. Each learning outcome contains
learning activities supported by concept notes in the What’s New section. Before you perform
the learning activities, read the What’s New section provided to ascertain to yourself and your
teacher that you have acquired the knowledge necessary to perform the skill portion of the
particular learning outcome.
Upon completion of this module, submit your portfolio to your teacher for the checking
of your achievement of knowledge and skills requirement of this module.
i
What I Need to Know
At the end of this module, the learners shall be able to apply quality standards in computer
systems servicing:
1. Transfer files and data between compatible systems using computer software,
hardware/peripheral devices in accordance with standard operating procedures TLE
2. Establish information requirements for internet search
3. Launch browser
4. Load search engine
5. Enter appropriate search criteria/or URL of site
6. Follow relevant links to locate required information
7. Bookmark useful pages and print as required
8. Implement procedures for ensuring security of data, including regular backups and
virus checks in accordance with standard operating procedures
9. Implement basic file maintenance procedures in line with the standards operating
procedures
ii
Icons of this Module
iii
What I Know
Assessment: (Pre-Test)
Multiple Choice.
Direction: Select the best answer for each question. Write your answer on a separate sheet of
paper.
iv
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
a. Trojan b. Worm c. Spyware d. Spam
v
Lesson Transfer Data to Other
1 Devices
After making or creating a new document and all the encoded information, designed
a cover page or edit some photo, you need to know how to transfer files from device to
another.
There are ways on how to transfer files from a certain device to another. Files need
to be kept and stored securely to prevent others from acquiring it illegally.
In this topic, you will learn what are ways on how to transfer files and data between
compatible systems using computer software, hardware/peripheral devices.
What’s New
Activity 1 – Identification
Identify five hardware or peripheral devices or software that is use to transfer data.
1. Bluetooth
2.
3.
4.
5.
6
What Is It
There are several ways on how to transfer files and data between compatible
systems using computer software, hardware and peripherals devices. You need to know the
following:
1. Files such as documents, pictures, music and email.
2. Peripherals or hardware this is where you can transfer from one device to
another just like computer to flash disk or vice versa, cellphone to cellphone,
computer to computer and so on.
1. Computer to computer
In this way, you will use a local connection or router either wired or wireless
connections where the computers are connected to the same network to meet
and can transfer files to each other. Some are using third party to install and use
in transferring files from each other like Zinstall Winwin. You can download the
software in this website http://www.zinstall.com/download-zinstall-winwin.
7
2. Computer to External storage device
Here, you need of course an external storage just like flash disk or memory
card where you can transfer files from computer to external storage or vice versa.
How to tranfer?
1. Make sure you have wire connectors if you want to transfer files from
mobile phone and external hard drive to computer and vice versa.
8
How to transfer files?
1. When transferring files from different devices to online storage, make
sure you are connected to the internet.
2. Internet access is needed when saving and transferring files.
3. Applications are available to download and install for easy access of the
online storage.
What’s More
Activity 2: Know Me.
In this activity, Identify the following images of the hardware/peripherals that is use to
transfer files from the computer system to other peripherals. Choose your answers from the
WORD BANK. Write your answer properly.
WORD BANK
Universal Serial Bus (USB)
External Hard Drive
Share it
Cellphones
Bluetooth
9
1. Answer: USB
2. Answer: _________
3. Answer:__________
4. Answer: _________
5. Answer: _________
What Is It
In this activity, match the given the logo of the online storage or repository where you
can store and transfer files or data from PC, cellphones or laptops immediately only when
you are connected to the internet. Draw a line to meet the logo and the word.
Google drive
icloud drive
Dropbox
OneDrive
Nextdrive
Table 2. Match the images and name of the online storage use to transfer files
10
What I Have Learned
Activity 4: Create a blog site using a www.blogger.com Website. You can watch the
video on the blogger tutorial using the link:
2. On the website, you are required to sign in your Gmail account. If you have
not created any account yet, you will first create an account by clicking the
“create new account”.
10
3. After creating the account, you are now
ready to create a blog address. In
creating a blog address, use ICT-
CSSYoursurname] (e.g ICTCSSpequiro).
Do not include spaces in between and
special characters. You may capitalize
the first letter of your surname. In case
your blog address is not available, you
may add a number or any letters to make
it unique.
4. Your blog Title is ICT-CSS because this is intended for ICT Computer System
Servicing subject only. You can create another blog address if you want to for
other purposes.
11
5. Then click if available button. If it is available, then you can proceed.
6. Choose now your template.
7. This time, create a new post.
8. Explore the other features of the blog to familiarize each of the icon
functionalities
What I Can Do
a. Identify five (5) different online storage where you can store and transfer
files online and describe how to transfer the data and files online. Please
be creative in creating blog.
12
b. Answer the following:
a. How do you transfer files :
i. from computer to USB?
ii. from Cellphone to laptop?
iii. From cellphone to cellphone?
Rating Criteria
Creativity - 30%
Total 100%
13
Lesson Using WWW browser to
2 locate information
In the early age, researching of information is quite hard and challenging. You need to
locate the book and the author name in order to research in the library. Today locating
information is being made easy. In just one click, you can see many options to choose from
This new era of technology, makes everything easy and simply but sometimes it
makes us lazier enough to understand and comprehend because we are bombarded with so
In this topic, you will learn the basic function of World Wide Web browsers to locate
information
What’s New
Identify five browsers that is now available in the World Wide Web. Write your
1. Google Chrome
2.
3.
4.
5.
14
What Is It
Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web
in October 1990. He wrote the first web page editor/browser which is WorldWideWeb.app and
the first server which httpd. The first web page was served on the open internet by the end of
1990.
It was in the year 1993 that CERN, a European Organization for Nuclear Research,
where Sir Tim was working, to announced the global wave of creativity, collaboration and
innovation.
In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World
Wide Web Consortium (W3C), an international community devoted to developing open web
o A kind of “address” that is unique and used to identify to each resource on the
o Allows for the retrieval of linked resources from across the web.
15
What’s More
In this activity, Identify the owner or company of the following browser images. Choose
your answers from the WORD BANK. Write your answer properly.
WORD BANK
- Mozilla Corporation
- Pichai Sundararajan (subsidiary
Google LLC)
- Apple company
- Microsoft Company
- Norwegian company (owned by
a Chinese group)A
2. Answer: _________
3. Answer:__________
4. Answer: _________
6. Answer: _________
16
What Is It
In this activity, you will determine the steps on researching a certain topic online.
Choose from the WORD BANK the enumerated steps. Write the step number only.
WORD BANK
1. STEP ____
2. STEP ____
Topic “ICT”
3. STEP ____
17
4. STEP ____
5. STEP ____
Bookmarked Website
6.STEP ____
18
What I Have Learned
In this activity, enumerate the different steps in locating information in the World Wide
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
What I Can Do
In this activity, you will locate the information using any browsers with the
topic “What is ICT?”. Answer the following questions.
1. What browser did you use in locating the information? Ans. ______________.
2. What website location did you click? Ans. ________________
3. What copyright year or name of the website? Ans. _____________
4. How did you bookmark the located link of information? Enumerate the two steps
you’ve done.
a. Step 1: ___________________
b. Step 2: ___________________
5. After bookmarking the website, where will you see the bookmarked website?
6. What is the purpose of bookmarking a certain website? State in maximum of 2
sentences only. Answer. __________________________________
__________________________________________________________
19
Lesson
Basic Computer Maintenance
3
In this worksheet, you will check and write down the current status of your computer
systems before the updates and after the updates with regard to the different area listed
below.
Security
1. Anti-
Spyware
Programs
2. Anti-Virus
Maintenance
1. System
Maintenance
What’s New
Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5) years.
But little did you discover that some six months down the road, your computer is
behaving like a Pentium computer, perpetually flustering you with its choppy images,
frustrating pop-ups and tremendously slow disk access. Gradually, your computer
crashes and all your data is lost on one fine afternoon.
20
One thing you have probably missed out is the need for system maintenance. The basic
routine maintenance comprises of the 3 basic processes.
3 Basic Processes
1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
Data Backup
In general, you should back up any work or data that cannot be replaced easily.
Some examples are word processing documents, spreadsheets, databases (for financial
data), customer data, and personal files such as pictures, music files, emails, etc.
As a rule of thumb, do not backup programs or system folders. Programs will need
to be reinstalled before you can run them and system folders can be restored from your
operating system install disc. Be sure to save program installation discs, operating system
discs, and registration information in a safe place. If you have downloaded any of your
applications, you should save the install files whenever possible.
Malware Maintenance
Malware refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an undesirable
manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and
many more. When you are infected, you can lose your privacy, confidential data, and
access to your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from malware.
21
One thing you can do to scan the file for any virus infection before you attempt to
open it. If the scan shows nothing, it is probably a safe file. But then again, it may be a
new virus yet to be updated in your virus scan. You can either wait and apply the next
virus signature update and perform a second scan or risk it all and open the file.
Disk Maintenance
Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and efficient
your software applications are running. But gradually, it slows down and this bothers
you. What truly causes the decline in performance? You may argue that your disk is just
a couple of months old. This has much to do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets.
Initially, the bucket only contains a few spanners, a hammer and some screws.
So every time you search for a particular item, it is relatively easy to find. But soon as
you keep filling the bucket with all sorts of items and especially when the amount of
items grows, you will discover that you may need more time just to search for a
particular screw head. In such cases, uninstall any unnecessary software and
defragment your disk. Typically, your system performance will decline when the amount
of data in your hard disk starts to grow.
22
What Is It
In this activity, identify the four types of Malware. Write your answer on a
piece of paper.
1. worms____________________ 3. ___________________________
2. _________________________ 4. ___________________________
5.________________________
23
What I Can Do
In this activity, you will determine the step number on how to perform computer disk
maintenance. Given the enumerated steps, write which step number and the complete
description of the steps or procedure on a piece of paper.
STEP # DESCRIPTIONS
At the Drives list, select which drive you want to run Disk Cleanup on
1 Type Disk Cleanup in the Search Bar
Select which files you want to delete
To delete system files that are no longer needed on your computer, click Clean
up system files.
Click Delete files
24
SUMMARY
1. Bluetooth is a wireless technology that allows the exchange of data between different
devices. However it is only on a short distance for the devices to stay connected.
2. Online Storage it is a cloud storage of the files and data especially for back up
purposes. It is for free. Most of the websites allowed limited storage only.
3. External Storage devices come in many forms, both removable and non-
removable. It includes flash drive, floppy disk, hard drive or compact drive.
4. World Wide Web is called as WEB. It is an information system on the Internet which
allows documents or pages to be connected to other documents using hypertext links,
which enable the user to search for information or data by moving from one document to
another.
5. HyperText Markup Language (HTML). This is the markup (formatting) language for the
web.
6. Uniform Resource Identifier (URI). A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.
7. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linked resources from
across the web.
8. Tim Berners-Lee. A British computer scientist and He invented the World Wide Web in
October 1990.
9. Malware refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
10. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's hard drive.
11. Back up It means creating a redundant copy of a data so that in case anything
happens to the original data, you have a spare copy
25
Assessment: (Post-Test)
Multiple Choice
Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.
1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c. Hyperlink Transfer
Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
26
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
b. Trojan b. Worm c. Spyware d. Spam
27
28
26. Universal Serial Bus
(USB)
27. External Hard Drive
28. Share it
29. Cellphones
30. Bluetooth
Activity 2. Identification of hardware/peripherals and software use to transfer files
21. Universal Serial Bus
(USB)
22. External Hard Drive
23. Share it
24. Cellphones
25. Bluetooth
Activity 1. Identification of hardware or devices use to transfer data.(in any order)
1. C
2. B
3. A
4. B
5. A
6. A
7. C
8. A
9. A
10. A
11. C
12. A
13. C
14. D
15. B
16. A
17. A
18. B
19. A
20. C
Pre-test and Post Test
Answer Key
29
1. Step 1
2. Step 2
3. Step 4
4. Step 3
5. Step 6
6. Step 5
Activity 8 – Steps on Locating Information
1. Pichai Sundararajan
(subsidiary Google LLC)
2. Norwegian
company (owned by
a Chinese group)
3. Apple Company
4. Microsoft Company
5. Mozilla Corporation
Activity 7: Know Me.
6. Next drive
7. Onedrive
8. Dropbox
9. Icloud
10. Google drive
Activity 6 – Identification of browsers (I any order)
1. Next drive
2. Onedrive
3. Dropbox
4. Icloud
5. Google drive
Activity 3 – Meet and Match
30
1. Worms
2. Trojan viruses
3. Spyware
4. Adware
5. Ransomware
Activity 12. Identify the Malware Maintenance
Step 1 - Select browser
Step 2 - Launch browser
Step 3- Load search engine
Step 4- Enter appropriate search
criteria/or URL of site
Step 5 - Follow relevant links to lo
cate required information
Step 6 - Bookmark useful pages and
print as required.
Activity 9 - Steps in Locating Information in World Wide Web
References
Websites:
©2008-2020 World Wide Web Foundation. This work is licensed under a Creative Commons
Attribution 4.0 International Licence https://webfoundation.org/about/vision/history-of-the-
web/
https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-
malware.html#:~:text=Malware%20is%20a%20contraction%20for,spyware%2C%20adware
%2C%20and%20ransomware.
https://neosmart.net/wiki/disk-cleanup/
https://en.wikipedia.org/wiki/Disk_Cleanup
e-chsmodules,
www.coursehero.com,
deped.gov.ph/ComputerSystemServicing module
12
For inquiries and feedback, please write or call: