Professional Documents
Culture Documents
STE - ICT
Computer Programming
(Java) NC III
Quarter 1 - Module 4:
Perform Computer Operations:
Maintain Computer Equipment
Computer Programming (Java) NC III
Self-Learning Module
Quarter 1 - Module 6: PERFORM COMPUTER OPERATIONS
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials
from their respective copyright owners. The publisher and authors do not represent
nor claim ownership over them.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
ii
For the learner:
Welcome to the Computer Programming (Java) NC III specialization of
TLE for Grade 9 – 12 Self-Learning Module on Perform Computer
Operations: Maintain Computer Equipment.
The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.
This module has the following parts and corresponding icons:
iii
exercises using the Answer Key at the
end of the module.
1. use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises;
2. don’t forget to answer What I Know before moving on to the other activities
included in the module;
3. read the instruction carefully before doing each task;
4. observe honesty and integrity in doing the tasks and checking your answers;
5. finish the task at hand before proceeding to the next;
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
iv
What I Need to Know
This module was designed and written with you in mind. It is here to help you
to plan a task to ensure that operational health and safety guidelines and procedures
are followed. The scope of this module permits it to be used in different learning
situations. The language used recognizes the diverse vocabulary level of students.
The lessons are arranged to follow the standard sequence of the course. But the order
in which you read them can be changed to correspond with the textbook you arenow
using.
Multiple Choice. Choose the letter of the best answer. Write your answer on a
separate sheet of paper.
1. It refers to an ethical computer hacker.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker
7. This type of antivirus software can scan each file on the computer’s hardware
and memory and compare the entire file.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection
2
9. It provides real-time protection, just like most antivirus software does.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection
11. It is a physical device on which you can store files and folders.
A. Computer C. Folder
B. File D. Storage Media
13. It is a program that is loaded onto your computer without your knowledge and
runs against your wishes.
A. Malware C. Virus
B. Trojan d. Worm
14. It is a malware that can autonomously spread itself without a carrier, using
information about connected computers.
A. Malware C. Virus
B. Trojan D. Worm
Lesson
Maintain Computer
1 Equipment
Maintenance of computer equipment is necessary for the productivity of data
and information. Implementing the procedures for ensuring the security of data is
important. regular back-ups and virus checks are one of the examples of
maintaining computer equipment. In this case, data loss and information hacking
may be avoided. File maintenance may also be used to organize data and
information.
3
What's In
Write at least 10 words that you can connect to the word MALWARE.
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
What's New
Name me!
Direction: Give the name of the antivirus software below
1. 2. 3.
4. 5.
4
What is It
CYBERSECURITY
What is cybersecurity?
The term cybersecurity is used to refer to the security offered through online
services to protect your information online.
Cyber Security and Information Security differs only in its response and
reduction/prevention.
Cyber security encompasses all aspects of security viz., physical, technical,
environmental, regulations and compliance including third parties involved in
delivering an objective.
With an increase amount of people getting connected to Internet, the security
threats that causes massive harm are increasing also.
(https://www.slideshare.net/BettyelChristopher/key-uses-of-entity-and-user-
behaviour-analytics-euba?next_slideshow=1)
Why cybersecurity is important?
Our world today is ruled by technology and we can’t do without it at all. From
booking our flight tickets, to catching up with an old friend, technology plays
an important role in it.
However, the same technology may expose you when it’s vulnerable and could
lead to loss of essential data. Cybersecurity, alongside physical commercial
security has thus, slowly and steadily, become one of the most important
topics in the business industry to be talked about.
Cybersecurity is necessary since it helps in securing data from threats such
as data theft or misuse, also safeguards your system from viruses.
(https://www.slideshare.net/amdadam5/cyber-security-importance-of-cyber-
security)
Cybersecurity Objectives
1. Confidentiality
Refers to protecting information from being accessed by unauthorized
parties. In other words, only the people who are authorized to do so can
gain access to sensitive data.
A failure to maintain confidentiality means that someone who shouldn’t
have access has managed to get it, through intentional behavior or by
accident. Such a failure of confidentiality, commonly known as breach.
2. Integrity
Refers to ensuring the authenticity of information – that information is not
altered, and that the source of the information is genuine.
5
Imagine that you have a website and you sell products on that site. Now
imagine that an attacker can shop on your website and maliciously alter
the prices of your products, so that they can buy anything for whatever
price they choose. That would be a failure of integrity, because of your
information – in this case, the price of a product – has been altered and you
didn’t authorize this alteration.
3. Availability
Means that information is accessible by authorized users.
Information and other critical assets are accessible to customers and the
business when needed. Note, information is unavailable not only when it is
lost or destroyed, but also when access to the information is denied or
delayed.
Cyber Attacks
A malicious attempt, using digital technologies, to cause personal or property
loss or damage, and/or steal or alter confidential personal or organizational
data.
Major Security Problems
1. Virus and Worms
Malware attached to a carrier such as an email message or a word processing
document.
A virus is a program that is loaded onto your computer without your
knowledge and runs against your wishes.
A worm is a malware can autonomously spread itself without a carrier, using
information about connected computers.
2. Hackers
A hacker is a person who breaks into computers, usually by gaining access to
administrative controls.
Types of Hackers
a. White Hat Hacker – the term “white hat” in Internet slang refers to an
ethical computer hacker, or a computer security expert, who specializes
in penetration testing and in other testing methodologies to ensure the
security of an organization’s information systems.
b. Grey Hat Hacker – the term “grey hat”, “greyhat” or “gray hat” refers to
a computer hacker or computer security expert who may sometimes
violate laws or typical ethical standards, but does not have the
malicious intent typical of a black hat hacker.
c. Black Hat Hacker – is a hacker who “violates computer security for little
reason beyond maliciousness or for personal gain”.
6
How to prevent hacking?
It may be impossible to prevent computer hacking, however effective security
controls including strong passwords, and the use of firewalls can help.
3. Malware
The word “malware” comes from the term “malicious software”.
Software that has some malicious intent and which is installed on a user’s
computer without that user’s consent.
Keyloggers – software installed on a computer that captures keystrokes and
sends these to a remote system. Used to try and get personal information to
gain access to sites such as banks.
Ransomware – software that runs on a user’s computer and demands that the
user pays some other organization. If they don’t, the information on their
computer will be destroyed.
Malware can usually spread itself from one computer to another either as a
virus or a worm.
4. Trojan Horses
These are email viruses that can duplicate themselves, steal information, or
harm the computer system.
These viruses are the most serious threats to computers.
5. Password Cracking
Password attacks are attacks by hackers that are able to determine passwords
or find passwords to different protected electronic areas and social network
sites.
(https://www.slideshare.net/AliciaNoval/top-10-types-of-cyber-security-threats-
167050748)
7
ANTIVIRUSE SOFTWARE/PROGRAMS
Antivirus
Antivirus or antivirus software, sometimes known as anti-malware software,
is a computer software used to prevent, detect and remove malicious software.
Antivirus software was originally developed to detect and remove computer
viruses.
In particular, modern antivirus software can protect from: malicious browser
helper (BHOs), browser hijackers, ransomware, keylogger, backdoors,
rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware
and spyware.
Some products also include protection from other computer threats, such as
infected and malicious URLs, spam, scam, and phishing attacks, online
identity (privacy), online banking attacks, social engineering techniques,
advanced persistent threats (APT), and botnet DDoS attacks.
(https://www.slideshare.net/faisal319/antivirus-10701219)
History
In the early 1980s, Internet security was practically nonexistent. No large-
scale attacks had ever been attempted, and networked-based vulnerabilities
were rarely, if ever, exploited.
This changed in the late 1980s with the Morris Worm, the first known large-
scale attack propagated via the Internet.
Today, spyware, viruses, trojan attacks, worms, and malware are all common
occurrences affecting nearly every computer user at least once.
Antivirus Types
Firewall Software – analyzes incoming and outgoing data packets on a
network; that is, all the information sent and received through the computer’s
network connection.
Network Layer Firewalls – are called packet filters. These firewalls are the
simplest of firewalls, and only allow information packets to pass through the
firewall if the packet matches the specific set of rules.
Proxy Servers – acts as a firewall in that they inspect incoming packets for
specific applications and block all other requests.
Application Layer Firewalls – these firewalls inspect all packets for specific
protocols, such as FTP and browser traffic.
8
Real Time Protection – most antivirus software provides real-time protection,
often under any number of clever synonyms such as resident shields,
background guard, auto protect, and so on.
Antispyware – software provides real-time protection, just like most antivirus
software does. Additionally, just like most antivirus software, antispyware
software relies on up to date spyware signature definition files to work
properly.
Examples of Antivirus
Adaware
McAfee
Kaspersky
AVG
Norton
Avira
ESET Nod32
Bit Defender
Microsoft Security Essentials
Windows Defender
(https://www.slideshare.net/mohammadsohaibafzaal/anti-virus-70356199)
FILE MANAGEMENT
1. File
Any information in a computer is stored in a file. Computers store information
as files or disks, just as office staff store files in a filing cabinet. Programs as well as
documents are stored as files.
9
Naming Convention
File names consist of primary name and an extension separated by a dot (e.g.
exam.docx). The extension, like the icon, indicates the type of the file. For example,
the extension ‘.doc’ indicates that the file was created using Microsoft Word. Please
follow the common rules for naming your file.
Naming Convention
A folder usually has only a primary file name (e.g. Teaching). Please follow the
common rules of naming your folder.
3. Storage Media
A storage media (i.e. hard disk, floppy disk, CD-ROM, etc.) is a physical device
on which you can store files and folders. It is the top container in a computer.
Naming Convention
Besides a label name, each storage media installed in your computer is
identified by a letter followed by a colon ( : ) sign:”
The floppy drive is usually allocated at letter A – A:
Sometimes, a second floppy drive is present and the letter B is allocated to it
– B:
The hard drive is usually allocated the letter C – C:
Sometimes, a computer can have more than one hard drive or the hard drive
can be divided in 2 partitions. Hence, this new drive would get the letter D –
D:
The CD-ROM drive usually gets the first unused letter. E for example – E:
Any removable media like ZIP drive or external USB hard disk get the next
available letter. F for example – F:
4. Computer
All the instructions have more than one computer hence, it is also useful to
be able to identify which computer your data is stored on. For instance: the
“secretary’s computer or” the second computer on the left-hand side of the computer
center”.
10
This becomes even more important when computers are connected together
in a local area network (LAN) because you will be then able to access your documents
from any computer. So, at the top level of hierarchy you will need to identify the
computer where they are stored using the proper computer convention for network
access.
Naming Convention
When a computer is connected to network it is given a unique name (you can’t
choose it, this is given by the technician who installed the network).
If you don’t know the name of your computer, follow this procedure:
a. Right-click on “My Computer” icon
b. Click on “Properties”
c. Select the tab “Computer Name” (for Windows XP) or “Network Identification”
d. The name of the computer is displayed
When accessing a computer from the network, you have to start by a double
backslash: \\. For example: \\NETPUNE.
Naming Rules:
In a folder, and folder names must be unique
File and folder names can be a maximum of 255 characters
Spaces and dots are allowed
* | <> ? / \ “ : are not allowed
File and folder names are not case-sensitive
Locating Information
The main reason for file management is so that you can locate files and
information easily. Each file is stored in a specific location on the computer. To locate
a file, you need to know its path, also called location or address.
On a standalone computer, a file path is composed by: a letter representing
the storage media, the names of the folders you have to go through and the name of
the file. Each field is separated by a backslash ‘\’.
Example: D:\Tezerra\Training Materials\Windows\Coursel.doc
On a networked computer: A file path starts with a computer name, then the
name of the network folder, the names of the folder you have to go through and the
name of the file. Each field is separated by a backslash ‘\’.
Example: \\NEPTUNE\D\Tezerra\Training_Materials\Windows\Coursel.doc
11
Importance of File Management
Always keep in mind the main reason why you are using a computer:
Ability to store: a computer can store an incredible amount of information in
a very limited space.
Ability to reuse: at any time, you can reuse an old piece of information and
correct it or amend it and make a new document very quick.
Ability to share: it is very easy to exchange information stored on a computer,
especially through a network or the Internet.
Right Pane:
Folder
Left Pane: Hierarchy
Folder
Hierarchy
12
Left Pane – this pane displays the tree structure of the disks and the folders
stored on a computer starting from the desktop
Right Pane – this pane shows the folder contents that is selected in the left
pane; all the files and subfolders. The right pane is divided into columns that
provide various details about the files and subfolders in a folder
13
Selecting files and folders
Windows explorer allows you to perform various operations on a file. To
perform any operation on one or many files, you first need to select them.
Select all
To select all the files and subfolders of the folder currently displayed:
1. Open the Edit Menu by clicking on the menu bar
2. Click ‘Select All”
Deselecting files
To deselect files that have been selected, click any blank area in the right pane.
Creating folders
By creating folders, you can store all the files that contain similar information
in the same folder and organize the data on your disk in order to retrieve them easily.
To create a new folder, with Windows/File Explorer:
1. Select the place you want to put the new folder by selecting the relevant disk
or folder in the left pane.
2. Open the File Menu by clicking File on the menu bar.
14
3. Point or click to New (This will display a submenu with a choice of objects to
create).
4. Click Folder (A new folder called New Folder is displayed in the left pane. Note
that there is a box around the name, which is highlighted, and the cursor is
positioned at the end of it).
5. Type a new name and press enter.
When you change a file name, its primary name changes while the extension
remains the same.
15
6. Click Paste (the selected file appears on the right pane)
16
Deleting files
Files that are not required any longer should be removed from the disk.
Removing files frees valuable disk space.
1. Select the files and folders to delete
2. Open the File menu by clicking File in the menu
3. Click Delete
Alternatively, once the selection is made, you can press the Delete key on the
keyboard.
17
The restored files are then moved back to their original location and can be
found in their original folder, even if that folder had been deleted.
Alternatively, once the selection is made, you can drag the selection from the
Recycle Bin and drop it any other location.
A confirmation dialog box will appear. From here, you can click Yes to
complete the action or No to cancel it.
Note that once files are deleted from the Recycle Bin, they can no longer be recovered
by Windows.
(https://www.slideshare.net/AbenezerAbiti/file-management-128262936)
What's More
Activity 1 ESSAY
Direction: Answer the following questions. Write your answers on your activity
sheet.
Activity 2
Direction: Solve the following problems given below by providing the steps to solve
the problem. Write your answers on your activity sheet.
1. I am navigating my files in my folder stored on Local Drive C: Accidentally, I
deleted one of my important files. What should I do?
18
2. My local disk drive is at risk of going out of storage. What should I do to free up
space on my local disk drive?
3. I was creating my presentation for tomorrow’s conference. Unfortunately, I saved
it in the wrong folder. What will I do to copy it in the right folder?
4. Write the path of the file:
a. File name: comprog.xls
b. Main Folder name: TLE
c. Subfolder name: Grade 10
d. Folder inside the subfolder: Computer Programming
e. Location: Desktop
f. Local Drive: C:
5. I have created a file on the Desktop but I entered an incorrect spelling for the
name of my file. What should I do to correct the name of the file?
Web browsers allow a user to quickly and easily access information provided
on many web pages at many websites by traversing these links.
The first web browser was invented in 1990 by Sir Tim Berners-Lee.
URL stands for Uniform Resource Locator, more commonly known as
commonly known as web address.
The address of every resource or file on the Internet has a Uniform Resource
Locator, including an address of a web page, audio stream or other Internet
resources.
URL’s consists of protocol of the resources, domain name for the resource and
address of the file.
A web search engine is a software system that is designed to search for
information on the World Wide Web.
Search engine uses keywords to search for documents that relate to these
keywords and then puts the result in order of relevance to the topic that was
searched for.
The types of search engine are crawler-based search engine, directories,
hybrid engine and meta search engine.
Social bookmarking is a way of storing and classifying Internet bookmarks,
meant to help Internet users find other sites they might be interested in.
On the Internet, a link is more appropriately referred to as a hyperlink and is
what connects web pages to other web pages.
19
What I Can Do
ESSAY. Explain the following. Write your answers on your activity sheet.
20
Assessment
Directions: Read and understand the statements below. Write the letter of the
correct answer on a separate sheet of paper.
3. It is a program that is loaded onto your computer without your knowledge and
runs against your wishes.
A. Malware C. Virus
B. Trojan D. Worm
21
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker
12. This type of antivirus software can scan each file on the computer’s hardware
and memory and compare the entire file.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection
14. It provides real-time protection, just like most antivirus software does.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection
22
Additional Activities
Direction: Explain the following below.
23
24
What I Know Assessment
1. D 1. D
2. A 2. C
3. B 3. C
4. A 4. D
5. B 5. C
6. D 6. B
7. D 7. A
8. C 8. B
9. A 9. A
10.B 10.D
11.D 11.D
12.C 12.D
13.C 13.C
14.D 14.A
15.C 15.B
What’s New
1. Norton
2. Avast
3. ESET Nod32
4. Avira
5. Bitdefender
Answer Key
References
https://www.slideshare.net/AliciaNoval/top-10-types-of-cyber-
security-threats-167050748
https://www.slideshare.net/BettyelChristopher/key-uses-of-entity-
and-user-behaviour-analytics-euba?next_slideshow=1
https://www.slideshare.net/amdadam5/cyber-security-importance-of-
cyber-security
https://www.slideshare.net/faisal319/antivirus-10701219
https://www.slideshare.net/mohammadsohaibafzaal/anti-virus-
70356199
https://www.slideshare.net/dmcoyle/file-management-8356106
https://www.slideshare.net/AhmedAlZaidy/file-management-
52861829
https://www.slideshare.net/AbenezerAbiti/file-management-
128262936
Empowerment Technologies, Innovative Works, Inc., Rules of Netiquette,
pp. 25-26
25
DISCLAIMER