You are on page 1of 32

10

STE - ICT
Computer Programming
(Java) NC III
Quarter 1 - Module 4:
Perform Computer Operations:
Maintain Computer Equipment
Computer Programming (Java) NC III
Self-Learning Module
Quarter 1 - Module 6: PERFORM COMPUTER OPERATIONS
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials
from their respective copyright owners. The publisher and authors do not represent
nor claim ownership over them.

Published by: Department of Education – SCHOOLS DIVISION OF CAPIZ


Schools Division Superintendent: Salvador O. Ochavo, Jr.
Assistant Schools Division Superintendent: Nicasio S. Frio

Development Team of the Module

Writer: CHRISTIAN P. OROPEO


Editors and Reviewers:
Evelyn Callar, Rossinni Medel, Christian Oropeo, Nilda Gallardo, Mark D. Villaruz,
Reynold Baes, Rechille Ann Denisado, Rezyl Fatima Lamier, Ethel L. Lopez, Darrel
Duran, Rodolyn Pimentel, Julie Magallanes, Suzette Bagares, Sheila Marie F.
Bergancia, Charmane Kae B. Fagutao, Dalene Dice, Lou Chemie D. Corpin, Judith
C. Betita, and Chimene Subere
Illustrator: CHRISTIAN P. OROPEO
Layout Artist: Julius E. Ubas
Management Team:
SALVADOR O. OCHAVO, Jr.
NICASIO S. FRIO
SEGUNDINA F. DOLLETE
SHIRLEY A. DE JUAN
ROLANDO B. JAMORA

Printed in the Philippines by Department of Education – SCHOOLS DIVISION OF CAPIZ

Office Address: Banica, Roxas City


Telephone No.: (036) 6210-974
9-12
TLE/TVL - ICT
Computer Programming
(Java) NC III
Quarter 1 - Module 6:
Perform Computer Operations:
Plan and Prepare for Task at Hand
Introductory Message

For the facilitator:

Welcome to Computer Programming (Java) NC III with Grade 9 – 12


Self- Learning Module on Perform Computer Operations: Maintain
Computer Equipment.

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic
constraints in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

As a facilitator you are expected to orient the learners on how to use


this module. You also need to keep track of the learners' progress while
allowing them to manage their own learning. Furthermore, you are expected
to encourage and assist the learners as they do the tasks included in the
module.

ii
For the learner:
Welcome to the Computer Programming (Java) NC III specialization of
TLE for Grade 9 – 12 Self-Learning Module on Perform Computer
Operations: Maintain Computer Equipment.

The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.
This module has the following parts and corresponding icons:

This will give you an idea of the skills or


What I Need to Know
competencies you are expected to learn
in the module.

What I Know This part includes an activity that aims


to check what you already know about
the lesson to take. If you get all the
answers correct (100%), you may decide
to skip this module.

What’s In This is a brief drill or review to help you


link the current lesson with the
previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such
as a story, a song, a poem, a problem
opener, an activity or a situation.

This section provides a brief discussion


What is It of the lesson. This aims to help you
discover and understand new concepts
and skills.

What’s More This comprises activities for


independent practice to solidify your
understanding and skills of the topic.
You may check the answers to the

iii
exercises using the Answer Key at the
end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to
process what you learned from the
lesson.

What I Can Do This section provides an activity which


will help you transfer your new
knowledge or skill into real life
situations or concerns.

Assessment This is a task which aims to evaluate


your level of mastery in achieving the
learning competency.

Answer Key In this portion, another activity will be


given to you to enrich your knowledge
or skill of the lesson learned. This also
tends retention of learned concepts.

Additional Activities This contains answers to all activities


in the module

At the end of this module you will also find:

References: This is a list of all sources used in developing this module.

The following are some reminders in using this module:

1. use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises;
2. don’t forget to answer What I Know before moving on to the other activities
included in the module;
3. read the instruction carefully before doing each task;
4. observe honesty and integrity in doing the tasks and checking your answers;
5. finish the task at hand before proceeding to the next;
6. Return this module to your teacher/facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!

iv
What I Need to Know

This module was designed and written with you in mind. It is here to help you
to plan a task to ensure that operational health and safety guidelines and procedures
are followed. The scope of this module permits it to be used in different learning
situations. The language used recognizes the diverse vocabulary level of students.
The lessons are arranged to follow the standard sequence of the course. But the order
in which you read them can be changed to correspond with the textbook you arenow
using.

The module mainly focuses one lesson:


Lesson 8: Performing Computer Operations (PCO)
Topics:
1. Security measures
2. Anti-virus software/programs
3. File management

Learning Competencies and codes:


LO 6. Maintain computer equipment
Code: TVL_ICTORCL_11-12PCO-IIe-28

After going through this module, you are expected to:


1. implement procedures for ensuring security of data, including regular
back-ups and virus checks in accordance with standard operating
procedure; and
2. implement basic file maintenance procedures in line with standard
operating procedures.
What I Know

Multiple Choice. Choose the letter of the best answer. Write your answer on a
separate sheet of paper.
1. It refers to an ethical computer hacker.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker

2. A hacker who violates computer security for little reason beyond


maliciousness for personal gain.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker

3. It refers to a computer hacker or computer security expert who may sometimes


violates laws or typical ethical standards, but does not have malicious intent.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker

4. It is a software that has some malicious intent which is installed on user’s


computer without that user’s content.
A. Malware C. Virus
B. Trojan D. Worm

5. This is an email virus that can duplicate themselves, steal information, or


harm the computer system.
A. Malware C. Virus
B. Trojan D. Worm

6. Which of the following is NOT an antivirus software?


A. Avira
B. Avast D. Windows Firewall

7. This type of antivirus software can scan each file on the computer’s hardware
and memory and compare the entire file.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

8. This is particularly nasty form or malware.


A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

2
9. It provides real-time protection, just like most antivirus software does.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

10. It a place where any information in a computer is stored.


A. Computer C. Folder
B. File D. Storage Media

11. It is a physical device on which you can store files and folders.
A. Computer C. Folder
B. File D. Storage Media

12. It is a container in which a group of related files can be stored.


A. Computer C. Folder
B. File D. Storage Media

13. It is a program that is loaded onto your computer without your knowledge and
runs against your wishes.
A. Malware C. Virus
B. Trojan d. Worm

14. It is a malware that can autonomously spread itself without a carrier, using
information about connected computers.
A. Malware C. Virus
B. Trojan D. Worm

15. It refers to protecting information from being accessed by unauthorized


parties.
A. Accessibility C. Confidentiality
B. Availability D. Integrity

Lesson
Maintain Computer
1 Equipment
Maintenance of computer equipment is necessary for the productivity of data
and information. Implementing the procedures for ensuring the security of data is
important. regular back-ups and virus checks are one of the examples of
maintaining computer equipment. In this case, data loss and information hacking
may be avoided. File maintenance may also be used to organize data and
information.

3
What's In

Write at least 10 words that you can connect to the word MALWARE.

1. 6.

2. 7.

3. 8.

4. 9.

5. 10.

What's New

Name me!
Direction: Give the name of the antivirus software below

1. 2. 3.

4. 5.

4
What is It

CYBERSECURITY

What is cybersecurity?
 The term cybersecurity is used to refer to the security offered through online
services to protect your information online.
 Cyber Security and Information Security differs only in its response and
reduction/prevention.
 Cyber security encompasses all aspects of security viz., physical, technical,
environmental, regulations and compliance including third parties involved in
delivering an objective.
 With an increase amount of people getting connected to Internet, the security
threats that causes massive harm are increasing also.
(https://www.slideshare.net/BettyelChristopher/key-uses-of-entity-and-user-
behaviour-analytics-euba?next_slideshow=1)
Why cybersecurity is important?
 Our world today is ruled by technology and we can’t do without it at all. From
booking our flight tickets, to catching up with an old friend, technology plays
an important role in it.
 However, the same technology may expose you when it’s vulnerable and could
lead to loss of essential data. Cybersecurity, alongside physical commercial
security has thus, slowly and steadily, become one of the most important
topics in the business industry to be talked about.
 Cybersecurity is necessary since it helps in securing data from threats such
as data theft or misuse, also safeguards your system from viruses.

(https://www.slideshare.net/amdadam5/cyber-security-importance-of-cyber-
security)

Cybersecurity Objectives
1. Confidentiality
 Refers to protecting information from being accessed by unauthorized
parties. In other words, only the people who are authorized to do so can
gain access to sensitive data.
 A failure to maintain confidentiality means that someone who shouldn’t
have access has managed to get it, through intentional behavior or by
accident. Such a failure of confidentiality, commonly known as breach.

2. Integrity
 Refers to ensuring the authenticity of information – that information is not
altered, and that the source of the information is genuine.

5
 Imagine that you have a website and you sell products on that site. Now
imagine that an attacker can shop on your website and maliciously alter
the prices of your products, so that they can buy anything for whatever
price they choose. That would be a failure of integrity, because of your
information – in this case, the price of a product – has been altered and you
didn’t authorize this alteration.

3. Availability
 Means that information is accessible by authorized users.
 Information and other critical assets are accessible to customers and the
business when needed. Note, information is unavailable not only when it is
lost or destroyed, but also when access to the information is denied or
delayed.

Cyber Attacks
 A malicious attempt, using digital technologies, to cause personal or property
loss or damage, and/or steal or alter confidential personal or organizational
data.
Major Security Problems
1. Virus and Worms
 Malware attached to a carrier such as an email message or a word processing
document.
 A virus is a program that is loaded onto your computer without your
knowledge and runs against your wishes.
 A worm is a malware can autonomously spread itself without a carrier, using
information about connected computers.

How to avoid virus and worms?


Install a security suite that protects the computer against threats such as viruses
and worms.

2. Hackers
 A hacker is a person who breaks into computers, usually by gaining access to
administrative controls.

Types of Hackers
a. White Hat Hacker – the term “white hat” in Internet slang refers to an
ethical computer hacker, or a computer security expert, who specializes
in penetration testing and in other testing methodologies to ensure the
security of an organization’s information systems.
b. Grey Hat Hacker – the term “grey hat”, “greyhat” or “gray hat” refers to
a computer hacker or computer security expert who may sometimes
violate laws or typical ethical standards, but does not have the
malicious intent typical of a black hat hacker.
c. Black Hat Hacker – is a hacker who “violates computer security for little
reason beyond maliciousness or for personal gain”.

6
How to prevent hacking?
 It may be impossible to prevent computer hacking, however effective security
controls including strong passwords, and the use of firewalls can help.

3. Malware
 The word “malware” comes from the term “malicious software”.
 Software that has some malicious intent and which is installed on a user’s
computer without that user’s consent.
 Keyloggers – software installed on a computer that captures keystrokes and
sends these to a remote system. Used to try and get personal information to
gain access to sites such as banks.
 Ransomware – software that runs on a user’s computer and demands that the
user pays some other organization. If they don’t, the information on their
computer will be destroyed.
 Malware can usually spread itself from one computer to another either as a
virus or a worm.

How to stop malware?


 Download an anti-malware program that also helps prevent infections.
 Do not download form unknown sources.
 Activate Network Threat Protection

4. Trojan Horses
 These are email viruses that can duplicate themselves, steal information, or
harm the computer system.
 These viruses are the most serious threats to computers.

How to avoid trojans?


 Security suites, such as Avast Internet Security, will prevent you from
downloading Trojan Horses.
 Do not click unknown links.

5. Password Cracking
 Password attacks are attacks by hackers that are able to determine passwords
or find passwords to different protected electronic areas and social network
sites.

How to secure passwords?


 Use always strong password. Never use same password for two different sites
 Use a 2-factor authentication in securing your passwords.

(https://www.slideshare.net/AliciaNoval/top-10-types-of-cyber-security-threats-
167050748)

7
ANTIVIRUSE SOFTWARE/PROGRAMS

Antivirus
 Antivirus or antivirus software, sometimes known as anti-malware software,
is a computer software used to prevent, detect and remove malicious software.
 Antivirus software was originally developed to detect and remove computer
viruses.
 In particular, modern antivirus software can protect from: malicious browser
helper (BHOs), browser hijackers, ransomware, keylogger, backdoors,
rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware
and spyware.
 Some products also include protection from other computer threats, such as
infected and malicious URLs, spam, scam, and phishing attacks, online
identity (privacy), online banking attacks, social engineering techniques,
advanced persistent threats (APT), and botnet DDoS attacks.

(https://www.slideshare.net/faisal319/antivirus-10701219)

History
 In the early 1980s, Internet security was practically nonexistent. No large-
scale attacks had ever been attempted, and networked-based vulnerabilities
were rarely, if ever, exploited.
 This changed in the late 1980s with the Morris Worm, the first known large-
scale attack propagated via the Internet.
 Today, spyware, viruses, trojan attacks, worms, and malware are all common
occurrences affecting nearly every computer user at least once.

Antivirus Types
 Firewall Software – analyzes incoming and outgoing data packets on a
network; that is, all the information sent and received through the computer’s
network connection.
 Network Layer Firewalls – are called packet filters. These firewalls are the
simplest of firewalls, and only allow information packets to pass through the
firewall if the packet matches the specific set of rules.
 Proxy Servers – acts as a firewall in that they inspect incoming packets for
specific applications and block all other requests.
 Application Layer Firewalls – these firewalls inspect all packets for specific
protocols, such as FTP and browser traffic.

Types of Antivirus Software


 Signature Based Detection – the antivirus software can then scan each file on
the computer’s hardware and memory and compare the entire file, as well as
small sections of each file, against the virus signature database.
 Heuristics – to help protect computers against new and unknown malware,
heuristics detection algorithm were created.
 Rootkit Detection – rootkits are a particularly nasty form or malware.

8
 Real Time Protection – most antivirus software provides real-time protection,
often under any number of clever synonyms such as resident shields,
background guard, auto protect, and so on.
 Antispyware – software provides real-time protection, just like most antivirus
software does. Additionally, just like most antivirus software, antispyware
software relies on up to date spyware signature definition files to work
properly.

Examples of Antivirus
 Adaware
 McAfee
 Kaspersky
 AVG
 Norton
 Avira
 ESET Nod32
 Bit Defender
 Microsoft Security Essentials
 Windows Defender

(https://www.slideshare.net/mohammadsohaibafzaal/anti-virus-70356199)

FILE MANAGEMENT

File Management: What is it?


Always remember that any information is stored in a computer as a file. File
management refers to the way you organize the storage of your information on the
computer.
File management basically answers the question: “Where is your information
stored?”. Everything is hierarchically organized: information is stored in a file that is
stored in a folder that (can be stored in another folder). These are stored on a storage
media that is stored on a computer that is eventually located on a local area network
(LAN).
Always keep in mind the analogy between file management in a computer and
file management in an office: in the former, information is inside an electronic file, in
the later, it is on paper in folders in a filing cabinet.
All of the computer elements: file, folder, storage media, and computer are
defined below.

1. File
Any information in a computer is stored in a file. Computers store information
as files or disks, just as office staff store files in a filing cabinet. Programs as well as
documents are stored as files.

9
Naming Convention
File names consist of primary name and an extension separated by a dot (e.g.
exam.docx). The extension, like the icon, indicates the type of the file. For example,
the extension ‘.doc’ indicates that the file was created using Microsoft Word. Please
follow the common rules for naming your file.

Extension File Type


.doc, .docx Microsoft Word
.xls, .xlsx Microsoft Excel
.ppt, .pptx Microsoft PowerPoint
.txt Text File
.exe Executable File
2. Folder
A folder is a container in which a group of related files can be stored, just as
folders are used in to store files in the office filing cabinet. Folders are used to store
files in an organized way. A folder may contain both files and other folders, just as
folder in the office cabinet may have other folders inside it.

Naming Convention
A folder usually has only a primary file name (e.g. Teaching). Please follow the
common rules of naming your folder.

3. Storage Media
A storage media (i.e. hard disk, floppy disk, CD-ROM, etc.) is a physical device
on which you can store files and folders. It is the top container in a computer.

Naming Convention
Besides a label name, each storage media installed in your computer is
identified by a letter followed by a colon ( : ) sign:”
 The floppy drive is usually allocated at letter A – A:
 Sometimes, a second floppy drive is present and the letter B is allocated to it
– B:
 The hard drive is usually allocated the letter C – C:
 Sometimes, a computer can have more than one hard drive or the hard drive
can be divided in 2 partitions. Hence, this new drive would get the letter D –
D:
 The CD-ROM drive usually gets the first unused letter. E for example – E:
 Any removable media like ZIP drive or external USB hard disk get the next
available letter. F for example – F:

4. Computer
All the instructions have more than one computer hence, it is also useful to
be able to identify which computer your data is stored on. For instance: the
“secretary’s computer or” the second computer on the left-hand side of the computer
center”.

10
This becomes even more important when computers are connected together
in a local area network (LAN) because you will be then able to access your documents
from any computer. So, at the top level of hierarchy you will need to identify the
computer where they are stored using the proper computer convention for network
access.

Naming Convention
When a computer is connected to network it is given a unique name (you can’t
choose it, this is given by the technician who installed the network).
If you don’t know the name of your computer, follow this procedure:
a. Right-click on “My Computer” icon
b. Click on “Properties”
c. Select the tab “Computer Name” (for Windows XP) or “Network Identification”
d. The name of the computer is displayed

When accessing a computer from the network, you have to start by a double
backslash: \\. For example: \\NETPUNE.

Common Rules for Naming Files and Folders


When creating a file or folder, it is important to give them a meaningful name.
Using a name that describes the content of the file makes it easier to retrieve in the
future.

Naming Rules:
 In a folder, and folder names must be unique
 File and folder names can be a maximum of 255 characters
 Spaces and dots are allowed
 * | <> ? / \ “ : are not allowed
 File and folder names are not case-sensitive

Locating Information
The main reason for file management is so that you can locate files and
information easily. Each file is stored in a specific location on the computer. To locate
a file, you need to know its path, also called location or address.
On a standalone computer, a file path is composed by: a letter representing
the storage media, the names of the folders you have to go through and the name of
the file. Each field is separated by a backslash ‘\’.
Example: D:\Tezerra\Training Materials\Windows\Coursel.doc

On a networked computer: A file path starts with a computer name, then the
name of the network folder, the names of the folder you have to go through and the
name of the file. Each field is separated by a backslash ‘\’.
Example: \\NEPTUNE\D\Tezerra\Training_Materials\Windows\Coursel.doc

11
Importance of File Management
Always keep in mind the main reason why you are using a computer:
 Ability to store: a computer can store an incredible amount of information in
a very limited space.
 Ability to reuse: at any time, you can reuse an old piece of information and
correct it or amend it and make a new document very quick.
 Ability to share: it is very easy to exchange information stored on a computer,
especially through a network or the Internet.

File Management: How you do it?


Files are created using a specific application, depending on the nature of the
document you want to create. Microsoft Word creates a typographic document. Excel
creates a spreadsheet document, etc. By using the Save As command, you will store
the newly created file in a specific location.
File management is achieved with Windows Explorer. This is the program that
will allow you to display all your files, create folders, move, copy, delete, rename
them, etc.

Windows Explorer/File Explorer


Files and folders on your computer can be represented as a tree-structure
where disks are roots, folders are branches and documents are leaves. This is why
the Windows Explorer presents the information stored on the computer.

Starting Windows Explorer/File Explorer


1. Click Start button
2. Click the programs to display the programs menu
3. Click Windows Explorer/File Explorer

Right Pane:
Folder
Left Pane: Hierarchy
Folder
Hierarchy

12
 Left Pane – this pane displays the tree structure of the disks and the folders
stored on a computer starting from the desktop
 Right Pane – this pane shows the folder contents that is selected in the left
pane; all the files and subfolders. The right pane is divided into columns that
provide various details about the files and subfolders in a folder

Column Name Description


Name Name of the file or folder and icon representing its type
Size Size occupied by each file in the storage device
Type Type of the file
Modified Date and time the content of a file or folder were last changed
You can sort the files and folders by name, size, type or modified date by
clicking on the desired column name.

Displaying the Files and Folders


Using the left pane
1. Click on the + sign to open a folder and display its subfolders
2. Click on the folder name or icon to display its content into the right pane

Using the right pane


1. Double click on a folder to display its content. Note that the left pane is
updated and the open folder has changed.

Navigating around using the toolbar

Use this button to display the content of the parent folder

Searching for files and folders


Click this button in the toolbar to launch a search.
You can also run a search from the Start Menu.
The following window is displayed:

13
Selecting files and folders
Windows explorer allows you to perform various operations on a file. To
perform any operation on one or many files, you first need to select them.

 Single file location


Click on the filename or icon in the Windows/File Explorer right pane to select
a single file. Note that when you select a file, its name is highlighted and the
status bar displays its size.

 Multiple file selection


There are different ways of selecting more than one file. Note that when you
select multiple files, their names are highlighted and the status bar displays
the total size of your selection.
Continuous file selection
To select a group of files which are displayed consecutively in the right pane:
1. Click on the first file of the list
2. Press and hold the shift key
3. Click on the last file of the list

Discrete file selection


To select a group of files which are not displayed consecutively in the right
pane:
1. Click on the first file
2. To add to the selection, press and hold the Ctrl key while clicking its name
or icon.

Select all
To select all the files and subfolders of the folder currently displayed:
1. Open the Edit Menu by clicking on the menu bar
2. Click ‘Select All”

Select all using keyboard shortcut


To select all the files and subfolders currently displayed:
1. Click on the first file
2. Press Ctrl+A on the keyboard

Deselecting files
To deselect files that have been selected, click any blank area in the right pane.

Creating folders
By creating folders, you can store all the files that contain similar information
in the same folder and organize the data on your disk in order to retrieve them easily.
To create a new folder, with Windows/File Explorer:
1. Select the place you want to put the new folder by selecting the relevant disk
or folder in the left pane.
2. Open the File Menu by clicking File on the menu bar.

14
3. Point or click to New (This will display a submenu with a choice of objects to
create).
4. Click Folder (A new folder called New Folder is displayed in the left pane. Note
that there is a box around the name, which is highlighted, and the cursor is
positioned at the end of it).
5. Type a new name and press enter.

To crate a new folder using the right-click on the mouse.


1. Right-click the mouse on to the place you want to create a folder to.
2. Click New
3. Click Folder
4. Type a new name and press enter.

Renaming files and folders


To rename a file or folder using Windows/File Explorer:
1. Select the file or folder by clicking on its name or icon in the right pane
2. Open the File menu or by clicking file on the menu bar
3. Click rename
4. Type a new name and press enter

To rename a file or folder using mouse clicking:


1. Right-click the file
2. Click rename
3. Type a new name and press enter

When you change a file name, its primary name changes while the extension
remains the same.

Moving files across folders


To improve the way in which your files are organized on disks, you can move
files or folders from one folder to another. Be careful. When you move a file, it is
deleted from its original location.

 The “Move to Folder” command


1. Select the files and folders to move
2. Open the Edit menu by clicking Edit on the menu bar
3. Click “Move to Folder”
4. Select the destination folder in the dialog box by navigating through the
folder hierarchy

 The cut and paste method using Windows/File Explorer


1. Select the files you want to move
2. Open the edit menu by clicking edit in the menu bar
3. Click cut (the selected object icons are grayed to indicate that there are
going to be deleted from this location)
4. Select the destination folder by clicking its name in the left pane.
5. Open the Edit menu by clicking Edit in the menu bar

15
6. Click Paste (the selected file appears on the right pane)

 The cut and paste method using keyboard commands


1. Select the files you want to move
2. Press Ctrl+X on the keyboard (the selected object icons are grayed to
indicate that there are going to be deleted from this location)
3. Select the destination folder
4. Press Ctrl+V on the keyboard (the selected file appears on the right
pane)

 The drag and drop method


1. Select the files or folders you want to move
2. Drag the selection to the destination folder in the right pane

Copying files to folders


It is a good practice to maintain the copies of important files. This practice is
referred to as making a back-up of your files. Maintaining copies of files protects you
against accidental data loss. You can copy files from one folder to another in the
same disk or to a folder in another storage medium.

 The “Copy to Folder” command


1. Select the files and folders to copy
2. Open the Edit menu by clicking on Edit in the menu bar
3. Click “Copy to Folder”
4. Select the destination folder in the dialog box by navigating through the
folder hierarchy

 The copy and paste method using Windows/File Explorer


1. Select the files and folders to copy
2. Open the Edit menu by clicking on Edit in the menu bar
3. Click Copy
4. Select the destination folder by clicking its name in the left pane.
5. Open the Edit menu by clicking on the Edit in the menu bar
6. Click Paste

 The copy and paste method using keyboard commands


1. Select the files and folders to copy
2. Press Ctrl+C on the keyboard
3. Select the destination folder
4. Press Ctrl+V on the keyboard

The selected files and folders appeared in the right pane.

 The drag and drop method


1. Select the files and folders to copy
2. Hold the Ctrl key and drag the selection to the destination folder

16
Deleting files
Files that are not required any longer should be removed from the disk.
Removing files frees valuable disk space.
1. Select the files and folders to delete
2. Open the File menu by clicking File in the menu
3. Click Delete
Alternatively, once the selection is made, you can press the Delete key on the
keyboard.

Restoring deleted files – the Recycle Bin


When you delete a file, Windows moves it to the Recycle Bin. This is like a
garbage collection area. Files that you remove from other folders stay in the Recycle
Bin until you instruct Windows to delete it.
Then, the Recycle Bin allows you to recover deleted files if they are needed
later. Note that the files deleted from a floppy disk are removed entirely and cannot
be restored.

Opening the Recycle Bin


Double click on the Recycle Bin in the Desktop to open it.
In the Recycle Bin window is a list of all the files that can be restored. By
default, all recoverable files are listed alphabetically, with other details such as when
the item was deleted and its original location.

Restoring files and folders


1. Select the files and folders to restore
2. Open the File menu by clicking on File in the menu bar
3. Click Restore
Or
1. Double-click the files and folders to restore
2. Click Restore

17
The restored files are then moved back to their original location and can be
found in their original folder, even if that folder had been deleted.
Alternatively, once the selection is made, you can drag the selection from the
Recycle Bin and drop it any other location.

Clearing the Recycle Bin


1. Open the File menu by clicking on File in the menu bar
2. Click “Empty the Recycle Bin”
Or
1. Select the first file on the list
2. Press Ctrl+A on the keyboard to highlight all the files to be cleared in the
Recycle Bin
3. Press Delete key on the keyboard

A confirmation dialog box will appear. From here, you can click Yes to
complete the action or No to cancel it.
Note that once files are deleted from the Recycle Bin, they can no longer be recovered
by Windows.

(https://www.slideshare.net/AbenezerAbiti/file-management-128262936)

What's More

Activity 1 ESSAY
Direction: Answer the following questions. Write your answers on your activity
sheet.

1. What is the importance of Antivirus?


2. Is it ideal to have 2 or more antivirus software installed in your computer?
Explain your answer.
3. What are the other reasons why computers are infected by viruses and other
malwares? Explain how it is being acquired by our computers.
4. In scanning our computers using antivirus, there is a term there called
“quarantine”. Does this “quarantine” remove the virus and other malwares of
our computer? Why or why not?
5. What is the importance of backing up our files?

Activity 2
Direction: Solve the following problems given below by providing the steps to solve
the problem. Write your answers on your activity sheet.
1. I am navigating my files in my folder stored on Local Drive C: Accidentally, I
deleted one of my important files. What should I do?

18
2. My local disk drive is at risk of going out of storage. What should I do to free up
space on my local disk drive?
3. I was creating my presentation for tomorrow’s conference. Unfortunately, I saved
it in the wrong folder. What will I do to copy it in the right folder?
4. Write the path of the file:
a. File name: comprog.xls
b. Main Folder name: TLE
c. Subfolder name: Grade 10
d. Folder inside the subfolder: Computer Programming
e. Location: Desktop
f. Local Drive: C:
5. I have created a file on the Desktop but I entered an incorrect spelling for the
name of my file. What should I do to correct the name of the file?

What I Have Learned

 Web browsers allow a user to quickly and easily access information provided
on many web pages at many websites by traversing these links.
 The first web browser was invented in 1990 by Sir Tim Berners-Lee.
 URL stands for Uniform Resource Locator, more commonly known as
commonly known as web address.
 The address of every resource or file on the Internet has a Uniform Resource
Locator, including an address of a web page, audio stream or other Internet
resources.
 URL’s consists of protocol of the resources, domain name for the resource and
address of the file.
 A web search engine is a software system that is designed to search for
information on the World Wide Web.
 Search engine uses keywords to search for documents that relate to these
keywords and then puts the result in order of relevance to the topic that was
searched for.
 The types of search engine are crawler-based search engine, directories,
hybrid engine and meta search engine.
 Social bookmarking is a way of storing and classifying Internet bookmarks,
meant to help Internet users find other sites they might be interested in.
 On the Internet, a link is more appropriately referred to as a hyperlink and is
what connects web pages to other web pages.

19
What I Can Do

ESSAY. Explain the following. Write your answers on your activity sheet.

1. Why file management is important?


2. Why should I keep my file in a specific place?
3. How can folders be useful to me?
4. What is the need for giving my document a proper name?

20
Assessment

Directions: Read and understand the statements below. Write the letter of the
correct answer on a separate sheet of paper.

1. It is a physical device on which you can store files and folders.


A. Computer C. Folder
B. File D. Storage Media

2. It is a container in which a group of related files can be stored.


A. Computer C. Folder
B. File D. Storage Media

3. It is a program that is loaded onto your computer without your knowledge and
runs against your wishes.
A. Malware C. Virus
B. Trojan D. Worm

4. It is a malware that can autonomously spread itself without a carrier, using


information about connected computers.
A. Malware C. Virus
B. Trojan D. Worm

5. It refers to protecting information from being accessed by unauthorized


parties.
A. Accessibility C. Confidentiality
B. Availability D. Integrity

6. This is an email virus that can duplicate themselves, steal information, or


harm the computer system.
A. Malware C. Virus
B. Trojan D. Worm

7. It is a software that has some malicious intent which is installed on user’s


computer without that user’s content.
A. Malware C. Virus
B. Trojan D. Worm

8. It refers to a computer hacker or computer security expert who may sometimes


violates laws or typical ethical standards, but does not have malicious intent.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker

9. A hacker who violates computer security for little reason beyond


maliciousness for personal gain.
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker
10. It refers to an ethical computer hacker.

21
A. Black Hat Hacker C. Red Hat Hacker
B. Grey Hat Hacker D. White Hat Hacker

11. Which of the following is NOT an antivirus software?


A. Avira C. Bitdefender
B. Avast D. Windows Firewall

12. This type of antivirus software can scan each file on the computer’s hardware
and memory and compare the entire file.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

13. This is particularly nasty form or malware.


A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

14. It provides real-time protection, just like most antivirus software does.
A. Antispyware C. Rootkit Detection
B. Real Time Protection D. Signature Based Detection

15. It a place where any information in a computer is stored.


A. Computer C. Folder
B. File D. Storage Media

22
Additional Activities
Direction: Explain the following below.

1. Why do we need to protect our personal information online?


2. What personal information are vulnerable to identity theft? Explain your
answer.
3. Explain this phrase “Think before you click”.

23
24
What I Know Assessment
1. D 1. D
2. A 2. C
3. B 3. C
4. A 4. D
5. B 5. C
6. D 6. B
7. D 7. A
8. C 8. B
9. A 9. A
10.B 10.D
11.D 11.D
12.C 12.D
13.C 13.C
14.D 14.A
15.C 15.B
What’s New
1. Norton
2. Avast
3. ESET Nod32
4. Avira
5. Bitdefender
Answer Key
References
 https://www.slideshare.net/AliciaNoval/top-10-types-of-cyber-
security-threats-167050748
 https://www.slideshare.net/BettyelChristopher/key-uses-of-entity-
and-user-behaviour-analytics-euba?next_slideshow=1
 https://www.slideshare.net/amdadam5/cyber-security-importance-of-
cyber-security
 https://www.slideshare.net/faisal319/antivirus-10701219
 https://www.slideshare.net/mohammadsohaibafzaal/anti-virus-
70356199
 https://www.slideshare.net/dmcoyle/file-management-8356106
 https://www.slideshare.net/AhmedAlZaidy/file-management-
52861829
 https://www.slideshare.net/AbenezerAbiti/file-management-
128262936
 Empowerment Technologies, Innovative Works, Inc., Rules of Netiquette,
pp. 25-26

25
DISCLAIMER

This Self-Learning Module (SLM) was developed by DepEd, Schools Division


of Capiz with the primary objective of preparing for and addressing the new normal.
Contents of this module were based on DepEd’s Most Essential Learning
Competencies (MELC). This is a supplementary material to be used by all learners of
Schools Division of Capiz in all public schools beginning SY 2020-2021. The process
of LR development was observed in the production of this module. This is version 1.0.
We highly encourage feedback, comments, and recommendations.

For inquiries or feedback, please write or call:


Department of Education – SCHOOLS DIVISION OF CAPIZ
Office Address: Banica, Roxas City, Capiz,
Philippines 5800
Telephone No: (036) 6210-974
Email Address: capiz@deped.gov.ph

You might also like