Professional Documents
Culture Documents
TLE/TVL-ICT (Computer
Programming-Java)
Activity Sheet Quarter 2 – LO 5
Maintain Computer Equipment
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
2
Introductory Message
Welcome to TLE/TVL- ICT (Computer Programming - Java)!
The TLE/TVL- ICT (Computer Programming - Java) Activity Sheet will help
you facilitate the leaching-learning activities specified in each Most Essential
Learning Competency (MELC) with minimal or no face-to-face encounter between
you and learner. This will be made available to the learners with the references/links
to ease the independent learning.
3
Quarter 2, Week 5
Name of Learner:_____________________________________________________
Grade and Section:_________________________________Date: ______________
What to Secure?
1. Check the physical security by setting control systems like motion
alarms, door accessing systems, humidity sensors, and temperature
sensors. All these components decrease the possibility of a computer to
be stolen or damaged by humans and environment itself.
2. People having access to computer systems should have their own user
ID with password protection.
4
3. Monitors should be screen saver protected to hide the information from
being displayed when the user is away or inactive.
4. Secure your network especially using wireless connections. Password
should be used.
5. Internet equipment as routers to be protected with password.
6. Data that you use to store information which can be financial, or non-
financial by encryption.
7. Information should be protected in all types of its representation in
transmission by encrypting it.
Potential Losses due to Security Attacks
Losing you data − If your computer has been hacked or infected, there is a
big chance that all your stored data might be taken by the attacker.
Bad usage of your computer resources − This means that your network or
computer can go in overload so you cannot access your genuine services or in a
worst scenario, it can be used by the hacker to attack another machine or
network.
Reputation loss − Just think if your Facebook account or business email has
been victimized by a social engineering attack and it sends fake information to
your friends or business partners. You will need time to gain back your
reputation.
Identity theft − This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making
false identity documents.
Basic Computer Security Checklist
There are some basic things that everyone of us in every operating system need
to do:
Check if the user is password protected.
Check if the operating system is being updated.
Check if the antivirus or antimalware is installed and updated.
Check for the unusual services running that consumes resources.
Check if your monitor is using a screen saver.
Check if the computer firewall is on or not.
Check if you are doing backups regularly.
Check if there are shares that are not useful.
Check if your account has full rights or is restricted.
Update other third party software’s.
5
4. The next step is to take updates regularly for Windows OS. It is
recommended to do them automatically and periodically. To set this up, go
to Control Panel – System and Security – Windows Updates – OK.
5. Put your Windows System Firewall up. This will block all the unauthorized
services that make traffic. To set this up, go to Control Panel – System and
Security – Windows Firewall.
6. Install a licensed antivirus and take updates. In the coming sections we will
cover in detail about antiviruses. It is strongly recommended not to download
from torrents and install cracked versions.
7. You should always Configure a password protected Screen Saver. To set
this up, please follow this path −Control Panel – All Control Panel Items –
Personalize – Turn Screen Saver on or off – Check “On resume, display logon
Screen”.
8. Disable Autoplay for Removable Media. This blocks the viruses to run
automatically from removable devices. To disable it go to – Start – on Search
box type Edit Group Policy –Administrative Templates – Windows Components
– Autoplay Policy – Turn off Autoplay – Enable – Ok.
9. Install only trusted internet explorer browsers like Internet explorer, Chrome
or Mozilla Firefox and then update them regularly. Missing the updates can lead
to possible hacking.
10. Enable the BitLocker Drive Encryption to encrypt hard drives, but it is
only available in Windows & Ultimate and Upper Versions.To enable it follow the
path: Start – Control Panel – System and Security – BitLocker Drive Encryption.
11. Set Bios Password − This option differs based on different computer
producers and we need to read manufacturer guidelines, this option secures
your computer one layer upper in the OS.
Virus/Malwares
A virus can be defined as a malicious program that attaches itself to a host
program and makes multiple copies of itself, slowing down, corrupting or
destroying the system. They are self-replication programs that reproduce their
own codes by attaching themselves to other executable codes. They operate
without the permissions or knowledge of the computer users. Viruses or
malwares like in real-life, contaminate other healthy files in a computer.
However, we should remember that viruses infect outside machines only with
the assistance of a computer user. These can happen by clicking a file that
comes attached with email from an unknown person, plugging a USB without
scanning, opening unsafe URLs for that reason. We as system administrators
have to remove the administrator permissions of users in these computers. We
categorize malwares in three types:
Trojans and Rootkits
Viruses
Worms
Characteristics of a Virus
They reside in a computer’s memory and activates themselves while the
program that is attached starts running.
For example − They attach themselves in general to the explorer.exe in
windows OS because it is the process that is running all the time, so you should
be cautious when this process starts to consume too much of your computer
capacities.
6
They modify themselves after the infection phase like they source codes,
extensions, new files, etc. so it is harder for an antivirus to detect them.
They always try to hide themselves in the operating systems in the following
ways −
o Encrypts itself into cryptic symbols, and they decrypt themselves when they
replicate or execute.
Some Practical Recommendations to Avoid Viruses
Don’t open any email attachment coming from unknown people or from
known people that contain suspicious text.
Don’t accept invitation from unknown people on social media.
Don’t open URL sent by unknown people or known people that are in any
weird form.
Antivirus
A software that assists the OS in providing virus free environment to the
users.An anti-virus scans the system for any virus and if detected, gets rid of it
by deleting or isolating it.
Commercial Antivirus
Based on PC magazine, the best commercial antiviruses are:
Kaspersky Anti-Virus
Bitdefender Antivirus Plus 2016
McAfee AntiVirus Plus (2016)
WebrootSecureAnywhere Antivirus (2015)
7
File Management System
The file management system is a software which is used to create, delete,
modify and control access and save files.
Responsibilities of File Management System
The responsibilities of File Management System are as follows:
Operation. This provides user to work with or manipulate the files.
Manipulation includes open, close, save, copy, delete, move, rename, share, etc.
Security. By supporting authorization, it restricts unauthorized user to log into
system and access files. Username and password are required for authorization
purpose. It supports file encryption feature and asks for authorization to access
those encrypted files.
Integrity. In support of integrity, file management system will keep track of
data manipulations like deletion, modification, addition of data, etc. If the data
gets modified, deleted or added, then those changes should be reflected in all
the files.
Storage. This allocates memory for storing files, deallocates memory of
deleted or unused files and maintains backups.
Compression Tools
Storage space is always at a premium in computer systems. So operating
systems are always looking at ways to minimize amount of storage space taken
by files.
Compression tools are utilities that assist operating systems in shortening files
so that they take less space. After compression files are stored in a different
format and cannot be read or edited directly. It needs to be uncompressed
before it can be accessed for further use. Some of the popular compression
tools are WinRAR, PeaZip, The Unarchiver, etc.
Disk Cleanup
Disk cleanup tools assist users in freeing up disk space. The software scans
hard disks to find files that are no longer used and frees up space by deleting
them. Examples of disk cleanup tools are CC Cleaner, Glary Utilities, etc.
Disk Defragmenter
Disk defragmenter is a disk management utility that increases file access
speeds by rearranging fragmented files on contiguous locations. Large files are
broken down into fragments and may be stores in non-contiguous locations if
8
contiguous ones are not available. When such files are accessed by the user,
access speed is slow due to fragmentation. Disk defragmenter utility scans the
hard disk and tries to assemble file fragments so that they may be stored in
contiguous locations.
Backup
Backup utility enables backing up of files, folders, databases or complete
disks. Backups are taken so that data may be restored in case of data loss.
Backup is a service provided by all operating systems.
Why is Backup Needed?
The main purpose is to recover the lost data from an unpredictable event
like deletion by mistake or file corruption which in many cases is caused by a
virus.
An example is Ransomware, which encrypts all your data when your
computer gets infected and the second is to roll back the data at a specific time
you want. This is a scenario that happens often in companies which have
applications and databases and they want to test their applications with a
specific version of data.
Backup Devices
CD and DVD, Blue-Rays
Removable Devices
Network attached storage (NAS) − They are generally devices that are used in
small businesses for backup purposes because they offer a centralized manner
of backup.
Storage Area Network (SAN) − These are generally devices that are used for
big businesses for backup purposes. They offer a high speed of network for
storage the biggest producers are EMC Corporation, DELL.
1. Exercises / Activities
Activity 1. Directions: Choose the letter of the correct answer. Write your answers on a
separate sheet of paper.
9
1. These are self-replication programs that reproduce their own codes by attaching
themselves to other executable codes.
a. Defragmenter b. Virus c. Antivirus d. Defender
2. What software assists the OS in providing virus-free environment to the users?
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
3. A software used to create, delete, modify, and control access and save files.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
4. A utility software that increases file access speeds.
a. Disk Defragmenter c. Archiver
b. WinRAR d. Cleaner
5. These tools assist users in freeing up disk space.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Backup Utility
6. The following are losses due to security attacks, EXCEPT.
a. Losing Data or Information c. Identity Theft
b. Bad usage of computer resources d. Plagiarism
7. A free antivirus that is good in malware blocking and anti-phishing test scans.
a. Avast b. AVG c. Panda d. Bitdefender
8. The process of detecting and preventing any unauthorized use of your computer.
a. Computer Maintenance c. Computer Security
b. Computer Repair d. Computer Organization
9. What do you call a person who tries and exploits the computer system for a
purpose.
a. IT Personnel b. Web Experts c. Software Engineer d. Hacker
10. The following are basic functions of Antivirus, EXCEPT.
a. Scanning b. Phishing c. Integrity Checking d.
Interception
Activity 2. Using your Mobile Phone or Computer (if available), open the browser (Mozilla
Firefox or google chrome) and open the link provided. Watch the YouTube video of disk
defragmentation.
https://www.youtube.com/watch?v=AtRIOUZuI2c
10
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. What significant values have you developed while doing your activity/output?
______________________________________________________________
______________________________________________________________
______________________________________________________________
11