You are on page 1of 32

9

Technical Vocational Education


444

Computer Systems Servicing


Quarter 4 - Week 3 - Module 2
Maintain Computer Systems
and Networks
SPTVE_CSYS9-MCSNIVa-b-12
Technical Vocational Education Computer Systems Servicing – Grade 9
Alternative Delivery Mode
Quarter 4 Week 3 Module 2 - Maintain Computer Systems and Networks
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Published by the Department of Education


Secretary : Leonor Magtolis Briones
Undersecretary : Diosdado M. San Antonio
Development Team of the Module

Author: Jocelyn M. Gamo


Language Reviewer: Melgee A. Canare
Content Editor: Elmar S. Legaspi
Illustrator: Jocelyn M. Gamo
Layout Artist: Jocelyn M. Gamo

Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division

Rainelda M. Blanco, PhD


Education Program Supervisor - LRMDS

Agnes R. Bernardo, PhD


EPS-Division ADM Coordinator

Joel I. Vasallo, PhD


EPS-EPP/TLE/TVE/TVL

Glenda S. Constantino
Project Development Officer II

Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph
9
Technical Vocational Education
Computer Systems Servicing
Quarter 4 - Week 3 - Module 2
Maintain Computer Systems
and Networks
SPTVE_CSYS9-MCSNIVa-b-12
Introductory Message
For the Facilitator:

Welcome to the Technical Vocational Education-Computer Systems Servicing 9 Project CAP-


LRE Alternative Delivery Mode (ADM) Module on Maintain Computer Systems and Networks.

This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners

As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.

For the Learner:

Welcome to the Technical Vocational Education-Computer Systems Servicing 9 Project CAP-


LRE Alternative Delivery Mode (ADM) Module on Maintain Computer Systems and Networks.

This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:


This will give you an idea of the skills or
competencies you are expected to learn in the
module.

This part includes an activity that aims to check


what you already know about the lesson to take. If
you get all the answers correctly (100%), you may
decide to skip this module.
This is a brief drill or review to help you link the
current lesson with the previous one.

1
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.

At the end of this module, you will also find:

References- This is a list of all sources used in developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!

2
This module encourages you to be familiar with how to validate one’s work
for quality improvement work. Different activities are provided for you to be able
to:
1. Identify how to use appropriate PPE in line with standard procedures.
2. Enumerate how to check the normal function of computer systems and
networks in accordance with manufacturer‘s instructions.
3. Determine how to perform scheduled/ periodic maintenance in
accordance with manufacturer ‘s requirements.
4. Familiarize yourselves on how to repair materials when needed in
accordance with established procedures.
5. Replace materials when needed in accordance with establish
procedures.
6. Respond to unplanned events or conditions in accordance
with established procedures.

Pre-Test
Directions: Choose the best answer. Write the letter of the correct answer in a
separate sheet.

1. The “brain” of the computer, and controls most of the work done.
a. AMD c. Processor
b. Hard Drive d. RAM

2. It refers to the main working memory in a computer.


a. AMD c. Processor
b. Hard Drive d. RAM

3. It is the computer’s primary storage area that stores the applications and programs.
a. AMD c. Processor
b. Hard Drive d. RAM

4. It is standard on PCs and allows the information on a compact disc (either data or
audio) to be read and written to by the PC.
a. CD c. CD/DVD/R
b. CD R/W d. DVD
3
5. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals (graphics and video) output by the computer.
a. Graphics and RAM c. RAM and ROM
b. Graphics and Sound Cards d. Sound Cards and RAM

6. Computers running high-end applications generally require a separate


__________ graphics card.
a. 1024MB c. 256MB
b. 128MB d. 512MB

7. It allows a computer to be connected to a network.


a. Network Interface Card c. Network Internet Card
b. Network Interface Cord d. Network Internet Cord

8. It is recommended, and the most common Operating System prescribed in schools


as it meets the minimum system requirements with maximum usability.
a. Linux c. OpenSolaris
b. MacOS d. Windows

9. An open-source free operating system that is not widely used by schools at


present, though it may be suitable for schools who are aware of its capabilities.
a. Linux c. OpenSolaris
b. MacOS d. Windows

10. A computer operating system developed by Sun Microsystems.


a. Linux c. OpenSolaris
b. MacOS d. Windows

11. It is used to connect your wired network adapters to a router or network switch.
a. Cable Modem c. Wireless Network Adapters
b. Ethernet Cabling d. Wireless Router

12. It connects all your computers, either through Ethernet cables or a wireless
connection.
a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput

13. The speed at which a router can transfer data.


a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput

14. Which of the following are the two ports at the back of the router?
a. LAN and MAN c. WAN and MAN
b. LAN and WAN d. b and c

4
15. It is currently the most secured type of wireless encryption.
a. WEP c. WPA2
b. WPA d. all of the above.

Directions: Write T if the underlined word(s) is true and F if it is false. Write


your answer in a separate sheet.

1. Checking a machine for Condition Based Maintenance may include non-invasive


measurements, visual inspection, performance data, and scheduled tests.
2. Corrective maintenance is given for maintaining equipment and facilities in satisfactory
operating conditions to extend the life of the equipment.
3. It is best to read the manufacturer’s and/or user’s manuals, this would indicate the part
of the equipment, the functions of each part, and the ways to maintain it.
4. Preventive maintenance is a task performed to identify, isolate and rectify a fault so
that the failed equipment or system can be restored to operational conditions within
the tolerances or limits.
5. The proper use of the training tools and equipment is the last and foremost task in the
maintenance.

As a future computer technician, you must be diligent and eager to know


the different procedures in using the tools for configuring computer and network
systems because this will guide you in carrying out a particular job in a proper
manner. Once you already identify the competencies, you must also acquire the
appropriate skills to apply them in real-time situations.

Directions: Look for the following word(s) inside the puzzle by drawing a straight line
in each word(s) that you can see inside the puzzle. Copy the puzzle and answer it on
a separate sheet of paper.

Contingency
Diagnose
Maintenance
Procedures
Repair

5
Windows and other Microsoft products have their built-in troubleshooting
tools that bear little or no resemblance to the Fix-It troubleshooters.
Windows 7's Action Center Control Panel applet alerts you to system
problems via an icon in the taskbar's notification area. You can also use the
Action Center to view the machine's security and maintenance status.

Here are the steps to find about a dozen options for fixing problems related to program
compatibility, hardware and audio, networking, security, Windows Update, performance, and
power usage.
1. Click on the Start Button.
2. Choose Control Panel.
3. Select System and Security.
4. Choose Action Center.
5. On the Action Center, browse and check all the options for systems check:
✓ Security (View Anti-Spyware Programs, update virus protection)
✓ Maintenance (Perform System Maintenance, Check for Solutions for unreported
problems, Setup Backup)
✓ Troubleshooting
✓ Recovery

NOTE
Windows Security Center can help enhance:
➢ computer's security by checking the status of several security
essentials on your computer
➢ firewall settings
➢ Windows automatic updating
➢ anti-malware software settings
➢ Internet security settings
➢ User Account Control settings

Computer users can avoid problems by doing regular


maintenance. These include covering their keyboard when not in
use, cleaning disk drive heads and printers as well as backing up
important data and software.
Proper set-up and maintenance ensure that system
users can put it to good use.

Set-Up and Maintenance


➢ Clean and dry work environment
➢ Sufficient of workspaces
6
➢ Storage for disks and manuals
➢ Proper lighting and seating
➢ Surge protector
➢ Screen glare shield
➢ Anti-static pad

Proper Environment and Location of Computer


One of the most overlooked aspects of microcomputer preventive maintenance is
protecting the hardware from environmental abuse. The result of this type of abuse causes
system failures.

Examining the Operating Environment


➢ Before you acquire a system, prepare a proper location for the new system, free of
airborne contaminants such as smoke or other pollution.
➢ Do not place your system in front of a window.
➢ The system should not be exposed to direct sunlight or temperature variations.
➢ The environmental condition should be as constant as possible.
➢ Power should be stable with properly grounded outlets and free from electrical noise
and interferences.
➢ Keep your system away from radio transmitters and other sources of radiofrequency
interferences.
1. Heating and Cooling
✓ Temperature variation leads to serious problems. To ensure, determine your
system’s specified functional temperature range.
✓ Two temperature specifications might be available, one indicating allowable
temperatures during operation and the other indicating temperatures under
non-operating conditions.
2. Power Cycling (On And Off)
✓ Turning on (also called Powering On) a cold system subjects it to the greatest
possible temperature variations.
✓ For this reason, limiting the number of power-on cycles a system is exposed to
greatly improves its life and reliability.
✓ If possible, power on the system once a day only.
✓ If you do keep your system on for too long, make sure that the screen goes
blank or displays a random image if the system is not in use.
3. Static Electricity
✓ Static electricity can cause numerous problems within a system. In this case,
you might need to take special precautions to ensure that the system functions
properly.
✓ Most static sensitivity problems are caused by improper groundings of the
computer/equipment. Always use a three-prong, grounded power cord plugged
into a properly grounded outlet.
✓ Whenever you open a system unit or handle circuits removed from the system,
you must be careful with Electrostatic Discharge (ESD)
✓ Select and ground a grounding point such as the bracket, before handling
boards and adapters to minimize the potential for static damage.
7
✓ If the static problem is extreme, you can resort to other measures. One is to
use a grounded anti-static mat underneath the computer.
4. Power Line Noise
To run properly, a computer system requires a steady supply of clean and
noise-free power. During the site preparation of a system installation, make sure
that you have a steady supply of clean power.
✓ If possible, the computer should be on its circuit with its circuit breaker.

Cleaning Computer’s Components and Peripherals


To help you determine how often you need to clean your computer, use a chart to determine
how often you clean your computer's environment.
You can use this guide questions:
➢ Where is the computer located?
➢ Computer environment
➢ Who uses your computer?
General Cleaning Tips
1. Never spray or squirt any liquid onto any computer component.

NOTE:
If a spray is needed, spray the liquid onto a cloth and then use that cloth to
rub-down the component.

2. Use the vacuum to suck up dirt, dust, or hair around the computer on the outside case.

NOTE:
Do not use a vacuum inside your system unit as it generates a lot of static
electricity that can damage the internal components. If you need to use a
vacuum to clean the inside of your computer, use a portable battery-powered
vacuum designed to do this job, or try using compressed air.

3. Turn off the computer before cleaning it.


4. Be cautious when using any cleaning solvents; some individuals may have allergic
reactions to chemicals while some solvents can even damage the case. Try to always use
water or a highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or controls. Also, when
cleaning the back of the computer, if anything is plugged in, make sure not to disconnect
any of the plugs.
6. When cleaning fans, especially the small fans within a portable computer or laptop it is
suggested that you either hold the fan or place something in-between the fan blades to
prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a
vacuum may cause damage or back voltage to be generated.
7. Never eat or drink around the computer.

8
Cleaning tools:
➢ The cloth is the best tool to use when rubbing down a component; although paper
towels can be used with most hardware, we recommend using a cloth whenever
possible.

CAUTION:
We only suggest you use a cloth when cleaning components such as the
outside of the case, a drive, mouse, etc. You should not use a cloth to clean
any circuitry such as the RAM or motherboard since they can generate
electrostatic that can damage electronics.

➢ Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing
alcohol. Other solvents may be bad for the plastics used within your computer.
➢ Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles
out of a computer can be one of the best methods of cleaning a computer. Over time,
these items can restrict the airflow in a computer and cause the circuitry to corrode.
Do not use a standard vacuum as it can generate a lot of static electricity that can
damage your computer.
➢ Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent
tools for wiping hard-to-reach areas in your keyboard, mouse, and other locations.
➢ Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam
swabs.

Cleaning the Parts of the Computer and the Peripherals


1. Case cleaning - Keeping the appearance of the computer looking new. During cleaning,
if ventilation locations are found, these can be cleaned helping the case keep a steady
airflow to the computer, keeping components cool and in good working condition.

Procedure:
✓ Use a clean lint-free cloth that has been slightly dampened with water for
plastic case of PC components.
✓ For stubborn stains, add a little household detergent to the cloth and never
use a solvent cleaner on plastics.
✓ Make sure all vents and air holes are hair and lint-free by rubbing a cloth
over the holes and vents.
✓ Take a vacuum around each of the holes, vents, and crevices on the
computer.
✓ Use a standard vacuum when cleaning the outside vents of a computer;
however, if you need to clean the inside of the computer, use a portable
battery-powered vacuum to prevent static electricity.

9
2. CD-ROM, DVD, and other disc drive cleaning
A dirty CD-ROM drive or other disc drives can cause read errors when reading discs.
These read errors could cause software installation issues or issues while running the
program.

Procedure:

✓ Purchase a CD-ROM cleaner from your local retailer.


✓ Use a cloth dampened with water to clean the tray that ejects from the drive.
✓ Dry before putting the tray back into the drive.

3. CD and DVD Cleaning

Procedure:

✓ Use a cleaning kit or normal clean cotton cloth or shirt.


✓ Use a clean cotton cloth or shirt to wipe against the tracks, starting from
the middle of the CD or DVD and wiping towards the outer side as shown
in the below picture.
4. Hard drive cleaning
To help improve the performance of your computer, perform the basic troubleshooting
steps.

5. Headphones Cleaning

Procedure:

✓ Moisten a cloth with warm water and rub the head and earpieces for plastic
or vinyl headphones
✓ Replace the cushions of your headphones.

6. Keyboard Cleaning

Procedure:

✓ Before cleaning the keyboard first, turn off the computer or if you're using
a USB keyboard unplug it.

More effective methods of cleaning the keyboard


✓ using compressed air.
✓ use a vacuum cleaner but make sure the keyboard does not have loose "pop off"
keys that could be sucked up by the vacuum.
✓ If you wish to clean the keyboard more extensively, you'll need to remove the keys
from the keyboard
✓ After the dust, dirt, and hair have been removed. Spray a disinfectant onto a cloth
or use disinfectant cloths and rub each of the keys on the keyboard.

10
7. CD Cleaning

Procedure:

✓ Do not spray any liquids onto the LCD directly, press gently while cleaning.
✓ Do not use a paper towel as it may cause the LCD to become scratched.
✓ Use a non-rugged microfiber cloth, soft cotton cloth, or Swiffer duster.
✓ Apply to rub alcohol to the cloth and wipe the screen with the damp cloth,
but clean the LCD before it leaves the factory.

8. Motherboard Cleaning

Caution:

✓ When working inside the computer, take the necessary ESD precautions
and try to avoid unplugging any cables or other connections.

Procedure:
✓ Use compressed air.
✓ When using compressed air, hold it in the upright position; otherwise, it is
possible chemicals may come out of the container that could damage or
corrode the Motherboard or other component within the computer.
✓ Ensure when using compressed air that you always blow the dust or dirt
away from the motherboard, or out of the case.

9. Mouse Cleaning

Procedure:
✓ To clean the rollers of an optical-mechanical mouse, you must first remove
the bottom cover of the mouse.
✓ Examine the bottom of the mouse to see which direction the mouse cover
should be rotated
✓ The mouse cover must be moved counter-clockwise
✓ Place two fingers on the mouse cover and push the direction of the arrows.

10. Printer Cleaning

Procedure:

✓ Turn off the printer before cleaning.


✓ Use damp cloth or rubbing alcohol and wipe the case and each of the
buttons or knobs on the printer.

11
11. Scanner Cleaning

Procedure:

✓ Clean a flatbed scanner's surface by spraying a window cleaner onto a


paper towel or cotton cloth and wipe the glass until clean.
✓ To clean the outside of the scanner, the same towel or cotton cloth can be
used.

Speeding up Computer System


These are the three categories of diagnostic disks:
1. Whole Machine Diagnostic
✓ Tests the memory, the microprocessor, the DMA chips, the numeric coprocessor,
and the optical disc and hard drives, the serial, the parallel ports or the VGA/DVI
ports, the video card, the mouse, and the keyboard.
✓ Provide full system configuration information (including the interrupt and memory
address used by each place of hardware.
2. Disk/Data Diagnostics
✓ Concentrate on the disk drives and the data structures of the hard disk and/or
floppy disk, patiently reading each sector in search of corrupted data.
3. System Snoopers
✓ Report on the hardware and software installed in the computer plus interrupts and
addresses used by the hardware, but do not attempt to test it.

NOTE:
Diagnostic program error messages, your computer’s BIOS ROM error
messages, and DOS error messages are all based on the educated guess.
Use the information these error messages give you, but remember they are
not infallible. Several of the diagnostic programs that are currently on the
market are:
✓ Whole System Utilities
✓ Diagnostic and Data Recovery Utilities

Regular Maintenance
Three(3) steps you have to take to fix Bad sectors, and some files or folders may be
missing:
1. Defragment Disk
It is the process used to scan the files system and reduce the amount of fragmentation in
file systems.
A. Using Windows XP/7
1. Go to Start Button.
2. Click Programs.
3. Click Accessories.
4. Click System Tools.
5. Click Disk Defragment.
12
B. Using Windows 8/10
1. Go/Search My Computer.
2. Right click your drive (example: System C).
3. Click Properties.
4. Click the Tools tab.
5. Click Optimize.
6. Choose the drive that you would like to defrag.
7. Click Analyze.
8. After analyzing, click Optimize.
9. Finally, click Ok to exit the Disk Defragment Disk dialog box.

2. Scandisk
A utility in Microsoft Windows that checks your drive to make sure there aren’t any
problems with it.

A. Using Windows XP/7


1. Double Click My Computer.
2. Right-Click the hard disk (example: System C:).
3. Click Properties.
4. Click the Tools tab.
5. Under “Error-checking”, click “Check Now”.
6. To repair errors without scanning the volume for bad sectors, select the
“Automatically fix file system errors” check box.
7. To repair errors, locate bad sectors, and recover readable information, select the
“Scan for and attempt recovery of bad sectors” check box.
8. Click Start.

NOTE:
If you receive the following message: “The disk check could not be
performed because the disk check utility needs exclusive access to some
Windows files on the disk. These files can be accessed by restarting Windows.
Do you want to schedule the disk check to occur the next time you restart the
computer? Click “Yes” to schedule the disk check, and then restart your computer
to start the disk check.

3. Disk Clean Up
It helps you free up space on your hard disk to improve the performance of your computer.
The tool identifies files that you can safely delete, and then enables you to choose whether
you want to delete some or all of the identified files.
This regular maintenance result to:
✓ Remove temporary Internet files.
✓ Remove downloaded program files (such as MS ActiveX controls and Java
applets).
✓ Empty the Recycle Bin.
✓ Remove Windows temporary files such as error reports.
✓ Remove optional Windows components that you do not use.
13
✓ Remove installed programs that you no longer use.
✓ Remove unused restore points and shadow copies from System Restore.

Disk Cleanup Utility Procedures: (Windows XP/Vista/7)


1. Click Start.
2. Click All Programs.
3. Click System Tools.
4. Click Disk Clean Up.
5. Choose the drive that you would like to clean up.
6. Wait for the Disk Cleanup will now calculate how much space you will be able to
free on your selected drive.
7. A new window will be displayed on your screen, scroll through the content in the
files to delete the list, check the checkboxes for files that you want to delete.
8. Click Ok.
9. Under Description, click Clean up system files as shown in the screenshot above,
specify the drive you want to clean, wait for the calculation to be done again.
10. Click the More Options tab.
11. To uninstall programs and features that are no longer in use, click Clean up under
the Programs and Features section.
12. To remove shadow copy files and system restore points, click Clean up under the
System Restore and Shadow Copies section.

Removing Viruses From Infected Machines

VIRUS - Viral Information Resource Under Siege


➢ A destructive executable program that infects the other programs in the system and
spreads by replicating itself.
➢ It is designed to damage the victim’s computer files.
➢ It is coded by malicious programmers in a way that they can spread in the system
without one's permission and knowledge.
➢ It damages your software, your hardware, and your files.

Worm
➢ It generally spreads without user action and distributes complete copies (possibly
modified) of itself across networks.
➢ It can consume memory or network bandwidth, thus causing a computer to stop
responding.

Spyware
➢ Technology that aids in gathering information about a person or organization without
their knowledge.
➢ Can overload your system and shut down other services.

Trojan Horse
➢ A computer program that appears to be useful software, but instead compromises your
security and causes a lot of damage.
14
Malware
➢ A virus that refers to malicious software.
➢ A software designed specifically to damage or disrupt a system, such as a virus or a
Trojan horse.

Aspects of Computer Virus


➢ Finder. searches for the new uninfected file.
➢ Replicator. actually targets these files and infects them by multiplying themselves.

Effects of Virus on Computer System


➢ It corrupts files.
➢ It slows down the speed of the computer system.
➢ It causes the system to hang frequently.
➢ It deletes various files.

Sources of Virus Infection:


➢ Infected CDs, DVDs, pen drives, etc
➢ E-mail
➢ Browsing infected sites
➢ Downloading files from the internet

Types of viruses and Examples:


1. Boot viruses
✓ It infects floppy disk boot records or master boot records in hard disks.
✓ It replaces the boot record program (which is responsible for loading the operating
system in-memory) copying it elsewhere on the disk or overwriting it.
✓ It loads into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus

2. Program viruses
✓ It infects executable program files, such as those with extensions. BIN, .COM,
.EXE, .OVL, .DRV (driver) and.SYS (device driver).
✓ These programs are loaded in memory during execution, taking the virus with
them.
✓ The virus becomes active in memory, making copies of itself and infecting files on
disk.
Examples: Sunday, Cascade

3. Multipartite viruses
✓ A hybrid of Boot and Program viruses.
✓ It infects program files and when the infected program is executed, these viruses
infect the boot record.
Examples: Invader, Flip, and Tequila

15
4. Stealth viruses
✓ These viruses use certain techniques to avoid detection. They may either redirect
the disk head to read another sector instead of the one in which they reside or they
may alter the reading of the infected file’s size shown in the directory listing. size
is given in the directory.
Examples: Frodo, Joshi, Whale

5. Polymorphic viruses
✓ A virus can encrypt its code in different ways so that it appears differently in each
infection.
✓ These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

6. Macro Viruses
✓ A macro virus is a new type of computer virus that infects the macros within a
document or template.
✓ When you open a word processing or spreadsheet document, the macro virus is
activated and it infects the Normal template.
Examples: DMV, Nuclear, Word Concept.

Antivirus Software
➢ Symantec Norton antivirus
➢ AVG antivirus
➢ McAfee Scan
➢ Microsoft Antivirus

Ways on How to Remove Viruses


➢ Buy or download an antivirus software
➢ Install the antivirus software
➢ Update antivirus software with the latest virus definitions
➢ Do a complete system scan

Methods of Eliminating Viruses


➢ Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.
➢ Quarantine – This is done when the virus cannot be easily identified removed from the
file and the removal of the virus means the removal of the complete file. In this method,
although the virus is not eliminated, it is rendered inactive by moving the file into
"quarantine" and renaming it.

Anti-Spyware Programs
Spyware is typically placed on your system by visiting websites and installing software.
Typical signs that you have spyware
✓ You have a lot of popup windows when visiting the web or just logging on to
your system.
✓ Your homepage has changed to a different site.
16
✓ You notice a major drop in system performance.
✓ Your anti-spyware or antivirus utility stops working.
✓ You go to search for things and your search page has changed.
✓ New items appear in your favorites.
✓ In many cases, there are no signs and it is running silently recording your
actions.

Protection from Spyware


✓ Use a popup blocker like Google Toolbar, or the one that comes with Firefox
and Internet Explorer.
✓ Install Anti-Spyware utilities.
✓ Some that we recommend are Ad-aware, Spybot - Search and Destroy, and
CWShredder.

Windows updates
➢ It fix bugs and plug security holes in Windows, the 'security holes' are used by worms,
viruses, and hackers to compromise your system.
➢ The first time you do the procedure, it may take a long time.
➢ It repeats the update procedure at least once per month.

Updating Windows
1. Search for Windows Update.
2. Ensure that you are in the administrator account .
3. Run Internet Explorer.
4. Click on the 'Tools' menu, then the 'Windows Update' option.
5. You will see the 'Microsoft checking your system' screen. If you are asked to download
a module - click the 'Yes' button.
6. If you are asked, click the 'Install Now' button.
7. Click on 'Express Install' option.
8. You will probably be prompted to reboot your system. When rebooted – restart
'Windows Update'.
9. Click on the 'Express Install' Option.
10. Keep clicking on the 'Install' button until there are no more patches to install.
11. Reboot your system if asked to do so.

Configure a schedule for Automatic Updates


1. Click Start or search for Control Panel.
2. Double-click System.
3. Click the Automatic Updates tab.
4. Click either Automatic download the updates, and install them on the schedule that I
specify or Download updates for me, but let me choose when to install them.
5. Select the day and time that you want to download and install updates when you know
your computer will be up.
If you select the 2nd option, you will see a globe or a shield appear in your taskbar and
you should click on it when it shows up.

17
Back Up Files
➢ To make sure you do not lose important files if your computer stops working, you
should back up your computer regularly.
➢ Choose backup storage
✓ the external hard disk drive
✓ removable disk drive, such as a CD

To back up your files to an external hard disk drive


1. Click Start.
2. Point to Accessories.
3. Click System Tools.
4. Click Backup.
If the Backup option does not appear on the System Tools menu, you can install it
5. The Backup or Restore Wizard appears. Click Next.
6. On the Backup or Restore page, click Next.
7. On the What to Back Up page, click All information on this computer, and then click
Next.
8. On the Backup Type, Destination, and Name page, click Choose a place to save
your backup and select your external hard disk drive. Then click Next.
9. On the Completing the Backup or Restore Wizard page, click Finish.
10. When the backup is complete, click Close.

Schedule backups
1. Click Start.
2. Point to Accessories.
3. Click System Tools.
4. The Backup or Restore Wizard appears. Click Next.
5. On the Backup or Restore page, click Next.
6. On the What to Back Up page, click All information on this computer, and then click
Next.
7. On the Backup Type, Destination, and Name page, click Choose a place to save
your backup and select your external hard disk drive. Then click Next.
8. On the Completing the Backup or Restore Wizard page, click Advanced.
9. On the Type of Backup page, click Next.
10. On the How to Back Up page, click Next.
11. On the Backup Options page, select Replace the existing backups. Then click
Next.
12. On the When to Back Up page, click Later. In the Job name box, type Backup.
Then click Set Schedule.
13. On the Schedule tab in the Schedule Job dialog box, click the Schedule Task list,
and then click Weekly.
14. Specify a time of day on the Start time and in the Schedule Task Weekly.
15. Click the Settings tab. Select the Wake the computer to run this task check box.
16. Click OK.
17. In the Set Account Information dialog box, type your password in both the
Password and Confirm password fields. Then click OK.
18
18. On the When to Back Up page, click Next.
19. In the Set Account Information dialog box, type your password in both the
Password and Confirm password fields. Then click OK.
20. In the Account Information Warning dialog box, click OK and Finish.

Changing an installed program


1. Click Start or search for Control Panel.
2. Double-click Add or Remove Programs.
3. In the Currently installed programs box, click the program that you want to remove.
4. Click Change or Change/Remove.
5. Follow the instructions that appear on the screen to make the changes that you want.

Removing an installed program


1. Click Start or search for Control Panel.
2. Double-click Add or Remove Programs.
3. In the Currently installed programs box, click the program that you want to remove.
4. Click Remove.
5. If you are prompted to confirm the removal of the program, click Yes.

Activity:
Directions: Write FACT if the statement is correct and BLUFF if it is incorrect. Write
your answer in a separate sheet.

1. Be cautious when using any cleaning solvents; some individuals may have allergic
reactions to chemicals while some solvents can even damage the case.
2. Use a vacuum inside your computer as it generates a lot of static electricity that can
damage the internal components of your computer.
3. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub-down
the component
4. If you need to use a vacuum to clean the inside of your computer, use a portable
battery-powered vacuum designed to do this job, or try using compressed air
5. Eat or drink around the compute
6. Never spray or squirt any liquid onto any computer component.
7. Vacuums can be used to suck up dirt, dust, or hair around or inside the computer.
8. Turn off the computer before cleaning it.
9. When cleaning fans, especially the small fans within a portable computer or laptop its
suggested that you either hold the fan or place something in-between the fan blades
to prevent it from spinning.
10. When cleaning, be careful not to accidentally adjust any knobs or controls. Also, when
cleaning the back of the computer, if anything is plugged in, make sure to connect any
of the plugs

19
.
Independent Activity 1: Cache
Instructions: (Please refer to page 28 for the rubrics).

Cache
➢ Temporary Internet Files folder contains a kind of travel record of the items
you have seen, heard, or downloaded from the Web, including images,
sounds, Web pages, even cookies
➢ Storing these files in your cache can make browsing the Web faster because
it usually takes your computer less time to display a Web page when it can
call up some of the page's elements or even the entire page from your local
Temporary Internet Files folder

1. Make your video tutorial on how to Clear your Browser’s Cache by following the
given steps below.
2. Upload your video tutorial to your google drive or youtube channel.
3. Share the link with your teacher.

Clearing Your Browser's Cache


1. On the Internet Explorer Tools menu, click Internet Options.
2. Click the General Tab.
3. Click the Temporary Internet Files .
4. Click the Delete Files button .
a. To clear the cache whenever you close Internet Explorer, go to the
.Tools menu .
b. Click Internet Options.
c. Click the Advanced tab.
d. In the "Settings" box, scroll down to the section labeled "Security,".
e. Click to check the box next to the "Empty Temporary Internet Files
folder when browser the is closed" option.
f. Click OK to finish.

Independent Assessment 1:
Direction: Choose the letter of the correct answer. Write your answer in a separate
sheet.

A. Malware D. Virus
B. Spyware E. Worm
C. Trojan Horse

1. A computer program that appears to be useful software, but instead compromises your
security and causes a lot of damage.
2. A destructive executable program that infects the other programs in the system and
spreads by replicating itself.
3. A software designed specifically to damage or disrupt a system, such as a virus or a
Trojan Horse.
20
4. Any technology that aids in gathering information about a person or organization
without their knowledge.
5. It can consume memory or network bandwidth, thus causing a computer to stop
responding.
6. It can overload your system and shut down other services.
7. It damages your software, your hardware, and your files.
8. It generally spreads without user action and distributes complete copies (possibly
modified) of itself across networks.
9. It is coded by malicious programmers in a way that they can spread in the system
without one's permission and knowledge.
10. It is designed to damage the victim’s computer files.

Independent Activity 2:
Instructions: (Please refer to page 28 for the rubrics).

1. Please watch this video: https://youtu.be/B96Qc9dS8Ag


2. Enumerate the steps chronologically on how to perform disk clean up

Independent Assessment 2:
Directions: Arrange the steps chronologically using the numbers. Write your answer
in a separate sheet.

Updating Windows(1-10)
1. Click on 'Express Install' option.
2. Click on the 'Express Install' Option.
3. Click on the 'Tools' menu, then the 'Windows Update' option.
4. Ensure that you are in the administrator account.
5. If you are asked, click the 'Install Now' button.

21
6. Keep clicking on the 'Install' button until there are no more patches to install then reboot
your system if asked to do so.
7. Run Internet Explore.r
8. Search for Windows Update.
9. You will probably be prompted to reboot your system. When rebooted – restart
'Windows Update'.
10. You will see the 'Microsoft checking your system' screen. If you are asked to download
a module - click the 'Yes' button.

Independent Activity 3: Configure Firewall


Instructions: (Please refer to page 28 for the rubrics).

1. Please watch this video: https://youtu.be/B96Qc9dS8Ag


2. Enumerate the steps chronologically on how to disk defrag base on the video.

Independent Assessment 3: Arrange Me


Directions: Arrange the steps chronologically using the numbers. Write your answer
in a separate sheet.

A. Changing an installed program (1-5)


1. Click Change or Change/Remove.
2. Click Start or search for Control Panel.
3. Double-click Add or Remove Programs.
4. Follow the instructions that appear on the screen to make the changes that you
want.
5. In the Currently installed programs box, click the program that you want to remove.

22
B. How to remove an installed program? (1-5)
1. Click Remove.
2. Click Start or search for Control Panel.
3. Double-click Add or Remove Programs.
4. If you are prompted to confirm the removal of the program, click Yes.
5. In the Currently installed programs box, click the program that you want to remove.

Directions. Answer the following questions by completing the given sentences


below. Write your answer in a separate sheet. (Please refer to page 28 for the
rubrics).

1. Back Up is __________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2. Windows Update helps________________________________________________


___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

Instructions: (Please refer to page 28 for the rubrics).

1. Collage pictures on how to clean the parts of the computer and the peripherals.
2. Write down procedures below the picture on how to clean the parts of the
computer and the peripherals

Post Test:
Direction: Write the letter of the correct answer in a separate sheet.

1. The “brain” of the computer, and controls most of the work done.
a. AMD c. Processor
b. Hard Drive d. RAM

23
2. It refers to the main working memory in a computer.
a. AMD c. Processor
b. Hard Drive d. RAM

3. It is the computer’s primary storage area that stores the applications and programs.
a. AMD c. Processor
b. Hard Drive d. RAM

4. It is standard on PCs and allows the information on a compact disc (either data or
audio) to be read and written to by the PC.
a. CD c. CD/DVD /R
b. CD R/W d. DVD

5. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals (graphics and video) output by the computer.
a. Graphics and RAM c. RAM and ROM
b. Graphics and Sound Cards d. Sound Cards and RAM

6. Computers running high-end applications generally require a separate


__________ graphics card.
a. 1024MB c. 256MB
b. 128MB d. 512MB

7. It allows a computer to be connected to a network.


a. Network Interface Card c. Network Internet Card
b. Network Interface Cord d. Network Internet Cord

8. It is recommended, and the most common Operating System prescribed in schools


as it meets the minimum system requirements with maximum usability.
a. Linux c. OpenSolaris
b. MacOS d. Windows

9. An open-source free operating system that is not widely used by schools at


present, though it may be suitable for schools who are aware of its capabilities.
a. Linux c. OpenSolaris
b. MacOS d. Windows

10. A computer operating system developed by Sun Microsystems.


a. Linux c. OpenSolaris
b. MacOS d. Windows

11. It is used to connect your wired network adapters to a router or network switch.
a. Cable Modem c. Wireless Network Adapters
b. Ethernet Cabling d. Wireless Router

24
12. It connects all your computers, either through Ethernet cables or a wireless
connection.
a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput

13. The speed at which a router can transfer data.


a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput

14. Which of the following are the two ports at the back of the router?
a. LAN and MAN c. WAN and MAN
b. LAN and WAN d. b and c

15. It is currently the most secured type of wireless encryption.


a. WEP c. WPA2
b. WPA d. all of the above.

Instructions: (Please refer to page 28 for the rubrics).

1. Choose only two (2) computer parts/peripherals which you think are the most
important parts that need to clean.
2. Show the steps on how to clean your chosen computer parts/peripherals thru
pictures.

25
26
What I Know What’s In:
1. c 6. c 11. b 1. T
2. d 7. a 12. b 2. F
3. b 8. d 13. d 3. T
4. b 9. a 14. b 4. F
5. b 10. c 15. c 5. F
What Is It:
What Is It: Activity 1: Independent Assessment 1:
1. Fact 6. Fact 1. C 6. B
2. Bluff 7. Bluff 2. D 7. D
3. Fact 8. Bluff 3. A 8. E
4. Fact 9. Fact 4. B 9. D
5. Bluff 10. Bluff 5. E 10. D
Independent Assessment 2: Independent Assessment 3:
1. 7 6. 10 A. 1. 4 B. 1. 4
2. 9 7. 3 2. 1 2. 1
3. 4 8. 1 3. 2 3. 2
4. 2 9. 8 4. 5 4. 5
5. 6 10. 5 5. 3 5. 3
Assessment
1. c 6. c 11. b
2. d 7. a 12. b
3. b 8. d 13. d
4. b 9. a 14. b
5. b 10. c 15. c
References

A. Book Reference:

Technical Education & Skills Development Authority I Connect Global Institute, Inc. Ocampo,
Camarines Sur, Computer System Servicing NC II ” Maintain Computer Systems and
Networks”, Nelson P. Alde Jr., April 17, 2015, pp: 13 – 48

B. Electronic Reference:

Google pdf. e-chs_lm_module4_q3-q4dec.pdf, “Maintaining Computer and Network


Systems”, pp: 187-204
http://amparonians.weebly.com/uploads/5/4/6/2/54623275/e-chs_lm_module4_q3-
q4dec.pdf

27
Appendices

What I Have Learned

CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar

Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely

Independent Activity 1-3/What I Can Do/Additional Activity

20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _

28
For inquiries or feedback, please write or call:

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph

29

You might also like