Professional Documents
Culture Documents
Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.
1
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!
2
This module encourages you to be familiar with how to validate one’s work
for quality improvement work. Different activities are provided for you to be able
to:
1. Identify how to use appropriate PPE in line with standard procedures.
2. Enumerate how to check the normal function of computer systems and
networks in accordance with manufacturer‘s instructions.
3. Determine how to perform scheduled/ periodic maintenance in
accordance with manufacturer ‘s requirements.
4. Familiarize yourselves on how to repair materials when needed in
accordance with established procedures.
5. Replace materials when needed in accordance with establish
procedures.
6. Respond to unplanned events or conditions in accordance
with established procedures.
Pre-Test
Directions: Choose the best answer. Write the letter of the correct answer in a
separate sheet.
1. The “brain” of the computer, and controls most of the work done.
a. AMD c. Processor
b. Hard Drive d. RAM
3. It is the computer’s primary storage area that stores the applications and programs.
a. AMD c. Processor
b. Hard Drive d. RAM
4. It is standard on PCs and allows the information on a compact disc (either data or
audio) to be read and written to by the PC.
a. CD c. CD/DVD/R
b. CD R/W d. DVD
3
5. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals (graphics and video) output by the computer.
a. Graphics and RAM c. RAM and ROM
b. Graphics and Sound Cards d. Sound Cards and RAM
11. It is used to connect your wired network adapters to a router or network switch.
a. Cable Modem c. Wireless Network Adapters
b. Ethernet Cabling d. Wireless Router
12. It connects all your computers, either through Ethernet cables or a wireless
connection.
a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput
14. Which of the following are the two ports at the back of the router?
a. LAN and MAN c. WAN and MAN
b. LAN and WAN d. b and c
4
15. It is currently the most secured type of wireless encryption.
a. WEP c. WPA2
b. WPA d. all of the above.
Directions: Look for the following word(s) inside the puzzle by drawing a straight line
in each word(s) that you can see inside the puzzle. Copy the puzzle and answer it on
a separate sheet of paper.
Contingency
Diagnose
Maintenance
Procedures
Repair
5
Windows and other Microsoft products have their built-in troubleshooting
tools that bear little or no resemblance to the Fix-It troubleshooters.
Windows 7's Action Center Control Panel applet alerts you to system
problems via an icon in the taskbar's notification area. You can also use the
Action Center to view the machine's security and maintenance status.
Here are the steps to find about a dozen options for fixing problems related to program
compatibility, hardware and audio, networking, security, Windows Update, performance, and
power usage.
1. Click on the Start Button.
2. Choose Control Panel.
3. Select System and Security.
4. Choose Action Center.
5. On the Action Center, browse and check all the options for systems check:
✓ Security (View Anti-Spyware Programs, update virus protection)
✓ Maintenance (Perform System Maintenance, Check for Solutions for unreported
problems, Setup Backup)
✓ Troubleshooting
✓ Recovery
NOTE
Windows Security Center can help enhance:
➢ computer's security by checking the status of several security
essentials on your computer
➢ firewall settings
➢ Windows automatic updating
➢ anti-malware software settings
➢ Internet security settings
➢ User Account Control settings
NOTE:
If a spray is needed, spray the liquid onto a cloth and then use that cloth to
rub-down the component.
2. Use the vacuum to suck up dirt, dust, or hair around the computer on the outside case.
NOTE:
Do not use a vacuum inside your system unit as it generates a lot of static
electricity that can damage the internal components. If you need to use a
vacuum to clean the inside of your computer, use a portable battery-powered
vacuum designed to do this job, or try using compressed air.
8
Cleaning tools:
➢ The cloth is the best tool to use when rubbing down a component; although paper
towels can be used with most hardware, we recommend using a cloth whenever
possible.
CAUTION:
We only suggest you use a cloth when cleaning components such as the
outside of the case, a drive, mouse, etc. You should not use a cloth to clean
any circuitry such as the RAM or motherboard since they can generate
electrostatic that can damage electronics.
➢ Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing
alcohol. Other solvents may be bad for the plastics used within your computer.
➢ Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles
out of a computer can be one of the best methods of cleaning a computer. Over time,
these items can restrict the airflow in a computer and cause the circuitry to corrode.
Do not use a standard vacuum as it can generate a lot of static electricity that can
damage your computer.
➢ Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent
tools for wiping hard-to-reach areas in your keyboard, mouse, and other locations.
➢ Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam
swabs.
Procedure:
✓ Use a clean lint-free cloth that has been slightly dampened with water for
plastic case of PC components.
✓ For stubborn stains, add a little household detergent to the cloth and never
use a solvent cleaner on plastics.
✓ Make sure all vents and air holes are hair and lint-free by rubbing a cloth
over the holes and vents.
✓ Take a vacuum around each of the holes, vents, and crevices on the
computer.
✓ Use a standard vacuum when cleaning the outside vents of a computer;
however, if you need to clean the inside of the computer, use a portable
battery-powered vacuum to prevent static electricity.
9
2. CD-ROM, DVD, and other disc drive cleaning
A dirty CD-ROM drive or other disc drives can cause read errors when reading discs.
These read errors could cause software installation issues or issues while running the
program.
Procedure:
Procedure:
5. Headphones Cleaning
Procedure:
✓ Moisten a cloth with warm water and rub the head and earpieces for plastic
or vinyl headphones
✓ Replace the cushions of your headphones.
6. Keyboard Cleaning
Procedure:
✓ Before cleaning the keyboard first, turn off the computer or if you're using
a USB keyboard unplug it.
10
7. CD Cleaning
Procedure:
✓ Do not spray any liquids onto the LCD directly, press gently while cleaning.
✓ Do not use a paper towel as it may cause the LCD to become scratched.
✓ Use a non-rugged microfiber cloth, soft cotton cloth, or Swiffer duster.
✓ Apply to rub alcohol to the cloth and wipe the screen with the damp cloth,
but clean the LCD before it leaves the factory.
8. Motherboard Cleaning
Caution:
✓ When working inside the computer, take the necessary ESD precautions
and try to avoid unplugging any cables or other connections.
Procedure:
✓ Use compressed air.
✓ When using compressed air, hold it in the upright position; otherwise, it is
possible chemicals may come out of the container that could damage or
corrode the Motherboard or other component within the computer.
✓ Ensure when using compressed air that you always blow the dust or dirt
away from the motherboard, or out of the case.
9. Mouse Cleaning
Procedure:
✓ To clean the rollers of an optical-mechanical mouse, you must first remove
the bottom cover of the mouse.
✓ Examine the bottom of the mouse to see which direction the mouse cover
should be rotated
✓ The mouse cover must be moved counter-clockwise
✓ Place two fingers on the mouse cover and push the direction of the arrows.
Procedure:
11
11. Scanner Cleaning
Procedure:
NOTE:
Diagnostic program error messages, your computer’s BIOS ROM error
messages, and DOS error messages are all based on the educated guess.
Use the information these error messages give you, but remember they are
not infallible. Several of the diagnostic programs that are currently on the
market are:
✓ Whole System Utilities
✓ Diagnostic and Data Recovery Utilities
Regular Maintenance
Three(3) steps you have to take to fix Bad sectors, and some files or folders may be
missing:
1. Defragment Disk
It is the process used to scan the files system and reduce the amount of fragmentation in
file systems.
A. Using Windows XP/7
1. Go to Start Button.
2. Click Programs.
3. Click Accessories.
4. Click System Tools.
5. Click Disk Defragment.
12
B. Using Windows 8/10
1. Go/Search My Computer.
2. Right click your drive (example: System C).
3. Click Properties.
4. Click the Tools tab.
5. Click Optimize.
6. Choose the drive that you would like to defrag.
7. Click Analyze.
8. After analyzing, click Optimize.
9. Finally, click Ok to exit the Disk Defragment Disk dialog box.
2. Scandisk
A utility in Microsoft Windows that checks your drive to make sure there aren’t any
problems with it.
NOTE:
If you receive the following message: “The disk check could not be
performed because the disk check utility needs exclusive access to some
Windows files on the disk. These files can be accessed by restarting Windows.
Do you want to schedule the disk check to occur the next time you restart the
computer? Click “Yes” to schedule the disk check, and then restart your computer
to start the disk check.
3. Disk Clean Up
It helps you free up space on your hard disk to improve the performance of your computer.
The tool identifies files that you can safely delete, and then enables you to choose whether
you want to delete some or all of the identified files.
This regular maintenance result to:
✓ Remove temporary Internet files.
✓ Remove downloaded program files (such as MS ActiveX controls and Java
applets).
✓ Empty the Recycle Bin.
✓ Remove Windows temporary files such as error reports.
✓ Remove optional Windows components that you do not use.
13
✓ Remove installed programs that you no longer use.
✓ Remove unused restore points and shadow copies from System Restore.
Worm
➢ It generally spreads without user action and distributes complete copies (possibly
modified) of itself across networks.
➢ It can consume memory or network bandwidth, thus causing a computer to stop
responding.
Spyware
➢ Technology that aids in gathering information about a person or organization without
their knowledge.
➢ Can overload your system and shut down other services.
Trojan Horse
➢ A computer program that appears to be useful software, but instead compromises your
security and causes a lot of damage.
14
Malware
➢ A virus that refers to malicious software.
➢ A software designed specifically to damage or disrupt a system, such as a virus or a
Trojan horse.
2. Program viruses
✓ It infects executable program files, such as those with extensions. BIN, .COM,
.EXE, .OVL, .DRV (driver) and.SYS (device driver).
✓ These programs are loaded in memory during execution, taking the virus with
them.
✓ The virus becomes active in memory, making copies of itself and infecting files on
disk.
Examples: Sunday, Cascade
3. Multipartite viruses
✓ A hybrid of Boot and Program viruses.
✓ It infects program files and when the infected program is executed, these viruses
infect the boot record.
Examples: Invader, Flip, and Tequila
15
4. Stealth viruses
✓ These viruses use certain techniques to avoid detection. They may either redirect
the disk head to read another sector instead of the one in which they reside or they
may alter the reading of the infected file’s size shown in the directory listing. size
is given in the directory.
Examples: Frodo, Joshi, Whale
5. Polymorphic viruses
✓ A virus can encrypt its code in different ways so that it appears differently in each
infection.
✓ These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
6. Macro Viruses
✓ A macro virus is a new type of computer virus that infects the macros within a
document or template.
✓ When you open a word processing or spreadsheet document, the macro virus is
activated and it infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software
➢ Symantec Norton antivirus
➢ AVG antivirus
➢ McAfee Scan
➢ Microsoft Antivirus
Anti-Spyware Programs
Spyware is typically placed on your system by visiting websites and installing software.
Typical signs that you have spyware
✓ You have a lot of popup windows when visiting the web or just logging on to
your system.
✓ Your homepage has changed to a different site.
16
✓ You notice a major drop in system performance.
✓ Your anti-spyware or antivirus utility stops working.
✓ You go to search for things and your search page has changed.
✓ New items appear in your favorites.
✓ In many cases, there are no signs and it is running silently recording your
actions.
Windows updates
➢ It fix bugs and plug security holes in Windows, the 'security holes' are used by worms,
viruses, and hackers to compromise your system.
➢ The first time you do the procedure, it may take a long time.
➢ It repeats the update procedure at least once per month.
Updating Windows
1. Search for Windows Update.
2. Ensure that you are in the administrator account .
3. Run Internet Explorer.
4. Click on the 'Tools' menu, then the 'Windows Update' option.
5. You will see the 'Microsoft checking your system' screen. If you are asked to download
a module - click the 'Yes' button.
6. If you are asked, click the 'Install Now' button.
7. Click on 'Express Install' option.
8. You will probably be prompted to reboot your system. When rebooted – restart
'Windows Update'.
9. Click on the 'Express Install' Option.
10. Keep clicking on the 'Install' button until there are no more patches to install.
11. Reboot your system if asked to do so.
17
Back Up Files
➢ To make sure you do not lose important files if your computer stops working, you
should back up your computer regularly.
➢ Choose backup storage
✓ the external hard disk drive
✓ removable disk drive, such as a CD
Schedule backups
1. Click Start.
2. Point to Accessories.
3. Click System Tools.
4. The Backup or Restore Wizard appears. Click Next.
5. On the Backup or Restore page, click Next.
6. On the What to Back Up page, click All information on this computer, and then click
Next.
7. On the Backup Type, Destination, and Name page, click Choose a place to save
your backup and select your external hard disk drive. Then click Next.
8. On the Completing the Backup or Restore Wizard page, click Advanced.
9. On the Type of Backup page, click Next.
10. On the How to Back Up page, click Next.
11. On the Backup Options page, select Replace the existing backups. Then click
Next.
12. On the When to Back Up page, click Later. In the Job name box, type Backup.
Then click Set Schedule.
13. On the Schedule tab in the Schedule Job dialog box, click the Schedule Task list,
and then click Weekly.
14. Specify a time of day on the Start time and in the Schedule Task Weekly.
15. Click the Settings tab. Select the Wake the computer to run this task check box.
16. Click OK.
17. In the Set Account Information dialog box, type your password in both the
Password and Confirm password fields. Then click OK.
18
18. On the When to Back Up page, click Next.
19. In the Set Account Information dialog box, type your password in both the
Password and Confirm password fields. Then click OK.
20. In the Account Information Warning dialog box, click OK and Finish.
Activity:
Directions: Write FACT if the statement is correct and BLUFF if it is incorrect. Write
your answer in a separate sheet.
1. Be cautious when using any cleaning solvents; some individuals may have allergic
reactions to chemicals while some solvents can even damage the case.
2. Use a vacuum inside your computer as it generates a lot of static electricity that can
damage the internal components of your computer.
3. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub-down
the component
4. If you need to use a vacuum to clean the inside of your computer, use a portable
battery-powered vacuum designed to do this job, or try using compressed air
5. Eat or drink around the compute
6. Never spray or squirt any liquid onto any computer component.
7. Vacuums can be used to suck up dirt, dust, or hair around or inside the computer.
8. Turn off the computer before cleaning it.
9. When cleaning fans, especially the small fans within a portable computer or laptop its
suggested that you either hold the fan or place something in-between the fan blades
to prevent it from spinning.
10. When cleaning, be careful not to accidentally adjust any knobs or controls. Also, when
cleaning the back of the computer, if anything is plugged in, make sure to connect any
of the plugs
19
.
Independent Activity 1: Cache
Instructions: (Please refer to page 28 for the rubrics).
Cache
➢ Temporary Internet Files folder contains a kind of travel record of the items
you have seen, heard, or downloaded from the Web, including images,
sounds, Web pages, even cookies
➢ Storing these files in your cache can make browsing the Web faster because
it usually takes your computer less time to display a Web page when it can
call up some of the page's elements or even the entire page from your local
Temporary Internet Files folder
1. Make your video tutorial on how to Clear your Browser’s Cache by following the
given steps below.
2. Upload your video tutorial to your google drive or youtube channel.
3. Share the link with your teacher.
Independent Assessment 1:
Direction: Choose the letter of the correct answer. Write your answer in a separate
sheet.
A. Malware D. Virus
B. Spyware E. Worm
C. Trojan Horse
1. A computer program that appears to be useful software, but instead compromises your
security and causes a lot of damage.
2. A destructive executable program that infects the other programs in the system and
spreads by replicating itself.
3. A software designed specifically to damage or disrupt a system, such as a virus or a
Trojan Horse.
20
4. Any technology that aids in gathering information about a person or organization
without their knowledge.
5. It can consume memory or network bandwidth, thus causing a computer to stop
responding.
6. It can overload your system and shut down other services.
7. It damages your software, your hardware, and your files.
8. It generally spreads without user action and distributes complete copies (possibly
modified) of itself across networks.
9. It is coded by malicious programmers in a way that they can spread in the system
without one's permission and knowledge.
10. It is designed to damage the victim’s computer files.
Independent Activity 2:
Instructions: (Please refer to page 28 for the rubrics).
Independent Assessment 2:
Directions: Arrange the steps chronologically using the numbers. Write your answer
in a separate sheet.
Updating Windows(1-10)
1. Click on 'Express Install' option.
2. Click on the 'Express Install' Option.
3. Click on the 'Tools' menu, then the 'Windows Update' option.
4. Ensure that you are in the administrator account.
5. If you are asked, click the 'Install Now' button.
21
6. Keep clicking on the 'Install' button until there are no more patches to install then reboot
your system if asked to do so.
7. Run Internet Explore.r
8. Search for Windows Update.
9. You will probably be prompted to reboot your system. When rebooted – restart
'Windows Update'.
10. You will see the 'Microsoft checking your system' screen. If you are asked to download
a module - click the 'Yes' button.
22
B. How to remove an installed program? (1-5)
1. Click Remove.
2. Click Start or search for Control Panel.
3. Double-click Add or Remove Programs.
4. If you are prompted to confirm the removal of the program, click Yes.
5. In the Currently installed programs box, click the program that you want to remove.
1. Back Up is __________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
1. Collage pictures on how to clean the parts of the computer and the peripherals.
2. Write down procedures below the picture on how to clean the parts of the
computer and the peripherals
Post Test:
Direction: Write the letter of the correct answer in a separate sheet.
1. The “brain” of the computer, and controls most of the work done.
a. AMD c. Processor
b. Hard Drive d. RAM
23
2. It refers to the main working memory in a computer.
a. AMD c. Processor
b. Hard Drive d. RAM
3. It is the computer’s primary storage area that stores the applications and programs.
a. AMD c. Processor
b. Hard Drive d. RAM
4. It is standard on PCs and allows the information on a compact disc (either data or
audio) to be read and written to by the PC.
a. CD c. CD/DVD /R
b. CD R/W d. DVD
5. These cards are installed inside a PC and are responsible for determining the
quality of the audio and visuals (graphics and video) output by the computer.
a. Graphics and RAM c. RAM and ROM
b. Graphics and Sound Cards d. Sound Cards and RAM
11. It is used to connect your wired network adapters to a router or network switch.
a. Cable Modem c. Wireless Network Adapters
b. Ethernet Cabling d. Wireless Router
24
12. It connects all your computers, either through Ethernet cables or a wireless
connection.
a. Ethernet Cabling c. Wireless Router
b. Router Basics d. Wireless Throughput
14. Which of the following are the two ports at the back of the router?
a. LAN and MAN c. WAN and MAN
b. LAN and WAN d. b and c
1. Choose only two (2) computer parts/peripherals which you think are the most
important parts that need to clean.
2. Show the steps on how to clean your chosen computer parts/peripherals thru
pictures.
25
26
What I Know What’s In:
1. c 6. c 11. b 1. T
2. d 7. a 12. b 2. F
3. b 8. d 13. d 3. T
4. b 9. a 14. b 4. F
5. b 10. c 15. c 5. F
What Is It:
What Is It: Activity 1: Independent Assessment 1:
1. Fact 6. Fact 1. C 6. B
2. Bluff 7. Bluff 2. D 7. D
3. Fact 8. Bluff 3. A 8. E
4. Fact 9. Fact 4. B 9. D
5. Bluff 10. Bluff 5. E 10. D
Independent Assessment 2: Independent Assessment 3:
1. 7 6. 10 A. 1. 4 B. 1. 4
2. 9 7. 3 2. 1 2. 1
3. 4 8. 1 3. 2 3. 2
4. 2 9. 8 4. 5 4. 5
5. 6 10. 5 5. 3 5. 3
Assessment
1. c 6. c 11. b
2. d 7. a 12. b
3. b 8. d 13. d
4. b 9. a 14. b
5. b 10. c 15. c
References
A. Book Reference:
Technical Education & Skills Development Authority I Connect Global Institute, Inc. Ocampo,
Camarines Sur, Computer System Servicing NC II ” Maintain Computer Systems and
Networks”, Nelson P. Alde Jr., April 17, 2015, pp: 13 – 48
B. Electronic Reference:
27
Appendices
CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _
28
For inquiries or feedback, please write or call:
29