Professional Documents
Culture Documents
IV
Quarter: ______ I
Week: ___ ELC: Maintain Computer Systems and Networks
ELC Code: TVE_ICTCSSUC4-IVa-1-2
Let Us Discover
Procedures
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from harm.
4. If the hazard can be easily and safely cleared, then do so.
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to
obtain
assistance.
6. After clearing of the hazard, fill out the correct documentation to assist in identifying improved
Let us address each of the processes in detail so that you can better understand how you can apply
them in your system to extend its longevity.
DATA BACKUP
Backing up basically means creating a
redundant copy of a data so that in case anything
happens to the original data, you have a spare copy.
This is typically a simple thing to do.
First, you must ask yourself why should you back up
the data or system?
If you feel that you should backup your
valuable data, then you should decide and select
what data to back up. Depending on your needs,
you may choose to back up your windows registry,
or your Outlook Express mail data, or even your
windows security keys.
Windows operating system's friendly interface allows you to drag and drop computer files
from one storage device to another. And this can be as simple as copying a document file from your
desktop into a thumb drive.
But when these files gradually occupy a lot of disk space, you may need to seek help from
archiver utilities such as Winzip which enables you to compact your files into a single compressed
file. You can then break up this large file into several pieces to be stored in several mediums such
as a span of CD or DVD-Recordable.
Winzip also allows you to protect your file with encryption and a software password to
prevent any unauthorized access. There are a number of backup methods you could use.
MALWARE MAINTENANCE
Malware refers to any kind of malicious
codes, objects or content that infiltrates your
computer, resulting in damage and causing your
system to act in an undesirable manner. Commonly,
these include viruses, spyware, worms, trojan
horses, spams and many more. When you are
infected, you can lose your privacy, confidential data
and access to your system when software and
hardware are damaged. Fortunately, there are a
couple of preventive measures you can take to
protect yourself from malware.
One thing you can do to scan the file for any
virus infection before you attempt to open it. If the scan shows nothing, it is probably a safe file. But
Let Us Try
Let Us Do
Advantages Disadvantages
Rubrics
Activity 2 Criteria
Performance of the learner will be rated based on the following criteria:
Contents Excellent (4) Very Satisfactory (3) Satisfactory (2)
Substantial, specific and/or
illustrative content Sufficiently developed Limited content with
Content
demonstrating strong content with adequate inadequate elaboration or
Knowledge
development and sophisticated elaboration or explanation. explanation..
ideas.
No misspelled word 1-3 misspelled 4 or more misspelled
Spelling and
and applies punctuations words and incorrect use of words and incorrect use
Punctuation
correctly. punctuations. of punctuations.
Follows correct capitalization 4 or more capitalization
Capitalization 1-3 capitalization errors.
(pronouns, sentences) errors.
1-3 words can’t be clearly 4 or more words can’t be
Handwriting Legible.
read. clearly read.
Activity 3 Criteria
Performance of the learner will be rated based on the following criteria:
Criteria Excellent (5) Very Satisfactory (4) Satisfactory (3)
Substantial, specific and/or
illustrative content Sufficiently developed Limited content with
Content
demonstrating strong content with adequate inadequate elaboration or
Knowledge
development and sophisticated elaboration or explanation. explanation.
ideas.
The information is broken down The information is broken Organizational pattern is
into block-by-block structure. It down into block-by-block not identifiable. Some
Organization
follows a consistent order when structure, but may not details are not in a logical
and
discussing the comparison. follow a consistent order or expected order, and
Structure
when discussing the this distracts the reader.
comparison.
No error in grammar and/or 1-3 errors in grammar 4 or more errors in
Grammar spelling that distract the reader and/or spelling that distract grammar and/or spelling
and Spelling from the content. the reader from the content. that distract the reader
from the content.