You are on page 1of 16

T.L.E.

8
T.L.E. – Grade 8
Quarter 3 – CSS Module 2: Using Basic Functions of a World Wide Web browser
to Locate Information and Maintain Computer
Equipment and Systems
First Edition, 2020

Republic Act 8293, Section 176 states that no copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this module are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission to
use these materials from their respective copyright owners. The publisher and
authors do not represent nor claim ownership over them.

Published by the Department of Education - Schools Division of Pasig City

Development Team of the Self-Learning Module


Writer: Crisaldo S. Marfil
Editor: Michael Ivan S. Ordillano
Reviewer: Michael Ivan S. Ordillano
Illustrator:
Layout Artist:
Management Team: Ma. Evalou Concepcion A. Agustin
OIC-Schools Division Superintendent
Aurelio G. AlfonsoEdD
OIC-Assistant Schools Division Superintendent
Victor M. JaveñaEdD
Chief, School Governance and Operations Division and
OIC-Chief, Curriculum Implementation Division

Education Program Supervisors

Librada L. AgonEdD(EPP/TLE/TVL/TVE)
Liza A. Alvarez(Science/STEM/SSP)
Bernard R. Balitao(AP/HUMSS)
Joselito E. Calios (English/SPFL/GAS)
Norlyn D. Conde EdD(MAPEH/SPA/SPS/HOPE/A&D/Sports)
Wilma Q. Del Rosario (LRMS/ADM)
Ma. Teresita E. HerreraEdD(Filipino/GAS/Piling Larang)
Perlita M. IgnacioPhD(EsP)
Dulce O. Santos PhD(Kindergarten/MTB-MLE)
Teresita P. TagulaoEdD(Mathematics/ABM)

Printed in the Philippines byDepartment of Education – Schools Division of


Pasig City
T.L.E. 8
Quarter 3
Self-Learning Module 6
Using Basic Functions of a
World Wide Web browser to
Locate Information and
Maintain Computer
Equipment and Systems
Introductory Message
For the Facilitator:
Welcome to the T.L.E. CSS Grade 8 Self-Learning Module on Using Basic
Functions of a World Wide Web browser to Locate Information and Maintain
Computer Equipment and Systems!

This Self-Learning Module was collaboratively designed, developed and


reviewed by educators from the Schools Division Office of Pasig City headed by its
Officer-in-Charge Schools Division Superintendent, Ma. Evalou Concepcion A.
Agustin, in partnership with the City Government of Pasig through its mayor,
Honorable Victor Ma. Regis N. Sotto. The writers utilized the standards set by the K
to 12 Curriculum using the Most Essential Learning Competencies (MELC) in
developing this instructional resource.

This learning material hopes to engage the learners in guided and


independent learning activities at their own pace and time. Further, this also aims
to help learners acquire the needed 21st century skills especially the 5 Cs, namely:
Communication, Collaboration, Creativity, Critical Thinking, and Character while
taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them
to manage their own learning. Moreover, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the Learner:
Welcome to the T.L.E CSS Grade 8 Self-Learning Module on Using Basic
Functions of a World Wide Web browser to Locate Information and Maintain
Computer Equipment and Systems!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an
active learner.

This module has the following parts and corresponding icons:

Expectations - Thispoints to the set of knowledge and skills


that you will learn after completing the module.

Pretest - This measures your prior knowledge aboutthe lesson


at hand.

Recap - This part of the module provides a review ofconcepts


and skills that you already knowabout a previous lesson.

Lesson- This section discusses the topic in the module.

Activities - This is a set of activities that you need to perform.

Wrap-Up- This section summarizes the concepts and


application of the lesson.

Valuing- This partintegrates a desirable moral value in the


lesson.

Posttest - This measures how much you have learned from the
entire module.
EXPECTATIONS

At the end of the lesson, the students should be able to:

A. establish information requirements for internet search;


B. implement procedures for ensuring security of data, including regular
backup and virus checks in accordance with standard operating
procedures; and
C. recognize the importance of implementing basic file management
procedure in line with the standards operating procedures.

PRETEST

A. DIRECTIONS: Choose the letter of the correct answer. Write your answer on the
space provided for each item.

________1. Which of the following is not a web browser?


A. Google Chrome C. Fortran
B. Internet Explorer D. Safari
________2. He is the director of the World Wide Web Consortium and creator of a
web browser.
A. Bill Gates C. Marie Currie
B. Marc Andereessen D. Sir Tim Berners-Lee
________3. Which of the following is not a computer virus?
A. Rootkit C. Torrent
B. Trojan Horse D. Worm
________4. It is a vast and powerful source of information for computer users.
A. Application Software C. Internet
B. Information Engines D. Web Browser
________5. The following are the proper way of using the internet except:
A. deleting cookies and history on a web browser.
B. not updating antivirus to avoid interruption on using the internet.
C. using a cryptic password for the account on Facebook.
D. using the appropriate website for your computer system
requirement.
RECAP

DIRECTIONS: Identify the function of the following software. Write your answer on
the box provided below.

Application Software System Software Programming Language

LESSON

LESSON 6: USING BASIC FUNCTIONS OF A WORLD WIDE WEB (WWW) –


BROWSER TO LOCATE INFORMATION AND MAINTAIN COMPUTER
EQUIPMENT AND SYSTEMS

Understanding Web Browsers


In 1990 Sir Tim Berners-Lee, Director of the World Wide Web Consortium
invented the first web browser. The first commonly available web browser as
Erwise, with a graphical user interface. Robert Cailliau introduced the creation of
the Erwise. In 1993, with the release of Mosaic, "the world's first common browser",
browser software was further innovated by Marc Andereessen.
A browser is a program used to access the internet. A browser lets you visit
websites and perform activities such as logging in, viewing multimedia, linking
from one site to another, visiting one page from another, printing, sending, and
receiving e-mail, among many other activities.
The Most Popular Names on the Market for Browser Applications are:

OPERA INTERNET
EXPLORER

MOZILLA
GOOGLE
SAFARI
CHROME

Web Browser Features and Functions

Refresh and Address Bar Tab


reload button

Minimize
Home button button
Back and
forward buttons Maximize Exit
button button

Bookmark
Search Bar
Settings

• Back and forward buttons to return either to the previous option or


forward.
• Refresh or reload button to make the current webpage or resource reload.
• Stop button is usually merged with the reload button which function is to
cancel the loading website.
• Home button to returning to the user’s home page.
• Address Bar is to encode the Uniform Resource Identifier (URL) to display
the desired webpage.
• Search bar is to encode what you want to look on the search engine.
Usually, it is merged with the address bar.
• Settings Icon is to change the current setup of the web browser. This
includes deleting search history as well as changing the default search
engine.

• Bookmark is to save the searched website for future use.

• Tab Icon is to identify the different websites opened inside the web browser.

• Maximize, minimize, and exit button control the viewing setting of the
browser. Maximize is to make the screen full, while minimize is to hide the
browser and exit is to eliminate or remove the web browser.

Recommended Ways on Using the Internet

The Internet is a vast and powerful resource for some users and can be
overwhelming. Below are information on how to use the Internet and Internet
browser.

1. Select the most compatible web browser for your computer. To avoid surfing
interruptions like hanging and error pages install a web browser that fits your
computer specification.

2. Use tab but not excessively. You may come across a link while reading an
article or browsing a website that interests you. You can open any link to another
page in a new tab, so it does not interrupt your reading. However, do not open
many tabs that can make your browser slow or unresponsive.

3. Install antivirus that protects websites against the threat. Latest anti-virus
has components that can avoid threats and viruses from dangerous websites. They
can block pop-ups and unwanted websites that could trigger hackers to invade
your computer.

4. Secure personal information. Never give personal details to unreliable


websites. There are many websites which pop up to your screen claiming you won
in a raffle or any information that will make you curious. They are hackers that
waiting for a victim to catch. Bad websites also bring threats, viruses, potential
hackers, and system problems.

5. Clear cookies and history. To avoid the slow response of the web browser or
any error connecting to the internet you must clean your web browser always. This
is necessary for individuals who don’t have a personal computer and uses only
public internet shops. History and cookies are also a threat for potential hacker, so
you need to clear them after using the internet.

Computer Security and Safety

Computer data should be a safeguard from different types of network


attacks,
software, and information theft as well as security risks. There are several
techniques to avoid this type of risk if you can identify and detect some of the
symptoms of possible computer threats that attack the system.

Computer viruses can be transmitted over network and external drives such
as flash drive that can affect a computer negatively by altering the way the
computer works. Types of the virus are worm which copies itself and shuts down a
computer or network; Trojan horse which hides and looks like a legitimate
program; and Rootkit that allows someone to take full control of an infected
system.

To avoid such problems these are some key steps that everyone can take.

• Use passwords that cannot be guessed easily. A cryptic password like with 6-8
characters with one capitalized letter, number, and symbol will be a good
combination. Always keep your password secret.

• It is important that all software application, devices, and the computer is


current and updated. This includes anti-virus, system updates as well as a
firewall.

• Make sure to scan external devices before opening the drives to avoid
contamination of computer viruses on the computer system.

• Check the storage capacity of your hard disk and eliminate some unwanted files
and applications on your computer.

• Back-up your data in a safe external drive, optical drives. or in safe and trusted
cloud drives. Some use back-up and recovery system in case of data loss.

Implementing File Maintenance

File maintenance is a routine in which changing, updating, copying, moving,


or deleting of files is done. This activity is applied to computer or server which
handles a big amount of files. This is also referred to as file management where
files are always maintained and updated not overloading the file on the computer.

1. Use defragment since the file is usually viewed and edits several times causing
files to error-prone. Defragment functions as to rewriting files and stores them in
adjacent sectors. This can lessen the possibility of error of data.

2. Data back-up and recovery system are accomplished by using separate drives or
using an off-site server to store an enormous amount of information this can avoid
loss of data due to human error, or system crash.

3. File Organization is a logical structuring of records according to the way how


files should be categorized. Short access time, ease of update, the economy of
storage, simple maintenance, and reliability should be criteria to apply this
procedure.
4. Know your File Directory in order to avoid duplication, data type, and history.

5. In file sharing you must provide a restriction on your computer for different
users on the network because not anyone is permissible into editing, viewing, or
getting information from your records.

ACTIVITY

A. DIRECTIONS: Identify the different parts of the Web Browser. Write your answer
on the space provided for each number.

1. ________________________________ 6. _______________________________

2. ________________________________ 7. _______________________________

3. ________________________________ 8. _______________________________

4. ________________________________ 9. _______________________________

5. ________________________________ 10. ______________________________

11. _______________________________
B. DIRECTIONS: Arrange the letters to form the correct word for each item. Write
your answer on the space provided before the number.

_______________1. This maintains the data by rewriting and storing in adjacent


sectors to avoid data crash and lost of files. (DAGEFNTRME)

________________2. This is one of the personal information that must be consists of


6-8 characters with a good combination of one capital letters,
symbol, and a number. (ASPRDSWO)

_______________3. It is a type of application that allows you to search for files and
viewing multimedia and communicate online. (WBR EBOWRSE)

_______________4. This can get thru the inserting of non-scanned flash drives on the
computer as well as downloading files from unknown or
unreliable websites. (CMTOEISP RUVUR)

_______________5. This activity includes changing, updating, copying, moving, or


deleting files on a computer. (FNAN MECEAILEINT)

C. DIRECTIONS: Underline the correct word in the parenthesis to complete the


sentence.

1. A browser is a (program, data, hardware) used to access the internet.

2. (Web, File, Chart) Organization is a logical structuring of records according to


the way how files should be categorized.

3. Know your File (Directory, Direction, Director) in order to avoid duplication,


data type, and history.

4. File (distribution, maintenance, registration) is a routine in which changing,


updating, copying, moving, or deleting of files is done.

5. Computer viruses can be (transformed, reduce, transmitted) over network and


external drives such as flash drive that can affect a computer negatively by
altering the way the computer works.

WRAP-UP

DIRECTIONS: Complete the statement below by providing phrases or ideas that


make a complete thought. Write your answer on the space provided for each item.

1. I have learned that the proper way of using the internet is ______________________

__________________________________________________________________________________

_________________________________________________________________________________.
2. I have realized that one way that a computer can be protected is ________________

__________________________________________________________________________________

_________________________________________________________________________________.

3. I have learned that you can manage your files by _______________________________

__________________________________________________________________________________

_________________________________________________________________________________.

VALUING

Computers are subject to have anti-virus be installed in the system to


maintain its good performance, both internal and external components.
Today, our country is facing an ecumenical problem which is the Covid-19.
Just like computers, everyone is also subject to have some safety precautions
against the virus to be safe and healthy. Create a slogan showing the safety
measures needed by the people to keep safe and stay healthy against the Covid-19
virus. Write down your Slogan on the box below.
POSTTEST
A. DIRECTIONS: Choose the letter of the correct answer. Write your answer on the
space provided for each item.

_______1. He is the director of the World Wide Web Consortium and creator of a
web browser.
A. Bill Gates C. Marie Currie
B. Marc Andereessen D. Sir Tim Berners-Lee
________2. He is the creator of the world's first common browser.
A. Bill Gates C. Marie Currie
B. Marc Andereessen D. Sir Tim Berners-Lee
________3. Which of the following is not a web browser?
A. Google Chrome B. Internet Explorer C. Fortran D. Safari
________4. Why do you need to clear cookies and history on your browser?
A. To avoid files to be deleted soon
B. To avoid personal information to be hacked
C. To minimize space on the desktop
D. To remove files on the desktop
________5. Which of the following shows the file management procedure?
A. Complex and file stocking.
B. Non-restricted files on other network.
C. Removing Files
D. Recovery and Data Back-up
________6. Which of the following is not a computer virus?
A. Rootkit B. Trojan Horse C. Torrent D. Wor
________7. The following are the proper way of using the internet except:
A. Deleting cookies and history on a web browser.
B. Not updating antivirus to avoid interruption on using the internet.
C. Using a cryptic password for the account on Facebook.
D. Using the appropriate website for your computer system
requirement.
________8. This process includes storing files in external devices that can be used
when the system crash.
A. Data Back-up and Recovery C. File Organization
B. Defragment D. Knowing File Directory
________9. Part of web browser that encodes keyword for searching and usually
merged with the address bar.
A. Bookmark C. Refresh and Reload Button
B. Home button D. Search bar
________10. It is a vast and powerful source of information for computer users.
A. Application Software C. Internet
B. Information Engines D. Web Browser
KEY TO CORRECTION
References

Computer Hope "Top 10 Internet tips and tricks" Accessed July 16, 2020
https://www.computerhope.com/tips/tip160.htm

Internet.Com "Web Browser Evolution" Accessed July 18, 2020


https://internet.com/web-101/web-browser-evolution/

The Free Dictionary "Defragment" Accessed July 18, 2020


https://encyclopedia2.thefreedictionary.com/defragment

Slideshare "Computer Security and Safety, Ethics and Privacy - ICT" Accessed July 16,
2020
https://www.slideshare.net/aliciamargaretjavelosa/computer-security-and-safety-ethics-
and-privacy-ict

Talluri, D. "Web Browsers" Accessed July 19, 2020


https://www.slideshare.net/DHANALAKSHMITALLURI/web-browsers-66213794

Computer Hope "File Maintenance" Accessed July 19, 2020


https://www.computerhope.com/jargon/f/filemain.htm#:~:text=The%20routine%20change
s%2C%20updates%2C%20copying,a%20vast%20amount%20of%20files.

Brickhost "Importance of Data Backup and Recovery" Accessed July 18, 2020
https://www.brickhost.com/importance-of-data-backup-and-recovery/

Sallings W. "Chapter 12 File Management 8th Edition" Accessed July 18, 2020
https://www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/CH12-OS8e.pdf

IMAGES

https://3.bp.blogspot.com/-
LoY1e5ANcVQ/Ts5cKjx6HgI/AAAAAAAAEvM/5xdIWTDBxWg/s1600/Windows-Utility-
Launcher.jpg

https://icasnetwork.com/wp-
content/uploads/2018/03/001aa2afe91a21eb14a51f06669ffcb2.jpg
https://fiverr-
res.cloudinary.com/images/t_main1,q_auto,f_auto,q_auto,f_auto/gigs/140908036/original
/ab73db6d2e51e11b4066fa649ba8f0ad9f95caf8/do-java-project-tasks-bugs-fixes.png
Icon Images came from Windows 10 Enterprise 64-Bit Dell Latitude E5520 Laptop.

https://www.top10zen.com/users/160/730/photos/web_browser3_large.jpg

https://mk0knownnewsql4vbcfb.kinstacdn.com/wp-content/uploads/2020/08/homepage-
background-tabs1-990x570.jpg

You might also like