You are on page 1of 11

12

TLE/TVL-ICT
(Computer Programming Java)

Activity Sheet
Quarter 2 – LO 5

Maintain Computer Equipment

REGION VI – WESTERN VISAYAS


Quarter 2, Week 5

J/SHS Computer Programming Java Technology


Activity Sheet No. 5
First Edition, 2020

Published in the Philippines


By the Department of Education
Region 6 – Western Visayas

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.

This Learning Activity Sheet is developed by DepEd Region 6 – Western


Visayas.

ALL RIGHTS RESERVED. No part of this learning resource may be


reproduced or transmitted in any form or by any means electronic or mechanical
without written permission from the DepEd Regional Office 6 – Western Visayas.

Development Team of English Activity Sheet

Writer: Ma. Louella B. Gavan

Reviewer/Editor:Edward E. Baña

Layout Artist:

Schools Division Quality Assurance Team:


Schubert Anthony C. Sialongo
Edward E. Baña
Allan B. Montenegto
Michelle P. Jordan
Division of Antique Management Team:
Felisa B. Beriong, CESO VI
Corazon C. Tingson
Gaudencio C. Riego, PhD
Schubert Anthony C. Sialongo
Edward E. Baña
Regional Management Team
Ma. Gemma M. Ledesma,
Dr. Josilyn S. Solana,
Dr. Elena P. Gonzaga,
Mr. Donald T. Genine,
(Learning Area EPS)

2
Introductory Message
Welcome to Computer Programming Java Grade 12

The LearningActivity Sheet is a product of the collaborative efforts of the


Schools Division of Antique and DepEd Regional Office VI - Western Visayas
through the Curriculum and Learning Management Division (CLMD). This is
developed to guide the learning facilitators (teachers, parents and responsible
adults) in helping the learners meet the standards set by the K to 12 Basic Education
Curriculum.

The Learning Activity Sheet is self-directed instructional materialsaimed to


guide the learners in accomplishing activities at their own pace and time using the
contextualized resources in the community. This will also assist the learners in
acquiring the lifelong learning skills, knowledge and attitudes for productivity and
employment.

For learning facilitator:

The Computer Programming Java Technology Activity Sheet will help you
facilitate the leaching-learning activities specified in each Most Essential Learning
Competency (MELC) with minimal or no face-to-face encounter between you and
learner. This will be made available to the learners with the references/links to ease
the independent learning.

For the learner:

The Computer Programming Java Technology Activity Sheet is


developed to help you continue learning even if you are not in school. This learning
material provides you with meaningful and engaging activities for independent
learning. Being an active learner, carefully read and understand the instructions then
perform the activities and answer the assessments. This will be returned to your
facilitator on the agreed schedule.

3
Learning Activity Sheets (LAS)
(For Computer Programming Java Technology)

Name of Learner:_________________________ Grade &Section:______________


Date: ______________

COMPUTER PROGRAMMING JAVA TECHNOLOGY ACTIVITY SHEET


Maintain Computer Equipment

I. Learning Competency with Code


Maintain Computer Equipment- TLE_ICTJAVA1 1-12PCO-IIe28
a. Implement procedures for ensuring security of data, including regular
back-ups and virus checks in accordance with standard operating
procedures
b. Implement basic file maintenance procedures in line with standard
operating procedures

II. Background Information for Learners


Computer Security is the process of detecting and preventing any unauthorized use
of your laptop/computer. It involves the process of safeguarding against trespassers from
using your personal or office-based computer resources with malicious intent or for their
own gains, or even for gaining any access to them accidentally.
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for
all organizations and individuals to protect their sensitive data or reputation. This is because
of the numerous people and machines accessing it. It is important to mention that the
recent studies have shown a big danger is coming from internal threats or from
disappointed employees like the Edward Snowden case. Another internal threat is that
information material can be easily accessible over the intranet.
In this lesson, we will be discussing the terms about computer security and steps on
how to secure your computer. We are going to discuss also Malware or Virus, its nature
and characteristics, Antivirus Software, File Management, Compression Tools, Disk
Cleanup, Disk Defragmenter and the importance of Backup.

III. Accompanying DepEd Textbook and Educational Sites (With Possible


Materials for experiments/activities)

Computer Security (n.d.). Retrieved from www.tutorialspoint.com:


https://www.tutorialspoint.com/computer_security/index.htm

File Management System(n.d.). Retrieved from www.tutorialspoint.com:


https://www.tutorialspoint.com/computer_concepts/computer_concepts_file_man
agement_system.htm

4
Utility Software(n.d.). Retrieved from www.tutorialspoint.com:
https://www.tutorialspoint.com/basics_of_computers/basics_of_computers_utility
_software.htm

IV. Activity Proper

1. Read information about computer protection and maintenance


.
Computer Maintenance is one of the critical aspects in maintaining your
computer. It requires a user to have knowledge about it especially in terms of
security which is an important concern to protect data and information.

What to Secure?
1. Check the physical security by setting control systems like motion
alarms, door accessing systems, humidity sensors, and temperature
sensors. All these components decrease the possibility of a computer to
be stolen or damaged by humans and environment itself.
2. People having access to computer systems should have their own user
ID with password protection.
3. Monitors should be screen saver protected to hide the information from
being displayed when the user is away or inactive.
4. Secure your network especially using wireless connections. Password
should be used.
5. Internet equipment as routers to be protected with password.
6. Data that you use to store information which can be financial, or non-
financial by encryption.
7. Information should be protected in all types of its representation in
transmission by encrypting it.
Potential Losses due to Security Attacks
 Losing you data − If your computer has been hacked or infected, there is a
big chance that all your stored data might be taken by the attacker.
 Bad usage of your computer resources − This means that your network or
computer can go in overload so you cannot access your genuine services or in a
worst scenario, it can be used by the hacker to attack another machine or
network.
 Reputation loss − Just think if your Facebook account or business email has
been victimized by a social engineering attack and it sends fake information to
your friends or business partners. You will need time to gain back your
reputation.
 Identity theft − This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making
false identity documents.
Basic Computer Security Checklist
There are some basic things that everyone of us in every operating system need
to do:
 Check if the user is password protected.
 Check if the operating system is being updated.
 Check if the antivirus or antimalware is installed and updated.

5
 Check for the unusual services running that consumes resources.
 Check if your monitor is using a screen saver.
 Check if the computer firewall is on or not.
 Check if you are doing backups regularly.
 Check if there are shares that are not useful.
 Check if your account has full rights or is restricted.
 Update other third party software’s.

Securing the Operating System (OS)


Guidelines for Windows OS Security
Following are the list of guidelines for Windows Operating System Security.
1. Use the licensed versions of Windows OS, not the cracked or pirated ones
and activate them in order to take genuine updates.
2. Disable Unused Users − To do this, Right Click on Computer – Manage –
Local Users and Groups – Users, then disable those users that are not required.
3. Disable unused shares − By default, Windows OS creates shares, please
see the following screenshot. You have to disable them and to do this, you
follow −Right Click on My Computer – Manage – Shared Folders – Right Click
Stop Sharing.
4. The next step is to take updates regularly for Windows OS. It is
recommended to do them automatically and periodically. To set this up, go
to Control Panel – System and Security – Windows Updates – OK.
5. Put your Windows System Firewall up. This will block all the unauthorized
services that make traffic. To set this up, go to Control Panel – System and
Security – Windows Firewall.
6. Install a licensed antivirus and take updates. In the coming sections we will
cover in detail about antiviruses. It is strongly recommended not to download
from torrents and install cracked versions.
7. You should always Configure a password protected Screen Saver. To set
this up, please follow this path −Control Panel – All Control Panel Items –
Personalize – Turn Screen Saver on or off – Check “On resume, display logon
Screen”.
8. Disable Autoplay for Removable Media. This blocks the viruses to run
automatically from removable devices. To disable it go to – Start – on Search
box type Edit Group Policy –Administrative Templates – Windows Components
– Autoplay Policy – Turn off Autoplay – Enable – Ok.
9. Install only trusted internet explorer browsers like Internet explorer, Chrome
or Mozilla Firefox and then update them regularly. Missing the updates can lead
to possible hacking.
10. Enable the BitLocker Drive Encryption to encrypt hard drives, but it is
only available in Windows & Ultimate and Upper Versions.To enable it follow the
path: Start – Control Panel – System and Security – BitLocker Drive Encryption.
11. Set Bios Password − This option differs based on different computer
producers and we need to read manufacturer guidelines, this option secures
your computer one layer upper in the OS.

Virus/Malwares
A virus can be defined as a malicious program that attaches itself to a host
program and makes multiple copies of itself, slowing down, corrupting or
destroying the system. They are self-replication programs that reproduce their
own codes by attaching themselves to other executable codes. They operate

6
without the permissions or knowledge of the computer users. Viruses or
malwares like in real-life, contaminate other healthy files in a computer.
However, we should remember that viruses infect outside machines only with
the assistance of a computer user. These can happen by clicking a file that
comes attached with email from an unknown person, plugging a USB without
scanning, opening unsafe URLs for that reason. We as system administrators
have to remove the administrator permissions of users in these computers. We
categorize malwares in three types:
 Trojans and Rootkits
 Viruses
 Worms

Characteristics of a Virus
 They reside in a computer’s memory and activates themselves while the
program that is attached starts running.
For example − They attach themselves in general to the explorer.exe in
windows OS because it is the process that is running all the time, so you should
be cautious when this process starts to consume too much of your computer
capacities.
 They modify themselves after the infection phase like they source codes,
extensions, new files, etc. so it is harder for an antivirus to detect them.
 They always try to hide themselves in the operating systems in the following
ways −
o Encrypts itself into cryptic symbols, and they decrypt themselves when they
replicate or execute.
Some Practical Recommendations to Avoid Viruses
 Don’t open any email attachment coming from unknown people or from
known people that contain suspicious text.
 Don’t accept invitation from unknown people on social media.
 Don’t open URL sent by unknown people or known people that are in any
weird form.

Antivirus
A software that assists the OS in providing virus free environment to the
users.An anti-virus scans the system for any virus and if detected, gets rid of it
by deleting or isolating it.

Basic Functions of Antivirus Engines


All antivirus engines have three components to function accordingly. It is
important to have a look at these functions because it will help us for better
manual cleaning of viruses in case we need.
 Scanning − When a new virus is detected in the cyberspace, antivirus
producers start writing programs (updates) that scans for similar signature
strings.
 Integrity Checking − This method generally checks for manipulated files in
OS from the viruses.
 Interception − This method is used basically to detect Trojans and it checks
the request made by the operating system for network access.

7
Free Antivirus Software
Examples of Free Antivirus Software:
1. Avast Antivirus – is good in malware blocking and anti-phishing test scans.
2. AVG Antivirus
3. Panda Antivirus 2016 - It has the following good features: Rescue Disk,
USB protection, and Process Monitor
4. Bitdefender Antivirus - A good feature in this antivirus is that it can work
entirely in the background. No configuration setting.
5. Microsoft Security Essentials – Microsoft’s free antivirus

Commercial Antivirus
Based on PC magazine, the best commercial antiviruses are:

 Kaspersky Anti-Virus
 Bitdefender Antivirus Plus 2016
 McAfee AntiVirus Plus (2016)
 WebrootSecureAnywhere Antivirus (2015)

File Management System


The file management system is a software which is used to create, delete,
modify and control access and save files.
Responsibilities of File Management System
The responsibilities of File Management System are as follows:
 Operation. This provides user to work with or manipulate the files.
Manipulation includes open, close, save, copy, delete, move, rename, share, etc.
 Security. By supporting authorization, it restricts unauthorized user to log into
system and access files. Username and password are required for authorization
purpose. It supports file encryption feature and asks for authorization to access
those encrypted files.
 Integrity. In support of integrity, file management system will keep track of
data manipulations like deletion, modification, addition of data, etc. If the data
gets modified, deleted or added, then those changes should be reflected in all
the files.
 Storage. This allocates memory for storing files, deallocates memory of
deleted or unused files and maintains backups.

File Management Tools


File management is an important function of operating systems as all data and
instructions are stored in the computer in form of files. Utility software providing
regular file management tasks like browse, search, update, preview, etc. are
called file management tools. Examples are Windows Explorer in Windows OS,
Google desktop, Directory Opus, and Double Commander.

Compression Tools

8
Storage space is always at a premium in computer systems. So operating
systems are always looking at ways to minimize amount of storage space taken
by files.
Compression tools are utilities that assist operating systems in shortening files
so that they take less space. After compression files are stored in a different
format and cannot be read or edited directly. It needs to be uncompressed
before it can be accessed for further use. Some of the popular compression
tools are WinRAR, PeaZip, The Unarchiver, etc.

Disk Cleanup
Disk cleanup tools assist users in freeing up disk space. The software scans
hard disks to find files that are no longer used and frees up space by deleting
them. Examples of disk cleanup tools are CC Cleaner, Glary Utilities, etc.

Disk Defragmenter
Disk defragmenter is a disk management utility that increases file access
speeds by rearranging fragmented files on contiguous locations. Large files are
broken down into fragments and may be stores in non-contiguous locations if
contiguous ones are not available. When such files are accessed by the user,
access speed is slow due to fragmentation. Disk defragmenter utility scans the
hard disk and tries to assemble file fragments so that they may be stored in
contiguous locations.

Backup
Backup utility enables backing up of files, folders, databases or complete
disks. Backups are taken so that data may be restored in case of data loss.
Backup is a service provided by all operating systems.
Why is Backup Needed?
The main purpose is to recover the lost data from an unpredictable event
like deletion by mistake or file corruption which in many cases is caused by a
virus.
An example is Ransomware, which encrypts all your data when your
computer gets infected and the second is to roll back the data at a specific time
you want. This is a scenario that happens often in companies which have
applications and databases and they want to test their applications with a
specific version of data.
Backup Devices
 CD and DVD, Blue-Rays
 Removable Devices
 Network attached storage (NAS) − They are generally devices that are used in
small businesses for backup purposes because they offer a centralized manner
of backup.
 Storage Area Network (SAN) − These are generally devices that are used for
big businesses for backup purposes. They offer a high speed of network for
storage the biggest producers are EMC Corporation, DELL.

9
2. Exercises / Activities
2.1. Directions: Choose the letter of the correct answer. Write your answers on a separate
sheet of paper.
1. These are self-replication programs that reproduce their own codes by attaching
themselves to other executable codes.
a. Defragmenter b. Virus c. Antivirus d. Defender
2. What software assists the OS in providing virus-free environment to the users?
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
3. A software used to create, delete, modify, and control access and save files.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Antivirus
4. A utility software that increases file access speeds.
a. Disk Defragmenter c. Archiver
b. WinRAR d. Cleaner
5. These tools assist users in freeing up disk space.
a. File Management System c. Disk Cleanup
b. Compression Tools d. Backup Utility
6. The following are losses due to security attacks, EXCEPT.
a. Losing Data or Information c. Identity Theft
b. Bad usage of computer resources d. Plagiarism
7. A free antivirus that is good in malware blocking and anti-phishing test scans.
a. Avast b. AVG c. Panda d. Bitdefender
8. The process of detecting and preventing any unauthorized use of your computer.
a. Computer Maintenance c. Computer Security
b. Computer Repair d. Computer Organization
9. What do you call a person who tries and exploits the computer system for a purpose.
a. IT Personnel b. Web Experts c. Software Engineer d. Hacker
10. The following are basic functions of Antivirus, EXCEPT.
a. Scanning b. Phishing c. Integrity Checking d. Interception

2.2 Using your Mobile Phone or Computer (if available), open the browser (Mozilla Firefox
or google chrome) and open the link provided. Watch the YouTube video of disk
defragmentation.
https://www.youtube.com/watch?v=AtRIOUZuI2c

Answer the questions below after watching the video:


1. Why is it maintenance and protection of computer important?
___________________________________________________________________
___________________________________________________________________
2. What are the things that can help maintain and protect the computer?
___________________________________________________________________
___________________________________________________________________

V. Reflection (Provide reflection guide question)


1. What insights have you gained from your activity/output?

10
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. What significant values have you developed while doing your activity/output?
______________________________________________________________
______________________________________________________________
______________________________________________________________

VI. Answer Key

Multiple Choice
1. b
2. d
3. a
4. a
5. c
6. d
7. a
8. c
9. d
10.b

11

You might also like