Tle Css10 Week8
Tle Css10 Week8
II. MOST ESSENTIAL LEARNING COMPETENCIES (MELCs) LO 2.2: Prepare Installer - TLE_IACSS9- 12ICCS-If-j-29
III. CONTENT/CORE CONTENT The learners demonstrate an understanding of concepts and principles in installing configuring computer systems.
Suggested
IV. LEARNING PHASES Learning Activities
Timeframe
A. Introduction 30 minutes LEARNING TASK 1. Arrange the following jumbled letters to form the correct words.
Panimula
1. ERTURPOMC USIRV _________________
2. SMROW _________________
3. AREWYPS _________________
4. YKSERPASK _________________
5. NOTRON _________________
9. TORAJN _________________
3. It is a type of utility used for scanning and removing viruses from your computer.
a. drivers
b. anti-virus
c. social media
d. operating system
4. Are techniques for ensuring that data stored in a computer cannot be read or compromised by any stranger without the owner’s authorization.
a. Permit
b. Protecting Hardware
c. Protecting computer from security
d. Computer Security
c. Use soft cloth or lint-free swab to clean between the keys of the keyboard
d. None of the above.
B. Development 1.5 hours
lifespan and decrease downtime hassles. To maintain a computer, students can do the following:
1. Clean the outer surface with a simple cloth and water solution. A damp cloth is the best cleaning tool for computer hardware. A small,
handy paint brush can be used to remove dust inside the system unit.
2. Apply an anti-static spray or solution to prevent a build-up of static charges on computer parts.an economical and effective anti-static so-
3. Observe the correct handling procedures for printed circuit boards and cables to prevent oxidation build ups or corrosion on electrical
4. Rub off the oxidation build ups using an emery board, a common pencil eraser, a special solvent white or an electrical contact cleaner
spray.
5. Use a lint-free foam swab and isopropyl alcohol or methanol for cleaning other internal components such as a disk drive head.
hardest or barricade normal operation of the computer, corrupt or change data and degrade the performance of the system by utilizing the resources such
as memory or disk space. Viruses increase their chances of spreading to other computers by infecting files on a network file system that is accessed by
another computer.
Types of Viruses
A computer virus that displays more than one characteristic of a regular computer virus is known as multi-part computer virus. A computer virus may
1. A file infector works by running together with the executable file that is attached with. It reproduce as its own code by attaching itself on
to an executable program such as .COM and .EXE files. On the other hand, a boot sector virus infects the computer when it reads an infected drive or
floppy disk.
2. Macro virus is one of the most widespread types of viruses. Macro virus is written in a macro language and associated with documents,
word processing and spreadsheet. Itu ses an email attachment to spread and can infect the computer when a user opens an email attachment with a macro
virus.
3. A worm replicates itself even without human intervention. It uses a computer network to spread itself. Worms can also be used to gain
access to a computer remotely.
4. Web applet virus is a newer type of virus that can exist using the three most popular web scripting languages - ActiveX, JavaScript and
Java. The virus infects the computer when a user installs an infected file.
5. Spyware is technically not a virus since it cannot replicate itself, but it can spy a user when he serves or does business on the internet. If
there is a pop up add on the computer or in the browser, there is a possibility that the spyware might be installed on the computer.
2. The computer takes longer than the usual to start up. If the user did not install anything new on the computer but it takes a long time
to start up, it is a symptom that something is wrong. A virus might also be initializing, so make it a habit to scan the computer regularly.
3. The web browser keeps crashing or there is a new homepage. If the browser is crashing constantly and the home page is being modi-
fied, then there is a possibility that the browser has been hijacked.
4. When the preferences in the folder options are set to Read-Only. The folder option gives the user a lot of control on how the files in
the computer will function. One of them is to show or hide the accepted file extension on the computer. if the user changes the setting of the file and it
reverts or returns to the previous setting right away, then there is a possibility that the virus was able to infiltrate the computer.
5. When the user cannot access the windows registry editor. Windows registry editor is where most of the operating system and applica-
tion process are stored. Viruses that penetrate the registry usually disables it so that the system administrators cannot change the setting manually.
Anti-Virus Software
Computers have become an integral parts of people’s life and it is important to protect computers from threat of viruses. Viruses come in many forms
and sometimes, it is difficult to detect them. Here is a list of different anti-virus software that are available in the market.
Bit Defender Anti-virus Plus- uses a secure browser that the user can use if he wants to do online banking or shopping.
● F-Secure Anti-virus - offers excellent protection against viruses, spyware worms and trojans. It can also eliminate and locate rootkits. It also prov
● G-Data Anti-virus - It is an anti-virus that offers strong web protection and is easy to use. G Data also protects
from phishing, scams, adware and more. G Data AV 2012 is considered on of the best antivirus PC solutions in the market.
● Norton Anti-virus not only protects the computer against spyware and viruses but also scans instant messages
check if there are infected attachments, links or viruses. It was manufactured by Symantec Corporation.
● Kaspersky Anti-virus - It is an antivirus that is easy to use and customize. It has a browser plug-in that can be integrated to Internet Explorer and
Firefox which will not allow the users to access infected websites.
Anti-Virus Installation
There is a lot software available in the market nowadays. Avira Antivirus is just one of software that is commonly used. The instructions given below
1. Open the folder where the installer is saved then double-click the icon and click Accept and Install button to proceed.
2. When the User Account Control dialog appears, click the YES button to continue.
4. The next screen shows the progress of the installation. The install button is just a promotion of Avira. Do not click the Install button, un-
less interested in the product. The blue progress bar above indicates that the Avira is installing.
5. Then wait until the installation is done and click Start Avira. If the program did not run, click the Avira icon in the taskbar.
6. The Avira Antivirus automatically scans the computer for a minute or two.
7. After scanning, the control panel of Avira appears. This indicates that the program is ready use.
PC Securities
Computer Security are techniques for ensuring that the data stored in a computer cannot be read or compromised by any stranger without the owner’s
authorization. It is protecting computer systems and information from harm, theft, and unauthorized use. Most computer security measures involve data
encryption and password. Data encryption is the translation of data into a form that is meaningless without a deciphering mechanism.
1. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism.
2. A password is a secret word or phrase that gives the user access to a particular program or system.
3. A firewall blocks unauthorized access to a system, while permitting authorized communications. There are two typical actions on data.
o Permit allows traffic that matches the rules to pass and implicitly denies everything else.
o Deny explicitly blocks traffic that matches the rule.
A hardware firewall typically performs better than a software firewall. However, a software firewall is more configurable than a hardware firewall. It is
essential for mobile computers. There are several software firewalls available in the market today such as:
Windows has a default firewall installed in a computer. To enable the Windows Firewall, do the following:
3. On the left side of the window, click Turn Windows Firewall on or off.
4. Click the radio button to Turn on Windows Firewall, then select OK.
Protecting Hardware
The problem that a computer may encounter depend on its environment and the manner it is used. Below are some examples.
1. Avoid heat buildup.
Excessive heat can cause premature aging and failure of the electronic components of the computer. Make sure that the area is uncluttered so air flows
freely around the computer. Check also if the power supply’s fan is working and operational.
Avoid using aerosol spray, solvent and commercial cleaners because these can damage the screen and system unit. Use a simple cleaning solution
instead then dry it with a soft cloth. Ensure that the monitor’s power cord is disconnected from the power source before cleaning.
Dust and clean the input devices occasionally. Use a soft cloth or lint-free swab to clean between the keys of the keyboard.
Troubleshooting Methodology
A good computer technicians will follow some sort of formalized troubleshooting methodology. Below are the basic troubleshooting practices one must
E-Step 2
____1. When the User Account Control dialog appears, click the YES button to continue.
____2. The next screen shows the progress of the installation. The install button is just a promotion of Avira.
____3. Open the folder where the installer is saved then double-click the icon and click Accept and Install button to proceed.
____4. Then wait until the installation is done and click Start Avira.
___1. Which of the following can use for preventive maintenance of the computer?
a. Anti-static spray
___2. Rona wants an anti-virus in her computer that can protect her from infected websites. Which of the following computer anti-virus Rona needs?
a. Kaspersky Anti-Virus
b. Norton Anti-Virus
c. G-Data Anti-Virus
d. F-Secure Anti-Virus
a. Worm
b. file infector
c. Hanta Virus
d. Macro Virus
___4. Jessie wants to clean her keyboard. Which of the following is proper material to use?
a. Aerosol spray
b. Soft cloth
c. Solvent
d. Clean water
___5. Jonas is a technician, and her customers wants to upgrade his computer for gaming. Which of the is the first step he must do?
d. Information gathering
___6. Which of the following is NOT the reason of heat buildup of the computer?
a. Information gathering
___8. It a secret word or phrase that gives the user access to a particular program or system.
a. Data encryption
b. password
c. firewall
d. hardware firewall
c. Firewall
d. Data encryption
b. When the user can easily access the windows registry editor.
_____3. It is an electronic set of instruction that a computer uses to test the hardware to complete the system startup.
_______________________4. Refers to the act of dividing a hard disk drive into multiple logical storage units.
______________________ 5. It is used to install new improvement settings on the computer id there is available
VI. REFLECTION The learner, in their notebook, will write their personal insights about the lesson using the prompts below.