100% found this document useful (1 vote)
456 views42 pages

TLE ICT 10 CSS Quarter 4 Weeks 1 7

Uploaded by

Teacher ICE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
456 views42 pages

TLE ICT 10 CSS Quarter 4 Weeks 1 7

Uploaded by

Teacher ICE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Department of Education

Region IV-A - CALABARZON


Schools Division of Calamba City

SELF-LEARNING MODULE

GRADE 10

INFORMATION AND COMMUNICATION TECHNOLOGY 10


Quarter 4

Module Development Team

Writer: Modified by Naiza A. Cadapan from


TLE-ICT Grade 10 Learner’s Material 2013
Reviewer: TBA
Layout: Naiza A. Cadapan
Management: SDS Susan DL Oribiana
ASDS Rogelio F. Opulencia FOR
KAPAYAPAAN INTEGR
CID Chief Dolorosa S. De Castro
EPS-LRMDS Cristeta M. Arcos
SCHOOL
Department of Education│R4A│Division of Calamba City USE ONLY
Office Address: DepEd Bldg., City Hall Compound, Brgy. Real, Calamba City

For DepEd Division of Calamba City USE only. Please send your feedback and
suggestions to lrmds.depedcalamba@deped.gov.ph or call 049–554 9830 loc. 14

1
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Dear Parents,

The Schools Division of Calamba City is one with every Filipino family in coping with the
demands of our modern times amidst Covid–19 Pandemic.

The Division initiated Self Learning Module (SLM) aims to meet the most essential learning
competencies required to be learned by your child whether your child opts for online, modular or
blended learning modality. The learning activities in this SLM are arranged chronologically from
simple to complex to lead your child to think critically, act skillfully, and reflect deeply on each
lesson and practice into real life skills. Most importantly, this SLM promotes self-paced learning as
your child can always review the least understood lessons as often as he/she pleases.

Thank you in advance for being one with us! Together, let us envision that, by the end of
this school year, we will see your child as one responsible young person with a heart and mind for
humanity, for nature, for the country, and for God.

Dear Learner,

Welcome to a brand-new year of learning!

This is our gift to you: The Division initiated Self Learning Module (SLM) that will help you
acquire the most essential learning competencies you needed as 21st Century Learner through the
Pivot 4 A IDEA Model which compose of 10 parts.
Parts of the LM Description
The teacher utilizes appropriate strategies in presenting the MELC and desired learning
Engagement Developme Introduction

What I need to know


outcomes for the day or week, purpose of the lesson, core content and relevant samples.
This allows teachers to maximize learner awareness of their own knowledge as regards
What is new content and skills required for the lesson
What I know The teacher presents activities, tasks, contents of value and interest to the learners. This
shall expose the learners on what he/she knew, what he /she does not know and what
What is in
nt

she/he wanted to know and learn. Most of the activities and tasks must simply and
What is it directly revolved around the concepts to develop and master the skills or the MELC.
What is more The teacher allows the learners to be engaged in various tasks and opportunities in
building their KSA’s to meaningfully connect their learnings after doing the tasks in the
What I can do D. This part exposes the learner to real life situations /tasks that shall ignite his/ her
interests to meet the expectation, make their performance satisfactory or produce a
What else I can do product or performance which lead him/ her to understand fully the skills and concepts.
The teacher brings the learners to a process where they shall demonstrate ideas,
Assimilation

What I have learned interpretation, mindset or values and create pieces of information that will form part of
their knowledge in reflecting, relating or using it effectively in any situation or context. This
What I can achieve part encourages learners in creating conceptual structures giving them the avenue to
integrate new and old learnings.
Please take time to read and do the activities in these SLM as if you are reporting in
school. Set a regular study schedule for you as much as possible, but keep in mind that these SLM
will enable you to learn at your own pace. If you do not understand a lesson, the SLM would not
mind you flipping back the pages repeatedly for review. Also, remember to keep in touch with your
teachers. Send them a message through your online sessions or write them a note as you do your
modular activities.

We wish you good luck in your studies, and we hope that you will remain happy and
enthusiastic in learning!
2
WEEK

I Maintenance of Computer System


1
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
 Follow OHS procedures in maintaining computer systems.

Perhaps you have handpicked the finest computer with the selected
fastest processor and graphic card and with a few gigabytes of memory. So
you thought to yourself that your machine is probably going to sustain you for
the next five (5) years. But little did you discover that some six months down
the road, your computer is behaving like a Pentium 2 computer, perpetually
flustering you with its choppy images, frustrating pop-ups and tremendously
slow disk access. Gradually, your computer crashes and all your data is lost
on one fine afternoon.
One thing you have probably missed out is the need for system
maintenance. The basic routine maintenance comprises of the 3 basic
processes:
1. Data Backup
2. Malware Maintenance
3. Disk or File System Maintenance
Let us address each of the processes in detail so that you can better
understand how you can apply them in your system to extend its longevity.

D
DATA BACKUP
Backing up basically
means creating a redundant copy
of a data so that in case anything
happens to the original data, you
have a spare copy. This is
typically a simple thing to do.
First, you must ask
yourself why should you back up
the data or system?
If you feel that you should backup your valuable data, then you should
decide and select what are the data to be backup. Depending on your needs,
you may choose to backup your windows registry, or your Outlook Express
mail data, or even your windows security keys.
Windows operating system's friendly interface allows you to drag and
drop computer files from one storage device to another. And this can be as
simple as copying a document file from your desktop into a thumb drive.

3
But when these files gradually occupies a lot of disk space, you may
need to seek help from archiver utilities such as Winzip which enables you to
compact your files into a single compressed file. You can then break up this
large file into several pieces to be stored in several mediums such as a span
of CD or DVD-Recordable.
Winzip also allows you to protect your file with encryption and a
software password to prevent any unauthorized access. There are a number
of backup methods you could use.

How to backup files in Windows XP:

1. To use the built in Windows


XP backup tool, follow the
instructions.
2. Click the Start button > All
Programs > Accessories >
System Tools > Backup.
3. The Windows XP backup
tool allows backing up all
user files in just one task. If
you select the option of the
My Documents backup, it
will copy the entire contents
of the Documents and
Settings folder including MS
Outlook/Outlook Express
messages and settings as
well as your profile settings.
The Windows XP backup
tool allows backing up all
user files in just one task. If
you select the option of the
My Documents backup, it
will copy the entire contents
of the Documents and
Settings folder including MS
Outlook/Outlook Express
messages and settings as
well as your profile settings.
4. However, in most situations
full backup is not necessary.
In all likelihood the My
Documents folder of your
computer will be large in
size and contain a lot of
irrelevant information. If this
is the case, Windows XP
backup tool suggests that

4
you manually specify files that you want to include or exclude
from the backup set.
5. Lastly, do not forget to back-up your Internet Explorer favorites
from within IE. You can export them from the Menu.

MALWARE MAINTENANCE
Malware refers to any kind
of malicious codes, objects or
content that infiltrates your
computer, resulting in damage and
causing your system to act in an
undesirable manner. Commonly,
these include viruses, spyware,
worms, trojan horses, spams and
many more. When you are
infected, you can lose your privacy,
confidential data and access to
your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from
malware.
One thing you can do to scan the file for any virus infection before you
attempt to open it. If the scan shows nothing, it is probably a safe file. But then
again, it may be a new virus yet to be updated in your virus scan. You can
either wait and apply the next virus signature update and perform a second
scan or risk it all and open the file.

DISK MAINTENANCE
Did anyone tell you that your hard disk is a pretty tricky machine?
When you first installed your operating system, you may be pleased to know
how smooth and efficient your software applications are running. But
gradually, it slows down and this bothers you. What truly causes the decline in
performance? You may argue that your disk is just a couple of months old.
This has much to do with the way you operate on your system.
Try to imagine a
big tool bucket filled
with gadgets. Initially,
the bucket only contains
a few spanners, a
hammer and some
screws. So every time
you search for a
particular item, it is
relatively easy to find.
But soon as you keep filling the bucket with all sorts of items and
especially when the amount of items grows, you will discover that you may
need more time just to search for a particular screw head. In such cases,
uninstall any unnecessary software and defragment your disk. Typically, your

5
system performance will decline when the amount of data in your hard disk
starts to grow.

E
Learning Task 1: Research and Investigate
Directions: Research on the internet about the different advantages and
disadvantages of data backup, malware maintenance and disk maintenance.
You can also interview/observe a practitioner while lending a quality service in
computer hardware servicing. Write your answers in your answer sheets.

A
Learning Task 2: Directions: Write an essay about the importance of Data
Backup. Relate your statements to the most treasured skills you acquired in
the lesson. Give also your own title for the essay (minimum of 200 words).
Write your answers in your answer sheets.

Rubric:
Excellent

Good

Poor
5

1
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but one
with uppercase letters.
Punctuation Correct ending punctuation in
every sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing and
alignment.
Total Points

Learning Task 3: Identification. Identify what type of fire is being stated.


Write your answers in your answer sheets.
1. It refers to any kind of malicious codes, objects or content that
infiltrates your computer, Fires in ordinary combustibles such as
wood, paper, cloth, trash, and plastics
2. It basically means creating a redundant copy of a data so that in
case anything happens to the original data, you have a spare copy.
3. An application that allows you to protect your file with encryption
and a software password to prevent any unauthorized access.

6
WEEK

I
DIAGNOSIS AND IDENTIFICATION
OF FAULTY SYSTEMS
2
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
 Identify faulty computer systems.

More than 70% of all computer problems are related to cabling and
connections. Ensure all cables are connected and connected firmly. IDE and
floppy ribbon cables and power cables can often go loose. Ensure
microprocessor, memory modules, and adapters such as video card are
inserted correctly and do not "pop-up" due to vibration.

D
DIAGNOSIS AND IDENTIFICATION OF FAULTY SYSTEM
Problem 1: System has no power at all. Power light does not illuminate,
fan inside the power supply does not turn on, and indicator light on
keyboard does not turn on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Power cable is Visually inspect power Make sure power cable
unplugged cable. is securely plugged in.
Defective power cable Visual inspection or try Replace cable.
another cable.
Power supply failure Power cable and wall Contact technical
socket are OK, but support.
system is still dead.
Faulty wall outlet; circuit Plug device into socket (1) ________________
breaker or fuse blown and test.

Problem 2: System is inoperative. Keyboard lights are on, power


indicator lights are lit, and hard drive is spinning.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Expansion card is Turn off computer. Using even pressure on
partially dislodged from Remove the cover of both ends of the
expansion slot on the the system unit. Check expansion card, press
motherboard. all expansion cards to down firmly on
ensure they expansion card.
are securely seated in
slots.
Defective floppy disk Turn the system off. Contact Technical
drive or tape drive Disconnect the cables Support.
from one of the floppy

7
drives. Turn on the
system, check to see if
the keyboard operates
normally. Repeat until
you have located
defective unit.

Defective expansion Turn the computer off. (2) ________________


card Remove an expansion
card.

Problem 3: System does not boot from hard disk drive but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between When attempting to run Check cable running
hard drive and system the FDISK utility form disk to disk
board is unplugged. described in the HARD controller on the board.
DISK section of the Make sure both ends
manual you get a are securely plugged
message, INVALID in; check the drive type
DRIVE in the Standard CMOS
SPECIFICATION Setup (in your
motherboard manual).
Damaged Hard Disk or Format hard disk: if Contact Technical
Disk Controller unable to do so, the Support.
hard disk may be
defective.
Hard Disk directory or Run the FDISK Backing up the hard
FAT is scrambled program, format the drive is extremely
hard drive (See HARD important. All Hard
DRIVE section of Disks can break down
manual). Copy your at any time.
backup data back onto
hard drive.

Problem 4: System only boots from Floppy Disk. Hard Disk can be read
and applications can be used, but booting from Hard Disk is impossible.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Hard Disk boot Corrupted system files (3) ________________
program has been
destroyed.

Problem 5: Error message reading "SECTOR NOT FOUND" or other


error messages indicators that certain data is not allowed to be
retrieved.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Sector Not Found Error Hard drive is likely bad You may be able to

8
itself. resolve this issue by
running scandisk and
having scandisk mark
the sectors as bad.
Problem 6: After installing an expansion card (network card, tape drive
card, etc.), the system no longer works properly.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Monitor has no power. All or part of the system (4) ______________
may be inoperable. The
new card may work but
a mouse or COM port
may not work.

Problem 7: Screen message says, "Invalid Configuration" or "CMOS


Failure."
PROBABLE CAUSE DIAGNOSIS SOLUTION
Incorrect information Check the configuration Review system's
has entered the program. Replace any equipment. Make sure
configuration (setup) incorrect information. correct information is in
program. setup.

Problem 8: Screen is blank.


PROBABLE CAUSE DIAGNOSIS SOLUTION
Monitor has no power. Power connectors may Check the power
be loose or not plugged connectors of the
in. monitor and the
system. Make sure
monitor is connected to
display card, change
I/O address on network
card if applicable.
Monitor is not (5) _____________
connected to computer.

Problem 9: System does not boot from hard disk drive but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between When attempting to run Check cable running
hard drive and system the FDISK utility form disk to disk
board unplugged. described in the HARD controller on the board.
DISK section of the Make sure both ends
manual you get a are securely plugged
message, INVALID in; check the drive type
DRIVE in the Standard CMOS
SPECIFICATION. Setup (in your

9
motherboard).

Problem 10: Memory Module Problem


PROBABLE CAUSE DIAGNOSIS SOLUTION
Memory problem, Loose installation of the Reboot computer. Re-
display card jumpers RAM on the memory install memory, make
one not set correctly. slot sure that all memory
modules are installed in
correct sockets. Check
jumper and switch
settings on display
card. See display card
section for information
of settings.
Computer virus Computer system Use anti-virus
becomes too slow and programs (McAfee/PC-
experiencing hang-up. cillin, E-port, etc.) to
detect and clean
viruses.

Problem 11: Screen goes blank periodically.


PROBABLE CAUSE DIAGNOSIS SOLUTION
Screen saver is Disable screen saver.
enabled.

Problem 12: Keyboard failure


PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is Loose keyboard cable Reconnect keyboard.
disconnected. connection Check keys again if
there is no
improvement, replace
keyboard.

Problem 13: No color on screen

PROBABLE CAUSE DIAGNOSIS SOLUTION


Faulty monitor If possible, connect
monitor to another
system. If no display,
replace monitor.

Problem 14: Windows system drive failure


PROBABLE CAUSE DIAGNOSIS SOLUTION

10
SETUP program does Boot from drive A:
not have correct using DOS system
information. disk. Input correct
information to SETUP
program.
Hard Drive cable is not Check Hard drive
connected properly. cable.

Problem 15: Cannot boot system after installing second hard drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Master/Slave jumpers Set master /slave
are not set correctly. jumpers correctly.
The Hard Drive is Run SETUP program
incompatible. and select correct drive
types. Call drive
manufacturers for
compatibility with other
drives.

Problem 16: Missing operating system on Hard Drive


PROBABLE CAUSE DIAGNOSIS SOLUTION
CMOS setup has been Run setup and select
changed. correct drive type.

Problem 17: Certain keys do not function.


PROBABLE CAUSE DIAGNOSIS SOLUTION
Keys are jammed or Replace keyboard.
defective.

Problem 18: Keyboard is locked, no keys function.


PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is locked. Unlock keyboard.

Learning Task 1: Read the situation below and answer the following
questions. Write your answer in your answer sheets.

Nash wants to play Roblox in their computer at home.


While turning on the computer, he noticed that the system has no
power at all. He observed if the power cable if it is unplugged. He
then noticed that it was plugged in. The next thing that he did is to
check if the power cable is defective. He made sure that the cord
is unplugged before checking it. He then had a visual inspection

11
and tried another cable. Upon thorough investigation, he
concluded that the power cord is defective. He then replaced it
with another one and turned on the computer. He was happy
because finally, he can play his favorite game, Roblox.
Questions:
1. What equipment has been tested?
2. What diagnosis has been made by the character?
3. What solutions did he make?

A
Learning Task 2:
Go back to the discussion on diagnosis and identification of faulty
systems. As you have noticed, there are five (5) blanks solutions on the
tables. Give one specific solution to the given problems/ probable causes
and diagnosis. Write your answers in your answer sheets.

Learning Task 3:
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using a computer
and the actions taken in every problem/error message or incidents
encountered. Write your answers in your answer sheets.

12
WEEK

I DIAGNOSTIC SOFTWARE TOOLS


3
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
 Test normal functions of computer systems

Diagnostic software is used to identify problems on a computer or


piece of equipment. These programs test the onboard systems for issues and
help to alert users of potential problems or breakdowns. Over the years, these
programs have gone from very basic to complex and highly specialized. With
this increase in technology, the skill required to use the software has
decreased to the point where most people can use this software with little or
no training.
Programs that provide
diagnostic information are
common everywhere.
Something as simple as the
oil light on a car dashboard is
a type of diagnostic software.
These hard-coded diagnostic
tools usually monitor one
specific part of a larger piece
of equipment and typically are
always operating. While these
types of diagnostic programs
are the most common, they are usually the least versatile. When people think
of true diagnostic software, they usually think of the types used on computers.
These programs monitor the computer for problems involving every aspect of
the machine, from hardware to software—far more complex and versatile than
the change oil light.
Since the introduction of diagnostic software, it has evolved in many
ways. The original type could only find the most major of problems. There
should be strong indicators or physical damage in order for the software to
recognize and report the problem. When computers became more common in
people's homes, particularly with the rise of Disc Operating Systems,
commonly known as DOS, diagnostic software became more common. Small
built-in programs, such as Checkdisk (CHKDISK), allowed users to perform
basic diagnostic routines on their systems. These early programs would often
output technical information and esoteric error codes instead of readable
information. In recent years, the output reports have changed considerably.
The basic outputs are now readable by most users, and they often contain
tips or warnings telling users what they should or should not do, all in plain
language.

13
Technological advances have even made Web page-based diagnostic
software available for home users. With minimal Web searching, nearly any
home user can find a wide range of websites offering to speed up their
computer or diagnose problems. Many of these sites are scams, so
consumers should perform proper research before using them. General
Internet searches can provide several resources to check a company's
credibility.

Some Downloadable Diagnostic Tools

Yet Another Cleaner


Protects your PC from browser hijacker,
malicious plug-ins, malwares, adware, various
viruses

ARO 2013
Repairs registry errors, remove "junk" files, and ensure
your PC is fully protected

RegDoctor
Improves your system performance and stability by
repairing and cleaning the Windows Registry

Wise Registry Cleaner


Cleans the registry portion of the hard drive

Advanced System Care


Tunes up and maintains your PC, with anti-spyware,
privacy protection, and system cleaning functions.

CPU-Z
Accesses various information's about your computer

Advanced System Care Pro


Tunes up and maintains your PC automatically.
Free Window Registry Repair

14
Free Window Registry Repair
Scans, repairs, and optimizes your Windows registry

Disk management tools:


 Fdisk - creates and deletes disk partitions.
 Format - prepares a hard drive prior to use.
 Scandisk or Chkdsk - checks for physical errors on the disk surface.
 Defrag - optimizes use of space on a disk.
 Disk Cleanup - removes unused files.
 Disk Management - creates partitions and formats disks (GUI
interface).
 System File Checker (SFC) – scans the operating system critical files.

Learning Task 1. Research three (3) downloadable diagnostic tools on the


internet. Write what does it do to your computer. Write your answers in your
answer sheets.

Learning Task 2. Matching type. Match column A with column B. Write the
letter of your answer on your answer sheet.

A B

1. It is used to identify problems on a a. scandisk


computer or piece of equipment. b. defrag
2. It creates and deletes partitions. c. free window
3. It checks for physical errors on the disk registry repair
surface. d. disk cleanup
4. It removes unused files. e. system file checker
5. It scans the operating system critical files. f. cpu-z
6. It optimizes the use of space on a disk. g. diagnostic software
7. It protects your PC from browser hijacker, tools
malicious plug-ins, malwares, adware, h. yet another cleaner
various viruses. i. disk management
8. It improves your system performance and j. reg doctor
stability by repairing and cleaning the k. Fdisk
Windows Registry.

15
9. It scans, repairs, and optimizes your
Windows registry.
10. It accesses various information's about
your computer.

16
WEEK

I
PROCEDURE IN CLEANING
HARDWARE COMPONENTS
4
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
 Adhere to the recommended schedule and techniques in
maintaining and cleaning computer systems

Cleaning your computer and its components and peripherals helps


keep them in good working condition and helps keep the computers from
spreading germs.

How often should I clean my computer?


The frequency of how
often you should clean your
computer varies on several
different factors. To help you
determine how often you need to
clean your computer, we have
created the chart below. Check
the appropriate boxes below that
apply to your computer’s
environment to determine how
often it should be cleaned.

General Cleaning Tips


Below is a listing of general tips that should be taken when cleaning
any of the components or peripherals of a computer, as well as tips to help
keep a computer clean.

1. Never spray or squirt any liquid onto any computer component. If a


spray is needed, spray the liquid onto a cloth and then use that cloth to
rub down the component.
2. You can use a vacuum to clean up dirt, dust, or hair around the
computer on the outside case. However, do not use a vacuum for the
inside of your computer as it generates a lot of static electricity that can
damage the internal components of your computer. If you need to use

17
a vacuum to clean the inside of your computer, use a portable battery
powered vacuum designed to do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before
cleaning.
4. Be cautious when using any cleaning solvents; some individuals may
have allergic reactions to chemicals in cleaning solvents and some
solvents can even damage the case. Try to always use water or a
highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or
controls. In addition, when cleaning the back of the computer, if
anything is plugged in, make sure turn off the PC and unplug the power
cable.
6. When cleaning fans, especially the smaller fans within a portable
computer or laptop it is suggested that you either hold the fan or place
something in-between the fan blades to prevent it from spinning.
Spraying compressed air into a fan or cleaning a fan with a vacuum
may cause damage or back voltage to be generated.
7. Never eat or drink around the computer area.

Cleaning Tools
Although many companies have created products to help improve the
process of cleaning your computer and peripherals, you can also use
household items to clean your computers and peripherals. Below is a listing of
items you may need to use while cleaning your computer or computer
peripherals.
Keep in mind that some components in your computer may only be
cleaned using a product designed for cleaning that component.

Cloth - A cloth is the best tool used when


rubbing down a component; although paper
towels can be used with most hardware, we
recommend using a cloth whenever possible.
Caution: It is recommended that you use a
cloth when cleaning components such as the
outside of the case, a drive, mouse, etc. You
should not use a cloth to clean any circuitry
such as the RAM or motherboard since they can generate Electrostatic
Discharge (ESD) that can damage electronics.

Water or rubbing alcohol - When moistening a


cloth, it is best to use water or rubbing alcohol.
Other solvents may be bad for the plastics
used with your computer.

18
Portable Vacuum - Sucking the dust, dirt,
hair, cigarette particles, and other particles out
of a computer can be one of the best methods
of cleaning a computer. Over time, these items
can restrict the airflow in a computer and
cause circuitry to corrode. Do not use a
standard vacuum as it can generate a lot of
static electricity that can damage your
computer.

Cotton swabs - Cotton swabs moistened with


rubbing alcohol or water are good for wiping hard
to reach areas in your keyboard, mouse, and
other peripherals.

Foam swabs - It is always better to use lint-free


swabs such as foam swabs.

Procedures in Cleaning Hardware


Components

Case cleaning
Why do we need to clean the computer
case regularly? It keeps the appearance of
the computer looking new. During cleaning, if
ventilation locations are found, these can be
cleaned helping the case keep a steady
airflow to the computer, keeping components
cool and in good working condition.
Procedure:
1. The plastic case that houses the PC
components can be cleaned with a lint-free cloth that has been
slightly dampened with water. For stubborn stains, add a little
household detergent to the cloth. It is recommended that you never
use a solvent cleaner on plastics.
2. Make sure all vents and air holes are hair and lint free by rubbing a
cloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is
safe to use a standard vacuum when cleaning the outside vents of
a computer. However, if you need to clean the inside of the
computer, use a portable battery powered vacuum to prevent static
electricity.

CD-ROM, DVD, and other disc drive cleaning

19
Why do we need to clean disc drives? A
dirty CD-ROM drive or other disc drives can
cause errors when reading discs. These read
errors could cause software installation and other
issues while running the program.
Procedure: To clean the CD-ROM drive, it is
recommended to purchase a CD-ROM cleaner
from your local retailer. Using a CD-ROM cleaner
should sufficiently clean the CD-ROM laser from
dust, dirt, and hair.
In addition to cleaning the drive with a special disc designed to
clean drives, you can also use a cloth dampened with water to clean
the tray that ejects from the drive. Make sure however, that after the
tray has been cleaned, it has to be completely dried before putting the
tray back into the drive.

CD and DVD disc cleaning


Why do we need to clean disc? Dirty CDs can cause read errors or
total malfunction.
Procedure: Cleaning CDs and DVDs
should be done with a cleaning kit but can
also be done with a normal clean cotton
cloth or shirt. When doing this with a clean
cotton cloth or shirt, wipe against the
tracks, starting from the middle of the CD
or DVD and wiping towards the outer side
as shown in the below picture. Never wipe
with the tracks; doing so may put more
scratches on the disc.
It is recommended to use water when cleaning a CD. However,
if the substance on a CD cannot be removed using water, pure alcohol
can also be used.

Hard drive cleaning


Why do we need to clean a hard drive? While hard drives cannot be
cleaned physically, they can be cleaned with various utilities on the computer
to help it run fast and more efficiently. Disk Management is one of the utilities
that will prevent the hard drive from slowing down.
Procedure: Disk Management
can be accessed in the Control
Panel, look for Administrative
Tools, then double-click on the
Computer Management icon. In
the System and Security
window, click on the
Administrative Tools. In the

20
Administrative Tools window, double-click on the Computer
Management icon.
When Computer Management opens, click on Disk
Management on the left side of the window, located under Storage.
After a brief loading period, Disk Management should now appear on
the right side of the Computer Management window.

Keyboard cleaning
Why do we need to clean the keyboard? The computer keyboard is
often the most germ infected item in your computer. Often, it will contain more
bacteria than your toilet seat. Cleaning it can help remove any dangerous
bacteria. Dirt, dust, and hair can also build up causing the keyboard to
malfunction.
Procedure: Before cleaning the
keyboard, turn off the computer
or unplug the USB keyboard. Not
unplugging the keyboard can
result in causing other computer
problems as you may press keys
that cause the computer to
perform an unwanted task.

Many people clean


the keyboard by turning it
upside down and shaking. A more effective method is to use
compressed air. Compressed air is pressurized air contained in a can
with a very long nozzle. Aim the air between the keys and blow away
all of the dust and debris that has gathered there. A vacuum cleaner
can also be used, but make sure the keyboard does not have loose
"pop off" keys that could possibly be drawn up by the vacuum.
After the dust, dirt, and hair had been removed spray a
disinfectant onto a cloth or use disinfectant cloths and rub each of the
keys on the keyboard. As mentioned in our general cleaning tips, never
spray any liquid onto the keyboard.

Substance spilt into the keyboard


Below are a few recommendations to help prevent a keyboard from
malfunctioning once a substance has been spilt within it.
If anything is spilt onto the keyboard turn the computer off
immediately or at the very least disconnect it from the computer. Then,
flip the keyboard over helping to prevent the substance from
penetrating the circuits. While the keyboard is upside down, shake the
keyboard over a surface that can be cleaned later. While still upside
down, use a cloth to help clean out what can be reached. After you

21
have cleaned it to the best of your ability, leave the keyboard upside
down for at least one night allowing it to dry. Once dry, continue
cleaning the keyboard with any remaining substances.
If after cleaning the keyboard you have keys that stick, remove
the keys and clean below the keys and the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky, try
washing the keyboard in the dishwasher.

If after doing all the above steps the keyboard does not function
properly or at all, it is recommended you buy a new keyboard.
LCD screen cleaning
Why do we need to clean the LCD screen? Dirt, dust, and fingerprints
can cause the computer screen to project blurry images/texts.
Procedure: Unlike a computer
monitor, the LCD or flat-panel
display is not made of glass, it
therefore requires special
cleaning procedures.
When cleaning the LCD
screen, it is important to
remember not to spray any liquids
onto the LCD directly. Press gently while cleaning, and do not use a
paper towel as it may cause the LCD to gather scratches.
To clean the LCD screen, use a non-rugged microfiber cloth,
soft cotton cloth, or swiffer duster. If a dry cloth does not completely
clean the screen, you can apply rubbing alcohol to the cloth and wipe
the screen with the damp cloth. Rubbing alcohol is used to clean the
LCD before it leaves the factory.

Motherboard cleaning
Why do we need to clean the motherboard? Dusts can build up and
corrode circuitry causing various problems such as computer lockups.

Caution: When working with interior computer parts (e.g.,


motherboard), take the necessary ESD precautions and avoid
unplugging any cables or other connections.
Procedure: Compressed air is
recommended when cleaning the
motherboard from dust, dirt, or
hair. When using compressed
air, hold it in the up-right position;
otherwise, it is possible that
chemicals may come out of the container that could damage or corrode
the motherboard or other component within the computer. Also, make
sure to always blow the dust or dirt away from the motherboard, or out
of the case.

22
Another good alternative to compressed air is to use a portable
battery powered vacuum that can effectively remove the dust, dirt, and
hair from the motherboard completely and prevent it from getting
trapped within the case. However, do not use a standard electric
vacuum as it can cause a lot of static electricity that can damage the
computer. When using the vacuum, it is vital that you stay a couple of
inches away from the motherboard and all other components to help
prevent contact as well as to help prevent anything from being sucked
into the vacuum. Ensure that you do not remove any small components
with the vacuum such as jumpers.

Optical Mouse cleaning


Why do we need to clean optical mouse regularly? To help keep a
mouse clean and germ free it can be helpful to clean the mouse.
Procedure: To clean the optical
mouse, you must first wipe the bottom
cover of the mouse. Turn the mouse
upside down to look at the lens.
If there is a smudge on the lens,
gently clean the area with a plain cotton-
tipped swab. If there is debris in the
lens, gently blow the debris away from
the area. Check the surface on which
you are using the mouse.
Use a cloth moistened with
rubbing alcohol or warm water and rub the surface of the mouse and
each of its buttons.

Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.

Mechanical mouse cleaning


Why is it important to clean an optical mouse? A dirty optical-
mechanical mouse (mouse with a ball) can be difficult to move. It can also
cause strange mouse movement.
Procedure: To clean the rollers of an optical-
mechanical mouse, you must first remove the
bottom cover of the mouse. To do this,
examine the bottom of the mouse to see what
direction the mouse cover should be rotated.
As you can see in the illustration below, the
mouse cover must be moved counter
clockwise. Place two fingers on the mouse
cover and push the direction of the arrows.

23
Once the cover has rotated about an inch, rotate the mouse into
its normal position, covering the bottom of the
mouse with one hand and the bottom should
fall off including the mouse ball. If this does not
occur, attempt to shake the mouse gently.
Once the bottom cover and the ball are
removed, you should be able to see three
rollers located within the mouse. Use a cotton
swab, finger, or fingernail to remove any
substance. Usually, there will be a small line of
hair and dirt in the middle of the roller, remove as much as this
substance as possible.
Once you have removed as much dirt and hair as possible,
place the ball back within the mouse and place the cover back on.
If the mouse still appears to be having the same issue, repeat
the above process. If after several attempts the mouse is still having
the same issues, it is likely that your mouse has other hardware issues,
and we recommend that it be replaced.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.

Printer cleaning
With some printers it may be necessary to clean the inside of the
printer to help keep the printer running smoothly.
Why do we need to do this? Cleaning the outside of a printer can
help keep the printer's appearance looking good; and in the case of a printer
that is used by many different people, it will keep the printer clean and free
from germs.
Procedure: First, make sure to
turn off the printer before cleaning
it. Dampen a cloth with water or
rubbing alcohol and wipe the case
and each of the buttons or knobs
on the printer. As mentioned
earlier, never spray any liquid
directly onto the printer.

Scanner cleaning
Why do we need to do this? Flatbed scanners commonly become
dirty with dust, fingerprints, and hair. When a scanner is dirty, the images may
have distortions.

24
Procedure: Clean a flatbed
scanner's surface by spraying a
window cleaner onto a paper towel
or cotton cloth and wipe the glass
until clean. As mentioned earlier,
never spray a liquid directly onto
the component.

To clean the outside of the


scanner, the same towel or cotton
cloth can be used.

Learning Task 1. Video presentation.

Directions: Choose one (1) computer hardware component and video


yourself that you are cleaning it. Make sure that you have followed OHS and
you have picked the correct cleaning tool.

Rubric:

Criteria Excellent Good Fair Needs


4 3 2 Improvement
1
Videograph The overall Most of the The quality The quality
y quality of the quality of of the of the video
video and the the video video is and the
focus were and the not very focus are not
excellent. focus were good but very good.
excellent. the overall
focus was
excellent
Content It covers all It includes IT includes The content
the topics in basic essential includes
depth with knowledge informatio minor
details and about the n about details, and
examples. topic. The the topic, it has
The content but it has several
knowledge of seems to be 1-2 mistakes in
the topic is good. mistakes the facts.
excellent. in the
facts.
Originality The product The product Uses Uses ideas
shows great shows ideas from from other

25
originality. certain other people
The ideas are originality. It people without
creative and shows the (quoting quoting
witty. use of new them) but them.
ideas and of there is
shrewdness. little
evidence
of original
ideas.
Use of There are not There are Four More than
language any mistakes fewer spelling or four spelling
in spelling or spelling grammar or grammar
grammar. mistakes or mistakes. mistakes.
punctuation
mistakes.
Total Points

Learning Task 2: True or False. Write True if the statement is correct or


False if otherwise. Write your answers in your answer sheets.
1. When cleaning a component or the computer, turn it off before
cleaning.
2. You are allowed to eat and drink around the computer area.
3. Be cautious when using any cleaning solvents.
4. Never spray or squirt any liquid onto any computer component.
5. Spraying compressed air into a fan or cleaning a fan with a vacuum DO
NOT cause damage or back voltage to be generated.

Learning Task 3.: Identify what cleaning tool is being asked in the following
statements. Write your answers in your answer sheets.
1. It is used when moistening a cloth.
2. A lint free swab
3. The best tool used when rubbing down a component.
4. It sucks the dust, dirt, hair, cigarette particles, and other particles out of
a computer.
5. It is good for wiping hard to reach areas in your keyboard, mouse, and
other peripherals.

26
WEEK

I
WAYS TO IMPROVE YOUR
COMPUTER'S PERFORMANCE
5
Maintaining Network Systems (TLE_ICTCS10MN-IVa-e-3)
 Respond to sudden breakdowns of computer systems in accordance
with established procedures

Disk Defragmentation

Fragmentation makes your hard disk do extra work that can slow down
your computer. Removable storage devices such as USB flash drives can
also become fragmented. Disk Defragmenter rearranges fragmented data so
your disks and drives can work more efficiently. Disk Defragmenter runs on a
schedule, but you can also analyze and defragment your disks and drives
manually.

When you store data into the hard disk, the data will normally occupy
the disk in continuous manner if there is sufficient data space on disk. Imagine
if you delete some data files, this will then leave some "gaps" in data space.
When new data files need to be stored and if the size of these data files could
not fit into a single gap, the data files will be segmented and fitted across
several gaps with interval. Your hard disk progressively becomes fragmented
after excessive usage of writing, deleting, and storing of data into your disk.

27
A file is typically broken into several small parts and stored in various
areas on a hard disk. When a read request is executed, the disk will search
for the multiple pieces, process, and link them and finally present it on screen
from the computer when you read a file or execute an application.

Besides improvement in system performance, disk defragmentation will


also improve data recovery yield in case your disk needs to be sent in for
recovery process.

For a similar reason, you should not perform defragmentation after


accidental data deletion as this will overwrite the deleted data when data
blocks are moved or replaced.

To defrag your hard disk, follow these steps:


1. Open Disk Defragmenter by clicking the Start button. In the search box,
type Disk Defragmenter, and then, in the list of results, click Disk
Defragmenter.
2. Under Current status, select the disk you want to defragment.
3. To determine if the disk needs to be defragmented or not, click Analyze
disk. If you are prompted for an administrator password or
confirmation, type the password, or provide confirmation.

Once Windows is finished analyzing the disk, you can check the
percentage of fragmentation on the disk in the Last Run column. If the
number is above 10%, you should defragment the disk.
4. Click Defragment disk. If you are prompted for an administrator
password or confirmation, type the password, or provide confirmation.
Disk Defragmenter might take from several minutes to a few hours to
finish, depending on the size and degree of fragmentation of your hard
disk. You can still use your computer during the defragmentation
process.
Notes:
 If the disk is already in exclusive use by another program or is
formatted using a file system other than NTFS file system, FAT, or
FAT32, it cannot be defragmented.
 Network locations cannot be defragmented.
 If a disk that you are expecting to see under Current status is not
showing up there, it might be because it contains an error. Try to
repair the disk first, then return to Disk Defragmenter to try again.

Cleaning Windows Registry

Registry is a system-defined database which is used by an Operating


System to store all the information needed to configure the windows settings
for 1 or more users, applications and hardware devices. Information contained
in registry includes user's profiles, application installed on the computer, types
of documents that are created, setting of properties sheet for each application

28
folder and icon, existing hardware in the system, and all the ports that are
being used.

Why Cleaning the registry is important?

When using the computer, users may have experienced quite several
problems relating to registry issues that may result in severe consequences
such as error messages pop-up, noticeably slow performance of a system or
even system crash. The reasons leading to these problems, however, are
mainly caused by missing or invalid registry key(s) from the Windows registry.
Usually, when any application is uninstalled from Windows, it is recommended
that you should use Add or Remove Programs feature to proceed (Start
menu>Control Panel >Add or Remove Programs) However, if you delete any
program manually without using this function, you might mistakenly move
away the registry key in the OS or even leave behind the orphaned registry
key. This, of course, will cause the problem of missing/ invalid registry entries.
Other actions include deletion of startup programs, installation of software
embedded with spyware or changes in hardware.

And because of the above reasons, cleaning Windows registry has


become an essential and crucial action that you need to implement regularly.
Do it regularly or you might experience losing all important data due to the
system breakdown.

Can I Delete the Registry By Myself?

The answer is "No". When you attempt to remove the registry by your
own, the risk that you may remove the valid registry is high because without
the registry cleaner software, it is not easy to determine which registry
belongs to which application. Therefore, this may cause the system to crash
or the software to malfunction.

How Do I Clean Windows Registry?

You can either buy Windows Registry cleaner software available in the
market or download a free trial package from the Internet to try out before
paying a full version. When run, this software will first identify the problems
with your Windows registry such as missing/invalid key references. After that,
it will proceed to probe your request for registry removal.

Below are some basic and useful features that you must consider when
choosing the Registry Cleaner software:
 ability to scan for the whole computer system for invalid/ orphan
registry
 ability to back up all the current registry in the system
 have an "undo" feature to restore the cleaning action
 options on which to choose registry key(s) to be deleted
 online updating of the software should be available

29
Now, with the software running regularly, it will have saved up a large
amount of disk space for your PC. The system then will run as smoothly and
efficiently like before.

Organizing Disk Drive Partition

What is Disk Partitioning?

Partitioning creates a logical file structure on your hard disk so as to


divide various portions of a hard disk to be used for different purposes such
as a dual operating systems, storage or organizational purposes.

Why Partition Your Disk?

Partitioning your hard disk helps categorize your files into logical
groupings so that you can search for files and make changes more effectively.
Folders are made for the same reason too. But partitioning provides better
security.

Security

Most default primary partition is the C drive. This is the drive where
your operating system and most other software applications are installed in. A
useful way of protecting your data is to store your personal information into a
separate disk partition. For example, if you are using an 80GB hard disk, you
might want to partition it into two drives - drive C & drive D. Drive C will
contain your operating system files and software applications such as your
Microsoft Office Suite, Adobe Acrobat, Antivirus, Photoshop etc., while drive D
can be configured as a storage drive to store all your document files, JPEG,
MP3 and other personal data.

It is understood that your most important files are those that are difficult
or virtually impossible to replace. For example, if Microsoft Word crashes, you
can always reinstall the application to make it work again. However, if your
document files are corrupted by a virus or worm, you may need to spend
money and precious time trying to recover your data. In some cases, you may
not be able to recover them if the damage is too severe. Statistics have
shown that most viruses and worms are more likely to infect executable and
system files compared to your MP3 or excel spreadsheets. Therefore, if one
partition corrupts, only that partition suffers and hopefully not the whole drive.

Convenience

Another reason for storing your document files in a separate drive is


the ease of manageability. Say in a scenario where your computer needs to
be reformatted due to severe corruption, you can easily reformat drive C and
be assured that all your documents in drive D remains intact. This will save
you time trying to back up your documents, then restoring them back in your

30
local drive after your computer is reformatted and starts working. In this way,
should you decide to refresh your operating system or application, the stored
data will not be affected.

Dual Operating System

You may wish to install more than one operating system into your
computer. For example, you need to use a Windows and Linux operating
system. But both are unable to be installed in the same partition. By
partitioning the disk, you separate two logical spaces to include each
individual OS.

UNDERSTANDING PARTITIONS

The master boot record is the first register that resides in your hard
disk. It is located at the first sector of the disk and the first program that runs
each time you power up your computer. The master boot record contains two
important structures - the master boot code and the master partition table.
Both provide instruction and information and how your computer boots up.
Due to its structure, a single hard disk is limited to four primary partitions. One
of it will be assigned as the active partition to contain your operating system.
Simply, You can create four primary partitions, or three primary partitions and
one extended partition which can be subdivided into multiple logical partitions.

For example, you may want to split your 80GB disk as follows:
 40GB primary partition for your OS and software applications
 10GB for MP3 files
 15GB for Document files
 5GB for Miscellaneous files
 10GB for Archival files

First, you create a 40GB primary partition. This will occupy the first of
the 4 partitions. Then you can create a 40GB extended partition. And within
the extended partition, you create four logical partition - 10GB, 15GB, 5GB &
10GB. So, the result of this will be a C drive (40GB), D drive (10GB), E drive
(15GB), F drive (5GB) and an H drive (10GB).

MAKING A DISK IMAGE BACKUP

Making a duplicate image or cloning a drive is often used in data


recovery to ensure that the original media where data has been lost is
untouched while recovery is done on the cloned drive.

It can also be used as a backup procedure. However, it is risky


because all the data duplicated will be along with whatever viruses and
malware that infected the drive.

BACKUP

Creating a backup of files is one of the most important things people do


not do, even though it should be their top priority.

31
Never recover lost data on the original media. Make a copy or image of
it on another storage media and recover from that copy.

Check Mode of Failure


Before you engage in any self-recovery jobs, do the following first:
 Check if you have heard any sound prior to your data loss.
 notice if the performance of the system degrades.
 Encountered any problems while opening files, folders or saving.

This is simply to make sure that the loss is logical in nature, and not
physical. If you encounter any data loss arising from physical data loss,
please send it to a professional data recovery outfit.

Learning Task 1. Identification. Write your answer in your answer sheet.

1. It is a system defined database which is used by an Operating


System to store all the information needed to configure the
windows settings.
2. It creates a logical file structure on your hard disk.
3. This is the driver where your operating system and most other
software applications are installed.
4. It is the first register that resides in your hard disk.
5. At what percent should you defragment your disk?

Learning Task 2. Online Review

After the research, watch this video presentation using the URL below:
https://www.youtube.com/watch?v=rS616jQOURg

Answer the following questions. Write your answer in your answer sheet.

1. What do we need to back-up?


2. Why you need to back-up in the same drive?
3. What other storage media is mentioned on the video?
4. Why is it important to create a system repair disc?
5. What are the different system recovery options?

Learning Task 3.

32
Imagine that you will be given a 1TB hard drive. Partition it in your own
way. Make sure that all necessary partitions are present. Write your answer
in your answer sheet.

WEEK

I MAINTAIN NETWORK SYSTEMS


6
Maintaining Network Systems (TLE_ICTCS10MN-IVa-e-3)
 Follow OHS procedures in maintaining network systems.

Maintaining computer system and network increases efficiency and


saves you from the hassle and expense associated with major repairs.
However, it is essential to understand how to schedule maintenance plans
and implement it accordingly. By learning when maintenance is practical and
developing a scheduling strategy, you can set up maintenance strategies that
are beneficial to your computer system and network.

D
The following are the procedures on how to maintain computer system
and networks:
Create an Equipment Maintenance Schedule
To perform the maintenance of your computer efficiently, a
maintenance schedule is made to guide the personnel in the proper
maintenance procedure. This will help them remember the maintenance task
that needs to be done to improve the functionality of the computer system and
networks.
Create a Maintenance Checklist
To determine if the maintenance program is implemented according to
what is planned, an assessment must be done. The result of the assessment

33
will then be recorded and reported to the proper authorities for immediate
action.
The assessment is through regular inspections which assure that the
maintenance activities are done on the date and time they were was planned
and that the performance levels adhered to the defined standard.
Below is a sample Maintenance Inspection Checklist. This checklist will
confirm if the maintenance activities have been performed in order to prolong
the life of this particular equipment. The inspection items are stated in
question form as these serve as the criteria or standards of maintenance.

Perform the computer maintenance task regularly.


Just knowing all the basics of computer maintenance task schedule
clearly will not be enough. Find time to apply all of the maintenance procedure
regularly and frequently. Make computer maintenance activities a regular
practice, so that you always have a fine-tuned computer with good
performance.

Perform Network Maintenance Procedures


Networks are used to transmit information and electricity through
cables. When installing these networks, at most care must be applied to
protect the network installers from injury. Procedures must also be followed to
ensure that those around the network cables do not become the victims of
electrical fires or other hazards.
1. Duct Systems - Networks are sometimes installed in duct systems.
There is a concern that the network cables might become damaged
during construction, so the ducts must be built away from planned
future road construction and utilities, according to the International
Telecommunication Union. The manholes placed in the roads must
be kept away from intersections so that the network installation and
repair workers are not at risk of being hit by a vehicle.
2. Optical Lasers - Networks that use optical lasers uses invisible
radiation that is emitted by these lasers. Before installing the laser,
the laser operation manual and safety guide must be read,
according to Net Ap. No one should stare inside the optical ports
from where the lasers emit their light or else blindness could result.
When working with the laser, safety goggles must always be worn.

34
3. Falling - Many networks are run along utility poles, which are
wooden poles that have network cables raised high above the
ground. When installing these cables, falling can be disastrous
given the height of the utility poles. Therefore, network installers
should wear safety harnesses to ensure that they do not fall.
4. De-Energize - Some networks have cables that are electrically
charged. These cables must be de-energized, and tests should be
used to ensure that the cables do not have any remaining electricity
in them. The tools that are used for repairing the cables are
insulated so that electricity does not travel through them and into
the hands of the line repairer.
5. Cable Safety Standards - Network cables must have certain
characteristics to be legally used for networks. The cables must not
produce flames that can ignite anything. They must not have
halogen. They must not produce acidic fumes. They must be
resistant to ionizing radiation. Cables must be coded so that those
working with the cables can identify what they are.

6. Cable Inspection - Networks must only be installed by licensed


professionals. Building inspectors must check the network cables to
ensure that they are installed properly and that they will not create a
fire hazard. These building inspections are especially important
when the property containing the network cables is sold.

General Safety
Safe working conditions help prevent injury to people and damage
to computer equipment. A safe workspace is clean, organized, and
properly lighted. Everyone must understand and follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first-aid kit are available in case of fire or injury. Poorly
placed or unsecured cables can cause tripping hazards in a network
installation. Cables should be installed in conduit or cable trays to prevent
hazards.
These are some of the basic safety precautions to observe when
working on a computer:
 Remove your watch and jewelry and secure loose clothing.
 Turn off the power and unplug equipment before performing
service.
 Cover sharp edges inside the computer case with tape.
 Never open a power supply or a CRT monitor.
 Do not touch areas in printers that are hot or that use high voltage.
 Know where the fire extinguisher is located and how to use it.
 Keep food and drinks out of your workspace.
 Keep your workspace clean and free of clutter.

35
 Bend your knees when lifting heavy objects to avoid injuring your
back.

Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries,
and fatalities in the home and the workplace. Power supplies and CRT
monitors contain high voltage.

CAUTION: Only experienced technicians should attempt to repair


power supplies and CRT monitors.

Some printer parts become hot during use, and other parts might
contain high voltage. Check the printer manual for the location of high-
voltage components. Some components retain a high voltage even after
the printer is turned off. Make sure that the printer has had time to cool
before making the repair.
Electrical devices have certain power requirements. For example,
AC adapters are manufactured for specific laptops. Exchanging power
cords with a different type of laptop or device may cause damage to both
the AC adapter and the laptop.

Follow fire safety guidelines to protect lives, structures, and


equipment. To avoid an electrical shock and to prevent damage to the
computer, turn off and unplug the computer before beginning a repair.
The following are general information on electrical safety:

 Electrical equipment that is plugged into a power source should


NEVER be handled if your hands or feet are wet.
 Do not allow cables and plugs to get wet. Thus, keep liquids away
from electrical equipment.
 Unplug equipment by pulling on the plug, not the cord.
 Damaged electrical equipment that constitutes an electrical hazard
are not to be used until properly repaired or replaced.
 Never connect electrical cords in series.
 All electrical circuit disconnects, or panels must not be blocked.
 Ground pins on the plugs and the devices plugged into the
receptacles must be intact.
 Do not store flammable liquids near electrical equipment.

Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire
extinguisher can prevent a small fire from getting out of control. When
working with computer components, be aware of the possibility of an
accidental fire and know how to react. Be alert to notice odors being
emitted from computers and electronic devices. When electronic
components overheat or short out, they emit a burning odor. If there is a
fire, follow these safety procedures:
 Never fight a fire that is out of control or not contained.

36
 Always have a planned fire escape route before beginning any
work.
 Get out of the building quickly.
 Contact emergency services for help.
 Locate and read the instructions on the fire extinguishers in your
workplace before you use them.
Be familiar with the types of fire extinguishers used in your country
or region. Each type of fire extinguisher has specific chemicals to fight
different types of fire.

Types of Fires
Not all fires are the same. Different fuels create different fires and
require different types of fire extinguishing agents.
Class A: Class A fires are fires in ordinary combustibles such as wood,
paper, cloth, trash, and plastics.
Class B: Class B fires are fires in flammable liquids such as gasoline,
petroleum oil and paint. Class B fires also include flammable gases
such as propane and butane. Class B fires do not include fires
involving cooking oils and grease.
Class C: Class C fires are fires involving energized electrical
equipment such as motors, transformers, and appliances.
Remove the power and the Class C fire becomes one of the other
classes of fire.

Class D: Class D fires are fires in combustible metals such as


potassium, sodium, aluminum, and magnesium.
Class K: Class K fires are fires in cooking oils and greases such as
animals’ fats and vegetable fats.

Types of Fire Extinguisher

Some types of fire


extinguishing agents can be used
on more than one class of fire.
Others have warnings where it
would be dangerous for the
operator to use a particular fire
extinguishing agent.
Different types of fire
extinguishers are designed to fight
different classes of fire. The three
most common types of fire
extinguishers are: Water (APW),
Carbon Dioxide (CO2), Dry
Chemical (ABC, BC,DC).

37
Water and Foam fire extinguishers snuff the fire by taking away the
heat element of the fire triangle. Foam agents also separate the oxygen
element from the other elements.
Water extinguishers are for Class A fires only - they should not be
used on Class B or C fires. The discharge stream could spread the
flammable liquid in a Class B fire or could create a shock hazard on a
Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the
oxygen element of the fire triangle and also be removing the heat with a
very cold discharge.
Carbon dioxide can be used on Class B & C fires. They are usually
ineffective on Class A fires.
Dry Chemical fire extinguishers extinguish the fire primarily by
interrupting the chemical reaction of the fire triangle. Today's most widely
used type of fire extinguisher is the multipurpose dry chemical that is
effective on Class A, B, and C fires. This agent also works by creating a
barrier between the oxygen element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the
memory aid P-A-S-S to remember the basic rules of fire extinguisher
operation:
P: Pull the pin.
A: Aim at the base of the fire, not at the flames.
S: Squeeze the lever.
S: Sweep the nozzle from side to side.

E
Learning Task 1: Create a weekly maintenance checklist for the computer
laboratory. Include all the computer and network hardware. Write your answers
in your answer sheets.
Rubric:
Excellent

Good

Poor
5

Hardware/ All hardware/peripherals were


Peripherals enumerated
Format Layout of the checklist is good.
Details Important details were included
such as dates, checker’s name,
area/room, remarks, conditions,
etc.
Handwritin Legible. Good spacing and
g alignment.
Total Points

38
A
Learning Task 2: True or False. Write True if the statement is true or False if
otherwise. Write your answers in your answer sheets.
1. Network cables must have certain characteristics to be legally used
for networks.
2. Safe working conditions help prevent injury to people and damage
to computer equipment.
3. NEVER open a power supply or a CRT monitor.
4. Store flammable liquids near electrical equipment.
5. NEVER fight a fire that is out of control or not contained.

Learning Task 3: Identification. Identify what type of fire is being stated.


Write your answers in your answer sheets.
1. Fires in flammable liquids such as gasoline, petroleum oil and paint
2. Fires in ordinary combustibles such as wood, paper, cloth, trash, and
plastics
3. Fires in cooking oils and greases such as animals’ fats and vegetable
fats
4. Fires are fires in combustible metals such as potassium, sodium,
aluminum, and magnesium
5. Fires involving energized electrical equipment such as motors,
transformers, and appliances.

39
WEEK

I
MAINTENANCE OF THE COMPUTER
SYSTEMS AND NETWORKS
7
Inspect and test configured/repaired computer systems and
networks (TLE_ICTCS10MN-IVf-j-4)
 Maintain the computer systems and networks to ensure safe
operations

Schedule and Techniques in Maintaining Systems

Regular maintenance is essential to keep a network running well. You


should also be prepared to upgrade equipment and software periodically to
take advantage of improving technology.

System Restore

System Information maintains a history of device drivers that are


installed on your computer. If you are unsure of a computer's recent history,
you can use System Information to better understand what has happened in
the past. If a device does not work correctly, and its history indicates a recent
upgrade to a new driver, replace that driver with the original driver, and test to
see if doing so resolves the issue.

System Information also provides access to tools you can use for If you
install an update from the Windows Update Web site, and it fails to meet your
expectations, restore the original files by running the Update Wizard Uninstall
from the Tools menu in the System Information tool. If your computer worked

40
fine yesterday, but is not working properly today, try restoring yesterday's
configuration files by running the System Restore utility from the Tools menu
in the System Information tool.

To start Microsoft System Information, use either of the following


methods:
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Information.
 Click Start, click Run, type msinfo32.exe in the Open box, and then
click OK.
 To start System Restore
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Restore; or
 Click Start, click Run, type System Restore in the Open box, and then
press Enter key. Then, it will prompt you to the dialogue box shown
below:
 Click Next button, then it will prompt you to restore your computer to
the state it was working properly. Tick on Show More Restore Points
then check the box below to display other possible options you can
choose troubleshooting your computer.

If you install an update from the Windows Update Web site, and it fails
to meet your expectations, restore the original files by running the Update
Wizard Uninstall from the Tools menu in the System Information tool. If your
computer worked fine yesterday, but is not working properly today, try
restoring yesterday's configuration files by running the System Restore utility
from the Tools menu in the System Information tool.

To start Microsoft System Information, use either of the following


methods:
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Information.
 Click Start, click Run, type msinfo32.exe in the Open box, and then
click OK.
 To start System Restore
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Restore; or
 Click Start, click Run, type System Restore in the Open box, and then
press Enter key. Then, it will prompt you to the dialogue box shown
below:
 Click Next button, then it will prompt you to restore your computer to
the state it was working properly. Tick on Show More Restore Points
then check the box below to display other possible options you can
choose.
 Choose a Restore Point given on the list and select Next.
 Finally, choose Finish button to proceed with the process. Wait for the
computer to automatically restart as it undergoes system restore.

41
Learning Task 1. Write the different steps in starting Microsoft system
information. Write your answer in your answer sheet.

Learning Task 2. Watch the following video using this URL


https://www.youtube.com/watch?v=vKH0QeV0coM and write the different
steps in creating system restore point. Write your answer in your answer
sheet.

42

You might also like