TLE ICT 10 CSS Quarter 4 Weeks 1 7
TLE ICT 10 CSS Quarter 4 Weeks 1 7
SELF-LEARNING MODULE
GRADE 10
For DepEd Division of Calamba City USE only. Please send your feedback and
suggestions to lrmds.depedcalamba@deped.gov.ph or call 049–554 9830 loc. 14
1
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Dear Parents,
The Schools Division of Calamba City is one with every Filipino family in coping with the
demands of our modern times amidst Covid–19 Pandemic.
The Division initiated Self Learning Module (SLM) aims to meet the most essential learning
competencies required to be learned by your child whether your child opts for online, modular or
blended learning modality. The learning activities in this SLM are arranged chronologically from
simple to complex to lead your child to think critically, act skillfully, and reflect deeply on each
lesson and practice into real life skills. Most importantly, this SLM promotes self-paced learning as
your child can always review the least understood lessons as often as he/she pleases.
Thank you in advance for being one with us! Together, let us envision that, by the end of
this school year, we will see your child as one responsible young person with a heart and mind for
humanity, for nature, for the country, and for God.
Dear Learner,
This is our gift to you: The Division initiated Self Learning Module (SLM) that will help you
acquire the most essential learning competencies you needed as 21st Century Learner through the
Pivot 4 A IDEA Model which compose of 10 parts.
Parts of the LM Description
The teacher utilizes appropriate strategies in presenting the MELC and desired learning
Engagement Developme Introduction
she/he wanted to know and learn. Most of the activities and tasks must simply and
What is it directly revolved around the concepts to develop and master the skills or the MELC.
What is more The teacher allows the learners to be engaged in various tasks and opportunities in
building their KSA’s to meaningfully connect their learnings after doing the tasks in the
What I can do D. This part exposes the learner to real life situations /tasks that shall ignite his/ her
interests to meet the expectation, make their performance satisfactory or produce a
What else I can do product or performance which lead him/ her to understand fully the skills and concepts.
The teacher brings the learners to a process where they shall demonstrate ideas,
Assimilation
What I have learned interpretation, mindset or values and create pieces of information that will form part of
their knowledge in reflecting, relating or using it effectively in any situation or context. This
What I can achieve part encourages learners in creating conceptual structures giving them the avenue to
integrate new and old learnings.
Please take time to read and do the activities in these SLM as if you are reporting in
school. Set a regular study schedule for you as much as possible, but keep in mind that these SLM
will enable you to learn at your own pace. If you do not understand a lesson, the SLM would not
mind you flipping back the pages repeatedly for review. Also, remember to keep in touch with your
teachers. Send them a message through your online sessions or write them a note as you do your
modular activities.
We wish you good luck in your studies, and we hope that you will remain happy and
enthusiastic in learning!
2
WEEK
Perhaps you have handpicked the finest computer with the selected
fastest processor and graphic card and with a few gigabytes of memory. So
you thought to yourself that your machine is probably going to sustain you for
the next five (5) years. But little did you discover that some six months down
the road, your computer is behaving like a Pentium 2 computer, perpetually
flustering you with its choppy images, frustrating pop-ups and tremendously
slow disk access. Gradually, your computer crashes and all your data is lost
on one fine afternoon.
One thing you have probably missed out is the need for system
maintenance. The basic routine maintenance comprises of the 3 basic
processes:
1. Data Backup
2. Malware Maintenance
3. Disk or File System Maintenance
Let us address each of the processes in detail so that you can better
understand how you can apply them in your system to extend its longevity.
D
DATA BACKUP
Backing up basically
means creating a redundant copy
of a data so that in case anything
happens to the original data, you
have a spare copy. This is
typically a simple thing to do.
First, you must ask
yourself why should you back up
the data or system?
If you feel that you should backup your valuable data, then you should
decide and select what are the data to be backup. Depending on your needs,
you may choose to backup your windows registry, or your Outlook Express
mail data, or even your windows security keys.
Windows operating system's friendly interface allows you to drag and
drop computer files from one storage device to another. And this can be as
simple as copying a document file from your desktop into a thumb drive.
3
But when these files gradually occupies a lot of disk space, you may
need to seek help from archiver utilities such as Winzip which enables you to
compact your files into a single compressed file. You can then break up this
large file into several pieces to be stored in several mediums such as a span
of CD or DVD-Recordable.
Winzip also allows you to protect your file with encryption and a
software password to prevent any unauthorized access. There are a number
of backup methods you could use.
4
you manually specify files that you want to include or exclude
from the backup set.
5. Lastly, do not forget to back-up your Internet Explorer favorites
from within IE. You can export them from the Menu.
MALWARE MAINTENANCE
Malware refers to any kind
of malicious codes, objects or
content that infiltrates your
computer, resulting in damage and
causing your system to act in an
undesirable manner. Commonly,
these include viruses, spyware,
worms, trojan horses, spams and
many more. When you are
infected, you can lose your privacy,
confidential data and access to
your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from
malware.
One thing you can do to scan the file for any virus infection before you
attempt to open it. If the scan shows nothing, it is probably a safe file. But then
again, it may be a new virus yet to be updated in your virus scan. You can
either wait and apply the next virus signature update and perform a second
scan or risk it all and open the file.
DISK MAINTENANCE
Did anyone tell you that your hard disk is a pretty tricky machine?
When you first installed your operating system, you may be pleased to know
how smooth and efficient your software applications are running. But
gradually, it slows down and this bothers you. What truly causes the decline in
performance? You may argue that your disk is just a couple of months old.
This has much to do with the way you operate on your system.
Try to imagine a
big tool bucket filled
with gadgets. Initially,
the bucket only contains
a few spanners, a
hammer and some
screws. So every time
you search for a
particular item, it is
relatively easy to find.
But soon as you keep filling the bucket with all sorts of items and
especially when the amount of items grows, you will discover that you may
need more time just to search for a particular screw head. In such cases,
uninstall any unnecessary software and defragment your disk. Typically, your
5
system performance will decline when the amount of data in your hard disk
starts to grow.
E
Learning Task 1: Research and Investigate
Directions: Research on the internet about the different advantages and
disadvantages of data backup, malware maintenance and disk maintenance.
You can also interview/observe a practitioner while lending a quality service in
computer hardware servicing. Write your answers in your answer sheets.
A
Learning Task 2: Directions: Write an essay about the importance of Data
Backup. Relate your statements to the most treasured skills you acquired in
the lesson. Give also your own title for the essay (minimum of 200 words).
Write your answers in your answer sheets.
Rubric:
Excellent
Good
Poor
5
1
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but one
with uppercase letters.
Punctuation Correct ending punctuation in
every sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing and
alignment.
Total Points
6
WEEK
I
DIAGNOSIS AND IDENTIFICATION
OF FAULTY SYSTEMS
2
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
Identify faulty computer systems.
More than 70% of all computer problems are related to cabling and
connections. Ensure all cables are connected and connected firmly. IDE and
floppy ribbon cables and power cables can often go loose. Ensure
microprocessor, memory modules, and adapters such as video card are
inserted correctly and do not "pop-up" due to vibration.
D
DIAGNOSIS AND IDENTIFICATION OF FAULTY SYSTEM
Problem 1: System has no power at all. Power light does not illuminate,
fan inside the power supply does not turn on, and indicator light on
keyboard does not turn on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Power cable is Visually inspect power Make sure power cable
unplugged cable. is securely plugged in.
Defective power cable Visual inspection or try Replace cable.
another cable.
Power supply failure Power cable and wall Contact technical
socket are OK, but support.
system is still dead.
Faulty wall outlet; circuit Plug device into socket (1) ________________
breaker or fuse blown and test.
7
drives. Turn on the
system, check to see if
the keyboard operates
normally. Repeat until
you have located
defective unit.
Problem 3: System does not boot from hard disk drive but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between When attempting to run Check cable running
hard drive and system the FDISK utility form disk to disk
board is unplugged. described in the HARD controller on the board.
DISK section of the Make sure both ends
manual you get a are securely plugged
message, INVALID in; check the drive type
DRIVE in the Standard CMOS
SPECIFICATION Setup (in your
motherboard manual).
Damaged Hard Disk or Format hard disk: if Contact Technical
Disk Controller unable to do so, the Support.
hard disk may be
defective.
Hard Disk directory or Run the FDISK Backing up the hard
FAT is scrambled program, format the drive is extremely
hard drive (See HARD important. All Hard
DRIVE section of Disks can break down
manual). Copy your at any time.
backup data back onto
hard drive.
Problem 4: System only boots from Floppy Disk. Hard Disk can be read
and applications can be used, but booting from Hard Disk is impossible.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Hard Disk boot Corrupted system files (3) ________________
program has been
destroyed.
8
itself. resolve this issue by
running scandisk and
having scandisk mark
the sectors as bad.
Problem 6: After installing an expansion card (network card, tape drive
card, etc.), the system no longer works properly.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Monitor has no power. All or part of the system (4) ______________
may be inoperable. The
new card may work but
a mouse or COM port
may not work.
Problem 9: System does not boot from hard disk drive but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between When attempting to run Check cable running
hard drive and system the FDISK utility form disk to disk
board unplugged. described in the HARD controller on the board.
DISK section of the Make sure both ends
manual you get a are securely plugged
message, INVALID in; check the drive type
DRIVE in the Standard CMOS
SPECIFICATION. Setup (in your
9
motherboard).
10
SETUP program does Boot from drive A:
not have correct using DOS system
information. disk. Input correct
information to SETUP
program.
Hard Drive cable is not Check Hard drive
connected properly. cable.
Problem 15: Cannot boot system after installing second hard drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Master/Slave jumpers Set master /slave
are not set correctly. jumpers correctly.
The Hard Drive is Run SETUP program
incompatible. and select correct drive
types. Call drive
manufacturers for
compatibility with other
drives.
Learning Task 1: Read the situation below and answer the following
questions. Write your answer in your answer sheets.
11
and tried another cable. Upon thorough investigation, he
concluded that the power cord is defective. He then replaced it
with another one and turned on the computer. He was happy
because finally, he can play his favorite game, Roblox.
Questions:
1. What equipment has been tested?
2. What diagnosis has been made by the character?
3. What solutions did he make?
A
Learning Task 2:
Go back to the discussion on diagnosis and identification of faulty
systems. As you have noticed, there are five (5) blanks solutions on the
tables. Give one specific solution to the given problems/ probable causes
and diagnosis. Write your answers in your answer sheets.
Learning Task 3:
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using a computer
and the actions taken in every problem/error message or incidents
encountered. Write your answers in your answer sheets.
12
WEEK
13
Technological advances have even made Web page-based diagnostic
software available for home users. With minimal Web searching, nearly any
home user can find a wide range of websites offering to speed up their
computer or diagnose problems. Many of these sites are scams, so
consumers should perform proper research before using them. General
Internet searches can provide several resources to check a company's
credibility.
ARO 2013
Repairs registry errors, remove "junk" files, and ensure
your PC is fully protected
RegDoctor
Improves your system performance and stability by
repairing and cleaning the Windows Registry
CPU-Z
Accesses various information's about your computer
14
Free Window Registry Repair
Scans, repairs, and optimizes your Windows registry
Learning Task 2. Matching type. Match column A with column B. Write the
letter of your answer on your answer sheet.
A B
15
9. It scans, repairs, and optimizes your
Windows registry.
10. It accesses various information's about
your computer.
16
WEEK
I
PROCEDURE IN CLEANING
HARDWARE COMPONENTS
4
Maintaining Computer Systems (TLE_ICTCS10MN-IIIf-j-2)
Adhere to the recommended schedule and techniques in
maintaining and cleaning computer systems
17
a vacuum to clean the inside of your computer, use a portable battery
powered vacuum designed to do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before
cleaning.
4. Be cautious when using any cleaning solvents; some individuals may
have allergic reactions to chemicals in cleaning solvents and some
solvents can even damage the case. Try to always use water or a
highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or
controls. In addition, when cleaning the back of the computer, if
anything is plugged in, make sure turn off the PC and unplug the power
cable.
6. When cleaning fans, especially the smaller fans within a portable
computer or laptop it is suggested that you either hold the fan or place
something in-between the fan blades to prevent it from spinning.
Spraying compressed air into a fan or cleaning a fan with a vacuum
may cause damage or back voltage to be generated.
7. Never eat or drink around the computer area.
Cleaning Tools
Although many companies have created products to help improve the
process of cleaning your computer and peripherals, you can also use
household items to clean your computers and peripherals. Below is a listing of
items you may need to use while cleaning your computer or computer
peripherals.
Keep in mind that some components in your computer may only be
cleaned using a product designed for cleaning that component.
18
Portable Vacuum - Sucking the dust, dirt,
hair, cigarette particles, and other particles out
of a computer can be one of the best methods
of cleaning a computer. Over time, these items
can restrict the airflow in a computer and
cause circuitry to corrode. Do not use a
standard vacuum as it can generate a lot of
static electricity that can damage your
computer.
Case cleaning
Why do we need to clean the computer
case regularly? It keeps the appearance of
the computer looking new. During cleaning, if
ventilation locations are found, these can be
cleaned helping the case keep a steady
airflow to the computer, keeping components
cool and in good working condition.
Procedure:
1. The plastic case that houses the PC
components can be cleaned with a lint-free cloth that has been
slightly dampened with water. For stubborn stains, add a little
household detergent to the cloth. It is recommended that you never
use a solvent cleaner on plastics.
2. Make sure all vents and air holes are hair and lint free by rubbing a
cloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is
safe to use a standard vacuum when cleaning the outside vents of
a computer. However, if you need to clean the inside of the
computer, use a portable battery powered vacuum to prevent static
electricity.
19
Why do we need to clean disc drives? A
dirty CD-ROM drive or other disc drives can
cause errors when reading discs. These read
errors could cause software installation and other
issues while running the program.
Procedure: To clean the CD-ROM drive, it is
recommended to purchase a CD-ROM cleaner
from your local retailer. Using a CD-ROM cleaner
should sufficiently clean the CD-ROM laser from
dust, dirt, and hair.
In addition to cleaning the drive with a special disc designed to
clean drives, you can also use a cloth dampened with water to clean
the tray that ejects from the drive. Make sure however, that after the
tray has been cleaned, it has to be completely dried before putting the
tray back into the drive.
20
Administrative Tools window, double-click on the Computer
Management icon.
When Computer Management opens, click on Disk
Management on the left side of the window, located under Storage.
After a brief loading period, Disk Management should now appear on
the right side of the Computer Management window.
Keyboard cleaning
Why do we need to clean the keyboard? The computer keyboard is
often the most germ infected item in your computer. Often, it will contain more
bacteria than your toilet seat. Cleaning it can help remove any dangerous
bacteria. Dirt, dust, and hair can also build up causing the keyboard to
malfunction.
Procedure: Before cleaning the
keyboard, turn off the computer
or unplug the USB keyboard. Not
unplugging the keyboard can
result in causing other computer
problems as you may press keys
that cause the computer to
perform an unwanted task.
21
have cleaned it to the best of your ability, leave the keyboard upside
down for at least one night allowing it to dry. Once dry, continue
cleaning the keyboard with any remaining substances.
If after cleaning the keyboard you have keys that stick, remove
the keys and clean below the keys and the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky, try
washing the keyboard in the dishwasher.
If after doing all the above steps the keyboard does not function
properly or at all, it is recommended you buy a new keyboard.
LCD screen cleaning
Why do we need to clean the LCD screen? Dirt, dust, and fingerprints
can cause the computer screen to project blurry images/texts.
Procedure: Unlike a computer
monitor, the LCD or flat-panel
display is not made of glass, it
therefore requires special
cleaning procedures.
When cleaning the LCD
screen, it is important to
remember not to spray any liquids
onto the LCD directly. Press gently while cleaning, and do not use a
paper towel as it may cause the LCD to gather scratches.
To clean the LCD screen, use a non-rugged microfiber cloth,
soft cotton cloth, or swiffer duster. If a dry cloth does not completely
clean the screen, you can apply rubbing alcohol to the cloth and wipe
the screen with the damp cloth. Rubbing alcohol is used to clean the
LCD before it leaves the factory.
Motherboard cleaning
Why do we need to clean the motherboard? Dusts can build up and
corrode circuitry causing various problems such as computer lockups.
22
Another good alternative to compressed air is to use a portable
battery powered vacuum that can effectively remove the dust, dirt, and
hair from the motherboard completely and prevent it from getting
trapped within the case. However, do not use a standard electric
vacuum as it can cause a lot of static electricity that can damage the
computer. When using the vacuum, it is vital that you stay a couple of
inches away from the motherboard and all other components to help
prevent contact as well as to help prevent anything from being sucked
into the vacuum. Ensure that you do not remove any small components
with the vacuum such as jumpers.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.
23
Once the cover has rotated about an inch, rotate the mouse into
its normal position, covering the bottom of the
mouse with one hand and the bottom should
fall off including the mouse ball. If this does not
occur, attempt to shake the mouse gently.
Once the bottom cover and the ball are
removed, you should be able to see three
rollers located within the mouse. Use a cotton
swab, finger, or fingernail to remove any
substance. Usually, there will be a small line of
hair and dirt in the middle of the roller, remove as much as this
substance as possible.
Once you have removed as much dirt and hair as possible,
place the ball back within the mouse and place the cover back on.
If the mouse still appears to be having the same issue, repeat
the above process. If after several attempts the mouse is still having
the same issues, it is likely that your mouse has other hardware issues,
and we recommend that it be replaced.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.
Printer cleaning
With some printers it may be necessary to clean the inside of the
printer to help keep the printer running smoothly.
Why do we need to do this? Cleaning the outside of a printer can
help keep the printer's appearance looking good; and in the case of a printer
that is used by many different people, it will keep the printer clean and free
from germs.
Procedure: First, make sure to
turn off the printer before cleaning
it. Dampen a cloth with water or
rubbing alcohol and wipe the case
and each of the buttons or knobs
on the printer. As mentioned
earlier, never spray any liquid
directly onto the printer.
Scanner cleaning
Why do we need to do this? Flatbed scanners commonly become
dirty with dust, fingerprints, and hair. When a scanner is dirty, the images may
have distortions.
24
Procedure: Clean a flatbed
scanner's surface by spraying a
window cleaner onto a paper towel
or cotton cloth and wipe the glass
until clean. As mentioned earlier,
never spray a liquid directly onto
the component.
Rubric:
25
originality. certain other people
The ideas are originality. It people without
creative and shows the (quoting quoting
witty. use of new them) but them.
ideas and of there is
shrewdness. little
evidence
of original
ideas.
Use of There are not There are Four More than
language any mistakes fewer spelling or four spelling
in spelling or spelling grammar or grammar
grammar. mistakes or mistakes. mistakes.
punctuation
mistakes.
Total Points
Learning Task 3.: Identify what cleaning tool is being asked in the following
statements. Write your answers in your answer sheets.
1. It is used when moistening a cloth.
2. A lint free swab
3. The best tool used when rubbing down a component.
4. It sucks the dust, dirt, hair, cigarette particles, and other particles out of
a computer.
5. It is good for wiping hard to reach areas in your keyboard, mouse, and
other peripherals.
26
WEEK
I
WAYS TO IMPROVE YOUR
COMPUTER'S PERFORMANCE
5
Maintaining Network Systems (TLE_ICTCS10MN-IVa-e-3)
Respond to sudden breakdowns of computer systems in accordance
with established procedures
Disk Defragmentation
Fragmentation makes your hard disk do extra work that can slow down
your computer. Removable storage devices such as USB flash drives can
also become fragmented. Disk Defragmenter rearranges fragmented data so
your disks and drives can work more efficiently. Disk Defragmenter runs on a
schedule, but you can also analyze and defragment your disks and drives
manually.
When you store data into the hard disk, the data will normally occupy
the disk in continuous manner if there is sufficient data space on disk. Imagine
if you delete some data files, this will then leave some "gaps" in data space.
When new data files need to be stored and if the size of these data files could
not fit into a single gap, the data files will be segmented and fitted across
several gaps with interval. Your hard disk progressively becomes fragmented
after excessive usage of writing, deleting, and storing of data into your disk.
27
A file is typically broken into several small parts and stored in various
areas on a hard disk. When a read request is executed, the disk will search
for the multiple pieces, process, and link them and finally present it on screen
from the computer when you read a file or execute an application.
Once Windows is finished analyzing the disk, you can check the
percentage of fragmentation on the disk in the Last Run column. If the
number is above 10%, you should defragment the disk.
4. Click Defragment disk. If you are prompted for an administrator
password or confirmation, type the password, or provide confirmation.
Disk Defragmenter might take from several minutes to a few hours to
finish, depending on the size and degree of fragmentation of your hard
disk. You can still use your computer during the defragmentation
process.
Notes:
If the disk is already in exclusive use by another program or is
formatted using a file system other than NTFS file system, FAT, or
FAT32, it cannot be defragmented.
Network locations cannot be defragmented.
If a disk that you are expecting to see under Current status is not
showing up there, it might be because it contains an error. Try to
repair the disk first, then return to Disk Defragmenter to try again.
28
folder and icon, existing hardware in the system, and all the ports that are
being used.
When using the computer, users may have experienced quite several
problems relating to registry issues that may result in severe consequences
such as error messages pop-up, noticeably slow performance of a system or
even system crash. The reasons leading to these problems, however, are
mainly caused by missing or invalid registry key(s) from the Windows registry.
Usually, when any application is uninstalled from Windows, it is recommended
that you should use Add or Remove Programs feature to proceed (Start
menu>Control Panel >Add or Remove Programs) However, if you delete any
program manually without using this function, you might mistakenly move
away the registry key in the OS or even leave behind the orphaned registry
key. This, of course, will cause the problem of missing/ invalid registry entries.
Other actions include deletion of startup programs, installation of software
embedded with spyware or changes in hardware.
The answer is "No". When you attempt to remove the registry by your
own, the risk that you may remove the valid registry is high because without
the registry cleaner software, it is not easy to determine which registry
belongs to which application. Therefore, this may cause the system to crash
or the software to malfunction.
You can either buy Windows Registry cleaner software available in the
market or download a free trial package from the Internet to try out before
paying a full version. When run, this software will first identify the problems
with your Windows registry such as missing/invalid key references. After that,
it will proceed to probe your request for registry removal.
Below are some basic and useful features that you must consider when
choosing the Registry Cleaner software:
ability to scan for the whole computer system for invalid/ orphan
registry
ability to back up all the current registry in the system
have an "undo" feature to restore the cleaning action
options on which to choose registry key(s) to be deleted
online updating of the software should be available
29
Now, with the software running regularly, it will have saved up a large
amount of disk space for your PC. The system then will run as smoothly and
efficiently like before.
Partitioning your hard disk helps categorize your files into logical
groupings so that you can search for files and make changes more effectively.
Folders are made for the same reason too. But partitioning provides better
security.
Security
Most default primary partition is the C drive. This is the drive where
your operating system and most other software applications are installed in. A
useful way of protecting your data is to store your personal information into a
separate disk partition. For example, if you are using an 80GB hard disk, you
might want to partition it into two drives - drive C & drive D. Drive C will
contain your operating system files and software applications such as your
Microsoft Office Suite, Adobe Acrobat, Antivirus, Photoshop etc., while drive D
can be configured as a storage drive to store all your document files, JPEG,
MP3 and other personal data.
It is understood that your most important files are those that are difficult
or virtually impossible to replace. For example, if Microsoft Word crashes, you
can always reinstall the application to make it work again. However, if your
document files are corrupted by a virus or worm, you may need to spend
money and precious time trying to recover your data. In some cases, you may
not be able to recover them if the damage is too severe. Statistics have
shown that most viruses and worms are more likely to infect executable and
system files compared to your MP3 or excel spreadsheets. Therefore, if one
partition corrupts, only that partition suffers and hopefully not the whole drive.
Convenience
30
local drive after your computer is reformatted and starts working. In this way,
should you decide to refresh your operating system or application, the stored
data will not be affected.
You may wish to install more than one operating system into your
computer. For example, you need to use a Windows and Linux operating
system. But both are unable to be installed in the same partition. By
partitioning the disk, you separate two logical spaces to include each
individual OS.
UNDERSTANDING PARTITIONS
The master boot record is the first register that resides in your hard
disk. It is located at the first sector of the disk and the first program that runs
each time you power up your computer. The master boot record contains two
important structures - the master boot code and the master partition table.
Both provide instruction and information and how your computer boots up.
Due to its structure, a single hard disk is limited to four primary partitions. One
of it will be assigned as the active partition to contain your operating system.
Simply, You can create four primary partitions, or three primary partitions and
one extended partition which can be subdivided into multiple logical partitions.
For example, you may want to split your 80GB disk as follows:
40GB primary partition for your OS and software applications
10GB for MP3 files
15GB for Document files
5GB for Miscellaneous files
10GB for Archival files
First, you create a 40GB primary partition. This will occupy the first of
the 4 partitions. Then you can create a 40GB extended partition. And within
the extended partition, you create four logical partition - 10GB, 15GB, 5GB &
10GB. So, the result of this will be a C drive (40GB), D drive (10GB), E drive
(15GB), F drive (5GB) and an H drive (10GB).
BACKUP
31
Never recover lost data on the original media. Make a copy or image of
it on another storage media and recover from that copy.
This is simply to make sure that the loss is logical in nature, and not
physical. If you encounter any data loss arising from physical data loss,
please send it to a professional data recovery outfit.
After the research, watch this video presentation using the URL below:
https://www.youtube.com/watch?v=rS616jQOURg
Answer the following questions. Write your answer in your answer sheet.
Learning Task 3.
32
Imagine that you will be given a 1TB hard drive. Partition it in your own
way. Make sure that all necessary partitions are present. Write your answer
in your answer sheet.
WEEK
D
The following are the procedures on how to maintain computer system
and networks:
Create an Equipment Maintenance Schedule
To perform the maintenance of your computer efficiently, a
maintenance schedule is made to guide the personnel in the proper
maintenance procedure. This will help them remember the maintenance task
that needs to be done to improve the functionality of the computer system and
networks.
Create a Maintenance Checklist
To determine if the maintenance program is implemented according to
what is planned, an assessment must be done. The result of the assessment
33
will then be recorded and reported to the proper authorities for immediate
action.
The assessment is through regular inspections which assure that the
maintenance activities are done on the date and time they were was planned
and that the performance levels adhered to the defined standard.
Below is a sample Maintenance Inspection Checklist. This checklist will
confirm if the maintenance activities have been performed in order to prolong
the life of this particular equipment. The inspection items are stated in
question form as these serve as the criteria or standards of maintenance.
34
3. Falling - Many networks are run along utility poles, which are
wooden poles that have network cables raised high above the
ground. When installing these cables, falling can be disastrous
given the height of the utility poles. Therefore, network installers
should wear safety harnesses to ensure that they do not fall.
4. De-Energize - Some networks have cables that are electrically
charged. These cables must be de-energized, and tests should be
used to ensure that the cables do not have any remaining electricity
in them. The tools that are used for repairing the cables are
insulated so that electricity does not travel through them and into
the hands of the line repairer.
5. Cable Safety Standards - Network cables must have certain
characteristics to be legally used for networks. The cables must not
produce flames that can ignite anything. They must not have
halogen. They must not produce acidic fumes. They must be
resistant to ionizing radiation. Cables must be coded so that those
working with the cables can identify what they are.
General Safety
Safe working conditions help prevent injury to people and damage
to computer equipment. A safe workspace is clean, organized, and
properly lighted. Everyone must understand and follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first-aid kit are available in case of fire or injury. Poorly
placed or unsecured cables can cause tripping hazards in a network
installation. Cables should be installed in conduit or cable trays to prevent
hazards.
These are some of the basic safety precautions to observe when
working on a computer:
Remove your watch and jewelry and secure loose clothing.
Turn off the power and unplug equipment before performing
service.
Cover sharp edges inside the computer case with tape.
Never open a power supply or a CRT monitor.
Do not touch areas in printers that are hot or that use high voltage.
Know where the fire extinguisher is located and how to use it.
Keep food and drinks out of your workspace.
Keep your workspace clean and free of clutter.
35
Bend your knees when lifting heavy objects to avoid injuring your
back.
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries,
and fatalities in the home and the workplace. Power supplies and CRT
monitors contain high voltage.
Some printer parts become hot during use, and other parts might
contain high voltage. Check the printer manual for the location of high-
voltage components. Some components retain a high voltage even after
the printer is turned off. Make sure that the printer has had time to cool
before making the repair.
Electrical devices have certain power requirements. For example,
AC adapters are manufactured for specific laptops. Exchanging power
cords with a different type of laptop or device may cause damage to both
the AC adapter and the laptop.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire
extinguisher can prevent a small fire from getting out of control. When
working with computer components, be aware of the possibility of an
accidental fire and know how to react. Be alert to notice odors being
emitted from computers and electronic devices. When electronic
components overheat or short out, they emit a burning odor. If there is a
fire, follow these safety procedures:
Never fight a fire that is out of control or not contained.
36
Always have a planned fire escape route before beginning any
work.
Get out of the building quickly.
Contact emergency services for help.
Locate and read the instructions on the fire extinguishers in your
workplace before you use them.
Be familiar with the types of fire extinguishers used in your country
or region. Each type of fire extinguisher has specific chemicals to fight
different types of fire.
Types of Fires
Not all fires are the same. Different fuels create different fires and
require different types of fire extinguishing agents.
Class A: Class A fires are fires in ordinary combustibles such as wood,
paper, cloth, trash, and plastics.
Class B: Class B fires are fires in flammable liquids such as gasoline,
petroleum oil and paint. Class B fires also include flammable gases
such as propane and butane. Class B fires do not include fires
involving cooking oils and grease.
Class C: Class C fires are fires involving energized electrical
equipment such as motors, transformers, and appliances.
Remove the power and the Class C fire becomes one of the other
classes of fire.
37
Water and Foam fire extinguishers snuff the fire by taking away the
heat element of the fire triangle. Foam agents also separate the oxygen
element from the other elements.
Water extinguishers are for Class A fires only - they should not be
used on Class B or C fires. The discharge stream could spread the
flammable liquid in a Class B fire or could create a shock hazard on a
Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the
oxygen element of the fire triangle and also be removing the heat with a
very cold discharge.
Carbon dioxide can be used on Class B & C fires. They are usually
ineffective on Class A fires.
Dry Chemical fire extinguishers extinguish the fire primarily by
interrupting the chemical reaction of the fire triangle. Today's most widely
used type of fire extinguisher is the multipurpose dry chemical that is
effective on Class A, B, and C fires. This agent also works by creating a
barrier between the oxygen element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the
memory aid P-A-S-S to remember the basic rules of fire extinguisher
operation:
P: Pull the pin.
A: Aim at the base of the fire, not at the flames.
S: Squeeze the lever.
S: Sweep the nozzle from side to side.
E
Learning Task 1: Create a weekly maintenance checklist for the computer
laboratory. Include all the computer and network hardware. Write your answers
in your answer sheets.
Rubric:
Excellent
Good
Poor
5
38
A
Learning Task 2: True or False. Write True if the statement is true or False if
otherwise. Write your answers in your answer sheets.
1. Network cables must have certain characteristics to be legally used
for networks.
2. Safe working conditions help prevent injury to people and damage
to computer equipment.
3. NEVER open a power supply or a CRT monitor.
4. Store flammable liquids near electrical equipment.
5. NEVER fight a fire that is out of control or not contained.
39
WEEK
I
MAINTENANCE OF THE COMPUTER
SYSTEMS AND NETWORKS
7
Inspect and test configured/repaired computer systems and
networks (TLE_ICTCS10MN-IVf-j-4)
Maintain the computer systems and networks to ensure safe
operations
System Restore
System Information also provides access to tools you can use for If you
install an update from the Windows Update Web site, and it fails to meet your
expectations, restore the original files by running the Update Wizard Uninstall
from the Tools menu in the System Information tool. If your computer worked
40
fine yesterday, but is not working properly today, try restoring yesterday's
configuration files by running the System Restore utility from the Tools menu
in the System Information tool.
If you install an update from the Windows Update Web site, and it fails
to meet your expectations, restore the original files by running the Update
Wizard Uninstall from the Tools menu in the System Information tool. If your
computer worked fine yesterday, but is not working properly today, try
restoring yesterday's configuration files by running the System Restore utility
from the Tools menu in the System Information tool.
41
Learning Task 1. Write the different steps in starting Microsoft system
information. Write your answer in your answer sheet.
42