CSS 7 - 8-Q4-Module 8
CSS 7 - 8-Q4-Module 8
CSS 7 - 8-Q4-Module 8
Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.
1
This is a brief drill or review to help you link the
current lesson with the previous one.
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!
2
This module encourages you to be familiar on how to validate one’s work for
quality improvement work. Different activities are provided for you to be able to:
1. enumerate implementing procedures for ensuring security of
data, including regular backups and virus checks in accordance
with standard operating procedures;
2. determine Implementing basic file maintenance procedures
in line with the standards operating procedures; and
3. apply different ways on how to maintain the computer system.
Pre-Test
Directions: Choose the best answer. Write your answers on a separate sheet.
2. Keeping the computer clean and avoiding extreme temperature can help to
maintain hardware.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance
4. A service provided by Microsoft facilitates patching your system with the latest
security and error fixes.
a. Security update c. Windows service pack
b. Software packages d. Windows update
6. These are being issued constantly and you'll notice when they are ready for your
system.
a. Security update c. Windows service pack
b. Software packages d. Windows update
3
7. A tool of operating system tool which shows all hardware components.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up
9. A Windows utility that can check the integrity of your hard disk and can fix various
file system errors.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up
11. It is a Windows utility that can check the integrity of your hard disk and can fix
various file system errors.
a. Back up c. Defragmentation
b. B. Check disk d. Disk Clean up
12. It is an event or action that could cause a loss or damage of data, hardware,
software, and processing capability of the computer.
a. computer security access c. computer security risks
b. computer security process d. computer logic programs
13. It is a software program that infects, damage, and disrupts the whole computer
system.
a. Malware c. Virus
b. Trojan horse d. Worms
14. It is a software utility used for scanning and removing viruses from the computer.
a. Anti-virus c. Defragmentation
b. Check disk d. Disk clean up
15. It is the most important thing to do to avoid losing valuable data to your computer.
a. always save files on the desktop
b. regularly back-up your files
c. always used permanent storage devices in saving files
d. regularly save your files into temporary devices
4
Directions: Look for the following word(s) inside the puzzle. Copy the puzzle
and draw a straight line in each word(s) that you can see inside the puzzle on
a separate sheet.
Directions: Arrange the jumbled letters to form the correct word base on the given
description below. Write your answers on a separate sheet.
1. K S I D C K E H C - ______________________________
It’s recommended to use this utility when your computer shows various boot errors.
2. K I D S N A E C L – P U - ______________________________
Windows designed to free up disk space on a computer's hard drive.
3. A T A D Y E F A S T - ______________________________
By saving your work files or other important files to other partitions makes the recovery
from a system
5
4. M S Y E T S G N L I O O C- ______________________________
It accumulates dust and this can cause the cooling airflow to be disrupted and components
to overheat.
5. D P A - ______________________________
It is designed to cool your battery and to maintain it at standard temperature.
Physical Maintenance
Keeping the computer clean and avoiding extreme temperature can help to maintain
hardware.
Different Ways on how to maintain the physical computer system:
✓ Use a big case (tower) for the components to have as much space as possible
for proper cooling.
✓ To create a better airflow and it will efficiently cool the CPU heat change your
standard CPU fan with a more advanced one.
✓ Use heat spreaders (from aluminum or copper) or ram fans. This way, the heat
is dissipated and allows the memory to function efficiently.
✓ All cooling gathers air in the case and the power supply fan will take it out. It is
recommended to add a fan on the case to bring cool air inside the case to
assure proper airflow.
✓ The cooling system accumulates dust and this can cause the cooling airflow to
be disrupted and components to overheat. Spray with compressed air to clean
it out.
✓ To prolong your battery’s life, take your battery out when your laptop is plugged
into AC power. By removing the battery, you remove another heat source of
your laptop.
✓ Avoid positioning your computer to direct sunlight, for prolonging laptop to sun
exposure will cause degradation to your plastic components.
✓ Avoid also to position it in dusty and high transit areas.
✓ Avoid keeping your computer in unused rooms with low temperatures. This
environment facilitates the condensation effect.
Computer Transportation
1. Pack your computer using the original packing kit.
2. Secure the box with padding and fill in any empty spaces with bubble wrap.
6
3. If you own a laptop just put it in your laptop case. Nowadays laptop cases/bags
have a good cushioning which protects laptop against all sort of harmful
interventions or accidents.
4. If you feel that your computer wasn't transported properly and water got into
the case or laptop, take out the battery; for computers: open the case and
position the case or laptop in a position to evacuate water and keep it at rooms
temperature at least for 12 hours to dry out. Don't turn on the computer during
that time. Avoid speeding the dry out process by using your hairdryer as this
will cause static problems.
5. Even if the computer was transported correctly, leave at least 30 minutes at
room temperature before you turn it on in the new location.
Prevention and Maintaining Methods
1. Use lightning protective electrical outlet in combination with Uninterruptable
Power Supply (UPS). The UPS will assure the quality of electrical power and
will prevent loss of data during a power outage. It will also provide you enough
time to save any files you were working on. Another advantage of the UPS is
that it protects your computer from shutting down improperly and it will take in
any electrical socks. Electrical socks usually damage your system components,
mainly those with electrical motors like Hard drives and CD-ROM. For laptops,
data loss can be avoided during a blackout if the battery is in.
2. Keep your monitor clean by using a lint-free cloth with a special cleaning
solution.
Note:
Before adding cooling devices to your system, verify if your power
supply can sustain the needed power. If the power supply can't
provide enough energy to all components it might shut down like
a safety measure.
System Maintenance
It is the modification of a system to correct faults, to improve performance, or to adapt
the system to a changing environment or changed requirements.
Keeps your system functioning smoothly by managing hard drive space, scanning for
system errors, and regularly defragmenting the hard drive. Virus protection is also important,
as some viruses can interfere with computer hardware.
NOTE:
During windows update installation, important files are modified and
added to the system. If the process stopped by various reasons it can
damage system files or prevent them to install, making your system unstable
or unresponsive. It is recommended avoiding performing any tasks during
windows update process, especially during service pack installation.
8
b. Protect your computer against malicious software by installing a
Security Software
✓ Before going online protect your computer with security software
(firewall and antivirus). You can choose a free software or a 30-day trial
version. After various tests, you can decide which software you would
like to keep protecting your system.
✓ Don't make the mistake to install more than one security software. It will
only slow down your computer and internet browsing as your traffic will
pass through more than one assured filter. If one of the security
software tries to block a malicious file the secondary software can
detect it also, ending up conflicting one with each other.
c. Check if all installed drivers are functioning properly.
✓ Some laptops come with recovery CD’s which already have the drivers
incorporated and you don't have to install them one by one, the setup
is doing that for you. In case you lose these CDs or you want to install
a different operating system than the one preinstalled can be use.
✓ Each manufacturer has its website from where drivers can be
downloaded. The general steps will be accessing the manufacturer's
site, look for the support/drivers area, type your hardware name or
laptop type, choose your operating system edition and you'll be
provided with the proper download link.
✓ Background Apps
1. Search for Background Apps
2. Click Open
3. Click the application that you would like to stop running while you
are performing a specific application
b. Disk Clean-up - a computer maintenance utility included in Microsoft Windows
designed to free up disk space on a computer's hard drive. The utility first
9
searches and analyzes the hard drive for files that are no longer of any use,
and then removes the unnecessary files.
Run Disk Clean-Up in Windows Vista and Windows 7 - Run using My Computer
1. Click Start
2. Go to All Programs > Accessories > System Tools
3. Click Disk Cleanup
4. Choose what type of files and folders to delete at the Files to delete
section
5. Click OK
6. To delete system files that are no longer needed, click Clean up system
files. You may be prompted by UAC (User Account Control) to confirm
the action.
7. Click Delete Files
c. Check Disk (CHKDSK) - a Windows utility that can check the integrity of your
hard disk and can fix various file system errors.
It’s recommended to use this utility when your computer shows various boot
errors. The check disk utility can be run if you need to fix the following errors:
➢ 0x00000024
➢ Various blue screen of death errors
➢ NTDETECT failed
10
➢ Fatal error reading boot.ini
➢ NTOSKRNL.EXE is missing or corrupt
➢ 0x0000007B
➢ 0xc0000001 on a Windows Vista computer
➢ 0xc000014C on a Windows 8 computer and others
The check disk utility can repair problems such as:
➢ bad sectors
➢ lost clusters
➢ cross-linked files
➢ directory errors
11
8. You can now run the check disk utility: select Scan for and attempt
recovery of bad sectors to let the utility attempt to repair any hard drive
errors found0020
9. Click Start
If the volume you want to check is in use, e.g. C:/ where Windows
Vista is installed, you may receive the following error message:
➢ Windows can't check the disk while it's in use
➢ Do you want to check for hard disk errors the next time you start
your computer?
➢ Schedule disk check | Cancel
➢ If you receive the “Do you want to dismount this volume first?” message,
follow the steps below. This message appears if the volume you want
to checked is locked, even if it’s not in use (e.g. the C:/ drive):
➢ Windows can't check the disk while it's in use
➢ Do you want to dismount this volume first?
➢ Note: All opened handles to this volume will become invalid.
➢ Force a dismount | Cancel
If so, follow these steps:
1. Click Force a dismount
2. A scan will automatically start now
From the Installation Disc
If you do not have the installation disc to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 7 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs, or USBs.
12
Follow these steps:
1. Insert the original Windows disc
2. Restart your PC and boot from
the disc
3. Click Repair your computer
4. Choose the operating system
from the list
5. Click Next
6. Choose Command Prompt
7. When it opens, type the
command: chkdsk C: /f /r
8. Press Enter
The parameters for this command are: /f option will attempt to fix any found
errors /r option will locate for bad sectors and recovery any readable
information /x option will force the volume you’re about to check to be
dismounted before the utility begins a scan. If the C: drive is in use, type Y
to run a scan at your PC’s next restart. If so, exit Command Prompt and
restart the computer.
If you can’t boot into Windows 10 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs, or USBs.
To run the check disk utility from Computer (My Computer), follow these steps:
1. Boot into Windows 10
2. Double-click on Computer (My Computer) to open it
13
3. Select the drive you want to run a check on, e.g. C:\
4. Right-click on the drive
5. Click Properties
6. Go to the Tools tab
7. Select Check at the Error checking section
8. If you receive the following messages, click Scan drive to begin the scan:
“You don't need to scan this drive we haven't found any errors on this drive.
You can still scan the drive for errors if you want. Scan Drive”
9. You can keep using the drive during the scan. If errors are found, you can
decide if you want to fix them. Depending on the results of this scan, the
utility will report the results:
✓ If no errors were found, you’ll see this message:
▪ Your drive was successfully scanned Windows scanned the
drive. No errors were found.
✓ If errors were found, you’ll see this message instead:
▪ Restart your computer to repair the file system. You can restart
right away or schedule the error fixing on the next restart.
14
Commands and Parameters
The check disk utility has several parameters that you can use:
➢ /c – applicable to an NTFS volume only
➢ /f – this option fixes errors on a volume
➢ /i – applicable to an NTFS volume only. This option performs a check of index entries
➢ /r – this option also implies the
➢ /f and /p option. This option locates the bad sectors of your hard drive and recovers any
readable information if you run the utility from Command Prompt or Recovery Console,
the following parameters are different:
➢ /p – this fixes any errors on a volume. In your standard Command, Prompt /p is only read-
only
The mandatory requirement of this utility is the volume you’re about to check must not be
locked. If a volume you’re about to scan is locked, you’ll receive this message:
➢ Chkdsk cannot run because the volume is in use by another process. Would you like
to schedule this volume to be checked the next time the system restarts? (Y/N)
➢ If so, type Y and press Enter to perform a scan at the next boot of your system.
Download chkdsk
➢ chkdsk can’t be downloaded as it’s a command available with Windows. You can use
the original installation disc to run the utility tool.
➢ You can download Easy Recovery Essentials and open Command Prompt to run
specific chkdsk commands.
➢ You can burn Easy Recovery Essentials to CDs, DVDs, or USBs and run Command
Prompt.
Troubleshooting
➢ If you receive the “Errors found. CHKDSK cannot continue in read-only mode.” error
message after running a check disk command, make sure you run the command with
the /r parameter: chkdsk /f.
➢ If the disk check utility must be run on another volume, update the command with the
letter of the drive you want to run a scan for chkdsk D: /f.
➢ Cannot run because the volume is in the use by another process.
➢ If you receive this error message when running the tool: Chkdsk cannot run because
the volume is in the use by another process. Would you like to schedule this volume
to be checked the next time the system restarts.
➢ You need to type Y to make sure the utility runs at the next boot. If so, type Y, restart
the computer, and let the tool to perform the scan.
15
Stop “chkdsk” on Every Boot
If the utility runs a scan at every boot without stopping, you can try a few solutions:
➢ Before you follow the instructions below, make sure you let the scan to be 100%
completed and then restart your computer.
➢ If the check disk runs again, even if the previous scan was 100% complete, continue
with the steps below.
Fix #1: Check if there is a scheduled scan. To do so, follow these steps:
1. Open Command Prompt
2. Type chkntfs c:, where c: is the letter of the drive you ran a check
3. Press Enter
4. If the message is the following, then a check scan is scheduled on the c: drive:
• The type of file system is NTFS. Chkdsk has been scheduled manually to run on
the next reboot on volume C:.
5. If there isn’t any scheduled scan, the message will be:
• The type of file system is NTFS. C: is not dirty.
6. To cancel a scheduled scan, type: chkntfs /x c:
Fix #2: Another option to fix this issue is to open the Registry Editor:
1. Boot into Windows
2. Open the Registry Editor
3. Go to this key:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
4. At the BootExecute key, check the value. If the value is autocheck autochk * /., you
need to change it to autocheck autochk *
chkdsk won’t finish
If the utility won’t finish a scan, make sure you run the command with the /r
parameter, like this: chkdsk /r chkdsk won’t run at startup
If the check disk won’t run a scan at startup after being scheduled to do so, follow any of the
following fixes.
Fix #1: Check the BootExecute key in the Registry Editor:
1. Open Registry Editor
2. Find this key:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
key
3. Check the value for the BootExecute key. If the value is autocheck autochk * /., you
need to change it to autocheck autochk *
Fix #2: Run sfc You can also run the sfc /scannow command and then run chkdsk /r again:
1. Open Command Prompt
2. Type the command: sfc /scannow
3. Press Enter
4. After the sfc process is complete, run the check disk utility.
16
Keeping computer clean, avoiding extreme temperature and perform
necessary action based on manufacturer’s standard operating
procedures can help to maintain computer hardware and systems to
function well and extend its lifespan.
FILE MAINTENANCE
➢ It is about the routine changes, updates, copying, moving, or deleting files on a
computer. It is performed on computers or servers that are serving a vast amount of
files.
BACKING UP FILES
➢ It is the process of duplicating files and programs into the computer.
Backup – a duplicate copy of a file, program, folder, or disk used if the original is
damaged, corrupt, or lost.
Restore – to copy the backed-up version of information back to its original location.
Backup Media – can be another computer, CD(s), DVD(s), or any other recordable
media for computers.
✓ CDs can hold 650-800Mb
✓ DVDs can hold 4.7Gb
✓ The external hard drive can hold various amounts of information. How much
will depend on the size of the drive you have.
Full Backup
✓ backing up everything on your computer. It includes data, software, and
operating system.
✓ this should be done before installing new software and software updates. It
should be done periodically. The frequency would depend on how often you
add to your system but at least twice a year.
Incremental Backup
✓ is a backup of only what has changed
since the last backup.
✓ this should be done daily especially if
you work on the computer a lot
changing files in a day.
Reasons for Backing Up Files
✓ The files on your computer are very
fragile.
✓ They can be destroyed or damaged by
a software malfunction, viruses, worms,
Trojans, and the biggest cause of lost files, the operator (that would be you).
✓ Ever accidentally deleted a file, not saved your changes, lost a disk, or been
playing around with something new and broke your project.
17
DELETING UNWANTED/JUNK FILES
a. Remove Junk Files with Disk Clean-up
1. Click Start > Computer (Windows 7) or Start > File Explorer > This PC
(Windows 10).
2. Right-click your main hard drive (usually the C: drive) and select Properties.
3. Click the Disk Cleanup button and you’ll see a list of items that can be removed,
including temporary files and more.
4. For even more options, click Clean up system files. Tick the categories you
want to remove, then click OK > Delete Files.
MALWARE
➢ is short for "malicious software," also known as malicious code or "malcode."
➢ It is code or software that is specifically designed to damage, disrupt, steal, or in
general inflict some other "bad" or illegitimate action on data, hosts, or networks.
Classes of Malicious Software
a. Ransomware
➢ threatens to publish the victim's data or perpetually block access to it unless a
ransom is paid while some simple ransomware may lock the system in a way that
is not difficult for a knowledgeable person to reverse
b. Worms
➢ they replicate functional copies of themselves and can cause the same type of
damage
➢ worms are standalone software and do not require a host program or human help
to propagate.
➢ enters a computer through a vulnerability in the system and takes advantage of
file-transport or information-transport features on the system, allowing it to travel
unaided.
18
c. Trojans
✓ also known to create backdoors to give malicious users access to the system.
✓ it spreads through user interaction such as opening an email attachment or
downloading and running a file from the Internet.
✓ after it is activated, it can achieve any number of attacks on the host, from irritating
the user (popping up windows or changing desktops) to damaging the host
(deleting files, stealing data, or activating and spreading other malware, such as
viruses).
d. Bots
✓ is derived from the word "robot" and is an automated process that interacts with
other network services.
✓ it often automates tasks and provides information or services that would otherwise
be conducted by a human being.
✓ its typical use is to gather information, such as web crawlers, or interact
automatically with Instant Messaging (IM), Internet Relay Chat (IRC), or other web
interfaces.
UPDATING ANTI-VIRUS
Three(3) ways on How to Update your Windows 10 virus protection:
a. Run Windows Update
1. Go to Start.
2. Type “update” in the search box.
3. Click on “Windows Update”.
4. In the Windows Update window, check for updates and install available updates.
5. After the update is complete, restart your Windows PC.
b. Update your antivirus program
1. Go to Start
2. Type Windows Defender > Hit “Enter”.
3. In the Windows Defender window, locate the “check for updates now” option and
click on it.
4. Wait for the update process to be complete and then restart your PC.
c. Update via your antivirus website
✓ If your antivirus program does not have the “update” option, you can update virus
protection by downloading new virus definitions from the developer’s website.
✓ However, it is recommended that you know basic information such as whether
your Windows PC is 32-bit or 64-bit, the antivirus version on your PC, and other
system information. This will enable you to download the correct utility update on
your PC before you update.
NOTE:
In updating antivirus application software, regardless of the version of
the operating system, just always click the antivirus icon to your notification
area, and choose update.
19
Activity 1:
Directions: Arrange the steps chronologically using numbers. Write your answers on
a separate sheet
.
Independent Activity 1:
Instruction: Please refer to page 29 for the rubrics.
1. All cooling gathers air in the case and the power supply fan will take it out. It is
recommended to add a fan on the case to bring cool air inside the case to assure
proper airflow.
2. Avoid also to position the computer in dusty and low transit areas.
3. Avoid keeping your computer in unused rooms with high temperatures. This
environment facilitates the condensation effect.
4. Avoid positioning your computer to direct sunlight, for prolonging laptop to sun
exposure will cause degradation to your plastic components.
5. By removing the battery, you remove another heat source of your laptop.
20
6. Cooling system accumulates dust and this can cause the cooling airflow to be
disrupted and components to overheat. Spray with compressed air to clean it out.
7. To create a better airflow and it will efficiently cool the CPU heat change your standard
CPU fan with a less advanced one.
8. To prolong your battery’s life, take your battery out when your laptop is plugged into
AC power.
9. Use a small case (tower) for the components to have as much space as possible for
proper cooling.
10. Use heat spreaders (from aluminum or copper) or ram fans. This way the heat is
dissipated and allows the memory to function inefficiently.
21
Independent Activity 3:
Directions: Choose the letter of the correct answer that best describes the given
statement below with regards to classes of malicious software. Write your answers
on a separate sheet.
A. Bots C. Trojans
B. Ransomware D. Worms
To delete system files that are no longer needed on your computer, click
1._____________ system files. The 2._________________ copies and
3.__________________ (except the last ones) can be 4. _________________ by going to
the 5. _______________ tab then, click ________________.
22
To protect file/data into computers, backing up of
files, installing of an anti-virus and cleaning of the whole
system are important.
Directions. Answer the given question(s) below. Write your answers on a separate
sheet.
Post Test:
Directions: Choose the best answer. Write your answers on separate sheet.
2. Keeping the computer clean and avoiding extreme temperature can help to
maintain hardware.
a. Computer Maintenance c. Physical Maintenance
c. Hardware Maintenance d. System Maintenance
23
3. It is the modification of a system to correct faults, to improve performance, or
to adapt the system to a changing environment or changed requirements.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance
4. A service provided by Microsoft facilitates patching your system with the latest
security and error fixes.
a. Security update c. Windows service pack
b. Software packages d. Windows update
6. These are being issued constantly and you'll notice when they are ready for your
system.
a. Security update c. Windows service pack
b. Software packages d. Windows update
9. A Windows utility that can check the integrity of your hard disk and can fix various
file system errors.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up
10. It is a computer maintenance utility included in Microsoft Windows designed to free
up disk space on a computer's hard drive.
a. Back up c. Defragmentation
b. Check disk d. Disk Clean up
11. It is a Windows utility that can check the integrity of your hard disk and can fix
various file system errors.
a. Back up c. Defragmentation
b. Check disk d. Disk Clean up
24
12. It is an event or action that could cause a loss or damage of data, hardware,
software, and processing capability of the computer.
a. computer security access c. computer security risks
b. computer security process d. computer logic programs
13. It is a software program that infects, damage, and disrupts the whole computer
system.
a. Malware c. Virus
b. Trojan horse d. Worms
14. It is a software utility used for scanning and removing viruses from the computer.
a. Anti-virus c. Defragmentation
b. Check disk d. Disk clean up
15. It is the most important thing to do to avoid losing valuable data to your computer.
a. always save files on the desktop
b. regularly back-up your files
c. always used permanent storage devices in saving files
d. regularly save your files into temporary devices
25
26
What I Know What’s New: What Is It-Activity1:
1. A 6. A 11. B 1. Check Disk A. 1. 4 B. 1. 6 4. 1
2. C 7. C 12. C 2. Disk Clean-Up 2. 2 2. 3 5. 2
3. D 8. D 13. A 3. Data Safety 3. 1 3. 4 6. 5
4. D 9. A 14. A 4. System Cooling 4. 3
5. C 10. D 15. B 5. Pad
What’s In:
Independent Assessment 1: Independent Activity 2:
1. T 6. T 1. PM 6. SM
2. F 7. F 2. PCM 7. PM
3. F 8. T 3. PM 8. PM
4. T 9. F 4. FM 9. SM
5. T 10. F 5. SM 10. FM
Independent Assessment 2: Independent Activity 3:
A. 1. 5 B. 1. 1 1. D 6. A
2. 3 2. 4 2. C 7. C
3. 1 3. 3 3. D 8. B
4. 4 4. 2 4. A 9. D
5. 2 5. 5 5. C 10. B
Independent Assessment 3: Assessment:
A. 1. More Options B. 1. Clean Up 1. A 6. A 11. B
2. Clean Up 2. Shadow 2. C 7. C 12. C
3. Programs 3. Restore points 3. D 8. D 13. A
4. System restore 4. Delete 4. D 9. A 14. A
5. restore point 5. More options 5. C 10. D 15. B
References
Electronic Reference
Google. Ivan Jenic, “How to update your Windows 10 virus protection”, November 10, 2017
https://windowsreport.com/update-windows-10-virus-protection/
Google. NeoSmart Knowledgebase, “Disk Cleanup – Guide for Windows XP, Vista, 7, 8, 8.1,
10 “
https://neosmart.net/wiki/disk-cleanup/
Google. NeoSmart Knowledgebase, “chkdsk – Guide for Windows XP, Vista, 7, 8, 8.1, 10”
https://neosmart.net/wiki/chkdsk/
27
Appendices
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _
CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely
28
For inquiries or feedback, please write or call:
29