Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CSS 7 - 8-Q4-Module 8

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

7/8

Technology and Livelihood Education


444

Computer Systems Servicing


Module 8
Maintain Computer Equipment
and Systems
TLE_IACSS 9-12PCO-Ii-j-9
Technology and Livelihood Education Computer Systems Servicing – Grade 7/8
Alternative Delivery Mode
Module 8 - Maintain Computer Equipment and Systems
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Published by the Department of Education


Secretary : Leonor Magtolis Briones
Undersecretary : Diosdado M. San Antonio
Development Team of the Module

Author: Jocelyn M. Gamo


Language Reviewer: Melgee A. Canare
Content Editor: Joel G. Castillo
Illustrator: Jocelyn M. Gamo
Layout Artist: Jocelyn M. Gamo

Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division

Rainelda M. Blanco, PhD


Education Program Supervisor - LRMDS

Agnes R. Bernardo, PhD


EPS-Division ADM Coordinator

Joel I. Vasallo, PhD


EPS – EPP/TLE/TVE/TVL

Glenda S. Constantino
Project Development Officer II

Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph
7/8

Technology and Livelihood Education


Computer Systems Servicing
Module 8
Maintain Computer Equipment
and Systems
TLE_IACSS 9-12PCO-Ii-j-9
Introductory Message
For the Facilitator:

Welcome to the Technology and Livelihood Education-Computer Systems Servicing 7/8


Project CAP-LRE Alternative Delivery Mode (ADM) Module on Maintain Computer Equipment
and Systems.

This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners

As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.

For the Learner:

Welcome to the Technology and Livelihood Education-Computer Systems Servicing 7/8


Project CAP-LRE Alternative Delivery Mode (ADM) Module on Maintain Computer Equipment
and Systems.

This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:


This will give you an idea of the skills or
competencies you are expected to learn in the
module.

This part includes an activity that aims to check


what you already know about the lesson to take. If
you get all the answers correctly (100%), you may
decide to skip this module.

1
This is a brief drill or review to help you link the
current lesson with the previous one.
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.

At the end of this module, you will also find:

References- This is a list of all sources used in developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!

2
This module encourages you to be familiar on how to validate one’s work for
quality improvement work. Different activities are provided for you to be able to:
1. enumerate implementing procedures for ensuring security of
data, including regular backups and virus checks in accordance
with standard operating procedures;
2. determine Implementing basic file maintenance procedures
in line with the standards operating procedures; and
3. apply different ways on how to maintain the computer system.

Pre-Test
Directions: Choose the best answer. Write your answers on a separate sheet.

1. It is a process of taking care of the computer physically (hardware) and


systematically (system) to keep it functioning well at an optimal performance
level.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance

2. Keeping the computer clean and avoiding extreme temperature can help to
maintain hardware.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance

3. It is the modification of a system to correct faults, to improve performance, or


to adapt the system to a changing environment or changed requirements.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance

4. A service provided by Microsoft facilitates patching your system with the latest
security and error fixes.
a. Security update c. Windows service pack
b. Software packages d. Windows update

5. It incorporates a collection of updates, fixes, and enhancements in one single


package.
a. Security update c. Windows service pack
b. Software packages d. Windows update

6. These are being issued constantly and you'll notice when they are ready for your
system.
a. Security update c. Windows service pack
b. Software packages d. Windows update

3
7. A tool of operating system tool which shows all hardware components.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up

8. A computer maintenance utility included in Microsoft Windows designed to free up


disk space on a computer's hard drive.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up

9. A Windows utility that can check the integrity of your hard disk and can fix various
file system errors.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up

10. It is a computer maintenance utility included in Microsoft Windows designed to free


up disk space on a computer's hard drive.
a. Back up c. Defragmentation
b. Check disk d. Disk Clean up

11. It is a Windows utility that can check the integrity of your hard disk and can fix
various file system errors.
a. Back up c. Defragmentation
b. B. Check disk d. Disk Clean up

12. It is an event or action that could cause a loss or damage of data, hardware,
software, and processing capability of the computer.
a. computer security access c. computer security risks
b. computer security process d. computer logic programs

13. It is a software program that infects, damage, and disrupts the whole computer
system.
a. Malware c. Virus
b. Trojan horse d. Worms

14. It is a software utility used for scanning and removing viruses from the computer.
a. Anti-virus c. Defragmentation
b. Check disk d. Disk clean up

15. It is the most important thing to do to avoid losing valuable data to your computer.
a. always save files on the desktop
b. regularly back-up your files
c. always used permanent storage devices in saving files
d. regularly save your files into temporary devices

4
Directions: Look for the following word(s) inside the puzzle. Copy the puzzle
and draw a straight line in each word(s) that you can see inside the puzzle on
a separate sheet.

Bookmark Browser Domain


Hyperlink Protocol

Computer Maintenance is a process of taking care of the


computer physically (hardware) and systematically (system) to
keep it functioning well in an optimal performance level.

Directions: Arrange the jumbled letters to form the correct word base on the given
description below. Write your answers on a separate sheet.

1. K S I D C K E H C - ______________________________
It’s recommended to use this utility when your computer shows various boot errors.
2. K I D S N A E C L – P U - ______________________________
Windows designed to free up disk space on a computer's hard drive.
3. A T A D Y E F A S T - ______________________________
By saving your work files or other important files to other partitions makes the recovery
from a system

5
4. M S Y E T S G N L I O O C- ______________________________
It accumulates dust and this can cause the cooling airflow to be disrupted and components
to overheat.

5. D P A - ______________________________
It is designed to cool your battery and to maintain it at standard temperature.

Computer hardware maintenance involves taking care


of the computer's physical components, such as its keyboard,
hard drive and internal CD or DVD drives. Cleaning the
computer, keeping its fans free from dust, and defragmenting its
hard drives regularly are all parts of a computer hardware
maintenance program.

Physical Maintenance
Keeping the computer clean and avoiding extreme temperature can help to maintain
hardware.
Different Ways on how to maintain the physical computer system:
✓ Use a big case (tower) for the components to have as much space as possible
for proper cooling.
✓ To create a better airflow and it will efficiently cool the CPU heat change your
standard CPU fan with a more advanced one.
✓ Use heat spreaders (from aluminum or copper) or ram fans. This way, the heat
is dissipated and allows the memory to function efficiently.
✓ All cooling gathers air in the case and the power supply fan will take it out. It is
recommended to add a fan on the case to bring cool air inside the case to
assure proper airflow.
✓ The cooling system accumulates dust and this can cause the cooling airflow to
be disrupted and components to overheat. Spray with compressed air to clean
it out.
✓ To prolong your battery’s life, take your battery out when your laptop is plugged
into AC power. By removing the battery, you remove another heat source of
your laptop.
✓ Avoid positioning your computer to direct sunlight, for prolonging laptop to sun
exposure will cause degradation to your plastic components.
✓ Avoid also to position it in dusty and high transit areas.
✓ Avoid keeping your computer in unused rooms with low temperatures. This
environment facilitates the condensation effect.
Computer Transportation
1. Pack your computer using the original packing kit.
2. Secure the box with padding and fill in any empty spaces with bubble wrap.
6
3. If you own a laptop just put it in your laptop case. Nowadays laptop cases/bags
have a good cushioning which protects laptop against all sort of harmful
interventions or accidents.
4. If you feel that your computer wasn't transported properly and water got into
the case or laptop, take out the battery; for computers: open the case and
position the case or laptop in a position to evacuate water and keep it at rooms
temperature at least for 12 hours to dry out. Don't turn on the computer during
that time. Avoid speeding the dry out process by using your hairdryer as this
will cause static problems.
5. Even if the computer was transported correctly, leave at least 30 minutes at
room temperature before you turn it on in the new location.
Prevention and Maintaining Methods
1. Use lightning protective electrical outlet in combination with Uninterruptable
Power Supply (UPS). The UPS will assure the quality of electrical power and
will prevent loss of data during a power outage. It will also provide you enough
time to save any files you were working on. Another advantage of the UPS is
that it protects your computer from shutting down improperly and it will take in
any electrical socks. Electrical socks usually damage your system components,
mainly those with electrical motors like Hard drives and CD-ROM. For laptops,
data loss can be avoided during a blackout if the battery is in.
2. Keep your monitor clean by using a lint-free cloth with a special cleaning
solution.

Note:
Before adding cooling devices to your system, verify if your power
supply can sustain the needed power. If the power supply can't
provide enough energy to all components it might shut down like
a safety measure.

System Maintenance
It is the modification of a system to correct faults, to improve performance, or to adapt
the system to a changing environment or changed requirements.
Keeps your system functioning smoothly by managing hard drive space, scanning for
system errors, and regularly defragmenting the hard drive. Virus protection is also important,
as some viruses can interfere with computer hardware.

Managing your Hard Drive Space


➢ Hard disks can be divided into multiple storage units also called partitions. This
process is required to separate the operating system and program files from work files.
➢ The amount dedicated to the system drive should be at least the doubled amount of
your operating system space requirements.
➢ If you plan to add more applications and features, estimate an average of needed
space and added it to the above amount.
7
➢ You need also to add a few more GB as a precaution for additional components, future
service packs, and virtual memory. The basic principle is to allow considerably more
disk space than the minimum.
Benefits of Managing Hard Drive
1. Data Safety - saving your work files or other important files to other partitions
makes the recovery from a system.
2. Best System Performance - saving your files to other partitions the system has a
constant free space amount at its disposal.
3. Increased Speed Accessing Files - creating multiple partitions the speed of
accessing files is considerably increased (it takes longer to read from 1 MFT
(master file table) of one hard disk partition than from smaller MFTs of smaller
partitions)
4. Recoverable Data – if one drive gets corrupted then other drives remain intact. It
is also related to disk space is the maintenance of your desktop files. All files that
are stored on the desktop are saved in your account profile which is located on
your system drive. Most people save their data on the desktop for convenience
reasons. However, this causes your system partition to fill up and eventually to
slow down your computer. Lack of free space affects your virtual memory and
data safety. When the system is running out of free space it will show a balloon
message with “Low disk space” with the possibility to start a disk cleanup.
5. Keep your computer protected and up to date - the computer's health is very
important. Various steps must be taken before use to assure best protection and
functionality and to prevent malicious software to put the computer at risk:
a. Start Installing All Offered Windows Updates
Windows update
✓ a service provided by Microsoft which facilitates patching your system with
the latest security and error fixes.
✓ scans your system, hardware, and software; it compares it against a
database and offers all necessary updates for your system

NOTE:
During windows update installation, important files are modified and
added to the system. If the process stopped by various reasons it can
damage system files or prevent them to install, making your system unstable
or unresponsive. It is recommended avoiding performing any tasks during
windows update process, especially during service pack installation.

Windows service pack


✓ it incorporates a collection of updates, fixes, and enhancements in one
single package.
Security update
✓ system updates and service packs are being issued constantly and
you'll notice when they are ready for your system. Windows update
against any security threats.

8
b. Protect your computer against malicious software by installing a
Security Software
✓ Before going online protect your computer with security software
(firewall and antivirus). You can choose a free software or a 30-day trial
version. After various tests, you can decide which software you would
like to keep protecting your system.
✓ Don't make the mistake to install more than one security software. It will
only slow down your computer and internet browsing as your traffic will
pass through more than one assured filter. If one of the security
software tries to block a malicious file the secondary software can
detect it also, ending up conflicting one with each other.
c. Check if all installed drivers are functioning properly.
✓ Some laptops come with recovery CD’s which already have the drivers
incorporated and you don't have to install them one by one, the setup
is doing that for you. In case you lose these CDs or you want to install
a different operating system than the one preinstalled can be use.
✓ Each manufacturer has its website from where drivers can be
downloaded. The general steps will be accessing the manufacturer's
site, look for the support/drivers area, type your hardware name or
laptop type, choose your operating system edition and you'll be
provided with the proper download link.

Periodic Computer Maintenance


To gain back your system performance we recommend erasing certain files to free disk
space, checking the system's files and partition to improve the system's reliability, analyzing
and reducing disk fragmentation to optimize disk space.
a. Increase System's Performance - The pc tune-up procedure is intended to
increase the system's performance. All presented methods are easy to follow
and prevent your system to run slow, freeze, or crash. To improve your system
performance you can stop services you usually don't use. You can use the
following to stop services you usually don’t use:
✓ Task Manager
1. Right Click on your Taskbar
2. Click Task Manager
3. Under Processes and Service, click the services you would like to
stop.
4. Click End task or Click Stop

✓ Background Apps
1. Search for Background Apps
2. Click Open
3. Click the application that you would like to stop running while you
are performing a specific application
b. Disk Clean-up - a computer maintenance utility included in Microsoft Windows
designed to free up disk space on a computer's hard drive. The utility first

9
searches and analyzes the hard drive for files that are no longer of any use,
and then removes the unnecessary files.
Run Disk Clean-Up in Windows Vista and Windows 7 - Run using My Computer
1. Click Start
2. Go to All Programs > Accessories > System Tools
3. Click Disk Cleanup
4. Choose what type of files and folders to delete at the Files to delete
section
5. Click OK
6. To delete system files that are no longer needed, click Clean up system
files. You may be prompted by UAC (User Account Control) to confirm
the action.
7. Click Delete Files

To free more space, go to the More options tab:


➢ Click Clean up at the Programs and Features section to remove
program files that are no longer needed
➢ Click Clean up at the System Restore and Shadow Copies section to
remove restore points, except the last one

Run from Command Prompt:


1. Open Command Prompt
2. Type cleanmgr
3. Press Enter

Run Disk Clean-Up in Windows 10


1. Type Disk Cleanup in the Search Bar
2. Press Enter
3. At the Drives list, select which drive you want to run Disk Cleanup on
4. Select which files you want to delete
5. Click OK
6. Click Delete files

To delete system files that are no longer needed on your computer:


➢ click Clean up system files.
➢ Shadow copies and restore points (except the last ones) can be
deleted by going to the More options tab > Click Cleanup.

c. Check Disk (CHKDSK) - a Windows utility that can check the integrity of your
hard disk and can fix various file system errors.
It’s recommended to use this utility when your computer shows various boot
errors. The check disk utility can be run if you need to fix the following errors:
➢ 0x00000024
➢ Various blue screen of death errors
➢ NTDETECT failed

10
➢ Fatal error reading boot.ini
➢ NTOSKRNL.EXE is missing or corrupt
➢ 0x0000007B
➢ 0xc0000001 on a Windows Vista computer
➢ 0xc000014C on a Windows 8 computer and others
The check disk utility can repair problems such as:
➢ bad sectors
➢ lost clusters
➢ cross-linked files
➢ directory errors

Run CHKDSK in Windows 7 - From Command Prompt:


1. Click Start
2. Type cmd at the Search program and files search box
3. Right-click on cmd.exe
4. Click Run as Administrator

5. Type in your Administrator password


6. When cmd.exe opens, type the command: chkdsk
7. Press Enter
8. You can run the tool with more parameters like this: chkdsk c:/r
✓ This will check the drive for errors and will automatically try to fix
any found errors.
9. If you receive the “Chkdsk cannot run because the volume is in use by
another process.” message, type Y to restart the computer and let the
utility to run a scan at the next boot of your PC.
10. After you typed Y, close the Command Prompt.
11. Restart the computer by going to Start > Shutdown > Restart.
12. At the next boot, the check disk utility will automatically run a scan.

Run CHKDSK in Windows 7 - From My Computer


1. Right-click on the Start icon
2. Click Open Windows Explorer
3. On the left side of the window, click Computer
4. At the Hard Disk Drives section, right-click on the volume you want to
check for errors
5. Click Properties
6. Go to the Tools Tab
7. At the Error-checking section, click Check now

11
8. You can now run the check disk utility: select Scan for and attempt
recovery of bad sectors to let the utility attempt to repair any hard drive
errors found0020
9. Click Start

If the volume you want to check is in use, e.g. C:/ where Windows
Vista is installed, you may receive the following error message:
➢ Windows can't check the disk while it's in use
➢ Do you want to check for hard disk errors the next time you start
your computer?
➢ Schedule disk check | Cancel

If so, follow these steps:


1. Click Schedule disk check
2. Exit any open programs
3. Restart your computer
4. Your computer will now restart and automatically boot and the utility will
perform a scan automatically

➢ If you receive the “Do you want to dismount this volume first?” message,
follow the steps below. This message appears if the volume you want
to checked is locked, even if it’s not in use (e.g. the C:/ drive):
➢ Windows can't check the disk while it's in use
➢ Do you want to dismount this volume first?
➢ Note: All opened handles to this volume will become invalid.
➢ Force a dismount | Cancel
If so, follow these steps:
1. Click Force a dismount
2. A scan will automatically start now
From the Installation Disc
If you do not have the installation disc to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 7 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs, or USBs.

12
Follow these steps:
1. Insert the original Windows disc
2. Restart your PC and boot from
the disc
3. Click Repair your computer
4. Choose the operating system
from the list
5. Click Next
6. Choose Command Prompt
7. When it opens, type the
command: chkdsk C: /f /r
8. Press Enter

CHKDSK in Windows 10 - From Command Prompt


✓ If you can’t boot into Windows 10 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair
or Command Prompt directly. You can burn EasyRE on CDs, DVDs, or
USBs.

To run it from Command Prompt, here are the instructions:


1. Log into Windows 10
2. Press the Windows key to
open the Start Menu
3. Select Search
4. Type-in cmd Right-click on
Command Prompt from the
search results list.
5. Click Run as administrator
6. Log in as an Administrator
7. When Command Prompt launches, type the command: chkdsk C: /f /r
/x

The parameters for this command are: /f option will attempt to fix any found
errors /r option will locate for bad sectors and recovery any readable
information /x option will force the volume you’re about to check to be
dismounted before the utility begins a scan. If the C: drive is in use, type Y
to run a scan at your PC’s next restart. If so, exit Command Prompt and
restart the computer.

If you can’t boot into Windows 10 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs, or USBs.

To run the check disk utility from Computer (My Computer), follow these steps:
1. Boot into Windows 10
2. Double-click on Computer (My Computer) to open it

13
3. Select the drive you want to run a check on, e.g. C:\
4. Right-click on the drive
5. Click Properties
6. Go to the Tools tab
7. Select Check at the Error checking section
8. If you receive the following messages, click Scan drive to begin the scan:
“You don't need to scan this drive we haven't found any errors on this drive.
You can still scan the drive for errors if you want. Scan Drive”
9. You can keep using the drive during the scan. If errors are found, you can
decide if you want to fix them. Depending on the results of this scan, the
utility will report the results:
✓ If no errors were found, you’ll see this message:
▪ Your drive was successfully scanned Windows scanned the
drive. No errors were found.
✓ If errors were found, you’ll see this message instead:
▪ Restart your computer to repair the file system. You can restart
right away or schedule the error fixing on the next restart.

From the Installation Disc


➢ If you don’t have the installation disc to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs, or USBs.
If you can’t boot into Windows 10 to run Command Prompt, you can use the original
Windows 10 installation disc to run Command Prompt from there.
To do so, follow these instructions:
1. Insert the installation disc
2. Restart your computer
3. Press any key to boot from the disc, at the “Press any key to boot from CD
or DVD…” message
4. Choose your keyboard layout
5. Select your language, time, and a keyboard method
6. Click Next
7. Click Repair your computer

At the Choose an option screen, click Troubleshoot

14
Commands and Parameters
The check disk utility has several parameters that you can use:
➢ /c – applicable to an NTFS volume only
➢ /f – this option fixes errors on a volume
➢ /i – applicable to an NTFS volume only. This option performs a check of index entries
➢ /r – this option also implies the
➢ /f and /p option. This option locates the bad sectors of your hard drive and recovers any
readable information if you run the utility from Command Prompt or Recovery Console,
the following parameters are different:
➢ /p – this fixes any errors on a volume. In your standard Command, Prompt /p is only read-
only

The mandatory requirement of this utility is the volume you’re about to check must not be
locked. If a volume you’re about to scan is locked, you’ll receive this message:
➢ Chkdsk cannot run because the volume is in use by another process. Would you like
to schedule this volume to be checked the next time the system restarts? (Y/N)
➢ If so, type Y and press Enter to perform a scan at the next boot of your system.

Download chkdsk
➢ chkdsk can’t be downloaded as it’s a command available with Windows. You can use
the original installation disc to run the utility tool.
➢ You can download Easy Recovery Essentials and open Command Prompt to run
specific chkdsk commands.
➢ You can burn Easy Recovery Essentials to CDs, DVDs, or USBs and run Command
Prompt.

Troubleshooting
➢ If you receive the “Errors found. CHKDSK cannot continue in read-only mode.” error
message after running a check disk command, make sure you run the command with
the /r parameter: chkdsk /f.
➢ If the disk check utility must be run on another volume, update the command with the
letter of the drive you want to run a scan for chkdsk D: /f.
➢ Cannot run because the volume is in the use by another process.
➢ If you receive this error message when running the tool: Chkdsk cannot run because
the volume is in the use by another process. Would you like to schedule this volume
to be checked the next time the system restarts.
➢ You need to type Y to make sure the utility runs at the next boot. If so, type Y, restart
the computer, and let the tool to perform the scan.

Cannot lock current drive


➢ If the check disk utility shows the “Cannot lock current drive.” error message, make
sure the command you’re performing has the /r option: chkdsk /r
➢ If this doesn’t work, try disabling System Restore for the entire session you’re trying to
run a scan and other protection software, such as antivirus, firewall, spyware, etc.
➢ Another alternative command is: chkdsk C: /f /r /x

15
Stop “chkdsk” on Every Boot
If the utility runs a scan at every boot without stopping, you can try a few solutions:
➢ Before you follow the instructions below, make sure you let the scan to be 100%
completed and then restart your computer.
➢ If the check disk runs again, even if the previous scan was 100% complete, continue
with the steps below.

Fix #1: Check if there is a scheduled scan. To do so, follow these steps:
1. Open Command Prompt
2. Type chkntfs c:, where c: is the letter of the drive you ran a check
3. Press Enter
4. If the message is the following, then a check scan is scheduled on the c: drive:
• The type of file system is NTFS. Chkdsk has been scheduled manually to run on
the next reboot on volume C:.
5. If there isn’t any scheduled scan, the message will be:
• The type of file system is NTFS. C: is not dirty.
6. To cancel a scheduled scan, type: chkntfs /x c:

Fix #2: Another option to fix this issue is to open the Registry Editor:
1. Boot into Windows
2. Open the Registry Editor
3. Go to this key:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
4. At the BootExecute key, check the value. If the value is autocheck autochk * /., you
need to change it to autocheck autochk *
chkdsk won’t finish
If the utility won’t finish a scan, make sure you run the command with the /r
parameter, like this: chkdsk /r chkdsk won’t run at startup

If the check disk won’t run a scan at startup after being scheduled to do so, follow any of the
following fixes.
Fix #1: Check the BootExecute key in the Registry Editor:
1. Open Registry Editor
2. Find this key:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
key
3. Check the value for the BootExecute key. If the value is autocheck autochk * /., you
need to change it to autocheck autochk *

Fix #2: Run sfc You can also run the sfc /scannow command and then run chkdsk /r again:
1. Open Command Prompt
2. Type the command: sfc /scannow
3. Press Enter
4. After the sfc process is complete, run the check disk utility.

16
Keeping computer clean, avoiding extreme temperature and perform
necessary action based on manufacturer’s standard operating
procedures can help to maintain computer hardware and systems to
function well and extend its lifespan.

FILE MAINTENANCE
➢ It is about the routine changes, updates, copying, moving, or deleting files on a
computer. It is performed on computers or servers that are serving a vast amount of
files.

BACKING UP FILES
➢ It is the process of duplicating files and programs into the computer.
Backup – a duplicate copy of a file, program, folder, or disk used if the original is
damaged, corrupt, or lost.
Restore – to copy the backed-up version of information back to its original location.
Backup Media – can be another computer, CD(s), DVD(s), or any other recordable
media for computers.
✓ CDs can hold 650-800Mb
✓ DVDs can hold 4.7Gb
✓ The external hard drive can hold various amounts of information. How much
will depend on the size of the drive you have.
Full Backup
✓ backing up everything on your computer. It includes data, software, and
operating system.
✓ this should be done before installing new software and software updates. It
should be done periodically. The frequency would depend on how often you
add to your system but at least twice a year.
Incremental Backup
✓ is a backup of only what has changed
since the last backup.
✓ this should be done daily especially if
you work on the computer a lot
changing files in a day.
Reasons for Backing Up Files
✓ The files on your computer are very
fragile.
✓ They can be destroyed or damaged by
a software malfunction, viruses, worms,
Trojans, and the biggest cause of lost files, the operator (that would be you).
✓ Ever accidentally deleted a file, not saved your changes, lost a disk, or been
playing around with something new and broke your project.

17
DELETING UNWANTED/JUNK FILES
a. Remove Junk Files with Disk Clean-up
1. Click Start > Computer (Windows 7) or Start > File Explorer > This PC
(Windows 10).
2. Right-click your main hard drive (usually the C: drive) and select Properties.
3. Click the Disk Cleanup button and you’ll see a list of items that can be removed,
including temporary files and more.
4. For even more options, click Clean up system files. Tick the categories you
want to remove, then click OK > Delete Files.

b. Remove Old Download Files


➢ To get rid of downloads, open the Downloads folder (on the left in Computer/File
Explorer). This is Windows’ default storage location, but you may also have
downloaded it on your desktop.
c. Delete Duplicate Files
➢ Uncovering duplicate files manually can be harder. The free version of CCleaner
(piriform.com/ ccleaner/download) includes a handy automated duplicate finding
tool – click Tools > Duplicate Finder to run it.

VIRUS - Viral Information Resource Under Siege


➢ it refers to a program that damages computer systems and/or destroys or erases data
files
➢ it spreads from one computer to another, leaving infections as it travels.
➢ almost all viruses are attached to an executable file, which means the virus may exist
on a system but will not be active or able to spread until a user runs or opens the
malicious host file or program
➢ type of malware that propagates by inserting a copy of itself into and becoming part of
another program.

MALWARE
➢ is short for "malicious software," also known as malicious code or "malcode."
➢ It is code or software that is specifically designed to damage, disrupt, steal, or in
general inflict some other "bad" or illegitimate action on data, hosts, or networks.
Classes of Malicious Software
a. Ransomware
➢ threatens to publish the victim's data or perpetually block access to it unless a
ransom is paid while some simple ransomware may lock the system in a way that
is not difficult for a knowledgeable person to reverse
b. Worms
➢ they replicate functional copies of themselves and can cause the same type of
damage
➢ worms are standalone software and do not require a host program or human help
to propagate.
➢ enters a computer through a vulnerability in the system and takes advantage of
file-transport or information-transport features on the system, allowing it to travel
unaided.
18
c. Trojans
✓ also known to create backdoors to give malicious users access to the system.
✓ it spreads through user interaction such as opening an email attachment or
downloading and running a file from the Internet.
✓ after it is activated, it can achieve any number of attacks on the host, from irritating
the user (popping up windows or changing desktops) to damaging the host
(deleting files, stealing data, or activating and spreading other malware, such as
viruses).
d. Bots
✓ is derived from the word "robot" and is an automated process that interacts with
other network services.
✓ it often automates tasks and provides information or services that would otherwise
be conducted by a human being.
✓ its typical use is to gather information, such as web crawlers, or interact
automatically with Instant Messaging (IM), Internet Relay Chat (IRC), or other web
interfaces.

UPDATING ANTI-VIRUS
Three(3) ways on How to Update your Windows 10 virus protection:
a. Run Windows Update
1. Go to Start.
2. Type “update” in the search box.
3. Click on “Windows Update”.
4. In the Windows Update window, check for updates and install available updates.
5. After the update is complete, restart your Windows PC.
b. Update your antivirus program
1. Go to Start
2. Type Windows Defender > Hit “Enter”.
3. In the Windows Defender window, locate the “check for updates now” option and
click on it.
4. Wait for the update process to be complete and then restart your PC.
c. Update via your antivirus website
✓ If your antivirus program does not have the “update” option, you can update virus
protection by downloading new virus definitions from the developer’s website.
✓ However, it is recommended that you know basic information such as whether
your Windows PC is 32-bit or 64-bit, the antivirus version on your PC, and other
system information. This will enable you to download the correct utility update on
your PC before you update.

NOTE:
In updating antivirus application software, regardless of the version of
the operating system, just always click the antivirus icon to your notification
area, and choose update.

19
Activity 1:
Directions: Arrange the steps chronologically using numbers. Write your answers on
a separate sheet

A. Increasing System's Performance using Task Manager (1-4).


1. ___ Click End task or Click Stop.
2. ___ Click Task Manager.
3. ___ Right Click on your Taskbar.
4. ___ Under Processes and Service, click the services you would like to stop.
B. Run Disk Clean-Up in Windows Vista and Windows 7 - Run using My Computer (1-
6)
1. ___ Click Delete Files
2. ___ Click Disk Cleanup
3. ___ Click Ok after choosing what type of files and folders to delete at the Files to
delete section
4. ___ Click Start
5. ___ Go to All Programs > Accessories > System Tools
6. ___ To delete system files that are no longer needed, click Clean up system files.
You may be prompted by UAC (User Account Control) to confirm the action.

.
Independent Activity 1:
Instruction: Please refer to page 29 for the rubrics.

1. Perform the following activities with the guidance of your teacher-parent at


home
a. Disk Clean-Up
b. Checkdisk
2. Record your activity
3. Upload/Send your recorded video to the given platform of your teacher.

Independent Assessment 1: Physical Maintenance


Directions: Write T if the statement is true and F if it is false. Write your answers on
a separate sheet.

1. All cooling gathers air in the case and the power supply fan will take it out. It is
recommended to add a fan on the case to bring cool air inside the case to assure
proper airflow.
2. Avoid also to position the computer in dusty and low transit areas.
3. Avoid keeping your computer in unused rooms with high temperatures. This
environment facilitates the condensation effect.
4. Avoid positioning your computer to direct sunlight, for prolonging laptop to sun
exposure will cause degradation to your plastic components.
5. By removing the battery, you remove another heat source of your laptop.
20
6. Cooling system accumulates dust and this can cause the cooling airflow to be
disrupted and components to overheat. Spray with compressed air to clean it out.
7. To create a better airflow and it will efficiently cool the CPU heat change your standard
CPU fan with a less advanced one.
8. To prolong your battery’s life, take your battery out when your laptop is plugged into
AC power.
9. Use a small case (tower) for the components to have as much space as possible for
proper cooling.
10. Use heat spreaders (from aluminum or copper) or ram fans. This way the heat is
dissipated and allows the memory to function inefficiently.

Independent Activity 2: Computer Maintenance


Directions: Write PM if the given statement is for Physical Maintenance, SM for
System Maintenance, PCM if it is a Periodic Computer Maintenance, and FM for File
Maintenance on a separate sheet.

1. Random Access Memory (RAM), needs to be cooled.


2. Check the integrity of your hard disk and fix various file system errors.
3. During the charging-discharging cycles the battery dissipates heat.
4. Increase System's Performance.
5. It is very important to do regular backups to prevent the loss of data.
6. Keep your computer protected and up to date.
7. Keep your monitor clean by using a lint-free cloth with a special cleaning solution.
8. Keeping the computer clean and avoiding extreme temperature.
9. Keep your system functioning smoothly by managing hard drive space, scanning for
system errors, and regularly defragmenting the hard drive.
10. Update antivirus program application software.

Independent Assessment 2: Matching Type


Direction: Arrange the steps chronologically using the numbers. Write your answers
on a separate sheet.

A. Update your Windows 10 virus protection by running Windows Update (1-5):


1. After the update is complete, restart your Windows PC.
2. Click on “Windows Update”.
3. Go to Start.
4. In the Windows Update window, check for updates and install available updates.
5. Type “update” in the search box.
B. Update your Windows 10 virus protection by Update your antivirus program (1-5):
1. Go to Start.
2. In the Windows Defender window, locate the “check for updates now” option and click
on it.
3. Press the enter key.
4. Type Windows Defender.
5. Wait for the update process to be complete and then restart your PC.

21
Independent Activity 3:
Directions: Choose the letter of the correct answer that best describes the given
statement below with regards to classes of malicious software. Write your answers
on a separate sheet.
A. Bots C. Trojans
B. Ransomware D. Worms

1. A standalone software do not require a host program or human help to propagate.


2. After it is activated, it can achieve any number of attacks on the host.
3. It enters a computer through a vulnerability in the system and takes advantage of file-
transport or information-transport features on the system, allowing it to travel unaided.
4. It gathers information, such as web crawlers, or interact automatically with Instant
Messaging (IM), Internet Relay Chat (IRC), or other web interfaces.
5. It is also known in creating backdoors to give malicious users access to the system.
6. It often automates tasks and provides information or services that would otherwise be
conducted by a human being.
7. It spreads through user interaction such as opening an email attachment or
downloading and running a file from the Internet.
8. Lock the system in a way that is not difficult for a knowledgeable person to reverse.
9. They replicate functional copies of themselves and can cause the same type of
damage.
10. Threatens to publish the victim's data or perpetually block access.

Independent Assessment 3: Disk Clean-Up


Directions: Supply the missing word(s) from the choices inside the box.. Write your
answers on separate sheet.

A. Free more space:

Clean up More Options Programs


restore points System Restore
To free up more space, go to the 1._________________ tab. Click
2.______________ at the 3._______________ and Features section to remove program files
that are no longer needed. You can also click Clean-up at the 4.________________ and
Shadow Copies section to remove 5.__________________, except the last one.

B. Delete system files that are no longer needed on your computer:

Clean up delete More options


restore points Shadow

To delete system files that are no longer needed on your computer, click
1._____________ system files. The 2._________________ copies and
3.__________________ (except the last ones) can be 4. _________________ by going to
the 5. _______________ tab then, click ________________.

22
To protect file/data into computers, backing up of
files, installing of an anti-virus and cleaning of the whole
system are important.

Directions. Answer the given question(s) below. Write your answers on a separate
sheet.

1. Give three(3) advantages of backing up your files.


______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Instructions: *Please refer to page 22 for the rubrics).

1. Create a video-tutorial by performing the following:


a. Delete Duplicated files
b. Remove Old Download Files
2. Send/Upload your video-tutorial to the platforms that will be given by your teacher.

Post Test:
Directions: Choose the best answer. Write your answers on separate sheet.

1. It is a process of taking care of the computer physically (hardware) and


systematically (system) to keep it functioning well at an optimal performance
level.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance

2. Keeping the computer clean and avoiding extreme temperature can help to
maintain hardware.
a. Computer Maintenance c. Physical Maintenance
c. Hardware Maintenance d. System Maintenance
23
3. It is the modification of a system to correct faults, to improve performance, or
to adapt the system to a changing environment or changed requirements.
a. Computer Maintenance c. Physical Maintenance
b. Hardware Maintenance d. System Maintenance

4. A service provided by Microsoft facilitates patching your system with the latest
security and error fixes.
a. Security update c. Windows service pack
b. Software packages d. Windows update

5. It incorporates a collection of updates, fixes, and enhancements in one single


package.
a. Security update c. Windows service pack
b. Software packages d. Windows update

6. These are being issued constantly and you'll notice when they are ready for your
system.
a. Security update c. Windows service pack
b. Software packages d. Windows update

7. A tool of operating system tool which shows all hardware components.


a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up

8. A computer maintenance utility included in Microsoft Windows designed to free up


disk space on a computer's hard drive.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up

9. A Windows utility that can check the integrity of your hard disk and can fix various
file system errors.
a. Check Disk c. Device Manager
b. Command Prompt d. Disk Clean-up
10. It is a computer maintenance utility included in Microsoft Windows designed to free
up disk space on a computer's hard drive.
a. Back up c. Defragmentation
b. Check disk d. Disk Clean up

11. It is a Windows utility that can check the integrity of your hard disk and can fix
various file system errors.
a. Back up c. Defragmentation
b. Check disk d. Disk Clean up

24
12. It is an event or action that could cause a loss or damage of data, hardware,
software, and processing capability of the computer.
a. computer security access c. computer security risks
b. computer security process d. computer logic programs

13. It is a software program that infects, damage, and disrupts the whole computer
system.
a. Malware c. Virus
b. Trojan horse d. Worms

14. It is a software utility used for scanning and removing viruses from the computer.
a. Anti-virus c. Defragmentation
b. Check disk d. Disk clean up

15. It is the most important thing to do to avoid losing valuable data to your computer.
a. always save files on the desktop
b. regularly back-up your files
c. always used permanent storage devices in saving files
d. regularly save your files into temporary devices

Instructions: Please refer to page 29 for the rubrics.

1. Create a graphical illustration showing the Dos and Don’ts in Maintaining


the Computer and Systems.

25
26
What I Know What’s New: What Is It-Activity1:
1. A 6. A 11. B 1. Check Disk A. 1. 4 B. 1. 6 4. 1
2. C 7. C 12. C 2. Disk Clean-Up 2. 2 2. 3 5. 2
3. D 8. D 13. A 3. Data Safety 3. 1 3. 4 6. 5
4. D 9. A 14. A 4. System Cooling 4. 3
5. C 10. D 15. B 5. Pad
What’s In:
Independent Assessment 1: Independent Activity 2:
1. T 6. T 1. PM 6. SM
2. F 7. F 2. PCM 7. PM
3. F 8. T 3. PM 8. PM
4. T 9. F 4. FM 9. SM
5. T 10. F 5. SM 10. FM
Independent Assessment 2: Independent Activity 3:
A. 1. 5 B. 1. 1 1. D 6. A
2. 3 2. 4 2. C 7. C
3. 1 3. 3 3. D 8. B
4. 4 4. 2 4. A 9. D
5. 2 5. 5 5. C 10. B
Independent Assessment 3: Assessment:
A. 1. More Options B. 1. Clean Up 1. A 6. A 11. B
2. Clean Up 2. Shadow 2. C 7. C 12. C
3. Programs 3. Restore points 3. D 8. D 13. A
4. System restore 4. Delete 4. D 9. A 14. A
5. restore point 5. More options 5. C 10. D 15. B
References

Electronic Reference

Google. Ivan Jenic, “How to update your Windows 10 virus protection”, November 10, 2017
https://windowsreport.com/update-windows-10-virus-protection/

Google. Elizabeth Burns, “What Is Computer Hardware Maintenance?”


https://www.techwalla.com/articles/what-is-computer-hardware-maintenance

Google. “Computer Maintenance”, Computer step by step,


https://computerstepbystep.com/computer-maintanence.html

Google. “Periodical computer maintenance”,


https://computerstepbystep.com/computer-maintanence.html

Google. NeoSmart Knowledgebase, “Disk Cleanup – Guide for Windows XP, Vista, 7, 8, 8.1,
10 “
https://neosmart.net/wiki/disk-cleanup/

Google. NeoSmart Knowledgebase, “chkdsk – Guide for Windows XP, Vista, 7, 8, 8.1, 10”
https://neosmart.net/wiki/chkdsk/

Google. Computer Hope, “File maintenance”, Updated: 11/16/2019


https://www.computerhope.com/jargon/f/filemain.htm#:~:text=The%20routine%20cha
nges%2C%20updates%2C%20copying,a%20vast%20amount%20of%20files.

27
Appendices

What’s More- Independent Activity 1/What I Can Do/Additional Activity

20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _

What I Have Learned:

CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely

28
For inquiries or feedback, please write or call:

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph

29

You might also like