TVL CSS8 Q3 M6
TVL CSS8 Q3 M6
TVL CSS8 Q3 M6
8
T.L.E. – Grade 8
Quarter 3 – CSS Module 2: Using Basic Functions of a World Wide Web browser
to Locate Information and Maintain Computer
Equipment and Systems
First Edition, 2020
Republic Act 8293, Section 176 states that no copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Librada L. AgonEdD(EPP/TLE/TVL/TVE)
Liza A. Alvarez(Science/STEM/SSP)
Bernard R. Balitao(AP/HUMSS)
Joselito E. Calios (English/SPFL/GAS)
Norlyn D. Conde EdD(MAPEH/SPA/SPS/HOPE/A&D/Sports)
Wilma Q. Del Rosario (LRMS/ADM)
Ma. Teresita E. HerreraEdD(Filipino/GAS/Piling Larang)
Perlita M. IgnacioPhD(EsP)
Dulce O. Santos PhD(Kindergarten/MTB-MLE)
Teresita P. TagulaoEdD(Mathematics/ABM)
In addition to the material in the main text, you will also see this box in the
body of the module:
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them
to manage their own learning. Moreover, you are expected to encourage and assist
the learners as they do the tasks included in the module.
For the Learner:
Welcome to the T.L.E CSS Grade 8 Self-Learning Module on Using Basic
Functions of a World Wide Web browser to Locate Information and Maintain
Computer Equipment and Systems!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an
active learner.
Posttest - This measures how much you have learned from the
entire module.
EXPECTATIONS
PRETEST
A. DIRECTIONS: Choose the letter of the correct answer. Write your answer on the
space provided for each item.
DIRECTIONS: Identify the function of the following software. Write your answer on
the box provided below.
LESSON
OPERA INTERNET
EXPLORER
MOZILLA
GOOGLE
SAFARI
CHROME
Minimize
Home button button
Back and
forward buttons Maximize Exit
button button
Bookmark
Search Bar
Settings
• Tab Icon is to identify the different websites opened inside the web browser.
• Maximize, minimize, and exit button control the viewing setting of the
browser. Maximize is to make the screen full, while minimize is to hide the
browser and exit is to eliminate or remove the web browser.
The Internet is a vast and powerful resource for some users and can be
overwhelming. Below are information on how to use the Internet and Internet
browser.
1. Select the most compatible web browser for your computer. To avoid surfing
interruptions like hanging and error pages install a web browser that fits your
computer specification.
2. Use tab but not excessively. You may come across a link while reading an
article or browsing a website that interests you. You can open any link to another
page in a new tab, so it does not interrupt your reading. However, do not open
many tabs that can make your browser slow or unresponsive.
3. Install antivirus that protects websites against the threat. Latest anti-virus
has components that can avoid threats and viruses from dangerous websites. They
can block pop-ups and unwanted websites that could trigger hackers to invade
your computer.
5. Clear cookies and history. To avoid the slow response of the web browser or
any error connecting to the internet you must clean your web browser always. This
is necessary for individuals who don’t have a personal computer and uses only
public internet shops. History and cookies are also a threat for potential hacker, so
you need to clear them after using the internet.
Computer viruses can be transmitted over network and external drives such
as flash drive that can affect a computer negatively by altering the way the
computer works. Types of the virus are worm which copies itself and shuts down a
computer or network; Trojan horse which hides and looks like a legitimate
program; and Rootkit that allows someone to take full control of an infected
system.
To avoid such problems these are some key steps that everyone can take.
• Use passwords that cannot be guessed easily. A cryptic password like with 6-8
characters with one capitalized letter, number, and symbol will be a good
combination. Always keep your password secret.
• Make sure to scan external devices before opening the drives to avoid
contamination of computer viruses on the computer system.
• Check the storage capacity of your hard disk and eliminate some unwanted files
and applications on your computer.
• Back-up your data in a safe external drive, optical drives. or in safe and trusted
cloud drives. Some use back-up and recovery system in case of data loss.
1. Use defragment since the file is usually viewed and edits several times causing
files to error-prone. Defragment functions as to rewriting files and stores them in
adjacent sectors. This can lessen the possibility of error of data.
2. Data back-up and recovery system are accomplished by using separate drives or
using an off-site server to store an enormous amount of information this can avoid
loss of data due to human error, or system crash.
5. In file sharing you must provide a restriction on your computer for different
users on the network because not anyone is permissible into editing, viewing, or
getting information from your records.
ACTIVITY
A. DIRECTIONS: Identify the different parts of the Web Browser. Write your answer
on the space provided for each number.
1. ________________________________ 6. _______________________________
2. ________________________________ 7. _______________________________
3. ________________________________ 8. _______________________________
4. ________________________________ 9. _______________________________
11. _______________________________
B. DIRECTIONS: Arrange the letters to form the correct word for each item. Write
your answer on the space provided before the number.
_______________3. It is a type of application that allows you to search for files and
viewing multimedia and communicate online. (WBR EBOWRSE)
_______________4. This can get thru the inserting of non-scanned flash drives on the
computer as well as downloading files from unknown or
unreliable websites. (CMTOEISP RUVUR)
WRAP-UP
1. I have learned that the proper way of using the internet is ______________________
__________________________________________________________________________________
_________________________________________________________________________________.
2. I have realized that one way that a computer can be protected is ________________
__________________________________________________________________________________
_________________________________________________________________________________.
__________________________________________________________________________________
_________________________________________________________________________________.
VALUING
_______1. He is the director of the World Wide Web Consortium and creator of a
web browser.
A. Bill Gates C. Marie Currie
B. Marc Andereessen D. Sir Tim Berners-Lee
________2. He is the creator of the world's first common browser.
A. Bill Gates C. Marie Currie
B. Marc Andereessen D. Sir Tim Berners-Lee
________3. Which of the following is not a web browser?
A. Google Chrome B. Internet Explorer C. Fortran D. Safari
________4. Why do you need to clear cookies and history on your browser?
A. To avoid files to be deleted soon
B. To avoid personal information to be hacked
C. To minimize space on the desktop
D. To remove files on the desktop
________5. Which of the following shows the file management procedure?
A. Complex and file stocking.
B. Non-restricted files on other network.
C. Removing Files
D. Recovery and Data Back-up
________6. Which of the following is not a computer virus?
A. Rootkit B. Trojan Horse C. Torrent D. Wor
________7. The following are the proper way of using the internet except:
A. Deleting cookies and history on a web browser.
B. Not updating antivirus to avoid interruption on using the internet.
C. Using a cryptic password for the account on Facebook.
D. Using the appropriate website for your computer system
requirement.
________8. This process includes storing files in external devices that can be used
when the system crash.
A. Data Back-up and Recovery C. File Organization
B. Defragment D. Knowing File Directory
________9. Part of web browser that encodes keyword for searching and usually
merged with the address bar.
A. Bookmark C. Refresh and Reload Button
B. Home button D. Search bar
________10. It is a vast and powerful source of information for computer users.
A. Application Software C. Internet
B. Information Engines D. Web Browser
KEY TO CORRECTION
References
Computer Hope "Top 10 Internet tips and tricks" Accessed July 16, 2020
https://www.computerhope.com/tips/tip160.htm
Slideshare "Computer Security and Safety, Ethics and Privacy - ICT" Accessed July 16,
2020
https://www.slideshare.net/aliciamargaretjavelosa/computer-security-and-safety-ethics-
and-privacy-ict
Brickhost "Importance of Data Backup and Recovery" Accessed July 18, 2020
https://www.brickhost.com/importance-of-data-backup-and-recovery/
Sallings W. "Chapter 12 File Management 8th Edition" Accessed July 18, 2020
https://www.unf.edu/public/cop4610/ree/Notes/PPT/PPT8E/CH12-OS8e.pdf
IMAGES
https://3.bp.blogspot.com/-
LoY1e5ANcVQ/Ts5cKjx6HgI/AAAAAAAAEvM/5xdIWTDBxWg/s1600/Windows-Utility-
Launcher.jpg
https://icasnetwork.com/wp-
content/uploads/2018/03/001aa2afe91a21eb14a51f06669ffcb2.jpg
https://fiverr-
res.cloudinary.com/images/t_main1,q_auto,f_auto,q_auto,f_auto/gigs/140908036/original
/ab73db6d2e51e11b4066fa649ba8f0ad9f95caf8/do-java-project-tasks-bugs-fixes.png
Icon Images came from Windows 10 Enterprise 64-Bit Dell Latitude E5520 Laptop.
https://www.top10zen.com/users/160/730/photos/web_browser3_large.jpg
https://mk0knownnewsql4vbcfb.kinstacdn.com/wp-content/uploads/2020/08/homepage-
background-tabs1-990x570.jpg