Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Tle CSS G10 Q2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

DIVISION OF NAVOTAS CITY

4
10
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(ICT)
Computer System Servicing
QUARTER 2

S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT-CSS) – Grade 10
Alternative Delivery Mode
Quarter 2
Second Edition, 2021

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writer: Ericelle Bianca A. Baltazar
Editors: Eduardo T. Gallego
Reviewers: Grace R. Nieves
Illustrator: Ericelle Bianca A. Baltazar
Layout Artist: Ericelle Bianca A. Baltazar
Management Team: Alejandro G. Ibañez, OIC- Schools Division Superintendent
Isabelle S. Sibayan, OIC- Asst. Schools Division Superintendent
Loida O. Balasa, Chief, Curriculum Implementation Division
Grace R. Nieves, EPS In Charge of LRMS/EPP-TLE-TVL
Lorena J. Mutas, ADM Coordinator
Vergel Junior C. Eusebio, PDO II LRMS

Inilimbag sa Pilipinas ng ________________________

Department of Education – Navotas City


Office Address: BES Compound M. Naval St. Sipac-Almacen Navotas City
____________________________________________
Telefax: 02-8332-77-64
____________________________________________
E-mail Address: ____________________________________________
Navotas.city@deped.gov.ph
Table of Contents
What I Know ................................................................................1

Module 1......................................................................................3

Module 2......................................................................................7

Module 3......................................................................................15

Module 4......................................................................................20

Module 5......................................................................................25

Module 6......................................................................................30

Assessment ..................................................................................40

Answer Key ..................................................................................42

References ...................................................................................44
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. You’ve tried to solve your computer issues by using the system restore and
sadly it didn’t help to resolve the problem. What is the next step for you to do?
A. Reformat your computer
B. Undo the system restore
C. Try to registry edit
D. Click another restore point
2. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open source
software?
A. Windows
B. LINUX
C. MAC
D. Android
3. What is operating system?
A. collection of programs that manages hardware resources
B. system service provider to the application programs
C. link to interface the hardware and application programs
D. all of the mentioned
4. Which one of the following errors will be handle by the operating system?
A. power failure
B. lack of paper in printer
C. connection failure in the network
D. all of the mentioned
5. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open-source
software?
A. Windows
B. LINUX
C. MAC
D. Android
6. Jimmy needs to detect not functional hardware attached to the computer. By
going to this section, how Jimmy will be able to identify all missing drivers and
manage devices so everything works smoothly anytime?
A. Device Manager
B. Storage
C. Services and Application
D. none of these

7. If CPU executes multiple programs simultaneously, it will be known as?


A. Multi-user
B. Multiprocessing
C. Multitasking
D. Multithreading

1
8. Which operating system is found most often on large business and scientific
computers?
A. Microsoft Windows
B. Mac OS
C. UNIX
D. Linux
9.A computer program that operates or controls a particular type of device that is
attached to a computer.
A. Device Driver
B. Control Panel
C. System Specification
D. Utility Software

10. Computer software with its source code made available with a license in which
the copyright holder provides the rights to study, change and distribute the
software to anyone and for any purpose.
A. Application
B. System
C. Open Source Software
D. Software License

2
MODULE 1

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/ devices.

TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. Install Operating System (OS) in accordance with established installation
procedures and to comply with end-user requirements
2. Define different terms used in installation of operating system
3. Identify the benefits of reformatting hard disk drive

Lesson
Install Operating System (OS)
1
This module the students will learn how to format a computer by install a new
Windows without a windows CD & with full data collection step-by-step, also the
students will how to create hard-drive partitions in Windows to save data before
install the new copy of windows.

3
DISK REFORMATTING
Clearing everything in your hard disk, checks and mark bad sectors and installs a
fresh new working operating system.

Configuration
It is the way a system is set up, or the assortment of components that make up the
system. Configuration can refer to either hardware or software, or the combination
of both.

BIOS (Basic Input Output System)


Instruct the computer on how to perform a number of basic functions such as
booting and keyboard control. BIOS is also used to identify and configure the
hardware in a computer such as the hard drive, optical drive, CPU, memory, etc.

Drivers
These are small software programs that help the operating system use or “drive” the
device.

When to reformat hard drive?


1. If you buy a computer, you must format the hard drive so you can put an operating
system on it.
2. If your windows files are corrupted beyond repair or you have files missing and all
your attempts to repair have failed.
3. If your computer is infected by a virus or malware and all your attempts to remove
has not worked.
4. If your computer's performance has slowed considerably.

Benefits of formatting a hard drive


1. Speed up your computer.
2. Fix malware and virus problems.
3. Get rid of outdated personal information.
4. Extend the life of a hard disk drive.

Things needed before formatting the hard drive

1. You will need to backup your computer files.


2. You will need system discs. These include a driver disc and the windows
operating system disc.
3. You will need to know everything about formatting a computer.

4
Notes to the Teacher
For the following activities you may inform
your students to write the answers on
their notebook

Directions: Secret Code Game. Find the missing word

A B C D E F
1 2 3 4 5 6
G H I J K L
7 8 9 10 11 12
M N O P Q R
13 14 15 16 17 18
S T U V W X
19 20 21 22 23 24
Y Z Space
25 26 27

1. __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __
15 16 5 18 1 20 9 14 7 33 19 25 19 20 5 13

2. __ __ __ __ __ __ __
4 18 32 22 5 2*9 19

3. __ __ __ __
2 9 15 19

4. __ __ __ __ __ __ __ __
3 15 13 16 21 20 5 18

5. __ __ __ __ __ __
19 25 19 20 5 13

5
Directions: List down all the pros and cons of reformatting a hard drive / computer.
Then, create and complete the Venn diagram to summarize your answer.

6
MODULE 2

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/ devices.

TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. Install peripherals/ devices in accordance with manufacturer’s
instructions and/ or OS installation procedures
2. Identify the steps on how to reformat a computer
3. Demonstrate the procedure of OS installation using VM VirtualBox
application

Lesson
Install Operating System (OS)
2

WINDOWS INSTALLATION
Clearing everything in your hard disk, checks and mark bad sectors and installs a
fresh new working operating system.

As with any OS installation, you must first plan the installation process. When you
run the Windows 7 Setup program, you must provide information about how to
install and configure the operating system. Thorough planning can make your

7
installation of Windows 7 more efficient by helping you to avoid potential problems
during installation. An understanding of the configuration options will also help to
ensure that you have properly configured your system.

Types of Installation

1. Upgrade (In-place upgrade) - This option replaces your current version of


Windows with Windows 7, and keeps your files, settings, and programs in
place on your computer.
2. Custom ("fresh" installation) - This option replaces your current version of
Windows with Windows 7, but doesn't preserve your files, settings, and
programs. It's sometimes referred to as a clean installation for that reason.

Installation Process

1. Boot the computer using the bootable windows installation disc from the DVD-ROM.

2. Your first step is to choose the language, time/currency format and the keyboard
input method.

8
3. On clicking next you will be taken to next step which has a big button to Click
" Install " click on it.

4. Wait to Windows 10 setup to begin. You don't need to press any key.

9
5. Accept the license agreement

4. Choose a type of installation “Upgrade or Custom(advance)”

10
5. Choose the partition where you want to install Windows 7. This is probably the
most important part of the entire installation, so you need to be very careful here
and make the right choices.

6. User setting (username, computer name and password).

11
7. Activate the windows using the 25 characters product key.

8. Configure your updates.

9. Configure the time zone.

12
10. Finalizing the setting.

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

13
DIRECTIONS: Create a diagram that shows the step-by-step procedure on how
to reformat computer.

1.

4.

5.

7.

8.

Directions: Describe some challenges of designing operating systems for mobile


devices compared with designing operating systems for traditional PCs.

_______________________________________________________________________________

_______________________________________________________________________________

_______________________________________________________________________________

_______________________________________________________________________________

_____________________________________________________________________________

14
MODULE 3

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/devices.

TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. Configure peripherals/ devices in accordance with manufacturer’s
instructions and/ or OS installation procedures
2. Describe a graphical user interface
3. Discuss the function of the file manager in an operating system.
4. Describe how system utilities help operating systems function.

Lesson
Install Operating System (OS)
3

The User Interface


The user interface (UI) is the point of human-computer interaction and
communication in a device. This can include display screens, keyboards, a mouse
and the appearance of a desktop. It is also the way through which a user interacts
with an application or a website.

15
Desktop

A desktop is a computer display area that represents the kinds of objects one might
find on top of a physical desk, including documents, phone books, telephones,
reference sources, writing and drawing tools, and project folders.

A desktop can be contained in a window that is part of the total display area or can
be full screen, taking up the total display area. Users can have multiple desktops for
different projects or work environments they have and can switch between them.

Icons
On the screen, pictures called icons represent various resources on the computer.
An icon might represent a program, a document, a hardware device, or a Web site.
You click or double-click an icon to perform an action, such as starting a program
or opening a file.

Options

The operating system lets you change some features of the desktop, such as the look
of the background or the placement of the icons. You can also change how other
things work on your computer, such as keyboard functions and the speed at which
the cursor blinks on the screen. The computer’s manual or the Help feature allows
you to explore these options.
System Utilities: File Management

Utility software is a collection of programs that help you maintain and repair your
computer. Today, many types of utilities are built into the operating system. Probably
the most important utilities are file managers, which let you work with data stored
on your computer.
Organizing Files

The operating system, programs, and data are all stored in files, each with a name.
Files can be grouped together into folders. Folders are also called directories. A folder
can be divided into subfolders.

Using Files
You can use an operating system’s file manager to perform several tasks:
• create new folders or subfolders
• move or copy items between folders or to other disks
• delete files and folders
• launch applications

Finding Files

You can use the file finder utility from your operating system to help you look for a
file. This utility can search for a file by its name, type, date, or even by looking for
specific data inside the file.

16
System Utilities: Other Jobs

Your operating system probably has utilities that can help with routine maintenance
and other jobs.

Driver Utilities

A driver utility contains data needed by programs to operate input and output devices
such as a mouse and printer. Operating systems that have Plug and Play (PnP)
capability can automatically detect new PnP-compatible devices. Otherwise, you will
be prompted to insert the disc that came with the equipment to load the driver.
Program Utilities

Before you can use a program, you must install it on your hard drive. In Windows,
you can use the Add/ Remove Programs utility to ensure that your program installs
properly. You can use the same utility to remove a program you no longer need.
Backup Utilities

Backup utility programs automatically copy data from the computer’s hard drive to
a backup storage device, such as an external hard drive or a CD. Businesses and
individuals routinely use backup utilities to ensure data is not lost if a computer or
disk drive fails. You, too, should regularly back up your computer data.
File Compression Utilities

File compression utilities are programs that reduce the size of files without harming
the data. These programs make it easier to copy and send files.

17
Notes to the Teacher
For the following activities you may inform
your students to write the answers on
their notebook

Directions: Determine the correct choice for each of the following.

1. Which of the following is NOT usually handled by the operating system?


a. managing programs
b. dealing with input/output devices
c. publishing Web pages
d. interacting with the user
2. Which kind of computer operating system usually requires the least amount of
user interaction?
a. real-time systems
b. single-user/single-task systems
c. single-user/multitask systems
d. multi-user systems
3. Which of the following is a key part of a graphical user interface?
a. command words
b. cursors
c. memory
d. icons
4. Which operating system is found most often on large business and scientific
computers?
a. Microsoft Windows
b. Mac OS
c. UNIX
d. Linux
5. Which of the following do operating systems, application programs, and user
data have in common?
a. They are all system utilities.
b. They are all Windows-based.
c. They are all created by the user.
d. They are all stored in files

18
Directions: Look at the desktop on your computer. Identify the icons on the
desktop and explain what each function. Give at least 5 icons

_______________________________________________________

_______________________________________________________

_______________________________________________________

_______________________________________________________

_______________________________________________________

19
MODULE 4

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/ devices.


TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. access OS and driver’s updates/ patches in accordance with manufacturer’s
recommendations and requirements.
2. Describe the features of a graphical user interface.
Explain how operating systems can be configured and changed.

Lesson
Install Operating System (OS)
4

Exploring the Operating System

The operating system, or OS, controls the computer and man-ages its work. The OS
also provides an interface which enables you to interact with the computer.

The Boot Process

When you turn the computer on, you boot it. That is, you start the computer, and it
responds by loading the operating system. If your computer is set to show it,
the first thing you see is the BIOS screen. BIOS stands for basic input/output

20
system, and it manages and configures the computer’s hardware. This means that
the computer will be able to accept input from the keyboard and display information.

The Power-On Self-Test


As a computer boots, it performs a series of tests called the power-on self-test, or POST.
During POST, the BIOS checks the major components of the system, such as its
memory, keyboard, and hard drive. If your BIOS screen is set to display during POST,
you will see text messages telling you what is happening. If there is a problem, a
written message or a sound alerts you. If this happens, the computer may need
repair. If no problem is detected, parts of the operating system are loaded from storage
into memory and take control of the computer.

The Login

As the operating system starts, you may see a screen that asks you for a
username and password. This is called the login screen. Businesses and schools
often use this process to control who has access to the computer.

Exploring Configuration Options

Every operating system includes default settings, the settings a program


automatically uses unless others are selected. Operating systems provide
configuration options, which let you change some of the default settings and make
the computer work in a way that best suits your needs. For example, you can:

• change keyboard and mouse settings

• change the volume of sounds and audio equipment

• change the system date or time

• set up or change your Internet connection

• add new hardware, such as a printer or scanner

• add or remove programs

• schedule a task to run automatically, such as an antivirus program

Changing system settings lets you customize your computer, but it can also cause
your computer to malfunction. Most operating systems have a feature that lets you
restore settings to a previous configuration.

Desktop Changes

Your operating system lets you change the desktop display. Among your choices
are these:

• change the background appearance of the desktop, some-times called the


wallpaper

21
• change the screen saver, a utility program that changes the screen display after a
preset period of nonuse

• add or eliminate desktop icons for various programs

• display or hide the taskbar

DESKTOP

ICON

MOUSE POINTER

START BUTTON
START BUTTON PINNED AREA TASKBAR

RECENTLY USED PROGRAMS


APPLICATIONS

TIME AND DATE


SEARCH BOX

Managing User Accounts

Since computers are used for many different tasks, from playing games to writing
reports and calculating numbers, businesses may want to restrict the use of some

22
programs and files to designated users. This may also be true in schools, homes, and
other settings where several people can use the same computer.

Usernames and Passwords

One way to protect data is to set up user accounts that identify who can
access a computer. Each user is assigned a username and a password that he or
she must provide in order to gain access. User accounts are set up using a system
tool provided by the operating system. The system administrator is the person
responsible for maintaining the computer system and for setting up user accounts.

Other Protections

Besides the username and password, a user account can also include the following
properties:

• file access rights that specify which files a user can access and what he or she can
do with these files

• installation rights that specify whether a user can install or remove programs

• hardware rights that specify whether a user can add or remove hardware

• configuration rights that specify whether a user can change operating system
settings

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

Directions: Answer the following questions.

1. What is the purpose of having a username and password on a computer?


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. Password and login security tips that anyone can use.


____________________________________________________________________________

23
____________________________________________________________________________
____________________________________________________________________________
3. Why is the booting process necessary?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Directions: Answer the following questions.

1. After you add a peripheral to your computer or change a preference, you are
asked to reboot the computer. Why do you think this is necessary?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. Why do most operating systems let users make system changes?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

24
MODULE 5

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/ devices.


TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. Install OS and driver’s updates/ patches in accordance with
manufacturer’s recommendations and requirements
2. Be able to set up and maintain computer systems.

Lesson
Install Operating System (OS)
5

Install software

Once all the necessary hardware is in place and suitably connected, it is time for the
software to be installed.

Operating system software: Most computers come with operating system software
such as Windows already installed. However, if you don’t buy in this way, you will
have to install it yourself. Operating system software: Most computers come with
operating system software such as Windows already installed. However, if you don’t
buy in this way, you will have to install it yourself.

25
Applications software: Once the operating system is in place, you can install the
applications software such as Microsoft Office.
Security software: Security software is a general phrase used to describe
any software that provides security for a computer or network. There are many
types of security software including antivirus software, encryption
software, firewall software and spyware removal software. Then you should
consider security software such as virus checkers, firewalls – certainly before
connecting to the Internet.

Device drivers : More commonly known as a driver, a device driver or hardware


driver is a group of files that enable one or more hardware devices to communicate
with the computer's operating system. Without drivers, the computer would not be
able to send and receive data correctly to hardware devices, such as a printer.
For each peripheral device, a device driver is needed to interface between the
processor and the peripheral. The driver acts as a decoder, so the data is

26
interpreted correctly. Installing device drivers is necessary when new hardware is
installed.

Directory/folder structures: Although you can manage for a while without doing
so, it’s wise to create appropriate directory/folder structures so that finding files at
a later date is made easier.

CONFIGURE
Having installed software, the next stage is to configure the system to suit the user.
A configuration is the way a system is set up, or the assortment of components that
make up the system. Configuration can refer to hardware, software, or a combination
of both. For instance, a typical configuration for a laptop PC consists of 8GB or 16GB
(gigabytes) main memory, multiple USB ports, a hard disk or solid-state drive (SSD),
a wireless card, and an operating system.
BIOS: You have the option to determine the BIOS configuration and might set a BIOS
password or edit the power management options. To access the BIOS configuration,
when you first turn your computer on, notice the message in the top right-hand
corner which tells you which function keys can be used to interrupt the boot process
and give you access to the BIOS configuration.

Anti-virus software: Editing anti-virus configurations is necessary to determine the


frequency and timing of virus scans. Some operating systems include free anti-virus
software or you may have installed your own third-party software. Either way, you
need to decide what scans you require
Virus protection

PCs can be attacked by viruses, worms and Trojans arriving with emails or
during access to the Internet. Anti-virus software checks for intruders. It
attempts to trace viruses by spotting the virus signature. Meanwhile,
virus writers adopt cloaking techniques such as polymorphing.

Almost as soon as virus writers invent new viruses, so do anti-virus software


vendors produce updated versions of their software. The anti-virus software
vendors maintain a database of information about viruses, their profiles and
signatures. Users who subscribe to an online anti-virus protection service may

27
have this database downloaded to their PC automatically each time an update is
released.
Other users may receive an email telling them that an update is available.
Having the most up-to-date virus information file, scanning regularly and avoiding
opening emails that may contain viruses is the best advice. The main defense against
viruses is to subscribe to a reliable software vendor’s virus protection service. If the
software detects a virus, a pop-up screen may offer options: to quarantine the file
(i.e. move it so it can do no harm), to repair the file (i.e. delete the virus but retain
the file) or to delete the file.

Anti-virus software vendors may offer to create a rescue disk – a bootable disk that
also contains anti-virus software. If a virus-infected system won’t boot, a rescue disk
may solve the problem. Write-protecting the disk may prevent it from becoming
infected with a virus.

Desktop: Editing the desktop – for example changing the icon size, the font size, the
text colour, the background, icon choice – personalizes the desktop for the user.
These are controlled through the Control Panel / Task Bar and Start Menu

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

Directions: Answer the following questions.

1. List five factors you might take into account when recommending a computer
system to a particular user.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. Why might a user insist on a particular brand of operating system?


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

28
3. Why is it essential to aim for the maximum processing power and storage
capacity that can be afforded?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

4. What is a bundle of software? What are the advantages and disadvantages of


purchasing a bundle?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
5. What is the advantage of choosing a software vendor which offers online training
as part of purchase price?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

1. Identify two different providers of antivirus software. Do they also provide firewall
protection?
2. For one provider of firewall protection, find out what is available for the user.

29
MODULE 6

This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install operating system and drivers for peripherals/ devices.


TLE_IACSS9- 12ICCS-IIa-j-30

After going through this module, you are expected to:


1. Check the quality of the work undertaken in accordance with established
procedures
2. Describe what is Disk Management
3. Understand the basic disk contain partitions, and that dynamic disks contain
volumes

Lesson
Install Operating System (OS)
6

What is Disk Management?

Disk Management is a utility built into different operating systems which can be used
to create, delete, format partitions, assign drive letters, and much more. Disk
Management can also be used to view partitions and their formatted file systems on
the hard drive.

30
Disk Management enables you to perform most disk-related tasks without shutting down the system
or interrupting users; most configuration changes take effect immediately.

Simplified tasks and intuitive user interface. Disk Management is easy to use. Menus that are
accessible from the right mouse button display the tasks you can perform on the selected object,
and wizards guide you through creating partitions or volumes and initializing or converting disks.

What's the difference between a "disc" and a "disk?“

Discs
A disc refers to optical media, such as
an audio CD, CDROM, DVD-ROM,
DVD-RAM, or DVD-Video disc. Some
discs are read-only (ROM), others allow
you to burn content (write files) to the
disc once (such as a CD-R or DVD-R,
unless you do a multisession burn),
and some can be erased and rewritten
over many times (such as CD-RW,
DVD-RW, and DVD-RAM discs). All
discs are removable, meaning when
you unmount or eject the disc from
your desktop or Finder, it physically https://searchstorage.techtarget.com/definition/compact-disc
comes out of your computer.

Disks
A disk refers to magnetic media, such as a
floppy disk, the disk in your computer's
hard drive, an external hard drive. Disks
are always rewritable unless intentionally
locked or write protected. You can easily
partition a disk into several smaller
volumes, too. Disks are usually sealed
inside a metal or plastic casing (often, a
disk and its enclosing mechanism are
collectively known as a "hard drive").

https://www.computerscience.gcse.guru/theory/storage-devices

31
The most common way to access Disk Management is via Computer
Management:
There are several methods to access the Disk Management.

Method 1 : Start > Control Panel > Administrative Tools. Double click Computer
Management and then click Disk Management in the left hand column.
Method 2 : Click Start > Run and type diskmgmt.msc in the Open: line and click
OK. The Disk Management snap-in will open.

Method 3 : By default, Administrative Tools is not shown on the Start Menu but if
you have modified the Start Menu (by right clicking the Start button and selecting
Properties > Customize) so it is shown then just select Start > Administrative Tools
> Computer Management and then click Disk Management in the left hand
column.

Opening D.M From CLI

The Disk Management command is the same in all versions of Windows so these
instructions apply to Windows 8, Windows 7, Windows Vista, and Windows XP.
Follow these easy steps to start Disk Management from the Command Prompt in
Windows:

• In Windows 7 8, and 10 click on the Start button.


• Type the following command in the text box:
• diskmgmt.msc
• Then hit the Enter key or press the OK button, depending on where you ran
the command from.

Note: Technically, opening Disk Management from the Command Prompt would
require that you open the Command Prompt program. However, running an
executable program like diskmgmt.msc from the search or run box accomplishes
the same thing.

Another Way of Opening Disk Management


Just press the WIN and X keys together to bring up the menu, then click on the
Disk Management shortcut. Beginning with the Windows 8.1 update, right-clicking
on the Start button works to bring up the Power User Menu too.

How To Use Disk Management

Disk Management has two main sections - a top and a bottom:

• The bottom section of Disk Management contains a graphical representation


of the physical drives installed in the computer.
• The top section of Disk Management contains a list of all the partitions,
formatted or not, that Windows recognizes.
• Performing certain actions on the drives or partitions make them available or
unavailable to Windows and configures them to be used by Windows in
certain ways.
• Here are some common things that you can do in Disk Management:

32
▪ Partition a Drive
▪ Format a Drive
▪ Change a Drive's Letter
▪ Shrink a Partition
▪ Extend a Partition
▪ Delete a Partition
▪ Change a Drive's File System

Basic Storage

Basic storage can be accessed by all Microsoft operating systems, as far back as MS-
DOS.
Disks configured as basic storage can be divided into one or more logical disks
called partitions. There are two types of partition; primary and extended.

Primary Partitions
A primary partition is always seen as a single logical drive letter by Windows.
One disk may contain up to four primary partitions.
A primary partition is the only type of partition that operating systems can boot
up from. In order for a primary partition to be used as a bootable partition it
has to be made “active”.

Extended Partitions
An extended partition is not given a drive letter by Windows. It has to be divided
into one or more logical drives. Each of the logical drives within the extended
partition is given a drive letter by Windows.
There can only be one extended partition per disk. If an extended partition exists
on a disk, the maximum number of primary partitions is limited to three.
Extended partitions cannot be made active; that is, they cannot contain an
operating system.
Below are examples of how partitions can be defined on a single basic storage
disk.

Dynamic storage

Dynamic storage disks contain volumes. Disks configured as dynamic storage do


not contain partitions; they contain volumes.

Volumes are more flexible than partitions because they can use space from one or
more physical disks.
Remember, partitions can use space from only one physical disk.

There are three types of volume; simple, spanned and striped.

33
Before simple, spanned or striped volumes are created on a disk, the disk must be
converted from basic to dynamic storage.
A simple volume contains space from one disk. A spanned volume contains space
from two or more disks. A striped volume contains space from two or more disks.

Partition a Hard Drive


To partition a hard drive in Windows 7 means to divide the hard drive into parts
and make those parts available to the operating system. It's also possible for an
entire hard drive to have a single partition, which oddly enough is actually the most
common way to partition a hard drive.

Steps For Partition


In Disk Management’s Graphical view, right-click an unallocated or free area, and
then click New Simple Volume. This starts the New Simple Volume Wizard.

▪ Read the Welcome page and then click Next.


▪ The Specify Volume Size page specifies the minimum and maximum size for
the volume in megabytes and lets you size the volume within these limits.
Size the partition in megabytes using the Simple Volume Size field and then
click Next.

34
▪ On the Assign Drive Letter Or Path page, specify whether you want to assign
a drive letter or path and then click Next. The available options are as
follows:

35
▪ Use the Format Partition page to determine whether and how the volume
should be formatted. If you want to format the volume, choose Format This
Volume With The Following Settings, and then configure the following
options:

36
▪ Click Next, confirm your options, and then click Finish.

37
The Windows 10 Disk Management tool will now show the space configured as a
new partition.

38
Shrink a Partition

Here’s an easy way to shrink a volume to free up space so you can create a new
partition on your disk.

To shrink a basic volume follow these steps:


▪ In Disk Management, right-click the volume that you want to shrink, and
then click Shrink

▪ In the field provided in the Shrink dialog box, enter the amount of space by
which to shrink the disk

39
▪ Click Shrink.
▪ Once you have unallocated space, you can use that space to create a new
partition by repeating above partition steps.

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

40
Directions: Answer the following questions.

1. How many primary partitions per disk are allowed on a Windows 7, 8, 10 basic
disk with no extended partitions?
____________________________________________________________________________

2. If you wanted partitions of both types, how many of each are allowed on a
Windows XP basic disk?
____________________________________________________________________________

3. What is the purpose of an extended partition?


____________________________________________________________________________

Directions: Identify the following.

_______1. It is the term to describe a disk that contains partitions, such as primary
partitions. This disk is usually formatted with a file system to become a volume for
file storage.

_______2. It is a more flexible model of storage management.

_______3. It operates as a single independent unit. It typically uses an NTFS file


system and can be extended within the same disk or across other disks.

_______4. It consists of more than one physical disk (up to 32). When a disk that is
used by a spanned volume is full, the data moves to the next disk in the array that
comprises the volume.

_______5. It consists of more than one physical disk (up to 32). The data on this
type of volume is allocated evenly to each of the physical disks.

41
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Jimmy needs to detect not functional hardware attached to the computer. By
going to this section, how Jimmy will be able to identify all missing drivers and
manage devices so everything works smoothly anytime?
A. Device Manager
B. Storage
C. Services and Application
D. none of these

2. If CPU executes multiple programs simultaneously, it will be known as?


A. Multi-user
B. Multiprocessing
C. Multitasking
D. Multithreading

3. Which operating system is found most often on large business and scientific
computers?
A. Microsoft Windows
B. Mac OS
C. UNIX
D. Linux
4. A computer program that operates or controls a particular type of device that is
attached to a computer.
A. Device Driver
B. Control Panel
C. System Specification
D. Utility Software

5. Computer software with its source code made available with a license in which
the copyright holder provides the rights to study, change and distribute the
software to anyone and for any purpose.
A. Application
B. System
C. Open Source Software
D. Software License

6. You’ve tried to solve your computer issues by using the system restore and
sadly it didn’t help to resolve the problem. What is the next step for you to do?
A. Reformat your computer
B. Undo the system restore
C. Try to registry edit
D. Click another restore point

42
7. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open source
software?
A. Windows
B. LINUX
C. MAC
D. Android

8. What is operating system?


A. collection of programs that manages hardware resources
B. system service provider to the application programs
C. link to interface the hardware and application programs
D. all of the mentioned

9. Which one of the following errors will be handle by the operating system?
A. power failure
B. lack of paper in printer
C. connection failure in the network
D. all of the mentioned

10. Open-source software is software whose source code is available for


modification or enhancement by anyone. Which of the following is an example of
open-source software?
A. Windows
B. LINUX
C. MAC
D. Android

43
44
Assessment
1. A
2. C
3. D
4. A
5. C
6. A
7. B
8. D
9. D
10.B
What I can Do What's More
1. Basic Disk 1. C
2. Dynamic 2. A
Disk 3. B
3. Simple 4. C
volume 5. A
4. Spanned
Volume
5. Stripped
Volume
What's More
What I Know
1. Operating
system 1. A
2. Drivers 2. B
3. BIOS
Module 3
3. D
4. Computer 4. D
5. system 5. B
6. A
7. C
8. D
9. A
10.C Module 1
Module 6

References
Detailed Lesson Plan in Senior high School https://www.slideshare.net/
https://www.slideshare.net/giareysie/detailedlessonplanforseniorhighdemo-
106139026?from_action=save
(Accessed October 19, 2020)

Formatting and Clean Install of Windows 7. www.youtube.com


https://www.youtube.com/watch?v=mME9VLT7-xw
(Accessed October 21, 2020)

How to Clean Install Windows 10. www.slideshare.net


https://www.slideshare.net/ronaktoshniwal18/how-to-clean-install-
windows-10?from_action=save
(Accessed October 23, 2020)

Computer Science Edu. www. compsciedu.com


https://compsciedu.com/mcq-questions/Operating-System/Introduction-to-
Operating-Systems/5
(Accessed October 24, 2020)

TechTarge. www.searchapparchitecture.techtarget.com
https://searchapparchitecture.techtarget.com/definition/user-interface-
UI#:~:text=The%20user%20interface%20(UI)%20is,an%20application%20or%20
a%20website. (Accessed October 27, 2020)

TechTarge. www.searchapparchitecture.techtarget.com
https://searchenterprisedesktop.techtarget.com/definition/desktop (Accessed
October 27, 2020)

Pearson Learning Solutions (2011). Introduction to Computers and Information


Technology pg 84-87

TechTarge. www.searchapparchitecture.techtarget.com
https://searchapparchitecture.techtarget.com/definition/user-interface-
UI#:~:text=The%20user%20interface%20(UI)%20is,an%20application%20or%20
a%20website.
(Accessed October 27, 2020)

TechTarge. www.searchapparchitecture.techtarget.com
https://searchenterprisedesktop.techtarget.com/definition/desktop
(Accessed October 27, 2020)

45
Pearson Learning Solutions (2011). Introduction to Computers and Information
Technology pg 84-87

Device driver. www.computerhope.com


https://www.computerhope.com/jargon/d/driver.htm#:~:text=More%20comm
only%20known%20as%20a,devices%2C%20such%20as%20a%20printer.
(Accessed November 25, 2020)

Security Software. www.webopedia.com


https://www.webopedia.com/TERM/S/security_software.html#:~:text=Secu
rity%20software%20is%20a%20general,software%20and%20spyware%20re
moval%20software.
(Accessed November 25, 2020)

IT Fundamentals – Operating System. www.quizlet.com


https://quizlet.com/510938305/it-fundamentals-operating-systems-flash-
cards/
(Accessed November 25, 2020)

Pearson Learning Solutions (2011). Introduction to Computers and Information


Technology

Disk Management. www2.slideshare.net


https://www2.slideshare.net/anjalinegi_/disk-management-
59667584?from_action=save
(Accessed November 28, 2020)

Windows Disk Management. www. quizizz.com


https://quizizz.com/admin/quiz/5bc0ac9d6cb25c001a5f66ef/windows-disk-
management
(Accessed November 28, 2020)

46
For inquiries or feedback, please write or call:

Department of Education – Schools Division Office Navotas


Learning Resource Management Section

Bagumbayan Elementary School Compound


M, Naval St., Sipac Almacen, Navotas City

Telefax: 02-8332-77-64
Email Address: navotas.city@deped.gov.ph

You might also like