Tle CSS G10 Q2
Tle CSS G10 Q2
Tle CSS G10 Q2
4
10
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(ICT)
Computer System Servicing
QUARTER 2
S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT-CSS) – Grade 10
Alternative Delivery Mode
Quarter 2
Second Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Module 1......................................................................................3
Module 2......................................................................................7
Module 3......................................................................................15
Module 4......................................................................................20
Module 5......................................................................................25
Module 6......................................................................................30
Assessment ..................................................................................40
References ...................................................................................44
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. You’ve tried to solve your computer issues by using the system restore and
sadly it didn’t help to resolve the problem. What is the next step for you to do?
A. Reformat your computer
B. Undo the system restore
C. Try to registry edit
D. Click another restore point
2. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open source
software?
A. Windows
B. LINUX
C. MAC
D. Android
3. What is operating system?
A. collection of programs that manages hardware resources
B. system service provider to the application programs
C. link to interface the hardware and application programs
D. all of the mentioned
4. Which one of the following errors will be handle by the operating system?
A. power failure
B. lack of paper in printer
C. connection failure in the network
D. all of the mentioned
5. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open-source
software?
A. Windows
B. LINUX
C. MAC
D. Android
6. Jimmy needs to detect not functional hardware attached to the computer. By
going to this section, how Jimmy will be able to identify all missing drivers and
manage devices so everything works smoothly anytime?
A. Device Manager
B. Storage
C. Services and Application
D. none of these
1
8. Which operating system is found most often on large business and scientific
computers?
A. Microsoft Windows
B. Mac OS
C. UNIX
D. Linux
9.A computer program that operates or controls a particular type of device that is
attached to a computer.
A. Device Driver
B. Control Panel
C. System Specification
D. Utility Software
10. Computer software with its source code made available with a license in which
the copyright holder provides the rights to study, change and distribute the
software to anyone and for any purpose.
A. Application
B. System
C. Open Source Software
D. Software License
2
MODULE 1
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9- 12ICCS-IIa-j-30
Lesson
Install Operating System (OS)
1
This module the students will learn how to format a computer by install a new
Windows without a windows CD & with full data collection step-by-step, also the
students will how to create hard-drive partitions in Windows to save data before
install the new copy of windows.
3
DISK REFORMATTING
Clearing everything in your hard disk, checks and mark bad sectors and installs a
fresh new working operating system.
Configuration
It is the way a system is set up, or the assortment of components that make up the
system. Configuration can refer to either hardware or software, or the combination
of both.
Drivers
These are small software programs that help the operating system use or “drive” the
device.
4
Notes to the Teacher
For the following activities you may inform
your students to write the answers on
their notebook
A B C D E F
1 2 3 4 5 6
G H I J K L
7 8 9 10 11 12
M N O P Q R
13 14 15 16 17 18
S T U V W X
19 20 21 22 23 24
Y Z Space
25 26 27
1. __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __
15 16 5 18 1 20 9 14 7 33 19 25 19 20 5 13
2. __ __ __ __ __ __ __
4 18 32 22 5 2*9 19
3. __ __ __ __
2 9 15 19
4. __ __ __ __ __ __ __ __
3 15 13 16 21 20 5 18
5. __ __ __ __ __ __
19 25 19 20 5 13
5
Directions: List down all the pros and cons of reformatting a hard drive / computer.
Then, create and complete the Venn diagram to summarize your answer.
6
MODULE 2
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9- 12ICCS-IIa-j-30
Lesson
Install Operating System (OS)
2
WINDOWS INSTALLATION
Clearing everything in your hard disk, checks and mark bad sectors and installs a
fresh new working operating system.
As with any OS installation, you must first plan the installation process. When you
run the Windows 7 Setup program, you must provide information about how to
install and configure the operating system. Thorough planning can make your
7
installation of Windows 7 more efficient by helping you to avoid potential problems
during installation. An understanding of the configuration options will also help to
ensure that you have properly configured your system.
Types of Installation
Installation Process
1. Boot the computer using the bootable windows installation disc from the DVD-ROM.
2. Your first step is to choose the language, time/currency format and the keyboard
input method.
8
3. On clicking next you will be taken to next step which has a big button to Click
" Install " click on it.
4. Wait to Windows 10 setup to begin. You don't need to press any key.
9
5. Accept the license agreement
10
5. Choose the partition where you want to install Windows 7. This is probably the
most important part of the entire installation, so you need to be very careful here
and make the right choices.
11
7. Activate the windows using the 25 characters product key.
12
10. Finalizing the setting.
13
DIRECTIONS: Create a diagram that shows the step-by-step procedure on how
to reformat computer.
1.
4.
5.
7.
8.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_____________________________________________________________________________
14
MODULE 3
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9- 12ICCS-IIa-j-30
Lesson
Install Operating System (OS)
3
15
Desktop
A desktop is a computer display area that represents the kinds of objects one might
find on top of a physical desk, including documents, phone books, telephones,
reference sources, writing and drawing tools, and project folders.
A desktop can be contained in a window that is part of the total display area or can
be full screen, taking up the total display area. Users can have multiple desktops for
different projects or work environments they have and can switch between them.
Icons
On the screen, pictures called icons represent various resources on the computer.
An icon might represent a program, a document, a hardware device, or a Web site.
You click or double-click an icon to perform an action, such as starting a program
or opening a file.
Options
The operating system lets you change some features of the desktop, such as the look
of the background or the placement of the icons. You can also change how other
things work on your computer, such as keyboard functions and the speed at which
the cursor blinks on the screen. The computer’s manual or the Help feature allows
you to explore these options.
System Utilities: File Management
Utility software is a collection of programs that help you maintain and repair your
computer. Today, many types of utilities are built into the operating system. Probably
the most important utilities are file managers, which let you work with data stored
on your computer.
Organizing Files
The operating system, programs, and data are all stored in files, each with a name.
Files can be grouped together into folders. Folders are also called directories. A folder
can be divided into subfolders.
Using Files
You can use an operating system’s file manager to perform several tasks:
• create new folders or subfolders
• move or copy items between folders or to other disks
• delete files and folders
• launch applications
Finding Files
You can use the file finder utility from your operating system to help you look for a
file. This utility can search for a file by its name, type, date, or even by looking for
specific data inside the file.
16
System Utilities: Other Jobs
Your operating system probably has utilities that can help with routine maintenance
and other jobs.
Driver Utilities
A driver utility contains data needed by programs to operate input and output devices
such as a mouse and printer. Operating systems that have Plug and Play (PnP)
capability can automatically detect new PnP-compatible devices. Otherwise, you will
be prompted to insert the disc that came with the equipment to load the driver.
Program Utilities
Before you can use a program, you must install it on your hard drive. In Windows,
you can use the Add/ Remove Programs utility to ensure that your program installs
properly. You can use the same utility to remove a program you no longer need.
Backup Utilities
Backup utility programs automatically copy data from the computer’s hard drive to
a backup storage device, such as an external hard drive or a CD. Businesses and
individuals routinely use backup utilities to ensure data is not lost if a computer or
disk drive fails. You, too, should regularly back up your computer data.
File Compression Utilities
File compression utilities are programs that reduce the size of files without harming
the data. These programs make it easier to copy and send files.
17
Notes to the Teacher
For the following activities you may inform
your students to write the answers on
their notebook
18
Directions: Look at the desktop on your computer. Identify the icons on the
desktop and explain what each function. Give at least 5 icons
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
19
MODULE 4
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
Lesson
Install Operating System (OS)
4
The operating system, or OS, controls the computer and man-ages its work. The OS
also provides an interface which enables you to interact with the computer.
When you turn the computer on, you boot it. That is, you start the computer, and it
responds by loading the operating system. If your computer is set to show it,
the first thing you see is the BIOS screen. BIOS stands for basic input/output
20
system, and it manages and configures the computer’s hardware. This means that
the computer will be able to accept input from the keyboard and display information.
The Login
As the operating system starts, you may see a screen that asks you for a
username and password. This is called the login screen. Businesses and schools
often use this process to control who has access to the computer.
Changing system settings lets you customize your computer, but it can also cause
your computer to malfunction. Most operating systems have a feature that lets you
restore settings to a previous configuration.
Desktop Changes
Your operating system lets you change the desktop display. Among your choices
are these:
21
• change the screen saver, a utility program that changes the screen display after a
preset period of nonuse
DESKTOP
ICON
MOUSE POINTER
START BUTTON
START BUTTON PINNED AREA TASKBAR
Since computers are used for many different tasks, from playing games to writing
reports and calculating numbers, businesses may want to restrict the use of some
22
programs and files to designated users. This may also be true in schools, homes, and
other settings where several people can use the same computer.
One way to protect data is to set up user accounts that identify who can
access a computer. Each user is assigned a username and a password that he or
she must provide in order to gain access. User accounts are set up using a system
tool provided by the operating system. The system administrator is the person
responsible for maintaining the computer system and for setting up user accounts.
Other Protections
Besides the username and password, a user account can also include the following
properties:
• file access rights that specify which files a user can access and what he or she can
do with these files
• installation rights that specify whether a user can install or remove programs
• hardware rights that specify whether a user can add or remove hardware
• configuration rights that specify whether a user can change operating system
settings
23
____________________________________________________________________________
____________________________________________________________________________
3. Why is the booting process necessary?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
1. After you add a peripheral to your computer or change a preference, you are
asked to reboot the computer. Why do you think this is necessary?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
24
MODULE 5
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
Lesson
Install Operating System (OS)
5
Install software
Once all the necessary hardware is in place and suitably connected, it is time for the
software to be installed.
Operating system software: Most computers come with operating system software
such as Windows already installed. However, if you don’t buy in this way, you will
have to install it yourself. Operating system software: Most computers come with
operating system software such as Windows already installed. However, if you don’t
buy in this way, you will have to install it yourself.
25
Applications software: Once the operating system is in place, you can install the
applications software such as Microsoft Office.
Security software: Security software is a general phrase used to describe
any software that provides security for a computer or network. There are many
types of security software including antivirus software, encryption
software, firewall software and spyware removal software. Then you should
consider security software such as virus checkers, firewalls – certainly before
connecting to the Internet.
26
interpreted correctly. Installing device drivers is necessary when new hardware is
installed.
Directory/folder structures: Although you can manage for a while without doing
so, it’s wise to create appropriate directory/folder structures so that finding files at
a later date is made easier.
CONFIGURE
Having installed software, the next stage is to configure the system to suit the user.
A configuration is the way a system is set up, or the assortment of components that
make up the system. Configuration can refer to hardware, software, or a combination
of both. For instance, a typical configuration for a laptop PC consists of 8GB or 16GB
(gigabytes) main memory, multiple USB ports, a hard disk or solid-state drive (SSD),
a wireless card, and an operating system.
BIOS: You have the option to determine the BIOS configuration and might set a BIOS
password or edit the power management options. To access the BIOS configuration,
when you first turn your computer on, notice the message in the top right-hand
corner which tells you which function keys can be used to interrupt the boot process
and give you access to the BIOS configuration.
PCs can be attacked by viruses, worms and Trojans arriving with emails or
during access to the Internet. Anti-virus software checks for intruders. It
attempts to trace viruses by spotting the virus signature. Meanwhile,
virus writers adopt cloaking techniques such as polymorphing.
27
have this database downloaded to their PC automatically each time an update is
released.
Other users may receive an email telling them that an update is available.
Having the most up-to-date virus information file, scanning regularly and avoiding
opening emails that may contain viruses is the best advice. The main defense against
viruses is to subscribe to a reliable software vendor’s virus protection service. If the
software detects a virus, a pop-up screen may offer options: to quarantine the file
(i.e. move it so it can do no harm), to repair the file (i.e. delete the virus but retain
the file) or to delete the file.
Anti-virus software vendors may offer to create a rescue disk – a bootable disk that
also contains anti-virus software. If a virus-infected system won’t boot, a rescue disk
may solve the problem. Write-protecting the disk may prevent it from becoming
infected with a virus.
Desktop: Editing the desktop – for example changing the icon size, the font size, the
text colour, the background, icon choice – personalizes the desktop for the user.
These are controlled through the Control Panel / Task Bar and Start Menu
1. List five factors you might take into account when recommending a computer
system to a particular user.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
28
3. Why is it essential to aim for the maximum processing power and storage
capacity that can be afforded?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
1. Identify two different providers of antivirus software. Do they also provide firewall
protection?
2. For one provider of firewall protection, find out what is available for the user.
29
MODULE 6
This module was designed and written with you in mind. It is here to help you master
the nature of Install operating system and drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
Lesson
Install Operating System (OS)
6
Disk Management is a utility built into different operating systems which can be used
to create, delete, format partitions, assign drive letters, and much more. Disk
Management can also be used to view partitions and their formatted file systems on
the hard drive.
30
Disk Management enables you to perform most disk-related tasks without shutting down the system
or interrupting users; most configuration changes take effect immediately.
Simplified tasks and intuitive user interface. Disk Management is easy to use. Menus that are
accessible from the right mouse button display the tasks you can perform on the selected object,
and wizards guide you through creating partitions or volumes and initializing or converting disks.
Discs
A disc refers to optical media, such as
an audio CD, CDROM, DVD-ROM,
DVD-RAM, or DVD-Video disc. Some
discs are read-only (ROM), others allow
you to burn content (write files) to the
disc once (such as a CD-R or DVD-R,
unless you do a multisession burn),
and some can be erased and rewritten
over many times (such as CD-RW,
DVD-RW, and DVD-RAM discs). All
discs are removable, meaning when
you unmount or eject the disc from
your desktop or Finder, it physically https://searchstorage.techtarget.com/definition/compact-disc
comes out of your computer.
Disks
A disk refers to magnetic media, such as a
floppy disk, the disk in your computer's
hard drive, an external hard drive. Disks
are always rewritable unless intentionally
locked or write protected. You can easily
partition a disk into several smaller
volumes, too. Disks are usually sealed
inside a metal or plastic casing (often, a
disk and its enclosing mechanism are
collectively known as a "hard drive").
https://www.computerscience.gcse.guru/theory/storage-devices
31
The most common way to access Disk Management is via Computer
Management:
There are several methods to access the Disk Management.
Method 1 : Start > Control Panel > Administrative Tools. Double click Computer
Management and then click Disk Management in the left hand column.
Method 2 : Click Start > Run and type diskmgmt.msc in the Open: line and click
OK. The Disk Management snap-in will open.
Method 3 : By default, Administrative Tools is not shown on the Start Menu but if
you have modified the Start Menu (by right clicking the Start button and selecting
Properties > Customize) so it is shown then just select Start > Administrative Tools
> Computer Management and then click Disk Management in the left hand
column.
The Disk Management command is the same in all versions of Windows so these
instructions apply to Windows 8, Windows 7, Windows Vista, and Windows XP.
Follow these easy steps to start Disk Management from the Command Prompt in
Windows:
Note: Technically, opening Disk Management from the Command Prompt would
require that you open the Command Prompt program. However, running an
executable program like diskmgmt.msc from the search or run box accomplishes
the same thing.
32
▪ Partition a Drive
▪ Format a Drive
▪ Change a Drive's Letter
▪ Shrink a Partition
▪ Extend a Partition
▪ Delete a Partition
▪ Change a Drive's File System
Basic Storage
Basic storage can be accessed by all Microsoft operating systems, as far back as MS-
DOS.
Disks configured as basic storage can be divided into one or more logical disks
called partitions. There are two types of partition; primary and extended.
Primary Partitions
A primary partition is always seen as a single logical drive letter by Windows.
One disk may contain up to four primary partitions.
A primary partition is the only type of partition that operating systems can boot
up from. In order for a primary partition to be used as a bootable partition it
has to be made “active”.
Extended Partitions
An extended partition is not given a drive letter by Windows. It has to be divided
into one or more logical drives. Each of the logical drives within the extended
partition is given a drive letter by Windows.
There can only be one extended partition per disk. If an extended partition exists
on a disk, the maximum number of primary partitions is limited to three.
Extended partitions cannot be made active; that is, they cannot contain an
operating system.
Below are examples of how partitions can be defined on a single basic storage
disk.
Dynamic storage
Volumes are more flexible than partitions because they can use space from one or
more physical disks.
Remember, partitions can use space from only one physical disk.
33
Before simple, spanned or striped volumes are created on a disk, the disk must be
converted from basic to dynamic storage.
A simple volume contains space from one disk. A spanned volume contains space
from two or more disks. A striped volume contains space from two or more disks.
34
▪ On the Assign Drive Letter Or Path page, specify whether you want to assign
a drive letter or path and then click Next. The available options are as
follows:
35
▪ Use the Format Partition page to determine whether and how the volume
should be formatted. If you want to format the volume, choose Format This
Volume With The Following Settings, and then configure the following
options:
36
▪ Click Next, confirm your options, and then click Finish.
37
The Windows 10 Disk Management tool will now show the space configured as a
new partition.
38
Shrink a Partition
Here’s an easy way to shrink a volume to free up space so you can create a new
partition on your disk.
▪ In the field provided in the Shrink dialog box, enter the amount of space by
which to shrink the disk
39
▪ Click Shrink.
▪ Once you have unallocated space, you can use that space to create a new
partition by repeating above partition steps.
40
Directions: Answer the following questions.
1. How many primary partitions per disk are allowed on a Windows 7, 8, 10 basic
disk with no extended partitions?
____________________________________________________________________________
2. If you wanted partitions of both types, how many of each are allowed on a
Windows XP basic disk?
____________________________________________________________________________
_______1. It is the term to describe a disk that contains partitions, such as primary
partitions. This disk is usually formatted with a file system to become a volume for
file storage.
_______4. It consists of more than one physical disk (up to 32). When a disk that is
used by a spanned volume is full, the data moves to the next disk in the array that
comprises the volume.
_______5. It consists of more than one physical disk (up to 32). The data on this
type of volume is allocated evenly to each of the physical disks.
41
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Jimmy needs to detect not functional hardware attached to the computer. By
going to this section, how Jimmy will be able to identify all missing drivers and
manage devices so everything works smoothly anytime?
A. Device Manager
B. Storage
C. Services and Application
D. none of these
3. Which operating system is found most often on large business and scientific
computers?
A. Microsoft Windows
B. Mac OS
C. UNIX
D. Linux
4. A computer program that operates or controls a particular type of device that is
attached to a computer.
A. Device Driver
B. Control Panel
C. System Specification
D. Utility Software
5. Computer software with its source code made available with a license in which
the copyright holder provides the rights to study, change and distribute the
software to anyone and for any purpose.
A. Application
B. System
C. Open Source Software
D. Software License
6. You’ve tried to solve your computer issues by using the system restore and
sadly it didn’t help to resolve the problem. What is the next step for you to do?
A. Reformat your computer
B. Undo the system restore
C. Try to registry edit
D. Click another restore point
42
7. Open source software is software whose source code is available for modification
or enhancement by anyone. Which of the following is an example of open source
software?
A. Windows
B. LINUX
C. MAC
D. Android
9. Which one of the following errors will be handle by the operating system?
A. power failure
B. lack of paper in printer
C. connection failure in the network
D. all of the mentioned
43
44
Assessment
1. A
2. C
3. D
4. A
5. C
6. A
7. B
8. D
9. D
10.B
What I can Do What's More
1. Basic Disk 1. C
2. Dynamic 2. A
Disk 3. B
3. Simple 4. C
volume 5. A
4. Spanned
Volume
5. Stripped
Volume
What's More
What I Know
1. Operating
system 1. A
2. Drivers 2. B
3. BIOS
Module 3
3. D
4. Computer 4. D
5. system 5. B
6. A
7. C
8. D
9. A
10.C Module 1
Module 6
References
Detailed Lesson Plan in Senior high School https://www.slideshare.net/
https://www.slideshare.net/giareysie/detailedlessonplanforseniorhighdemo-
106139026?from_action=save
(Accessed October 19, 2020)
TechTarge. www.searchapparchitecture.techtarget.com
https://searchapparchitecture.techtarget.com/definition/user-interface-
UI#:~:text=The%20user%20interface%20(UI)%20is,an%20application%20or%20
a%20website. (Accessed October 27, 2020)
TechTarge. www.searchapparchitecture.techtarget.com
https://searchenterprisedesktop.techtarget.com/definition/desktop (Accessed
October 27, 2020)
TechTarge. www.searchapparchitecture.techtarget.com
https://searchapparchitecture.techtarget.com/definition/user-interface-
UI#:~:text=The%20user%20interface%20(UI)%20is,an%20application%20or%20
a%20website.
(Accessed October 27, 2020)
TechTarge. www.searchapparchitecture.techtarget.com
https://searchenterprisedesktop.techtarget.com/definition/desktop
(Accessed October 27, 2020)
45
Pearson Learning Solutions (2011). Introduction to Computers and Information
Technology pg 84-87
46
For inquiries or feedback, please write or call:
Telefax: 02-8332-77-64
Email Address: navotas.city@deped.gov.ph