Computer Systems Servicing: Quarter 1 - Module 3
Computer Systems Servicing: Quarter 1 - Module 3
Senior High
NOT FOR SALE
School
Computer Systems
Servicing
Quarter 1 - Module 3
Performing Computer Operations
PART 3
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Management Team
Chairperson: Cherry Mae L. Limbaco, PhD, CESO V
Schools Division Superintendent
Computer
Systems
Servicing NC II
Quarter 1 - Module 3
Performing Computer Operations – Part 3
Lesson 1:
Performing Computer Operations-Transfer Files to Other Devices............................
What I Need to Know..................................................................................6
What’s New …. ..........................................................................................6
What Is It....................................................................................................6
What’s More:..............................................................................................8-9
What I Have Learned.................................................................................9-10
What I Can Do............................................................................................11
Lesson 2:
Performing Computer Operations-Using WWW-browser to Locate Information........
What I Need to Know..................................................................................14
What’s New ..............................................................................................14
What Is It....................................................................................................15
What’s More...............................................................................................16
What Is It....................................................................................................17
What I Have Learned................................................................................. 19
What I Can Do............................................................................................19
Lesson 3:
Performing Computer Operations-Computer Basic Maintenance...............................
What I Need to Know..................................................................................20
What’s New: .............................................................................................20
What Is It....................................................................................................23
What I Have Learned................................................................................. 23
What I Can Do............................................................................................24
Completion of this module will help you better understand the succeeding module on
Computer Systems Servicing.
This module consists of three 3 learning outcomes. Each learning outcome contains
learning activities supported by concept notes in the What’s New section. Before you perform
the learning activities, read the What’s New section provided to ascertain to yourself and your
teacher that you have acquired the knowledge necessary to perform the skill portion of the
particular learning outcome.
Upon completion of this module, submit your portfolio to your teacher for the checking
of your achievement of knowledge and skills requirement of this module.
i
What I Need to Know
At the end of this module, the learners shall be able to apply quality standards in computer
systems servicing:
1. Transfer files and data between compatible systems using computer software,
hardware/peripheral devices in accordance with standard operating procedures TLE
2. Establish information requirements for internet search
3. Launch browser
4. Load search engine
5. Enter appropriate search criteria/or URL of site
6. Follow relevant links to locate required information
7. Bookmark useful pages and print as required
8. Implement procedures for ensuring security of data, including regular backups and
virus checks in accordance with standard operating procedures
9. Implement basic file maintenance procedures in line with the standards operating
procedures
ii
Icons of this Module
What I Need to This part contains learning objectives that
Know are set for you to learn as you go along the
module.
iii
What I Know
Assessment: (Pre-Test)
Multiple Choice.
Direction: Select the best answer for each question. Write your answer on a separate sheet of
paper.
iv
v
Lesso Transfer Data to Other
n Devices
1
What’s New
Activity 1 – Identification
Identify five hardware or peripheral devices or software that is use to transfer data.
1. Bluetooth
2.
3.
4.
5.
What Is It
Transfer Files and Data
There are several ways on how to transfer files and data between compatible
systems using computer software, hardware and peripherals devices. You need to know
the following:
1. Files such as documents, pictures, music and email.
2. Peripherals or hardware this is where you can transfer from one device to
another just like computer to flash disk or vice versa, cellphone to cellphone,
computer to computer and so on.
1. Computer to computer
In this way, you will use a local connection or router either wired or wireless
connections where the computers are connected to the same network to meet
and can transfer files to each other. Some are using third party to install and
use in transferring files from each other like Zinstall Winwin. You can download
the software in this website http://www.zinstall.com/download-zinstall-winwin.
What’s More
In this activity, Identify the following images of the hardware/peripherals that is use to
transfer files from the computer system to other peripherals. Choose your answers from the
WORD BANK. Write your answer properly.
WORD BANK
Universal Serial Bus (USB)
External Hard Drive
Share it
Cellphones
Bluetooth
1. Answer: USB
2. Answer: _________
3. Answer:__________
4. Answer: _________
5. Answer: _________
What Is It
In this activity, match the given the logo of the online storage or repository where you
can store and transfer files or data from PC, cellphones or laptops immediately only when
you are connected to the internet. Draw a line to meet the logo and the word.
Google drive
icloud drive
Dropbox
OneDrive
Nextdrive
Table 2. Match the images and name of the online storage use to transfer files
10
2. On the website, you are required to sign in your Gmail account. If you have
not created any account yet, you will first create an account by clicking the
“create new account”.
11
a. Identify five (5) different online storage where you can store and transfer
files online and describe how to transfer the data and files online. Please
be creative in creating blog.
12
Rating Criteria
Creativity - 30%
Total 100%
13
Lesso Using WWW browser to
n locate information
2
In the early age, researching of information is quite hard and challenging. You need
to locate the book and the author name in order to research in the library. Today locating
information is being made easy. In just one click, you can see many options to choose from
This new era of technology, makes everything easy and simply but sometimes it
makes us lazier enough to understand and comprehend because we are bombarded with so
In this topic, you will learn the basic function of World Wide Web browsers to locate
information
What’s New
Activity 6 – Identification of browsers
Identify five browsers that is now available in the World Wide Web. Write your
1. Google Chrome
2.
3.
4.
5.
Table 3. Identification of browsers
14
What Is It
Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide
Web in October 1990. He wrote the first web page editor/browser which is
WorldWideWeb.app and the first server which httpd. The first web page was served on the
It was in the year 1993 that CERN, a European Organization for Nuclear Research,
where Sir Tim was working, to announced the global wave of creativity, collaboration and
innovation.
In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World
o Allows for the retrieval of linked resources from across the web.
15
What’s More
In this activity, Identify the owner or company of the following browser images.
Choose your answers from the WORD BANK. Write your answer properly.
WORD BANK
- Mozilla Corporation
- Pichai Sundararajan (subsidiary
Google LLC)
- Apple company
- Microsoft Company
- Norwegian company (owned by
a Chinese group)A
2. Answer: _________
3. Answer:__________
4. Answer: _________
6. Answer: _________
Table 4. Identification of browsers owners/company
16
What Is It
In this activity, you will determine the steps on researching a certain topic online.
Choose from the WORD BANK the enumerated steps. Write the step number only.
WORD BANK
2. STEP ____
Topic “ICT”
3. STEP ____
4. STEP ____
5. STEP ____
Bookmarked Website
6.STEP ____
18
In this activity, enumerate the different steps in locating information in the World Wide
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
What I Can Do
In this activity, you will locate the information using any browsers with the
topic “What is ICT?”. Answer the following questions.
1. What browser did you use in locating the information? Ans. ______________.
2. What website location did you click? Ans. ________________
3. What copyright year or name of the website? Ans. _____________
4. How did you bookmark the located link of information? Enumerate the two steps
you’ve done.
a. Step 1: ___________________
b. Step 2: ___________________
5. After bookmarking the website, where will you see the bookmarked website?
6. What is the purpose of bookmarking a certain website? State in maximum of 2
sentences only. Answer. __________________________________
__________________________________________________________
19
Lesso
n Basic Computer Maintenance
3
In this worksheet, you will check and write down the current status of your computer
systems before the updates and after the updates with regard to the different area listed
below.
Security
1. Anti-
Spyware
Programs
2. Anti-Virus
Maintenance
1. System
Maintenanc
e
What’s New
Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5) years.
But little did you discover that some six months down the road, your computer is
behaving like a Pentium computer, perpetually flustering you with its choppy images,
frustrating pop-ups and tremendously slow disk access. Gradually, your computer
crashes and all your data is lost on one fine afternoon.
One thing you have probably missed out is20the need for system maintenance. The
basic routine maintenance comprises of the 3 basic processes.
3 Basic Processes
1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
Data Backup
In general, you should back up any work or data that cannot be replaced easily.
Some examples are word processing documents, spreadsheets, databases (for financial
data), customer data, and personal files such as pictures, music files, emails, etc.
Malware refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an undesirable
manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and
many more. When you are infected, you can lose your privacy, confidential data, and
access to your system when software and hardware are damaged. Fortunately, there
are a couple of preventive measures you can take to protect yourself from malware.
21
One thing you can do to scan the file for any virus infection before you attempt
to open it. If the scan shows nothing, it is probably a safe file. But then again, it may be
a new virus yet to be updated in your virus scan. You can either wait and apply the
next virus signature update and perform a second scan or risk it all and open the file.
Disk Maintenance
Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and efficient
your software applications are running. But gradually, it slows down and this bothers
you. What truly causes the decline in performance? You may argue that your disk is
just a couple of months old. This has much to do with the way you operate on your
system.
Try to imagine a big tool bucket filled with gadgets.
Initially, the bucket only contains a few spanners, a hammer and some screws.
So every time you search for a particular item, it is relatively easy to find. But soon as
you keep filling the bucket with all sorts of items and especially when the amount of
items grows, you will discover that you may need more time just to search for a
particular screw head. In such cases, uninstall any unnecessary software and
defragment your disk. Typically, your system performance will decline when the amount
of data in your hard disk starts to grow.
22
What Is It
In this activity, identify the four types of Malware. Write your answer on a
piece of paper.
1. worms____________________ 3. ___________________________
2. _________________________ 4. ___________________________
5.________________________
23
What I Can Do
In this activity, you will determine the step number on how to perform computer disk
maintenance. Given the enumerated steps, write which step number and the complete
description of the steps or procedure on a piece of paper.
STEP # DESCRIPTIONS
At the Drives list, select which drive you want to run Disk Cleanup on
1 Type Disk Cleanup in the Search Bar
Select which files you want to delete
To delete system files that are no longer needed on your computer, click Clean up
system files.
Click Delete files
24
SUMMARY
1. Bluetooth is a wireless technology that allows the exchange of data between different
devices. However it is only on a short distance for the devices to stay connected.
2. Online Storage it is a cloud storage of the files and data especially for back up
purposes. It is for free. Most of the websites allowed limited storage only.
3. External Storage devices come in many forms, both removable and non-
removable. It includes flash drive, floppy disk, hard drive or compact drive.
4. World Wide Web is called as WEB. It is an information system on the Internet which
allows documents or pages to be connected to other documents using hypertext links,
which enable the user to search for information or data by moving from one document to
another.
5. HyperText Markup Language (HTML). This is the markup (formatting) language for the
web.
6. Uniform Resource Identifier (URI). A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.
7. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linked resources from
across the web.
8. Tim Berners-Lee. A British computer scientist and He invented the World Wide Web in
October 1990.
9. Malware refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
10. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's hard drive.
11. Back up It means creating a redundant copy of a data so that in case anything
happens to the original data, you have a spare copy
25
Assessment: (Post-Test)
Multiple Choice
Direction: Select the best answer for each question. Write your answer on a separate sheet of
paper.
1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
5. What is the complete of HTML?
a. Hypertext Transfer Protocol b. Hypertext Trans Protocol c.
Hyperlink Transfer Protocol
6. What is the example of online storage?
a. one drive b.google.com c. twitter
7. It is a wireless technology that allows the exchange of data between different
devices.
a. Wi-Fi b. share it c. Bluetooth
8. The transferring of files is has many ways.
a. True b. False
9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
10. It is an application use to share files between cellphones when only the Bluetooth is
on.
a. Shareit b. OneDrive c. shareme
11. It is a process which you create a copy of your computer files
a. System Update
b. Virus scan
c. Data Backup
d. All of the above
12. What will happen if you avoid computer updates?
a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. Nothing happens
26
13. It is a malicious code in our computer system which infiltrates personal data.
a. Anti-Virus
b. Software
c. Malware
d. All of the above
14. As a computer technician we should maintain our computer systems by
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above
15. A process of computer system which cleans up your disk and improves performance.
a. Malware maintenance
b. Disk maintenance
c. Data maintenance
d. None of the above
16. To avoid data infiltration from viruses you must
a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program
17. It is a type of data backup which takes once a month.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
18. It is a type of data backup which takes every week.
a. System image backup
b. Full File Backup
c. Differential file backup
d. None of the above
19. How often should you run an Anti-virus software?
a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Not at all
20. A type of malware which steals your internet data usage and sensitive information
b. Trojan b. Worm c. Spyware d. Spam
27
Answer Key
1. C
2. B
3. A
4. B
5. A
6. A
7. C
8. A
9. A
10. A
11. C
12. A
13. C
14. D
15. B
16. A
17. A
18. B
19. A
20. C
28
Activity 3 – Meet and Match
1. Next drive
2. Onedrive
3. Dropbox
4. Icloud
5. Google drive
order)
6. Next drive
7. Onedrive
8. Dropbox
9. Icloud
10. Google drive
1. Pichai Sundararajan
(subsidiary Google LLC)
2. Norwegian
company (owned by
a Chinese group)
3. Apple Company
4. Microsoft Company
5. Mozilla Corporation
1. Step 1
2. Step 2
3. Step 4
4. Step 3
5. Step 6
6. Step 5
29
Activity 9 - Steps in Locating
1. Worms
2. Trojan viruses
3. Spyware
4. Adware
5. Ransomware
30
References
Websites:
©2008-2020 World Wide Web Foundation. This work is licensed under a Creative Commons
Attribution 4.0 International Licence https://webfoundation.org/about/vision/history-of-the-
web/
https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-
malware.html#:~:text=Malware%20is%20a%20contraction%20for,spyware%2C%20adware
%2C%20and%20ransomware.
https://neosmart.net/wiki/disk-cleanup/
https://en.wikipedia.org/wiki/Disk_Cleanup
e-chsmodules,
www.coursehero.com,
deped.gov.ph/ComputerSystemServicing module
12
For inquiries and feedback, please write or call: