Module 1-Ongoing Maintenance of Computer Systems
Module 1-Ongoing Maintenance of Computer Systems
Overview:
This module will guide you on how to maintain your computer systems. It will begin by
knowing the prior knowledge about maintenance of computer system and defining the
different viruses that can harm our computer system. This module will also ask you to
perform different proper caring of your computer system by doing an activity. After knowing
the different maintenance of computer system you will be guided on the next topic categories
of computer.
Module Objectives:
1. Perform simple maintenance on the computer system: scandisk, defrag, and obtain
virus updates.
2. Aware that individual protection against viruses impacts everyone
3. Define a computer virus and its type of virus.
4. Perform proper ways of cleaning your computer system..
Course Materials:
Pre-Activity
SKILLS TEST
Directions: Listed below are some of the most important skills that you must master in order to
render quality service when you enter the industry of Computer Hardware Servicing. Read
the skills carefully. Write “YES” if you can do the skill and “NO” if not . Feel free to answer
each skill. Write your answers in your notebook.
I can… YES NO
plan and prepare work to ensure occupational health
and safety (OHS) policies and procedures are followed.
Watch
1. Be able to watch this video clip about computer maintenance.
https://www.youtube.com/watch?v=9aFVjvCJcbk
2. What are your significant learning from the video?
3. What are your reflections about the video?
Read
Maintenance Procedures
In preparing maintenance procedure, you also have to consider designing a systematic plan
for both for hardware and software. This saves time, money and frustration and ensures safe
conditions to prevent injury to people and damage to computer equipment.
A computer virus is a computer program that can spread across computers and
networks by making copies of itself, usually without the user’s knowledge.
Viruses can have harmful side-effects. These can range from displaying irritating messages to
deleting all the files on your computer.
A virus program has to be run before it can infect your computer. Viruses have ways of
making sure that this happens. They can attach themselves to other programs or hide in code
that is run automatically when you open certain types of files. You might receive an infected
file on a disk, in an email attachment, or in a download from the internet. As soon as you
launch the file, the virus code runs. Then the virus can copy itself to other files or disks and
make changes on your computer.
1. Trojan horses
Trojan horses are programs that do things that are not described in their specifications.
The user runs what they think is a legitimate program, allowing it to carry out hidden, often
harmful, functions.
Trojan horses are sometimes used as a means of infecting a user with a computer virus.
Backdoor Trojans are programs that allow other computer users to take control of your PC
over the internet.
2. Worms
Worms are similar to viruses but do not need a carrier (like a macro or a boot sector). Worms
simply create exact copies of themselves and use communications between computers to
spread. Many viruses, such as Kakworm (VBS/Kakworm) or Love Bug (VBS/LoveLet-A),
behave like worms and use email to forward themselves to other users.
Boot sector viruses were the first type of virus to appear. They spread by modifying the boot
sector, which contains the program that enables your computer to start up.
When you switch on, the hardware looks for the boot sector program – which is usually on the
hard disk, but can be on floppy or CD – and runs it. This program then loads the rest of the
operating system into memory.
A boot sector virus replaces the original boot sector with its own, modified version (and
usually hides the original somewhere else on the hard disk). When you next start up, the
infected boot sector is used and the virus becomes active.
Parasitic viruses, also known as file viruses, attach themselves to programs (or ‘executables’).
When you start a program infected with a file virus, the virus is launched first. To hide itself,
the virus then runs the original program. The operating system on your computer sees the
virus as part of the program you were trying to run and gives it the same rights. These rights
allow the virus to copy itself, install itself in memory or release its payload. Parasitic viruses
appeared early in virus history but they still pose a real threat. The internet has made it easier
than ever to distribute programs, giving these viruses new opportunities to spread.
What is Anti-Virus?
Anti-virus is a security program you install on your computer or mobile device to protect it
from getting infected by malware. The term “malware” is a catch-all phrase for any type of
malicious software, such as viruses, worms, Trojans and spyware. In fact, the term malware
comes from combining the words malicious and software. If your computer has become
infected by malware, a cyber attacker can capture all of your keystrokes, steal your documents
or use your computer to attack others.
In general, there are two ways anti-virus software identifies malware: signature detection and
behavior detection. Signature detection works like the human immune system. It scans your
computer for characteristics or signatures of programs known to be malicious. It does this by
referring to a dictionary of known malware. If something on your computer matches a pattern
in the dictionary, the program attempts to neutralize it. Like the human immune system, the
dictionary approach requires updates, like flu shots, to protect against new strains of malware.
Anti-virus can only protect against what it recognizes as harmful. The problem is that cyber
attackers are developing new malware so fast that anti-virus vendors cannot keep up. As a
result, no matter how recently your anti-virus was updated, there is always some new variant
of malware that can potentially bypass your anti-virus software.
Anti-Virus Tips
1. Obtain anti-virus software only from known, trusted sources and vendors. It is a common
ploy of cyber attackers to distribute fake anti-virus programs that are really malware.
2. Make sure you have the latest version of your anti-virus software installed, that your
annual subscription is paid for and active and that your anti-virus is configured to update
automatically. If your computer has been offline or powered off for a while, your anti-virus
software will need to update itself when you turn it back on or reconnect it to the Internet. Do
not postpone these updates.
Review:
Importance of maintaining computer system. Answer the following essay question below.
Questions Answer
1. What is the importance of protecting our
computer from viruses?
Activity 1.
2.
3.
4.
5.
6.
7.
Activities/Assignments:
Answer the following question.
1. What are the proper ways in cleaning your computer?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Reference
https://www.stcharlessd.org/cms/lib/MO01910164/Centricity/Domain/103/K-
8_Computer_Technology_curriculum_guide_revised%20April%202019.pdf