How To Use This Competency-Based Learning Material
How To Use This Competency-Based Learning Material
Welcome!
The unit of competency, “Perform Computer Operation” is one of the competencies
of Computer Systems Servicing NC II, a course that comprises the knowledge, skills
and attitudes required for a graduate of this course to possess.
The Module, Performing Computer Operation, contains training materials and
activities for you to complete.
You are required to go through a series of learning activities in order to complete
each learning outcome of the module. In each learning outcome, there are
Information Sheets, Self-Checks and Job Sheets. Follow these activities on your own
and answer the questions that are given. Then, ask for the answer key from your
instructor and check your work honestly. If you have questions, please don’t hesitate
to ask your facilitator for assistance.
This learning material was prepared to help you achieve the required
competency in Performing Computer Operation. This will be the source of
information for you to acquire the knowledge and skills in this particular module
independently and at your own pace with less supervision.
In doing the activities to be completed as required in this module, please be guided
by the following:
Talk to your trainer and agree on how you will both organize in taking this module.
Read through the module carefully.
Work through all information and complete the activities in each section. Read the
information sheets and complete the self-checks provided.
Most probably your trainer will also be your supervisor or manager. He/she is there
to support you and show you the correct way to do things. Ask for help.
Your trainer will tell you about the important things you need to consider when you
are completing the activities and it is important that you listen and take notes.
You will be given plenty of opportunities to ask questions and practice on the job.
Make sure to practice your new skills during regular work shifts. This way you will
improve both your speed and memory and also your confidence.
Use the Self-Check, and Task Sheets at the end of each section to test your own
progress. Use the performance Criteria Checklist or Procedural Checklist used after
the sheet to check your own performance. When you feel confident that you have
sufficient knowledge and skills, ask your instructor to evaluate you. The results of
your assessment will be recorded in your Progress Chart and Accomplishment
Chart.
You need to complete this module before you can perform the next common
competency module.
MODULE CONTENT
MODULE DESCRIPTOR:
This module covers the knowledge, skills, attitudes and values needed to
perform computer operations which include inputting, accessing, producing and
transferring data using the appropriate hardware and software.
LEARNING COMPETENCY:
Implement procedures for ensuring security of data, including regular backups
and virus checks in accordance with standard operating procedures
Implement basic file maintenance procedure in line with the standards
operating procedures
ASSESSMENT CRITERIA:
Procedures for ensuring security of data, including regular back-ups and virus
checks are implemented in accordance with standard operating procedures.
Basic file maintenance procedures are implemented in line with the standards
operating procedures.
CONTENTS:
Computer Maintenance
File Maintenance
CONDITIONS:
Learners must be provided with the following:
Computer hardware with peripherals
Appropriate software
LEARNING EXPERIENCES
Learning Activities Special Instructions
Definition of Terms
Read Information Sheet 1.1 Read and understand the
information sheet provided and
browse to internet for more sample
Answer self-check 1.1
guide. Check yourself by answering
the self-check and by performing
Answer task sheet 1.1 the task sheet. You must complete
all the requirements before
proceeding to the next activity.
Reference/s
https://www.scribd.com/document/458204727/CBLM-Operate-personal-computer-
final2-docx
Definition of Terms
PROPER DISCUSSION
Maintaining computer equipment and systems
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the computer maintenance and file maintenance procedure
2. Give the importance of computer maintenance and file maintenance
3. Install/Update anti-virus, scan computer for virus, remove unwanted
files, run disk defragmenter, scandisk, Back-up file using windows
utility, remove unnecessary software, Clear internet history &
temporary files.
Introduction
This unit covers the knowledge, skills, attitudes and values needed to perform
computer operations which include inputting, accessing, producing and transferring
data using the appropriate hardware and software.
(If your not sure what you are deleting select the category and then Click “View
Files”)
--------------------------------------------------------------------------------
3. Click “OK”
--------------------------------------------------------------------------------
4. Click “OK”
--------------------------------------------------------------------------------
Click OK
Then Perform Scan Disk:
Start Menu>>Programs>>Accessories>>System Tools>>Scan Disk
Upon Restart
Click OK
Computer Virus
Viruses are coded by malicious programmers in a way that they can spread in
the system without one's permission and knowledge.
It corrupts files
It slows down the speed of the computer system
It causes the system to hang frequently
It deletes various files
A virus can enter the system and infect it through various sources. Some of the
sources are
Methods of Eliminating
Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.
Quarantine – This is done when the virus cannot be easily identified removed from
the file and the removal of virus means the removal of the complete file. In this
method, although the virus is not eliminated, it is rendered inactive by moving the file
into "quarantine" and renaming it.
Boot viruses: These viruses infect floppy disk boot records or master boot records in
hard disks. They replace the boot record program (which is responsible for loading
the operating system in memory) copying it elsewhere on the disk or overwriting it.
Boot viruses load into memory if the computer tries to read the disk while it is
booting.
Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files
and when the infected program is executed, these viruses infect the boot record.
Stealth viruses: These viruses use certain techniques to avoid detection. They may
either redirect the disk head to read another sector instead of the one in which they
reside or they may alter the reading of the infected file’s size shown in the directory
listing. size given in the directory.
Polymorphic viruses: A virus that can encrypt its code in different ways so that it
appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Macro Viruses: A macro virus is a new type of computer virus that infects the macros
within a document or template. When you open a word processing or spreadsheet
document, the macro virus is activated and it infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software
As our world becomes more digitized, the files we store on our computers are
becoming increasingly more important. Instead of keeping handwritten letters in a
shoebox, we correspond with family members using e-mail. If we use digital
cameras, we often keep our photo albums on our computers.
Unfortunately, computers (and particularly the hard disk drives that hold your files)
can fail. Your computer might run for a decade with no problems, or it could fail
tomorrow—there's no way to tell. To make sure you don't lose important files if your
computer stops working, you should back up your computer on a regular basis. The
backup process copies your files to a safe place so that even if your computer fails,
you won't lose them.
It doesn't make sense to back up your files to the hard disk drive inside your
computer, because if your computer were to fail, you would also lose your backup.
Instead, you should back up your files to an external hard disk drive or removable
disk drive, such as a CD. If your computer does fail, you can then connect the
external hard disk drive or use the CDs to restore your files to your new or repaired
computer. (This article describes how to back up your files to an external hard disk
drive, which is the easiest way to do a full backup of all your files. If you decide to
use CDs, you'll need to choose which files to back up and then manually insert and
remove CDs as they are filled.)
If you decide to get an external hard disk drive, choose one that is at least as large
as the hard disk drive inside your computer. For example, if your computer has a
100-gigabyte (GB) hard disk drive, choose a 100-GB or larger external hard disk
drive. Then connect the external hard disk drive to your computer. Make a note of
the drive letter (such as E:, F:, or G:) assigned to your new hard disk drive.
With an external hard disk drive, you can manually back up your files, or you can
schedule automatic weekly backups.
1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools menu, you
can install it.
2. The Backup or Restore Wizard appears. Click Next.
4. On the What to Back Up page, click All information on this computer, and
then click Next.
5. On the Backup Type, Destination, and Name page, click Choose a place to
save your backup, and select your external hard disk drive. Then click Next.
6. On the Completing the Backup or Restore Wizard page, click Finish.
7. Windows Backup saves a copy of your files to your external hard disk drive.
When the backup is complete, click Close.
If your computer stops responding, you will be able to restore your files to the state
they were in when you completed the backup. However, any new files you have
created and any changes you have made to existing files since the backup occurred
will not be saved unless you back up your files again. For best results, back up your
files every week or immediately after creating important files, such as after you copy
pictures from your digital camera.
For an additional layer of protection, purchase a second external hard disk drive and
perform another backup of your hard disk drive. Store this external hard disk drive in
a different location, such as at a family member's house, to protect your files from
theft, fire, or natural disasters that might damage both your computer and your
backup.
Schedule backups
If you're busy, you might not have time to manually back up your files every week.
Fortunately, you can schedule backups to occur automatically. This takes a few
minutes to set up, but once you've done so, you'll be protected indefinitely.
1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools menu,
you can install it.
4. On the What to Back Up page, click All information on this computer, and
then click Next.
5. On the Backup Type, Destination, and Name page, click Choose a place to
save your backup, and select your external hard disk drive. Then click Next.
10 On the When to Back Up page, click Later. In the Job name box, type
. Backup. Then click Set Schedule.
11 On the Schedule tab in the Schedule Job dialog box, click the Schedule Task
. list, and then click Weekly.
12 In the Start time box, specify a time of day when your computer will not be used
. for several hours, such as 3:00 AM. In the Schedule Task Weekly area, select
the day of the week you want to back up your files. If you are backing up files
overnight, remember to leave your computer running the night before.
13 Click the Settings tab. Select the Wake the computer to run this task check
. box.
14 Click OK.
.
15 In the Set Account Information dialog box, type your password in both the
. Password and Confirm password fields. Then click OK.
17 In the Set Account Information dialog box, type your password in both the
. Password and Confirm password fields. Then click OK.
Your computer will automatically back up your files to your external hard disk drive
every week at the time you specified.
You can use this feature to change the installation of Windows Installer-based
programs such as Microsoft Office XP. Windows Installer-based programs include a
Maintenance Mode option. With this option, you can add or remove features, change
the installation state of the program or of individual components, or repair and
restore the installation.
1. Click Start, click Control Panel, and then double-click Add or Remove
Programs.
2. In the Currently installed programs box, click the program that you want to
remove, and then click Change or Change/Remove.
3. Follow the instructions that appear on the screen to make the changes that
you want.
1. Click Start, click Control Panel, and then double-click Add or Remove
Programs.
2. In the Currently installed programs box, click the program that you want to
remove, and then click Remove.
3. If you are prompted to confirm the removal of the program, click Yes.
Troubleshooting
Make sure that the program that you click in the Add or Remove Programs
tool is the program that you want to remove from your computer. Some
programs may not prompt you to confirm the removal before the program is
removed from the computer.
You can only remove a program with the Add or Remove Programs tool if the
program is written for Windows. If you do not see the program that you want
to remove in the Currently installed programs box, view the program
documentation for instructions about how to remove it.
Directions: Arrange the procedures to their proper order. . Write your answers on a
separate sheet of paper.
_____ Accessories
_____ Programs
Steps/ Procedure:
1. Shut down computer
2. Be sure to unplug it from power source
3. Remove cables and other peripheral devices
4. Clean Inside and outside parts of the system
5. Connect cables and peripherals
6. Start the computer
7. Install/Update anti-virus program
8. Scan computer for viruses
9. Remove unnecessary programs
10. Clear Internet history and temporary files
11. Run disk cleanup
12. Run desk defragment tool
13. Perform scandisk
14. Let your trainer check your work.
Assessment Method:
Demonstration , Performance Criteria checklist
CRITERIA Yes No
Did you…
Shut down computer
Unplug from power source
Removed cables and other peripheral device
Cleaned Inside and outside parts of the system
Re-connected cables and peripherals
Started the computer
Installed/Updated anti-virus program
Scanned computer for viruses
Removed unnecessary programs
Cleared Internet history and temporary files
Ran disk cleanup
Ran desk defragment tool
Performed scandisk
Followed safety procedures
Answer Key 1.1
3. Click “OK”
1. Start Menu
2. Programs
3. Accessories
4. System Tools
5. Scan Disk