0% found this document useful (0 votes)
54 views23 pages

How To Use This Competency-Based Learning Material

The document provides instructions for maintaining computer equipment and systems. It outlines procedures for performing disk clean up, clearing internet history and temporary files, running disk defragmenter and scan disk, and removing viruses. Maintaining computer systems includes implementing regular backups, virus checks, and basic file maintenance in accordance with standard operating procedures to ensure security of data. Learners are provided definitions of key terms and step-by-step guides to complete maintenance tasks and protect their computer systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views23 pages

How To Use This Competency-Based Learning Material

The document provides instructions for maintaining computer equipment and systems. It outlines procedures for performing disk clean up, clearing internet history and temporary files, running disk defragmenter and scan disk, and removing viruses. Maintaining computer systems includes implementing regular backups, virus checks, and basic file maintenance in accordance with standard operating procedures to ensure security of data. Learners are provided definitions of key terms and step-by-step guides to complete maintenance tasks and protect their computer systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL

Welcome!
The unit of competency, “Perform Computer Operation” is one of the competencies
of Computer Systems Servicing NC II, a course that comprises the knowledge, skills
and attitudes required for a graduate of this course to possess.
The Module, Performing Computer Operation, contains training materials and
activities for you to complete.
You are required to go through a series of learning activities in order to complete
each learning outcome of the module. In each learning outcome, there are
Information Sheets, Self-Checks and Job Sheets. Follow these activities on your own
and answer the questions that are given. Then, ask for the answer key from your
instructor and check your work honestly. If you have questions, please don’t hesitate
to ask your facilitator for assistance.
This learning material was prepared to help you achieve the required
competency in Performing Computer Operation. This will be the source of
information for you to acquire the knowledge and skills in this particular module
independently and at your own pace with less supervision.
In doing the activities to be completed as required in this module, please be guided
by the following:
Talk to your trainer and agree on how you will both organize in taking this module.
Read through the module carefully.
Work through all information and complete the activities in each section. Read the
information sheets and complete the self-checks provided.
Most probably your trainer will also be your supervisor or manager. He/she is there
to support you and show you the correct way to do things. Ask for help.
Your trainer will tell you about the important things you need to consider when you
are completing the activities and it is important that you listen and take notes.
You will be given plenty of opportunities to ask questions and practice on the job.
Make sure to practice your new skills during regular work shifts. This way you will
improve both your speed and memory and also your confidence.
Use the Self-Check, and Task Sheets at the end of each section to test your own
progress. Use the performance Criteria Checklist or Procedural Checklist used after
the sheet to check your own performance. When you feel confident that you have
sufficient knowledge and skills, ask your instructor to evaluate you. The results of
your assessment will be recorded in your Progress Chart and Accomplishment
Chart.
You need to complete this module before you can perform the next common
competency module.
MODULE CONTENT

QUALIFICATION : Computer Systems Servicing NC II


UNIT OF COMPETENCY : Maintaining computer equipment and systems
MODULE TITLE : Maintain computer equipment and systems
NOMINAL DURATION : 12 hours

MODULE DESCRIPTOR:
This module covers the knowledge, skills, attitudes and values needed to
perform computer operations which include inputting, accessing, producing and
transferring data using the appropriate hardware and software.

LEARNING COMPETENCY:
 Implement procedures for ensuring security of data, including regular backups
and virus checks in accordance with standard operating procedures
 Implement basic file maintenance procedure in line with the standards
operating procedures

ASSESSMENT CRITERIA:
 Procedures for ensuring security of data, including regular back-ups and virus
checks are implemented in accordance with standard operating procedures.
 Basic file maintenance procedures are implemented in line with the standards
operating procedures.

CONTENTS:
 Computer Maintenance
 File Maintenance

CONDITIONS:
Learners must be provided with the following:
 Computer hardware with peripherals
 Appropriate software

LEARNING EXPERIENCES
Learning Activities Special Instructions
Definition of Terms
Read Information Sheet 1.1 Read and understand the
information sheet provided and
browse to internet for more sample
Answer self-check 1.1
guide. Check yourself by answering
the self-check and by performing
Answer task sheet 1.1 the task sheet. You must complete
all the requirements before
proceeding to the next activity.
Reference/s
 https://www.scribd.com/document/458204727/CBLM-Operate-personal-computer-
final2-docx

Definition of Terms

Computer - A computer is a device that executes a program or programs.


CPU - The central processing unit or CPU, also known as the microprocessor or
Operating System –The operating system (OS) is the software that communicates
with the computer
Software – Software is a program application; which provides the computer with
step-by-step instructions to perform a specific task. A computer cannot function
without software.
Monitor - The computer monitor is computer screen or display unit. Types of
monitors are CRTs
Desktop - Is the display on the monitor/screen.
Icon - An icon is a small, clickable picture that opens programs on a computer.
Mouse - Is a hand held device that helps you control the pointer on the
desktop/screen.
Keyboard - Is the device used in typing in the words, numbers and to perform tasks.
CD (Compact Disc) & USB Flash Drive - used for storage of computer files or for
media
File - A file is a block of information includes word documents, pictures, music, etc.
Folder - The folder is a system that helps in organizing the files, programs and
projects on the computer. It is similar to organizing files on a shelf in your cabinet.
Hard Drive - The hard drive is the device where the information is stored.
Hardware - Is the physical pieces of a computer; monitor, keyboard, mouse, printer,
computer unit, scanner, etc.
Browser - The web browser is software that you use to access the internet/World
Wide Web
Networks - A network is a physical or logical construction that connects different
computers together and helps them communicate.

What Do You Need To Know?


Information Sheet 1.1

PROPER DISCUSSION
Maintaining computer equipment and systems

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the computer maintenance and file maintenance procedure
2. Give the importance of computer maintenance and file maintenance
3. Install/Update anti-virus, scan computer for virus, remove unwanted
files, run disk defragmenter, scandisk, Back-up file using windows
utility, remove unnecessary software, Clear internet history &
temporary files.

Introduction
This unit covers the knowledge, skills, attitudes and values needed to perform
computer operations which include inputting, accessing, producing and transferring
data using the appropriate hardware and software.

MAINTAIN COMPUTER SYSTEM

How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk Clean Up

2. Select Drive to Clean Up and click “OK”

3. Place Check Marks in Items to be removed Click “OK”

(If your not sure what you are deleting select the category and then Click “View
Files”)
--------------------------------------------------------------------------------

How to Clear Internet “History”


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click “Clear History”

3. Click “OK”

--------------------------------------------------------------------------------

How to Clear Internet “Temporary Internet” Files

1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click “Delete Files”


3. Put check mark in “Delete all Offline Content”

4. Click “OK”

5. Click “OK” again

--------------------------------------------------------------------------------

How to Run Scan disk and Disk Defragmenter without interruption:

Start Menu>>Run >>In Run Type “MSCONFIG” then click “OK”


MSCONFIG will appear
Select “Selective Startup” then Uncheck
“Load Startup Group Items”
Click “OK”
Click Yes to Restart Computer
Upon Restart
Start Menu>>Settings>>Control Panel>>Dbl Click Display

Select the “Screen Saver” Tab

Change the Screen Saver Drop Menu to “NONE”

Click OK
Then Perform Scan Disk:
Start Menu>>Programs>>Accessories>>System Tools>>Scan Disk

After Scan Disk Perform Disk Defragmenter

Start Menu>>Programs>>Accessories>>System Tools>>Disk Defragmenter


Select which disk to Defragment then click “OK”

After Disk Defragmenter

Start Menu>>Run >>In Run Type “MSCONFIG” then click “OK”


MSCONFIG will appear>>select “Normal Start Up” and Click “OK”
Click Yes to Restart Computer

Upon Restart

Start Menu>>Settings>>Control Panel>>Dbl Click Display


Select the “Screen Saver” Tab>>Change the Screen Saver Drop Menu to your
preferred screen saver

Click OK

Removing viruses from infected machines

Computer Virus

 A virus is a destructive executable program that infects the


other programs in the system and spreads by replicating
itself.

 Such a program is designed to damage the victim’s


computer files.

 Viruses are coded by malicious programmers in a way that they can spread in
the system without one's permission and knowledge.

Different Aspects of Computer Virus


Finder- searches for the new uninfected files and the
Replicator- actually targets these files and infects it by multiplying itself.

How do Virus Affects a System?

 It corrupts files
 It slows down the speed of the computer system
 It causes the system to hang frequently
 It deletes various files

Sources of Virus Infection

A virus can enter the system and infect it through various sources. Some of the
sources are

 Infected CDs, DVDs, pen drives, etc


 E-mail
 Browsing infected sites
 Downloading files from the internet

Steps to Remove Viruses

Removing viruses, though technical, is yet a


very simple process if all the required steps
are properly followed.
The basic steps are:

 Buy or download an antivirus software


 Install the antivirus software
 Update antivirus software with the latest virus definitions
 Do a complete system scan

Methods of Eliminating

Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.

Quarantine – This is done when the virus cannot be easily identified removed from
the file and the removal of virus means the removal of the complete file. In this
method, although the virus is not eliminated, it is rendered inactive by moving the file
into "quarantine" and renaming it.

Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master boot records in
hard disks. They replace the boot record program (which is responsible for loading
the operating system in memory) copying it elsewhere on the disk or overwriting it.
Boot viruses load into memory if the computer tries to read the disk while it is
booting.

Examples: Form, Disk Killer, Michelangelo, and Stone virus


Program viruses: These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver).
These programs are loaded in memory during execution, taking the virus with them.
The virus becomes active in memory, making copies of itself and infecting files on
disk.
Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files
and when the infected program is executed, these viruses infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection. They may
either redirect the disk head to read another sector instead of the one in which they
reside or they may alter the reading of the infected file’s size shown in the directory
listing. size given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so that it
appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects the macros
within a document or template. When you open a word processing or spreadsheet
document, the macro virus is activated and it infects the Normal template.
Examples: DMV, Nuclear, Word Concept.

Antivirus Software

Software designed to cure virus infected machines. An antivirus is a program that


searches for, identifies and removes potential viruses existing in the computer
system

Examples of Anti-virus software

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus

Back up your files

As our world becomes more digitized, the files we store on our computers are
becoming increasingly more important. Instead of keeping handwritten letters in a
shoebox, we correspond with family members using e-mail. If we use digital
cameras, we often keep our photo albums on our computers.

Unfortunately, computers (and particularly the hard disk drives that hold your files)
can fail. Your computer might run for a decade with no problems, or it could fail
tomorrow—there's no way to tell. To make sure you don't lose important files if your
computer stops working, you should back up your computer on a regular basis. The
backup process copies your files to a safe place so that even if your computer fails,
you won't lose them.

Choose backup storage

It doesn't make sense to back up your files to the hard disk drive inside your
computer, because if your computer were to fail, you would also lose your backup.
Instead, you should back up your files to an external hard disk drive or removable
disk drive, such as a CD. If your computer does fail, you can then connect the
external hard disk drive or use the CDs to restore your files to your new or repaired
computer. (This article describes how to back up your files to an external hard disk
drive, which is the easiest way to do a full backup of all your files. If you decide to
use CDs, you'll need to choose which files to back up and then manually insert and
remove CDs as they are filled.)

If you decide to get an external hard disk drive, choose one that is at least as large
as the hard disk drive inside your computer. For example, if your computer has a
100-gigabyte (GB) hard disk drive, choose a 100-GB or larger external hard disk
drive. Then connect the external hard disk drive to your computer. Make a note of
the drive letter (such as E:, F:, or G:) assigned to your new hard disk drive.

With an external hard disk drive, you can manually back up your files, or you can
schedule automatic weekly backups.

Manually back up your files

To back up your files to an external hard disk drive

1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools menu, you
can install it.
2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

4. On the What to Back Up page, click All information on this computer, and
then click Next.

5. On the Backup Type, Destination, and Name page, click Choose a place to
save your backup, and select your external hard disk drive. Then click Next.
6. On the Completing the Backup or Restore Wizard page, click Finish.

7. Windows Backup saves a copy of your files to your external hard disk drive.
When the backup is complete, click Close.

If your computer stops responding, you will be able to restore your files to the state
they were in when you completed the backup. However, any new files you have
created and any changes you have made to existing files since the backup occurred
will not be saved unless you back up your files again. For best results, back up your
files every week or immediately after creating important files, such as after you copy
pictures from your digital camera.

For an additional layer of protection, purchase a second external hard disk drive and
perform another backup of your hard disk drive. Store this external hard disk drive in
a different location, such as at a family member's house, to protect your files from
theft, fire, or natural disasters that might damage both your computer and your
backup.
Schedule backups

If you're busy, you might not have time to manually back up your files every week.
Fortunately, you can schedule backups to occur automatically. This takes a few
minutes to set up, but once you've done so, you'll be protected indefinitely.

To schedule a weekly backup

1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools menu,
you can install it.

2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

4. On the What to Back Up page, click All information on this computer, and
then click Next.
5. On the Backup Type, Destination, and Name page, click Choose a place to
save your backup, and select your external hard disk drive. Then click Next.

6. On the Completing the Backup or Restore Wizard page, click Advanced.

7. On the Type of Backup page, click Next.

8. On the How to Back Up page, click Next.


9. On the Backup Options page, select Replace the existing backups. Then
click Next.

10 On the When to Back Up page, click Later. In the Job name box, type
. Backup. Then click Set Schedule.

11 On the Schedule tab in the Schedule Job dialog box, click the Schedule Task
. list, and then click Weekly.
12 In the Start time box, specify a time of day when your computer will not be used
. for several hours, such as 3:00 AM. In the Schedule Task Weekly area, select
the day of the week you want to back up your files. If you are backing up files
overnight, remember to leave your computer running the night before.

13 Click the Settings tab. Select the Wake the computer to run this task check
. box.

14 Click OK.
.
15 In the Set Account Information dialog box, type your password in both the
. Password and Confirm password fields. Then click OK.

16 On the When to Back Up page, click Next.


.

17 In the Set Account Information dialog box, type your password in both the
. Password and Confirm password fields. Then click OK.

18 In the Account Information Warning dialog box, click OK.


.
19 On the Completing the Backup or Restore Wizard page, click Finish.
.

Your computer will automatically back up your files to your external hard disk drive
every week at the time you specified.

How to change an installed program


Note You cannot use this feature to modify all programs.

You can use this feature to change the installation of Windows Installer-based
programs such as Microsoft Office XP. Windows Installer-based programs include a
Maintenance Mode option. With this option, you can add or remove features, change
the installation state of the program or of individual components, or repair and
restore the installation.

To change a program, follow these steps:

1. Click Start, click Control Panel, and then double-click Add or Remove
Programs.
2. In the Currently installed programs box, click the program that you want to
remove, and then click Change or Change/Remove.
3. Follow the instructions that appear on the screen to make the changes that
you want.

How to remove an installed program


To remove a program that is installed on your computer, follow these steps:

1. Click Start, click Control Panel, and then double-click Add or Remove
Programs.
2. In the Currently installed programs box, click the program that you want to
remove, and then click Remove.
3. If you are prompted to confirm the removal of the program, click Yes.

Troubleshooting

 Make sure that the program that you click in the Add or Remove Programs
tool is the program that you want to remove from your computer. Some
programs may not prompt you to confirm the removal before the program is
removed from the computer.
 You can only remove a program with the Add or Remove Programs tool if the
program is written for Windows. If you do not see the program that you want
to remove in the Currently installed programs box, view the program
documentation for instructions about how to remove it.

How Much Have You Learned?


Self-Check 1.1

Directions: Arrange the procedures to their proper order. . Write your answers on a
separate sheet of paper.

1. How to perform Disk Clean Up:

_____ Start Menu>>Programs>>Accessories>>System Tools>>Disk Clean Up

______ Place Check Marks in Items to be removed Click “OK”

______ Select Drive to Clean Up and click “OK”

2. How to Clear Internet “History”

______ Click “OK”


______ Click “Clear History”

______ Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

3. Perform Scan Disk:

_____ Scan Disk

_____ Start Menu

_____ Accessories

_____ Programs

_____ System Tools

How Do You Apply What You Have Learned?

Show that you learned something by doing this activity.

Task Sheet 1.1

Title : Computer System Maintenance


Performance Objective : Given a working personal computer you are going
external & internal parts, install/Update anti-virus, scan computer for
virus, remove unwanted files, run disk defragmenter, scandisk, Back-
up file using windows utility, remove unnecessary software, Clear
internet history & temporary files.

Supplies, Tools & Equipment :


 Working PC
 Screw driver
 Anti-virus software
 Paint Brush
 Vacuum cleaner
 Printer

Steps/ Procedure:
1. Shut down computer
2. Be sure to unplug it from power source
3. Remove cables and other peripheral devices
4. Clean Inside and outside parts of the system
5. Connect cables and peripherals
6. Start the computer
7. Install/Update anti-virus program
8. Scan computer for viruses
9. Remove unnecessary programs
10. Clear Internet history and temporary files
11. Run disk cleanup
12. Run desk defragment tool
13. Perform scandisk
14. Let your trainer check your work.

Assessment Method:
Demonstration , Performance Criteria checklist

Performance Criteria Checklist 1.1

CRITERIA Yes No
Did you…
Shut down computer
Unplug from power source
Removed cables and other peripheral device
Cleaned Inside and outside parts of the system
Re-connected cables and peripherals
Started the computer
Installed/Updated anti-virus program
Scanned computer for viruses
Removed unnecessary programs
Cleared Internet history and temporary files
Ran disk cleanup
Ran desk defragment tool
Performed scandisk
Followed safety procedures
Answer Key 1.1

1. How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk Clean Up

2. Select Drive to Clean Up and click “OK”

3. Place Check Marks in Items to be removed Click “OK”

2. How to Clear Internet “History”

1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click “Clear History”

3. Click “OK”

3. Perform Scan Disk:

1. Start Menu
2. Programs
3. Accessories
4. System Tools
5. Scan Disk

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy