Maintain Your Computer and System
Maintain Your Computer and System
Department of Education
National Capital Region
DIVISION OF CITY SCHOOLS – MANILA
Manila Education Center Arroceros Forest Park
Antonio J. Villegas St. Ermita, Manila
Image credit to: https://www.informationq.com/tag/computer-basics/
Re-designed by: LEONIE B. PALLONES
0
HOW TO USE THIS MODULE
Before starting the module, I want you to set aside other tasks that disturb you
while enjoying the lessons. Read the simple instruction below to successfully enjoy
the objectives of this kit. Have fun!
1. Follow carefully all the contents and instructions indicated in every page on
this module
2. Write on you notebook or any writing pad the concepts about the lessons.
Writing enhances learning that is important to develop and keep in mind.
3. Perform all the provided activities in the module.
4. Let you facilitator/guardian assess your answers.
5. Analyze conceptually the post test and apply what you have learned.
6. Enjoy studying!
Expectations - These are what you will be able to know after completing
the lessons in the module.
Pre-test - This will measure your prior knowledge and the concepts to be
mastered throughout the lesson.
Looking Back - This section will measure what learnings and skills that you
understand from the previous lesson.
Brief Introduction-This section will give you an overview of the lesson.
Activities- These are activities designed to develop critical thinking and
other competencies. This can be done with or without a partner depending
on the nature of the activity.
Remember - This section summarizes the concepts and applications of the
lessons.
Checking your Understanding - It will verify how you learned from the
lesson.
Post-test - This will measure how much you have learned from the entire
module.
1
LESSON 1- COMPUTER MAINTENANCE
EXPECTATIONS:
PRE-TEST
Direction: Read and answer carefully. Encircle the BEST answer from the given
choices.
1. It involves the process of taking care of the computer's physical components.
A. Device Utility Maintenance C. Software Maintenance
B. Hardware Maintenance D. System Maintenance
2. Which tool should be used in cleaning different computer components without
scratching?
A. lint-free cloth C. soft brush
B. paper towel D. soft cloth
3. Which material is used to blow away dust and debris from different computer parts
without touching the components?
A. Air Spray C. Compressed Air
B. Blower D. Vacuum Cleaner
4. It is the modification of a system to correct faults, improve performance, or to adapt
the system to a changed requirement.
A. Device Utility Maintenance C. Software Maintenance
B. Hardware Maintenance D. System Maintenance
5. It is a computer maintenance utility included in Microsoft Windows designed to
free up disk space on a computer's hard drive.
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
6. It is a Windows utility that can check the integrity of your hard disk and can fix
various file system errors.
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
2
7. It is an event or action that could cause a loss or damage of data, hardware,
software and processing capability of the computer.
A. computer security access C. computer security risks
B. computer security process D. computer logic programs
8. It is a software program that infect, damage and disrupts the whole computer
system.
A. Malware C. Virus
B. Trojan horse D. Worms
9. It is a software utility used for scanning and removing viruses from the computer.
A. Anti-virus C. Defragmentation
B. Check disk D. Disk clean up
10. It is the most important things to do to avoid losing valuable data to your computer.
A. always save files on the desktop
B. regularly back-up your files
C. always used permanent storage devices in saving files
D. regularly save your files into temporary devices
________ 1. Aubrey’s computer is connected across the global network which share
different resources online. Which of the following is being described?
A. Internet B. Network C. Server D. Web
________ 2. Anna wants to access the web to search for an answer to her assignment.
Which software program will she used to access the web?
A. ISP B. HTML C. Web Browser D. Web Server
________ 3.To carry out the web search in a systematic way for particular information,
Anna needs to choose ____ to open.
A. Browser B. Hyperlink C. Search engine D. Web page
________ 4. The following are the samples of search engine except one.
A. AltaVista B. Google C. Myntra D. Yahoo
________ 5. Gemma opens the icon of Google Chrome, as she open, the first web
page appears. Which of the following page is being described?
A. Home Page B. Web Browser C. Web Page D. Web Site
3
________ 6. In knowing the name of the company, university or organization that
owns the site, which of these is specifically needed to take a look?
A. Domain Name C. Web Browser
B. Web Address D. World Wide web
________ 7. Joseph wants to save the web page he visited, what should be the
method of saving will he used?
A. use Bookmark C. save the address
B. use the Link D. save the browser
________ 8. The unique address of the web is known as _______.
A. html B. http:// C. url D. www
________ 9. It is a set of rules that defines how web pages transfer on the webs.
A. html B. http:// C. url D. www
________ 10. It is collection of electronics documents that are linked together like a
spider web.
A. html B. http:// C. url D. www
BRIEF INTRODUCTION
Desktops are designed usually with cooling systems (cooling fans) for power
supply and CPU (cooling through ventilation).
It is recommended for the desktop to have a big case (tower) in order for the
components to have as much space as possible for a proper cooling. In addition, you
can change your standard CPU fan with a more advanced one. This will create a better
airflow and it will efficiently cool the CPU heat.
4
Another key component of your computer is the Random Access Memory
(RAM), which also needs to be cooled. This can be done using heat spreaders (from
aluminum or copper) or ram fans. This way the heat is dissipated and allows the
memory to function efficiently.
The hard drive can be cooled also using hard drive fans depending on the fans
type they can be mounted on the hard drive.
Verify what kind of system is used to cool your video card. Often its use a heat
conductive metal and above is a fan which helps increase cooling. Even if your card
has a silent fan you should change the fan with a better one to assure a proper cooling.
All cooling gathers air in the case and the power supply fan will take it out. It
is recommended to add an additional fan on the case to bring cool air inside the case
to assure proper air flow.
Note:
Before adding cooling devices to your system, verify if your power supply can
sustain the needed power. If the power supply can't provide enough energy to all
components it might shut down like a safety measure.
Cooling system accumulates dust and this can cause the cooling air flow to be
disrupted and components to overheat. Spray with compressed air to clean it out.
Laptops through their design have a cooling system which was tested by their
manufacturer but can also improve it by purchasing a cooling pad. Usually for most
laptops the cooling vents are situated at the bottom of the laptop. Bottom vents will
draw cool air into the system and side or rear vents will blow the air out. Adding the
pad, which has one or more fans incorporated, increases air flow and helps it to cool
faster and better. If you uses Mac book you don't need a pad because his vents are
situated behind the keyboard.
Take your battery out when your laptop is plugged into AC power. The reason
why we recommend this procedure is because batteries are designed with a defined
number of charges-discharges cycles and by using less cycle possible that you
prolong your battery’s life. Also during the charging –discharging cycles the battery
dissipates heat. By removing the battery you remove another heat source of your
laptop.
When using your battery keep in mind to use a pad to cool your battery and to
maintain it at standard temperature.
Your computer's position in room is also important. Avoid positioning your
computer to direct sunlight. The heat generated by the sun will heat the computer's
case or LCD screen. It's a known fact that prolonged sun exposure will cause
degradation to your plastic components. Avoid also to position it in dusty and high
transit areas. If they are placed in these areas, verify frequently your computer for dust.
Avoid keeping your computer in unused rooms with low temperatures. This
environment facilitates the condensation effect.
Computer Transportation
There are some easy steps to follow if you are thinking to move your computer
from one location to another:
1. Pack your computer using the original packing kit.
5
2. Secure the box with padding and fill in any empty spaces with bubble wrap.
3. If you own a laptop just put in your laptop case. Nowadays laptop cases/bags have a
good cushioning which protects laptop against all sort of harmful interventions or
accidents.
4. If you feel that your computer wasn't transported properly and water got into the case
or laptop, take out the battery; for computer's, open the case and position the case or
laptop in a position to evacuate water and keep it at rooms temperature at least for 12
hours to dry out . Don't turn on the computer during that time. Avoid speeding the dry
out process by using your hairdryer as this will cause static problems.
5. Even if the computer was transported correctly, leave at least 30 minutes at
room's temperature before you turn it on in the new location.
Prevention and Maintaining Methods
1. Use lightning protective electrical outlet in combination with Uninterruptable Power
Supply (UPS). The UPS will assure the quality of electrical power and will prevent
loss of data during a power outage. It will also provide you enough time to save any
files you were working on. Another advantage of the UPS is that it protects your
computer from shutting down improperly and it will take in any electrical socks.
Electrical socks usually damage your system components, mainly those with electrical
motors like Hard Drive and CD-ROM.
For laptops, data lost can be avoided during a blackout if the battery is in.
2. Keep your monitor clean by using lint-free cloth with special cleaning solution.
https://computerstepbystep.com/computer-maintanence.html#Periodical_computer_maintenance
System Maintenance
https://www.techwalla.com/articles/what-is-computer-hardware-maintenance
Hard disks can be divided in multiple storage units also called partitions. This
process is required to separate operating system and programs files from work files.
During windows installation, you will need to determine the size of the hard
disk partition on which the operating system will be installed. The amount dedicated
to the system drive should be at least the doubled amount of your operating system
space requirements. If you plan to add more applications and features, estimate an
average of needed space and added it to the above amount. You need also to add
6
a few more GB as a precaution for additional components, future service packs
and virtual memory. The basic principle is to allow considerably more disk space than
the minimum.
Benefits of Managing Hard Drive
1. Data Safety - by saving your work files or other important files to other partitions
makes the recovery from a system.
2. Best System Performance - by saving your files to other partitions the system has
a constant free space amount at its disposal.
3. Increased Speed Accessing Files - by creating multiple partitions the speed of
accessing files is considerably increased (it takes longer to read from 1 MFT (master
file table) of one hard disk partition than from smaller MFTs of smaller partitions)
4. Recoverable Data – if one drive gets corrupted the other drives remain intact. It is
also related to disk space is the maintenance of your desktop files
All files that are stored on desktop are really saved in your account profile which
is located on your system drive. Most people save their data on desktop from
convenience reasons. However, this causes your system partition to fill up and
eventually to slow down your computer. Lack of free space affects your virtual memory
and your data safety. When the system is running out of free space it will show a
balloon message with “Low disk space” with the possibility to start a disk cleanup.
5. Keep your computer protected and up to date - computer's health is very
important. Various steps must be taken prior to use to assure best protection and
functionality and to prevent malicious software to put the computer at risk:
a. Start Installing All Offered Windows Updates
Windows update is a service provided by Microsoft which facilitates patching
your system with latest security and error fixes. Security updates or critical updates
keep your computer safe by eliminating any known system vulnerabilities. Through
the same process are also provided service packs.
Windows update scans your system, hardware and software; it compares it
against a database and offers all necessary updates for your system. It is a great
and easy tool to update the system. During windows update installation, important
files are modified and added to the system. If the process stopped by various
reasons it can damage system files or prevent them to install, making your system
unstable or unresponsive. It is recommended avoiding performing any tasks during
windows update process, especially during service pack installation.
Windows service pack – it incorporates a collection of updates, fixes and
enhancements in one single package.
Security update - system updates and service packs are being issued
constantly and you'll be notice when they are ready for your system. Windows update
against any security threats.
b. Protect your computer against malicious software by installing a
Security.Software
Before going online protect your computer with security software (firewall and
antivirus). You can choose a free software or a 30 day free trial version. After various
tests you can decide which software you would like to keep protecting your system.
7
Don't make the mistake to install more than one security software. It will only slow
down your computer and internet browsing as your traffic will pass through more
than one assured filter. If one of the security software tries to block a malicious file
the secondary software can detect it also, ending up conflicting one with each other.
c. Check if all installed drivers are functioning properly.
Usually when you buy a computer, desktop or laptop, you receive also a couple
of CD’s containing your system's drivers and your windows installation disk. Some
laptops come with recovery CD’s which already have the drivers incorporated and you
don't have to install them one by one, the setup is doing that for you.
In case you lose these CD’s or you want to install a different operating system then
the one preinstalled. Each manufacturer has their own website from where drivers
can be downloaded. The general steps will be accessing manufacturer's site, look for
the support/drivers area, type your hardware name or laptop type, choose your
operating system edition and you'll be provided with the proper download link.
Why do we need to go through these steps?
A driver is software that controls how your hardware functions. The driver is like
a translator between your hardware device and your system software. The operating
system has included a tool which shows all hardware components. This tool is called
Device Manager. It can be accessed by right clicking on My Computer
and choosing Manage, then Device Manager. You can view all hardware devices by
clicking on the + sign.
The good thing is that device manager alerts you about any device or driver
issues, by displaying a black/exclamation mark '!' on a yellow field, a red 'x' or a blue
'I' on a white field.
Periodic Computer Maintenance
The operating system's purpose is to interact with the user. One of his
functionality is to anticipate user’s needs and use various methods to recover in case
of system failure. To achieve this, the operating system during his daily functioning,
collects and stores important data. He uses different methods for different actions. For
Browsing it saves all visited web pages. The purpose is, if you want to access them
again, they will load faster. If major changes take place, like a driver installation, the
system creates a system restore point. In case you experience issues after this action,
you have the option to restore to a previous time. The variety of today's programs can
create various problems and let’s not forget about malicious software which was
specially created to destabilize your operating system. All these factors put together
affect your overall computer performance.
To gain back your system performance we recommend erasing certain files to
free disk space, checking system's files and partition to improve system's reliability,
analyzing and reducing disk fragmentation to optimize disk space.
Increase System's Performance
The pc tune-up procedure is intended to increase system's performance. All
presented methods are easy to follow and prevent your system to run slow, freeze or
8
crash. To improve your system performance you can stop services you usually don't
use.
https://computerstepbystep.com/computer-maintanence.html#Periodical_computer_maintenance
Check Disk (CHKDSK) is a Windows utility that can check the integrity of your
hard disk and can fix various file system errors.
It’s recommended to use this utility when your computer shows various boot errors.
The check disk utility can be run if you need to fix for the following errors:
0x00000024
Various blue screen of death errors
NTDETECT failed
Fatal error reading boot.ini
NTOSKRNL.EXE is missing or corrupt
0x0000007B
0xc0000001 on a Windows Vista computer
0xc000014C on a Windows 8 computer and others
The check disk utility can repair problems such as:
bad sectors
lost clusters
cross-linked files
directory errors
COLLABORATIVE ACTIVITIES
A. School Activity
Direction: Perform the following by choosing the preferred Operating System with the
supervision of the teacher.
1. Disk Clean-Up
2. Check Disk
B. Home Activity
Direction: Perform the following by choosing the preferred Operating System with
the guidance of the teacher-parent at home then, take pictures/videos to record the
activity conducted.
1. Disk Clean-Up
2. Check Disk
A. Disk Clean-up
Run Disk Clean-Up in Windows Vista and Windows 7
Run using My Computer
To open Disk Cleanup on a Windows Vista or Windows 7 computer, follow these
steps:
9
1.Click Start
2.Go to All Programs > Accessories > System Tools
3.Click Disk Cleanup
4.Choose what type of files and folders to delete at the Files to delete section
5.Click OK
6.To delete system files that are no longer needed, click Clean up system
files. You may be
prompted by UAC (User Account Control) to confirm the action.
7. Click Delete Files
To free more space, go to the More options tab:
Click Clean up at the Programs and Features section to remove program files
that are no longer needed
Click Clean up at the System Restore and Shadow Copies section to remove
restore points, except the last one
Run from Command Prompt
To open Disk Cleanup via Command Prompt (command line) on a Windows Vista or
Windows 7:
1. Open Command Prompt
2. Type cleanmgr
3. Press Enter
B. Check Disk
CHKDSK in Windows 7
The steps to run this utility in Windows 7 are similar to those of Windows Vista.
From Command Prompt
If you can’t boot into Windows 7 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 7 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs or USBs.
If you can boot into Windows 7, run the utility from Command Prompt directly:
10
1. Click Start
3. Right-click on cmd.exe
9. If you receive the “Chkdsk cannot run because the volume is in use by another
process.” message, type Y to restart the computer and let the utility to run a
scan at the next boot of your PC
10. After you typed Y, close the Command Prompt
11. Restart the computer by going to Start > Shutdown > Restart
12. At the next boot, the check disk utility will automatically run a scan
From My Computer
If you can’t boot into Windows 7 to run chkdsk, download Easy Recovery
Essentials – the recovery disk for Windows 7 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs or USBs.
The check disk utility can also be ran from My Computer to check for errors
on your hard disk.
To do so, follow these instructions:
1. Right-click on the Start icon
2. Click Open Windows Explorer
3. On the left side of the window, click Computer
4. At the Hard Disk Drives section, right-click on the volume you want to check
for errors
5. Click Properties
6. Go to the Tools Tab
7. At the Error-checking section click Check now
11
8. You can now run the check disk utility: select Scan for and attempt recovery
of bad sectors to let the utility attempt to repair any hard drive errors found
9. Click Start
If the volume you want to check is in use, e.g. C:/ where Windows Vista is
installed, you may receive the following error message:
Windows can't check the disk while it's in use
Do you want to check for hard disk errors the next time you start your
computer?
Schedule disk check | Cancel
12
5. Click Next
8. Press Enter
CHKDSK in Windows 10
Windows 10 users can run this utility by choosing any of the following methods:
From Command Prompt
If you can’t boot into Windows 10 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs or USBs.
To run it from Command Prompt, here are the instructions:
1. Log into Windows 10
2. Press the Windows key to open the Start Menu
3. Select Search
4. Type-in cmd
Right-click on Command Prompt from the search results list.
5. Click Run as administrator
6. Log in as an Administrator
7. When Command Prompt launches, type the command: chkdsk C: /f /r /x
The parameters for this command are: /f option will attempt to fix any found
errors /r option will locate for bad sectors and recovery any readable
information /x option will force the volume you’re about to check to be dismounted
before the utility begins a scan If the C: drive is in use, type Y to run a scan at your
PC’s next restart. If so, exit Command Prompt and restart the computer.
From My Computer
If you can’t boot into Windows 10 to run chkdsk, download Easy Recovery
Essentials – our recovery disk for Windows 10 – and run Automated Repair or
Command Prompt directly. You can burn EasyRE on CDs, DVDs or USBs.
To run the check disk utility from Computer (My Computer), follow these steps:
1. Boot into Windows 10
2. Double-click on Computer (My Computer) to open it
3. Select the drive you want to run a check on, e.g. C:\
4. Right-click on the drive
5. Click Properties
6. Go to the Tools tab
7. Select Check, at the Error checking section
8. If you receive the following message, click Scan drive to begin the scan:
13
You don't need to scan this drive we haven't found any errors on this drive. You
can still scan the drive for errors if you want. Scan Drive
9. You can keep using the drive during the scan. If errors are found, you can
decide if you want to fix them. Depending on the results of this scan, the utility
will report the results:
If no errors were found, you’ll see this message:
Your drive was successfully scanned Windows successfully scanned the
drive. No errors were found.
If errors were found, you’ll see this message instead:
Restart your computer to repair file system. You can restart right away or
schedule the error fixing on next restart.
From the Installation Disc
If you don’t have the installation disc to run chkdsk, download Easy
Recovery Essentials – our recovery disk for Windows 10 – and run Automated
Repair or Command Prompt directly. You can burn EasyRE on CDs, DVDs or
USBs.
If you can’t boot into Windows 10 to run Command Prompt, you can use the
original Windows 10 installation disc to run Command Prompt from there.
To do so, follow these instructions:
1. Insert the installation disc
2. Restart your computer
3. Press any key to boot from the disc, at the “Press any key to boot from
CD or DVD…” message
4. Choose your keyboard layout
5. Select your language, time and a keyboard method
6. Click Next
7. Click Repair your computer
At the Choose an option screen, click Troubleshoot
14
The mandatory requirement of this utility is the volume you’re about to check must
not be locked. If a volume you’re about to scan is locked, you’ll receive this
message:
Chkdsk cannot run because the volume is in use by another process. Would
you like to schedule this volume to be checked the next time the system
restarts? (Y/N)
If so, type Y and press Enter to perform a scan at the next boot of your system.
Download chkdsk
chkdsk can’t be downloaded as it’s a command available with Windows. You
can use the original installation disc to run the utility tool.
You can download Easy Recovery Essentials and open Command Prompt to
run specific chkdsk commands:
You can burn Easy Recovery Essentials to CDs, DVDs or USBs and run
Command Prompt.
Troubleshooting
If you receive the “Errors found. CHKDSK cannot continue in read-only mode.”
error message after running a check disk command, make sure you run the
command with the /r parameter: chkdsk /f
If the disk check utility must be ran on another volume, update the command
with the letter of the drive you want to run a scan for: chkdsk D: /f
Cannot run because the volume is in the use by another process
If you receive this error message when running the tool: Chkdsk cannot run
because the volume is in the use by another process. Would you like to
schedule this volume to be checked the next time the system restarts.
You need to type Y to make sure the utility runs at the next boot. If so, type Y ,
restart the computer and let the tool to perform the scan.
Cannot lock current drive
If the check disk utility shows the “Cannot lock current drive.” error message,
make sure the command you’re performing has the /r option: chkdsk /r
If this doesn’t work, try disabling System Restore for the entire session you’re
trying to run a scan and other protection software, such as: antivirus, firewall,
spyware etc.
Another alternative command is: chkdsk C: /f /r /x
Stop “chkdsk” on Every Boot
If the utility runs a scan at every boot without stopping, you can try a few
solutions.
Before you follow the instructions below, make sure you let the scan to be 100%
completed and then restart your computer.
If the check disk runs again, even if the previous scan was 100% complete,
continue with the steps below.
Fix #1: Check if there is a scheduled scan. To do so, follow these steps:
1. Open Command Prompt
2. Type chkntfs c:, where c: is the letter of the drive you ran a check
15
3. Press Enter
4. If the message is the following, then a check scan is scheduled on the c: drive:
The type of file system is NTFS. Chkdsk has been scheduled manually to run
on next reboot on volume C:.
5. If there isn’t any scheduled scan, the message will be:
The type of the file system is NTFS. C: is not dirty.
Fix #2: Another option to fix this issue is to open the Registry Editor:
1. Boot into Windows
2. Open the Registry Editor
3. Go to this key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session
Manager
4. At the BootExecute key, check the value.If the value is autocheck autochk * /.,
you need to change it to autocheck autochk *
chkdsk won’t finish
If the utility won’t finish a scan, make sure you run the command with
the /r parameter, like this: chkdsk /r
chkdsk won’t run at startup
If the check disk won’t run a scan at startup after being scheduled to do so,
follow any of the following fixes.
Fix #1: Check the BootExecute key in the Registry Editor:
1. Open Registry Editor
2. Find this key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session
Manager key
3. Check the value for the BootExecute key.If the value is autocheck autochk *
/., you need to change it to autocheck autochk *
Fix #2: Run sfc
You can also run the sfc /scannow command and then run chkdsk /r again:
1. Open Command Prompt
2. Type the command: sfc /scannow
3. Press Enter
4. After the sfc process is complete, run the check disk utility.
https://neosmart.net/wiki/chkdsk/
REMEMBER
17
LOOKING BACK TO YOUR LESSON
Direction: Fill in the circles with the corresponding needed data in maintaining
computer hardware and system.
Do’s
Do’s Don’ts
Don’ts
BRIEF INTRODUCTION
FILE MAINTENANCE
- It is pertaining to the routine changes, updates, copying, moving, or deleting
of files on a computer. It is performed on computers or servers that are serving a vast
amount of files.
https://www.computerhope.com/jargon/f/filemain.htm
BACKING UP FILES
- It is the process of duplicating files and programs into computer.
The Importance of Backing Up Files
It is very important to do regular backups to prevent the lost of data. Software
can be reinstalled but your data could quite possibly be lost. There are various causes
for data loss such as machine breakdown, virus, power outage, software upgrades,
fire, flood and human error.
18
Backup – a duplicate copy of a file, program, folder or disk used if the original is
damaged, corrupt or lost.
Restore – to copy the backed up version of information back to its original location.
Backup Media – can be another computer, CD(s), DVD(s) or any other recordable
media for computers.
CDs can hold 650-800mb
DVDs can hold 4.7gb
External hard drive can hold various amounts of information. How much will depend
on the size of drive you have.
Full Backup – backing up everything on your computer. It includes data, software
and operating system.
Incremental Backup – it is a backup of only what has changed since the last backup.
Reasons for Backing Up Files
The files on your computer are very fragile. They can be destroyed or damaged
by a software malfunction, viruses, worms, Trojans and the biggest cause of lost files,
the operator (that would be you). Ever accidentally deleted a file, not saved your
changes, lost a disk or been playing around with something new and broke your
project.
19
1. Click Start > Computer (Windows 7) or
Start > File Explorer > This PC (Windows 10).
2. Right-click your main hard drive (usually the C:
drive) and select Properties.
3. Click the Disk Cleanup button and you’ll see a
list of items that can be removed, including
temporary files and more.
4. For even more options, click Clean up system
files. Tick the categories you want to remove,
then click OK > Delete Files.
Remove Old Download Files
To get rid of downloads, open the Downloads folder (on the left in Computer/File
Explorer). This is Windows’ default storage location, but
you may also have downloads on your desktop.
Ransomware
- it is a type of malicious software that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid while some simple ransomware
may lock the system in a way that is not difficult for a knowledgeable person to reverse,
more advanced malware uses a technique called cryptoviral extortion, which encrypts
the victim's files, making them inaccessible, and demands a ransom payment to
decrypt them.
20
Viruses
- computer virus is a type of malware that propagates by inserting a copy of
itself into and becoming part of another program. It spreads from one computer to
another, leaving infections as it travels. Viruses can range in severity from causing
mildly annoying effects to damaging data or software and causing denial-of-service
(DoS) conditions.
Almost all viruses are attached to an executable file, which means the virus
may exist on a system but will not be active or able to spread until a user runs or opens
the malicious host file or program. When the host code is executed, the viral code is
executed as well. Normally, the host program keeps functioning after it is infected by
the virus. However, some viruses overwrite other programs with copies of themselves,
which destroys the host program altogether. Viruses spread when the software or
document they are attached to is transferred from one computer to another using the
network, a disk, file sharing, or infected email attachments.
Worms
- Computer worms are similar to viruses in that they replicate functional copies
of themselves and can cause the same type of damage. In contrast to viruses, which
require the spreading of an infected host file, worms are standalone software and do
not require a host program or human help to propagate. To spread, worms either
exploit vulnerability on the target system or use some kind of social engineering to
trick users into executing them. A worm enters a computer through a vulnerability in
the system and takes advantage of file-transport or information-transport features on
the system, allowing it to travel unaided.
Trojans
- it is another type of malware named after the wooden horse that the Greeks
used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are
typically tricked into loading and executing it on their systems. After it is activated, it
can achieve any number of attacks on the host, from irritating the user (popping up
windows or changing desktops) to damaging the host (deleting files, stealing data, or
activating and spreading other malware, such as viruses). Trojans are also known to
create backdoors to give malicious users access to the system. Unlike viruses and
worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Trojans must spread through user interaction such as opening an email attachment or
downloading and running a file from the Internet.
Bots
- "Bot" is derived from the word "robot" and is an automated process that
interacts with other network services. Bots often automate tasks and provide
information or services that would otherwise be conducted by a human being. A typical
use of bots is to gather information, such as web crawlers, or interact automatically
with Instant Messaging (IM), Internet Relay Chat (IRC), or other web interfaces. They
may also be used to interact dynamically with websites.
https://tools.cisco.com/security/center/resources/virus_differences#3
21
UPDATING ANTI-VIRUS
Antivirus software is a type of program designed and developed to protect
computers from malware like viruses, computer worms, Trojan horse, spyware,
botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and
remove viruses from your computer. The prime objective of any antivirus program is
to protect computers and remove viruses once detected.
Most antivirus programs incorporate both automated and manual filtering
abilities. The instant scanning option may check files - downloaded from the Internet,
discs that are embedded into the PC, and files that are made by software installers.
The programmed scanning process may likewise check the entire hard drive
on a day-to-day basis. The manual scanning system enables you to check single
documents or even to scan the complete network.
Since new infections are always being made by PC programmers, antivirus
programs must keep an updated database of the most recent malware codes. This
database incorporates a list of "malware definitions" that the antivirus software
implements when filtering records. Since new infections evolve every day, it is
essential to keep your product's infection database up and coming. Luckily, most
antivirus programs naturally refresh the infection database all the time while
antivirus software is basically intended to ensure complete protection for PCs
against virus infections.
Antivirus software may likewise include firewall features, which anticipate
unapproved access to your PC. Utilities that incorporate both antivirus and firewall
abilities are commonly called "Internet Security Suite".
https://antivirus.comodo.com/security/define-antivirus.html
22
Select how the updates are carried out. The choice are
o Automatic update
o Ask when update is downloaded
o Ask when an update is available
o Manual update
https://blog.avast.com/how-to-update-avast-antivirus
ACTIVITY
SCHOOL ACTIVITY
Direction: With the supervision of the teacher, the students will do the backing up of
files using WINDOWS 7 Operating System (OS) by following the given instructions.
HOME ACTIVITY
Direction: With the supervision of the teacher-parents, the student will do the backing
up of files using WINDOWS 7 Operating System (OS) by following the given
instructions. Take pictures/videos while doing the activity.
1. Click Start
2. Go to Control Panel
3. Go to System and Security
4. Click Backup and Restore
For a faster route: click Start, type backup in the search field, and then click on
the Backup and Restore option from the search results list.
5. At the Back up or restore your files screen, click Set up backup
6. Select where you want to save the backup and
click Next
You can save the backup on:
If you plan to save the backup on a DVD, insert the DVD when prompted and
label each DVD in sequence.
If you plan to save the backup on a network, browse to the desired location on
the network. After you type the network credentials, click OK.
23
7. Choose Let Windows choose (recommended)
You can opt for Let me choose and select individual files and folders to backup.
8. Click Next
9. Verify the backup details
10. Click Save settings and run backup
11. The process will now start. This might take some time because your system is
backing up all data on your system.
12. After the process is complete, the Back up or restore your files wizard will
display the size of the backup file.
POST-TEST:
Direction: Read and answer carefully. Encircle the BEST answer from the given
choices.
1. If you keep your computer clean and you avoided the extreme temperature of it,
which process of maintenance is being followed?
A. Device Utility Maintenance C. Software Maintenance
B. Hardware Maintenance D. System Maintenance
24
2. In cleaning different computer components without scratching, which tool should
be used?
A. lint-free cloth C. soft brush
B. paper towel D. soft cloth
3. To blow away dust and debris from different computer parts without touching the
components, which material will be used?
A. Air Spray C. Compressed Air
B. Blower D. Vacuum Cleaner
4. If there is a modification to a system requirement, which maintenance is best
needed?
A. Device Utility Maintenance C. Software Maintenance
B. Hardware Maintenance D. System Maintenance
5. To free up the disk space on a computer's hard drive, which utility maintenance in
Microsoft Windows should be used?
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
6. To check the integrity of your hard disk and fix various file system errors, which
Windows utility should be implemented?
A. Back up C. Defragmentation
B. Check disk D. Disk Clean up
7. An event or action took place and it caused damage to data, hardware, software
and processing capability of the computer. From the statement given, which of the
following is being described?
A. logic programs C. security process
B. security access D. security risks
8. This software program infect, damage and disrupts the whole computer system.
Which of the following is being described?
A. Malware C. Virus
B. Trojan horse D. Worms
9. To protect the whole computer system, which software utility is needed?
A. Anti-virus C. Defragmentation
B. Check disk D. Disk clean up
10. To avoid losing valuable data to your computer, which is the most important thing
to do?
A. always save files on the desktop
B. regularly back-up your files
C. always used permanent storage devices in saving files
D. regularly save your files into temporary devices
11. Which of the following is the component of computer that uses disk clean-up tool
for a better performance?
A. Compact Disc B. Hard Disk C. RAM D. Flash Disk
25
12. To protect both hardware and system components, which of the following utility
is needed?
A. Security Software C. Windows Service Pack
B. Security Update D. Windows update
13. If the hard disk is divided in multiple storage units, which process is being
implemented?
A. divisioning B. partitioning C. segregating D. separating
14. To ensure the quality of electrical power and prevent the loss of data during a
power outage, which equipment will be used?
A. Automatic Voltage Regulator (AVR)
B. Uninterruptable Power Supply Unit (UPS )
C. Power Supply Unit (PSU)
D. Central Processing Unit (CPU)
15. In checking the integrity of hard disk and to fix various file system errors, what
command will be used?
A. chkdsk c: /f /r C. cleanmgr
B. cmd c: /f /r D. clean-up
Online Links of the Post-Test:
26
KEY ANSWERS:
PRE-TEST
1. B – Hardware Maintenance 6. B – Check disk
2. A – Lint-free cloth 7. C - Computer security risks
3. C – Compressed Air 8. A – Malware
4. D – System Maintenance 9. A – Anti-virus
5. D – Disk Clean up 10. B – Regularly back-up your files
ACTIVITY (PART 1)
A. School Activity
B. Home Activity
} Through the use of Performance Rubrics
5. A - chkdsk c: /f /r
27
POST-TEST
1. B – Hardware Maintenance 9. A – Anti-virus
2. A – Lint-free cloth 10. B – Regularly back-up your files
3. C – Compressed Air 11. B – Hard Disk
4. D – System Maintenance 12. A - Security Software
5. D – Disk Clean up 13. B – Partitioning
6. B – Check disk 14. B – Uninterruptable Power Supply Unit (UPS)
7. D - Security risks 15. A – chkdsk c: /f /r
8. A – Malware
Scoring Legend:
15 pts.= 100% 12 pts.=94% 9 pts.=88% 6 pts.= 82% 3 pts. = 76%
14 pts.= 98% 11 pts.=92% 8 pts.=86% 5 pts.= 80% 2 pts. = 74%
13 pts.= 96% 10 pts.=90% 7 pts.=84% 4 pts. = 78% 1 pts. = 72%
28
9pts.= 98
CRITERIA RUBRICS FORLESSON 2 – CHECKING YOUR UNDERSTANDING
CRITERIA 5 4 3 2 1
The students The students The students The students The students
Quality are able to are able to are able to are able to are able to
of Answer understand understand and understand understand answer
with Correct and answer answer the and answer and answer questions but
Usage of the questions the questions the questions has a difficulty
Grammar questions correctly slightly correct slightly correct in constructing
correctly and with a minimal ideas
clearly error in usage
explained grammar
The students The students The students The students The students
Ideas and are able to are able to are able to are able to have the
Explanation explain and explain his/her explain his/her explain his/her hardship to
expand ideas ideas slightly idea explain his/her
his/her ideas thoroughly idea
extremely
Scoring Legend:
10 pts.= 90% 7 pts.=84% 4 pts.=78% 1 pt.=72%
9 pts.= 88% 6 pts.=82% 3 pts.=76% 0 pt.=70%
8 pts.= 86% 5 pts.=80% 2 pts.=74%
References:
9pts.= 98
https://www.techwalla.com/articles/what-is-computer-hardware-maintenance
https://computerstepbystep.com/computer-maintanence.html
https://www.bitpipe.com/tlist/Systems-Maintenance.html
https://en.wikipedia.org/wiki/Disk_Cleanup
https://neosmart.net/wiki/disk-cleanup/
https://www.computerhope.com/jargon/f/filemain.htm
http://www.basiccomputerinformation.ca/backing-up-files/
https://computing.which.co.uk/hc/en-gb/articles/207142759-
Delete-junk-files-from-your-PC
https://antivirus.comodo.com/security/define-antivirus.html
https://blog.avast.com/how-to-update-avast-antivirus
https://neosmart.net/wiki/backup-restore-files-windows-7/
29
ACKNOWLEDGEMENTS
ARIEL D. TOSIO
Education Program Supervisor, TLE-Vocational
AQUILINA TIAMA
Education Program Supervisor
AIDA H. RONDILLA
Chief, Curriculum Implementation Division
LUCKY S. CARPIO
Division EPS in Charge of LRMS
Division ADM Coordinator
30