0% found this document useful (0 votes)
54 views18 pages

Illustration 10 Q4W5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views18 pages

Illustration 10 Q4W5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

10 Technology and

Livelihood Education
Quarter 4 - Module 5:
Performing Safety Procedures in
Maintaining Stored Work

1
Technology and Livelihood Education – Grade 10
Alternative Delivery Mode
Quarter 4 – Module 5: Performing Safety Procedures in Maintaining Stored Work
First Edition, 2021

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education- Region III


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writer/illustrator/Layout Artist/Editor
John Nilcon M. Abolencia
Aldwin S. Santos
Sally B. De Vera
Leilani S. Adaya
Mar Florence DC. Sebastian
Pearl Dianne A. Sarmiento

Content Evaluator :
Language Evaluator :
Layout Evaluator :
Management Team : Gregorio C. Quinto
Rainelda M. Blanco
Agnes R. Bernardo
Joel I. Vasallo
Glenda S. Constantino
Joannarie C. Garcia

Printed in the Philippines by ________________________

Department of Education--- Schools Division of Bulacan

Office Address: Curriculum Implementation Division


Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
E-mail address: lrmdsbulacan@deped.gov.ph
10

Technology and
Livelihood Education
Quarter 4 - Module 5:
Performing Safety Procedures in
Maintaining Stored Work
Introductory Message

This Self-Learning Module (SLM) is prepared so that you, dear learners, can
continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.

Each SLM is composed of different parts. Each part shall guide you step-by-step
as you discover and understand the lesson prepared for you.

Pre-tests are provided to measure your prior knowledge on lessons in each SLM.
This will tell you if you need to proceed on completing this module or if you need to
ask your facilitator or your teacher’s assistance for better understanding of the
lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that
you will be honest in using these.

In addition to the material in the main text, Notes to the Teachers are also provided
to our facilitators and parents for strategies and reminders on how they can best
help you on your home-based learning.

Please use this module with care. Do not put unnecessary marks on any part of
this SLM. Use a separate sheet of paper in answering the exercise and tests. Read
the instructions carefully before performing each task.

If you have any questions in using this SLM or any difficulty in answering the tasks
in this module, do not hesitate to consult your teacher or facilitator.

Thank you.

0
This module identifies the safety procedures in maintaining stored work. Activities are
arranged from simple to complex, so you can understand the lesson progressively at
your utmost.

At the end of this module, you are expected to:

• enumerate safety procedures in maintaining stored work;


• identify the strategies and the importance of implementing safety procedures;
and
• distinguish between the correct and incorrect practices in maintaining stored
work.

Hi there! Today you are about to discover the safety procedures in assessing
finished work for storage. Before we start, let us first assess your prior understanding about
it.

I. True or False

Directions: Write True if the given statement is correct and False if it is not. Write your
answers on a separate sheet of paper.

1. Before saving your work or any document, make sure you save it in the most suitable
folder.
2. Using dates as filename is not important.
3. Keeping updated versions of your file is important.
4. Deleting previous year files that are not important is necessary.
5. Backup files are not applicable in storing files.
6. Having an antivirus helps you to maintain your computer safety.
7. Weak passwords make your files or account safe.
8. The main use of firewall is to make your desktop at risk.
9. Cloud drive and other storage are very useful in storing files.
10. Proper naming of file helps you to store them properly.

II. Yes or No

Directions: Write Y if the term/s would help your desktop be secured. Meanwhile, write N if
it would not. Write your answers on a separate sheet of paper.

11. Strong Password


12. Firewall
13. Absence of anti-virus
14. Use of personal information as password
15. Logical passwords

1
That was a great start! Let us continue with your preliminary assessment. This time,
we will recall what you have learned from the previous module.

Directions: Use the word/s in the box to identify the rasterization options described in each
item. Write the letter of the correct answer on a separate sheet of paper.

A. Add Around Object D. Create Clipping Mask


B. Anti-Alias E. Resolution
C. Background

1. It reduces the appearance of jagged edges in the rasterized image.


2. It determines the number of pixels per inch (ppi) in the rasterized image.
3. It makes the background of the rasterized image appear transparent.
4. It determines how transparent areas of the vector graphic are converted to pixels.
5. It adds a padding or border around the rasterized image.

Impressive! You have just shown that you really understand the previous lesson. To
proceed, kindly answer the next activity.

Directions: Fill in the boxes with missing letters to identify words related to the new lesson.
A clue is provided to help you identify the given words.

1.

Clue: It controls internet traffic coming and leaving from your desktop.

2.
Clue: They are designed to block worms, malware, and Trojan viruses that could
destroy your operating system.

3.
Clue: A combination of capitals, lower-case letters, numbers, and symbols.

4.
Clue: This can keep your data stored safely.

2
5.

Clue: This refers to the safety of your desktop.

Good job! It seems that you already have an idea of the lesson in this module. With
that, let us now proceed with the information that you need to learn.

Safety Procedures in Maintaining Stored Work

Strategies to Keep Safe Computer Files

Strategy 1: Naming Computer Files and Documents

• Keep it in a folder: This would help you store


your work properly. Sort tasks in every area,
and find your files quickly in times of need.

• Add the date: Documents can be located easily


when the filename is exactly the date you
created the document. Start the file name in
reverse order YYMMDD- these will appear
arranged properly in the date order. For
example, the document created on 11/3/2012
can be called as ‘120311 study notes on cell
chapter 5.doc’.

• Keep the updated version of files: In working on a document like a PowerPoint


presentation, an essay or a major project, it is a good idea to keep different versions
of the document as you progress and delete the working versions when you finish.
The easiest way to do this is to change the date whenever you start working on the
document like this: ‘120313PLP.doc.’

• Clean up unnecessary files: Delete documents yearly which you do not need anymore
or put them into sensibly named folders. For instance, school and students should
keep all their notes from previous years for future purposes. In this case, create a new
folder with the year when work was done. For example, in your TLE folder, make a
new folder called 2019 TLE files and transfer all your files into that folder.

3
Strategy 2: Backing up your Computer Files

• Have a backup of your files using the system and


security command located at the Control Panel. If
you don’t know how to set up a backup, seek
assistance from the people who have expertise on
this field of work.

• Store your files with the use of available storage


devices.

Strategy 3: Protecting Data from Outside Attack

• Ensure that you have an updated anti-virus


software.

• To avoid malfunctions, back up your operating


system and programs at least once a month to
restore your system after a virus attack.

• Have an external drive or a flash drive where you


can have a backup of your files somewhere else
safely.

Ways to Secure Stored Computer Data

Here are the ways to protect data in your computer, prevent unauthorized persons
to access your files, and avoid accidental or unintended destruction or corruption of data:

1. Implement data protection and security model, including multiple perimeter rings of
defense to counter applicable threats.

2. Include both logical (securing your networks with firewalls, running anti-spyware and
virus detection programs) and physical (restricted access and locks on server,
storage and networking cabinets) security.

3. Know who has physical access to fix and remove data storage.

4. Avoid letting data security become a bottleneck to productivity, because that is a


sure way to compromise a security initiative.

5. See to it that backup and archives are secured, including the process of performing
backups and recovery along with where and how the data is stored.

4
Data Security Measures

1. Establish Strong Passwords

Putting a combination of capitals, lower-case


letters, numbers, and symbols to create a strong
password is important. The more characters in your
password, the better, but refrain from using personal
information to secure your password.

2. Set Up a Firewall

Another way to protect your desktop against


viruses is by setting up a firewall that would ensure
your network. It is important to consider as they can
control internet traffic coming and leaving from your
desktop.

3. Install Antivirus and Anti-Malware Protection

Antivirus and anti-malware protection software


are indispensable to protecting your data. They are
designed to block worms, malware, and Trojan
viruses that can destroy your operating system.

4. Schedule Backups

Using external hard drives or cloud drives, you


can keep your data safe. Scheduling your backup
weekly can also help you in storing data.

5
Independent Activity 1

) on a separate sheet of paper if the statement is true


Directions: Draw a like symbol (
and a thumbs down symbol ( ) if it is false.

1. Firewall helps our desktop to manage unwanted users.

2. Having a folder that is exclusive for your files is important.

3. Scheduling backups for file safety is unnecessary.

4. Outdated anti-virus software can make your files and desktop safe.

5. Keeping the updated version of your work is important.

Independent Assessment 1

Directions: Arrange the jumbled letters in the parenthesis to complete the function of
“Strategy 1: Naming Documents and other Computer Files” for an easy access.
Write your answers on a separate sheet of paper.

Keep it in a folder: This would help you (1. ertos) ____________ your work, sort
tasks in every area, and find your files quickly in times of need. Before saving your work or
any document, make sure to save it in the most suitable (2. redlof) ____________.

Add the date: Documents can be located easily when the (3. eelmeifna)
____________ is exactly the date you created the document.

Keep the (4.ddeatup) ____________ version of files: In working on a document like


a PowerPoint presentation, an essay or a major project, it is a good idea to keep different
versions of the document as you progress and (5. eeeltd) ____________ the working
versions when you finished.

6
Independent Activity 2

Directions: Using the diagram below, distinguish the DO’s and DON’Ts of the safety
procedures in maintaining stored work. See and group the statements in the
box accordingly. Copy the diagram on a separate sheet of paper and write
your answers.

Protect data from outside attack Keep an Outdated Anti-Virus software


Forget to create folders for files Backup computer files
Add the date in saving files

DO’s Safety DON’Ts


Procedures
in
Maintaining
Stored
Work

Independent Assessment 2

Directions: Read the following questions below and answer them based on your own
understanding of the lesson presented in this module. Each item will be
graded based on the rubrics shown below. Write your answers on a separate
sheet.

1. How would the given strategies 1-3 in Safety Procedures in Maintaining Stored Work
be useful enough in your desktop and file storing?

2. How important are the ways in securing computer data in maintaining security measures
for your desktop?

Criteria Percentage
Content and focus on topic 25 %
Creativity 30 %
Originality 30 %
Neatness 15 %
Total: 100 %

7
Independent Activity 3

Directions: Match the implications in column A to their data security measures in column
B. Write only the letter of your answers on a separate sheet.

A B

1. This application is designed to block A. Folder


worms, malware, and other viruses that
can destroy your OS.
B. Firewall
2. It is a combination of characters with upper
and lower case.
C. Schedule backups
3. This refers to weekly or monthly backup of
files and documents.
D. Strong password
4. This helps to protect files from unwanted
users.

5. It would help you store your work and sort E. Antivirus software
tasks in every area.

Independent Assessment 3

Directions: Identify the given statement about Safety Procedures in Maintaining Stored
Work. Choose from the phrases in the box and write your answer on a separate
paper.

Protect data from outside attack Backup your computer files

Setup firewall Naming documents and other computer files

Securing stored computer data

1. Ensure that you have an up-to-date antivirus software.


2. Save your file to the most suitable folder.
3. Protect your data in a computer to prevent unauthorized persons to access your files.
4. Store your files with the use of available storage devices.
5. Protect your desktop against viruses.

Nice work, you really did well! Let us proceed to summarize the knowledge that you
have attained in this module.

8
Directions: Use the Facebook post template below to express what have you learned from
this module.

Great, what a nice output! You really did well and proved that you have an overall
understanding of the lesson. Now, try to apply what have you learned in this module with
the next activity.

Directions: You are tasked to consolidate pictures and programs annually in celebrating
the Minasa Festival of Bustos, Bulacan. List down the specific safety
procedures in keeping and maintaining your files you will observe.

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

9
I. Directions: Fill in the missing word to complete each statement. Write your answers on
your answer sheet.

1. Using external hard drives or _______ can keep your data safe.

2. ________ and anti-malware are indispensable in protecting your data.

3. Another way to protect your desktop against viruses is by setting up a that would
ensure your network.

4. Put combination of capitals, lower-case letters, numbers, and symbols to create a


strong _________.

5. Ensure that you have an ______ antivirus software.

6. _______ your files using the system and security command located at the Control
Panel.

7. It is a good idea to keep different ______ of the document as you progress and
delete the working versions when you finish.

8. Implement data _______ and security model including multiple perimeter rings of
defense to counter applicable threats.

9. Scheduling your backup weekly can also help you in _____

10. _________ is another way to protect your desktop against viruses is by setting up
that would ensure your network.

II. Directions: Arrange the jumbled letters below to come up with essential words as regards
to the content of the module.

11. REDLOF

12. LAWLEIRF

13. SSOADRWP

14. PUSKACB

15. SAUNTRIVI

You really did a great job! Now let us advance with your final task.

10
Directions: Analyze the following graphic drawings and identify the safety procedures in
maintaining stored work.

1. ____________________ 2. ____________________

3. ____________________ 4. ____________________

5. ____________________

11
12
What I Know Independent Assessment2
1. TRUE (Answers may vary)
2. FALSE
3. TRUE Independent Activity 3
4. TRUE 1. E
5. FALSE 2. D
6. TRUE 3. C
7. FALSE 4. B
8. FALSE 5. A
9. TRUE
10. TRUE Independent Assessment 3
11. Y 1. Protect data from outside attack
12. Y 2. Naming documents and other
13. N computer files
14. N 3. Securing stored computer data
15. Y 4. Backup your computer files
5. Setup firewall
What’s In
1. B What I have learned
2. E (Answers may vary)
3. D
4. C Assessment
5. A 1. Cloud drive
2. Antivirus
3. Firewall
What’s New 4. Password
1. FIREWALL 5. Updated
2. ANTIVIRUS 6. Backup
3. PASSWORD 7. Versions
4. BACKUP 8. Protection
5. SECURE 9. Storing data
10. Suitable folder
Independent Activity 1 11. FOLDER
1.  12. FIREWALL
2.  13. PASSWORD
14. BACKUPS
3.  15. ANTIVIRUS
4. 
5.  Additional Activity
1. SCHEDULE BACKUPS
Independent Assessment 1 2. PROTECT DATA FROM
1. STORE OUTSIDE ATTACK
2. FOLDER 3. SETUP FIREWALL
3. FILENAME 4. STRONG PASSWORD
4. UPDATED 5. ANTIVIRUS
5. DELETE
Independent Activity 2
PROTECT DATA OUTDATED
FROM OUTSIDE ANTI-VIRUS
ATTACK
ABSENCE OF
BACKUP FOLDERS FOR
COMPUTER FILES
References
A. Books

Avila, RB., Dela Cruz, CF., and Flores, ERR. Illustration 10 Learning Material, 2017, Edited
by Bernardino S. Facun, Ma. Marissa B. Facun and Enrique Rigor P. Flores, Schools
Division of Bulacan.

B. Electronic Sources

Le, alice. 2017 “The 10 Data Security Measures you must take for your business”/
https://www.wimi-teamwork.com/blog/10-data-security-measures/

13

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy