Illustration 10 Q4W5
Illustration 10 Q4W5
Livelihood Education
Quarter 4 - Module 5:
Performing Safety Procedures in
Maintaining Stored Work
1
Technology and Livelihood Education – Grade 10
Alternative Delivery Mode
Quarter 4 – Module 5: Performing Safety Procedures in Maintaining Stored Work
First Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Content Evaluator :
Language Evaluator :
Layout Evaluator :
Management Team : Gregorio C. Quinto
Rainelda M. Blanco
Agnes R. Bernardo
Joel I. Vasallo
Glenda S. Constantino
Joannarie C. Garcia
Technology and
Livelihood Education
Quarter 4 - Module 5:
Performing Safety Procedures in
Maintaining Stored Work
Introductory Message
This Self-Learning Module (SLM) is prepared so that you, dear learners, can
continue your studies and learn while at home. Activities, questions, directions,
exercises, and discussions are carefully stated for you to understand each lesson.
Each SLM is composed of different parts. Each part shall guide you step-by-step
as you discover and understand the lesson prepared for you.
Pre-tests are provided to measure your prior knowledge on lessons in each SLM.
This will tell you if you need to proceed on completing this module or if you need to
ask your facilitator or your teacher’s assistance for better understanding of the
lesson. At the end of each module, you need to answer the post-test to self-check
your learning. Answer keys are provided for each activity and test. We trust that
you will be honest in using these.
In addition to the material in the main text, Notes to the Teachers are also provided
to our facilitators and parents for strategies and reminders on how they can best
help you on your home-based learning.
Please use this module with care. Do not put unnecessary marks on any part of
this SLM. Use a separate sheet of paper in answering the exercise and tests. Read
the instructions carefully before performing each task.
If you have any questions in using this SLM or any difficulty in answering the tasks
in this module, do not hesitate to consult your teacher or facilitator.
Thank you.
0
This module identifies the safety procedures in maintaining stored work. Activities are
arranged from simple to complex, so you can understand the lesson progressively at
your utmost.
Hi there! Today you are about to discover the safety procedures in assessing
finished work for storage. Before we start, let us first assess your prior understanding about
it.
I. True or False
Directions: Write True if the given statement is correct and False if it is not. Write your
answers on a separate sheet of paper.
1. Before saving your work or any document, make sure you save it in the most suitable
folder.
2. Using dates as filename is not important.
3. Keeping updated versions of your file is important.
4. Deleting previous year files that are not important is necessary.
5. Backup files are not applicable in storing files.
6. Having an antivirus helps you to maintain your computer safety.
7. Weak passwords make your files or account safe.
8. The main use of firewall is to make your desktop at risk.
9. Cloud drive and other storage are very useful in storing files.
10. Proper naming of file helps you to store them properly.
II. Yes or No
Directions: Write Y if the term/s would help your desktop be secured. Meanwhile, write N if
it would not. Write your answers on a separate sheet of paper.
1
That was a great start! Let us continue with your preliminary assessment. This time,
we will recall what you have learned from the previous module.
Directions: Use the word/s in the box to identify the rasterization options described in each
item. Write the letter of the correct answer on a separate sheet of paper.
Impressive! You have just shown that you really understand the previous lesson. To
proceed, kindly answer the next activity.
Directions: Fill in the boxes with missing letters to identify words related to the new lesson.
A clue is provided to help you identify the given words.
1.
Clue: It controls internet traffic coming and leaving from your desktop.
2.
Clue: They are designed to block worms, malware, and Trojan viruses that could
destroy your operating system.
3.
Clue: A combination of capitals, lower-case letters, numbers, and symbols.
4.
Clue: This can keep your data stored safely.
2
5.
Good job! It seems that you already have an idea of the lesson in this module. With
that, let us now proceed with the information that you need to learn.
• Clean up unnecessary files: Delete documents yearly which you do not need anymore
or put them into sensibly named folders. For instance, school and students should
keep all their notes from previous years for future purposes. In this case, create a new
folder with the year when work was done. For example, in your TLE folder, make a
new folder called 2019 TLE files and transfer all your files into that folder.
3
Strategy 2: Backing up your Computer Files
Here are the ways to protect data in your computer, prevent unauthorized persons
to access your files, and avoid accidental or unintended destruction or corruption of data:
1. Implement data protection and security model, including multiple perimeter rings of
defense to counter applicable threats.
2. Include both logical (securing your networks with firewalls, running anti-spyware and
virus detection programs) and physical (restricted access and locks on server,
storage and networking cabinets) security.
3. Know who has physical access to fix and remove data storage.
5. See to it that backup and archives are secured, including the process of performing
backups and recovery along with where and how the data is stored.
4
Data Security Measures
2. Set Up a Firewall
4. Schedule Backups
5
Independent Activity 1
4. Outdated anti-virus software can make your files and desktop safe.
Independent Assessment 1
Directions: Arrange the jumbled letters in the parenthesis to complete the function of
“Strategy 1: Naming Documents and other Computer Files” for an easy access.
Write your answers on a separate sheet of paper.
Keep it in a folder: This would help you (1. ertos) ____________ your work, sort
tasks in every area, and find your files quickly in times of need. Before saving your work or
any document, make sure to save it in the most suitable (2. redlof) ____________.
Add the date: Documents can be located easily when the (3. eelmeifna)
____________ is exactly the date you created the document.
6
Independent Activity 2
Directions: Using the diagram below, distinguish the DO’s and DON’Ts of the safety
procedures in maintaining stored work. See and group the statements in the
box accordingly. Copy the diagram on a separate sheet of paper and write
your answers.
Independent Assessment 2
Directions: Read the following questions below and answer them based on your own
understanding of the lesson presented in this module. Each item will be
graded based on the rubrics shown below. Write your answers on a separate
sheet.
1. How would the given strategies 1-3 in Safety Procedures in Maintaining Stored Work
be useful enough in your desktop and file storing?
2. How important are the ways in securing computer data in maintaining security measures
for your desktop?
Criteria Percentage
Content and focus on topic 25 %
Creativity 30 %
Originality 30 %
Neatness 15 %
Total: 100 %
7
Independent Activity 3
Directions: Match the implications in column A to their data security measures in column
B. Write only the letter of your answers on a separate sheet.
A B
5. It would help you store your work and sort E. Antivirus software
tasks in every area.
Independent Assessment 3
Directions: Identify the given statement about Safety Procedures in Maintaining Stored
Work. Choose from the phrases in the box and write your answer on a separate
paper.
Nice work, you really did well! Let us proceed to summarize the knowledge that you
have attained in this module.
8
Directions: Use the Facebook post template below to express what have you learned from
this module.
Great, what a nice output! You really did well and proved that you have an overall
understanding of the lesson. Now, try to apply what have you learned in this module with
the next activity.
Directions: You are tasked to consolidate pictures and programs annually in celebrating
the Minasa Festival of Bustos, Bulacan. List down the specific safety
procedures in keeping and maintaining your files you will observe.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
9
I. Directions: Fill in the missing word to complete each statement. Write your answers on
your answer sheet.
1. Using external hard drives or _______ can keep your data safe.
3. Another way to protect your desktop against viruses is by setting up a that would
ensure your network.
6. _______ your files using the system and security command located at the Control
Panel.
7. It is a good idea to keep different ______ of the document as you progress and
delete the working versions when you finish.
8. Implement data _______ and security model including multiple perimeter rings of
defense to counter applicable threats.
10. _________ is another way to protect your desktop against viruses is by setting up
that would ensure your network.
II. Directions: Arrange the jumbled letters below to come up with essential words as regards
to the content of the module.
11. REDLOF
12. LAWLEIRF
13. SSOADRWP
14. PUSKACB
15. SAUNTRIVI
You really did a great job! Now let us advance with your final task.
10
Directions: Analyze the following graphic drawings and identify the safety procedures in
maintaining stored work.
1. ____________________ 2. ____________________
3. ____________________ 4. ____________________
5. ____________________
11
12
What I Know Independent Assessment2
1. TRUE (Answers may vary)
2. FALSE
3. TRUE Independent Activity 3
4. TRUE 1. E
5. FALSE 2. D
6. TRUE 3. C
7. FALSE 4. B
8. FALSE 5. A
9. TRUE
10. TRUE Independent Assessment 3
11. Y 1. Protect data from outside attack
12. Y 2. Naming documents and other
13. N computer files
14. N 3. Securing stored computer data
15. Y 4. Backup your computer files
5. Setup firewall
What’s In
1. B What I have learned
2. E (Answers may vary)
3. D
4. C Assessment
5. A 1. Cloud drive
2. Antivirus
3. Firewall
What’s New 4. Password
1. FIREWALL 5. Updated
2. ANTIVIRUS 6. Backup
3. PASSWORD 7. Versions
4. BACKUP 8. Protection
5. SECURE 9. Storing data
10. Suitable folder
Independent Activity 1 11. FOLDER
1. 12. FIREWALL
2. 13. PASSWORD
14. BACKUPS
3. 15. ANTIVIRUS
4.
5. Additional Activity
1. SCHEDULE BACKUPS
Independent Assessment 1 2. PROTECT DATA FROM
1. STORE OUTSIDE ATTACK
2. FOLDER 3. SETUP FIREWALL
3. FILENAME 4. STRONG PASSWORD
4. UPDATED 5. ANTIVIRUS
5. DELETE
Independent Activity 2
PROTECT DATA OUTDATED
FROM OUTSIDE ANTI-VIRUS
ATTACK
ABSENCE OF
BACKUP FOLDERS FOR
COMPUTER FILES
References
A. Books
Avila, RB., Dela Cruz, CF., and Flores, ERR. Illustration 10 Learning Material, 2017, Edited
by Bernardino S. Facun, Ma. Marissa B. Facun and Enrique Rigor P. Flores, Schools
Division of Bulacan.
B. Electronic Sources
Le, alice. 2017 “The 10 Data Security Measures you must take for your business”/
https://www.wimi-teamwork.com/blog/10-data-security-measures/
13