Tle CSS G10 Q3
Tle CSS G10 Q3
4
10
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(COMPUTER SYSTEM
SERVICING)
QUARTER 3
S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT-Computer System Servicing) – Grade 10
Alternative Delivery Mode
Quarter 3
Second Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Module 1 ...................................................................... 3
Module 2 ...................................................................... 10
Module 3 ...................................................................... 17
Module 4 ...................................................................... 23
Module 5 ...................................................................... 27
Module 6 ...................................................................... 31
Module 7 ...................................................................... 35
Module 8 ...................................................................... 39
Assessment .................................................................. 44
References .................................................................... 46
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. A way for software developers to fine-tune a product to make it the best it can
be. They offer small, frequent improvements rather than major changes.
A. system software C. software updates
B. programming software D. software upgrade
3. Any ordinary files are automatically relocated on the disk to create the new
unallocated space. What is being described in the sentence?
A. shrink in disk C. formatting
B. disk cleanup D. optimizing Drives
4. This contains the operating system files. There can be up to four per hard drive
and cannot be subdivided into smaller sections.
A. primary partition C. extended partition
B. active partition D. logical drive
5The technician is responsible for applying the most recent updates. Why do you
need to update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware
A6. Malware is the collective name for a number of malicious software variants.
Which is not a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
7. This is a software that gives you the knowledge you need to be able to potentially
repair your own computer.
A. Software Updates Evaluation
B. Antivirus software Scan
C. Diagnostic Software Tools
D. Application software license agreements
1
8. It is a diagnostic software that gives you a quick view of vital information related
to your computer’s hardware.
A. Directory Statistics C. Resource Monitor
B. Antivirus software Scan D. Performance Monitor
9. Which Windows utility can scan disks for bad sectors and tries to repair them?
A. system restore C. disk cleanup
B. optimizing drives service D. check disk
10.__________ is the process that prepares a file system in a partition for files to be
stored.
A. disk cleanup C. arrangement
B. construction D. formatting
2
MODULE 1
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9-12ICCS-IIIa-e31
3
Lesson
SOFTWARE UPDATES
1
We know, updating your PC is a hassle–but it’s essential. New security flaws
are discovered on a regular basis, and most companies are pretty good about issuing
fixes for those flaws as they crop up. Plugging those holes, however, depends
primarily upon you making sure things are appropriately updated. In addition to
fixing security flaws, updates also come in the form of bug fixes and new features,
both of which are also nice to have. We’re going to be talking about how to keep three
major aspects of your PC up to date.
4
Software updates
That’s because software updates address any new-found security issues, fix
recently discovered bugs, and add support for drivers and new hardware. They tweak
and improve the way the program operates, but they don’t fundamentally alter it.
Simply put, software updates modify, fix and alter your current software
program on a regular basis. They’re the software equivalent of keeping your bicycle
oiled. It’s still the same bike, it just runs smoother.
Software updates
Software updates are important to your digital safety and cyber security. The
sooner you update, the sooner you’ll feel confident your device is more secure — until
the next update reminder.
Why are software updates so important? There are a lot of reasons. Here are
5 reasons that show why it’s important to update software regularly.
5
information is valuable to cybercriminals. They can use it to commit crimes in your
name or sell it on the dark web to enable others to commit crimes. If it’s a
ransomware attack, they might encrypt your data. You might have to pay a ransom
for an encryption key to get it back. Or, worse, you might pay a ransom and not get
it back. Updating your software and operating systems helps keep hackers out.
That’s when most bugs are discovered. When that happens, software
developers find ways to fix the problems, and release those fixes as software updates.
Another reason why software updates are important is that they may enhance
some of the program’s features, or even add new features. These are often considered
non-essential updates, but even if they’re not important to your business, it’s still
worthwhile updating, just to ensure that your software is fully compatible with what
clients, customers, and peers are using.
5. Compatibility updates
Keeping your operating system updated is one of the most important steps in
protecting yourself from viruses, malware, and other Internet security threats.
6
Windows
To update Windows, first open the Control Panel. If you don't know where the
Control Panel is, check out this lesson in Windows Basics. In the search bar in the
Control Panel, type update. Under Windows Update, click Check for updates. It may
take a moment for Windows to search for updates. Once it does, if there are any
updates available it will prompt you to install them. It may take a while to install all
the updates. It's safe to leave the computer and do something else while it finishes.
Once it's done, Windows will probably prompt you to restart the computer. If you
need to do anything else after this, Windows will prompt you; otherwise, you're up to
date!
For many apps, regular updates provide new features and stability rather than
security patches, so it isn't necessary to update them as frequently. However, for
more essential software like web browsers and antivirus software, security updates
are just as critical as operating system updates.
Many apps in both mac OS and Windows will automatically check for
updates when you open them. If you installed them through the App Store or
another distribution platform, the program will alert you about updates. For
standalone programs, take time to explore the program's menus and learn how to
run the update process. For example, in Avast! Free Antivirus, there is an Update
page on the Settings screen.
7
Directions: In this activity, you will use the Internet to research about software
updates.
2. List the configuration options available for important updates for the OS.
8
Directions: Research the environmental impact of hardware components such as
processors, motherboards, video cards and hard disks.
2. What are the reasons for upgrading and installing new hardware components?
4. Compare the current and previous versions of Microsoft Windows. What do you
think about the hardware requirements and user reviews?
9
MODULE 2
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
10
Lesson
DISK MANAGEMENT
2
Disk Management is a utility built into different operating systems which
can be used to create, delete, format partitions, assign drive letters, and much
more. Disk Management can also be used to view partitions and their formatted file
systems on the hard drive. The most common way to access Disk Management is
via Computer Management
Disk Management
Disk Management is a Microsoft Windows utility first introduced in Windows
XP as a replacement for the disk command. It enables users to view and manage the
disk drives installed in their computer and the partitions associated with those
drives. As the image below shows, each drive is displayed followed by the layout,
type, file system, status, capacity, free space, % free, and fault tolerance.
11
Figure 1 - Disk Management
https://www.slideshare.net/ArshadQureshi5/disk-management-dm
On the Assign Drive Letter or Path page, specify whether you want to assign a drive
letter or path and then click Next. The available options are as follows:
Use the Format Partition page to determine whether and how the volume should be
formatted. If you want to format the volume, choose Format This Volume with the
Following Settings, and then configure the following options:
Click next, confirm your options, and then click Finish
12
Figure 3 - Disk Management, New Simple Volume
https://www.slideshare.net/ArshadQureshi5/disk-management-dm
The Windows 7 Disk Management tool will now show the space configured as a new
partition.
Here’s an easy way to shrink a volume to free up space so you can create a new
partition on your disk. To shrink a basic volume, follow these steps:
In Disk Management, right-click the volume that you want to shrink, and then
click Shrink Volume
13
Figure 5 - Disk Management
https://www.slideshare.net/ArshadQureshi5/disk-management-dm
In the field provided in the Shrink dialog box, enter the amount of space by which to
shrink the disk. Click Shrink.
When you shrink a partition, any ordinary files are automatically relocated on the
disk to create the new unallocated space. There is no need to reformat the disk to
shrink the partition
14
Directions: Using your smartphone or webcam, record a short video discussing the
use of disk management? Keep your video short with a maximum of 2-3 minutes.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
15
Directions: Answer the following questions below:
16
MODULE 3
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9-12ICCS-IIIa-e31
Lesson
ANTIVIRUS SOFTWARE
3
As a future computer technician, you need to understand computers and
security. Failure to implement proper security procedures can affect users,
computers, and the general public. private information, company secrets, financial
data, computer equipment, and items about national security are placed at risk if
proper security procedures are not followed.
17
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before they
infect a computer. Antivirus software becomes outdated quickly, however. The
technician is responsible for applying the most recent updates, patches, and virus
definitions as part of a regular maintenance schedule. Many organizations establish
a written security policy stating that employees are not permitted to install any
software that is not provided by the company. Organizations also make employees
aware of the dangers of opening e-mail attachments that may contain a virus or
worm.
Antivirus Software
Anti-virus is a security program you install on your computer or mobile device
to protect it from getting infected by malware. The term “malware” is a catch-all
phrase for any type of malicious software, such as viruses, worms, Trojans and
spyware. In fact, the term malware comes from combining the words malicious and
software. If your computer has become infected by malware, a cyber-attacker can
capture all your keystrokes, steal your documents or use your
computer to attack others. Contrary to what some people believe, any operating
system, including Mac OS X and Linux, can be infected.
TYPES OF ANTIVIRUS
Anyone who finds out on the internet and then knows about various antivirus
programs can benefit by allowing you to stay safe when you are online. Accessing a
website can open the way for hackers to infect your computer with a virus, and they
are also able to gather information or spy on you secretly.
18
Source: www.computerflu.com
Commonly Known Anti-Virus Software
Security Attacks
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security:
19
✔ Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
❖ Malicious threats are when an employee intends to cause damage.
❖ Accidental threats are when the user damages data or equipment
unintentionally.
✔ External: Users outside an organization who do not have authorized access
to the network or resources. External attacks can be characterized as follows:
❖ Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed to
vandalize.
❖ Structured attacks, which use code to access operating systems and
software.
Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly
changing as attackers find new ways to gain entry and commit their crimes.
Computer virus
Computer viruses are created with malicious intent and sent by attackers. A
virus is attached to small pieces of computer code, software, or document. The
virus executes when the software is run on a computer. If the virus spreads to
other computers, those computers could continue to spread the virus. Malware is
the collective name for a number of malicious software variants, including viruses,
ransom ware and spyware.
20
significant. A technician may be needed to perform the repairs, and employees may
lose or have to replace data.
Ransom ware is malicious software that infects your computer and displays
messages demanding a fee to be paid in order for your system to work again. This
class of malware is a criminal money making scheme that can be installed through
deceptive links in an email message, instant message or website.
Directions: Understanding Computer Viruses: What They Can Do, Why People Write
Them and How to Defend Against Them.
Directions: Use the internet to identify 5 best antiviruses for PC computers. Draw
the anti-virus logo inside the box and make a short description about its features.
_______________________________________________________
21
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
22
MODULE 4
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9-12ICCS-IIIa-e31
1. identify computer diagnostics tools that will give you the knowledge to repair
your own computer.
2. understand the importance of computer diagnostics tools that will help you to
pinpoint problems with your computer and
3. recognize the steps by steps procedures on how to use the different computer
diagnostic tools.
Lesson
DIAGNOSTIC SOFTWARE TOOLS
4
23
Diagnostic Software Tools
Computer diagnostics tools are pieces of software that give you the knowledge
you need to be able to potentially repair your own computer. Some of these tools
come built into your operating system while others come from 3rd party software
developers. These programs test the onboard systems for issues and help to alert
users of potential problems or breakdowns. Diagnostic tools can be used to scan
your computer’s hard drive, check your ram for errors, check CPU temp and give you
information about any other devices connected to your computer. These tools are
made to find problems that may be disrupting your computer’s normal performance.
Once a problem is found, you can then plan your repair.
The performance monitor gives you a quick view of vital information related to your
computer’s hardware. From here, you can check out your CPU, Memory, Disk info
and Ethernet information. You can use Performance Monitor to examine the effects
of your running applications in both real time and by collecting data to check out for
later analysis.
24
1. Windows Resource Monitor
It is better suited for tracking individual aspects of CPU, Network, memory and disk
usage. This tool gives you an in depth look at what processes are affecting your CPU,
how much memory is being used, what is using it, individual process disk activity
and network information like current TCP connections and what processes are
listening on what port.
4. Speccy
Speccy is another great computer diagnostic tool. This application gives information
on just about everything including software, hardware, peripherals, disk info,
graphics & network data. It’s easy to use, make troubleshooting and maintenance a
breeze. Great application to start with when you are looking for specific info about
your computer.
5. HD Tune
HD Tune Pro is a great tool for HDD and SSD diagnostics. This utility allows you to
benchmark your storage device showing you the minimum, maximum and average
transfer rates along with many other useful tools. The other features of HD Tune
include detailed drive info, error scanning, & drive health. The pro version allows you
to check the health status of multiple drives, offers folder usage info, secure erase,
file benchmark, disk monitor, cache test & extra tests.
25
Directions: Use the internet to identify steps on how to use the three
Diagnostic Software Tools. Write the steps through a graphic organizer. Use the
template below. Write your answer on a separate sheet of paper.
Directions: Write an essay about “Diagnostics Tools to Improve Your PC's Health”
(200 words)
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
26
MODULE 5
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9- 12ICCS-IIIf-j-32
27
Types of Device Drivers
Device drivers are small computer programs that allow operating systems to
read pieces
of hardware connected to your computer. There are countless kinds of device drivers
for dozens of different pieces of computer hardware. However, for a computer to have
basic functionality there are a few select drivers that all computers must have.
1. BIOS (basic input/output system) - by definition, the most basic computer driver
in existence and is designed to be the first program that boots when a PC turns on.
The BIOS is stored on memory built into the motherboard and is designed to boot
the hardware connected to the PC, including the hard drives, video display output
(whether it be video card or on-board), keyboard and mouse.
2. Motherboard Drivers - Motherboard drivers are small programs that are read by
either Windows or Linux and allow for basic computer functions while inside the
operating system. These drivers normally include programs that allow broadband
ports, USB ports and I/O ports for the mouse and keyboard. Depending on the make
of the motherboard, the drivers may also have basic drivers for video and audio
support. BIOS are not the same as motherboard drivers.
3. Hardware Drivers are programs that are designed to allow pieces of computer
hardware, such as expansion slots, to function on a computer. Video cards, sound
cards, network cards and other expansion cards come with driver discs to ease the
installation process of the hardware. Other devices, like certain kinds of digital
cameras and MP3 players, have PC drivers programmed into their software for easy
use on most makes of personal computers.
4. Virtual Device Drivers - are different than most drivers. Unlike the majority of
drivers, which allow pieces of hardware to work with a particular operating system,
virtual device drivers emulate a piece of hardware and essentially trick the computer
into thinking that it is reading from a piece of actual hardware. A particularly popular
use for virtual device drivers is with reading .iso files without having an actual disc,
using one of these drivers to emulate a CD or DVD drive.
28
Directions. Read the given statement carefully. Write T if it is True, F if it is False.
___1. In some cases, generic drivers are installed so that the devices will work
properly.
___2. There are limited kinds of device drivers for dozens of different pieces of
computer hardware.
___3. Motherboard drivers normally include programs that allow broadband ports,
USB ports and I/O ports for the mouse and keyboard.
___4. Device drivers are small computer programs that allow operating systems to
read pieces of hardware connected to your computer.
___6. In many cases, if Windows recognizes the device, drivers will not be installed
automatically.
___7. A driver typically communicates with the device through the computer bus or
___8. Motherboard drivers are programs that are designed to allow pieces of computer
___9. Virtual device drivers emulate a piece of hardware and essentially trick the
___10. The BIOS is stored on memory built into the motherboard and is designed to
boot the hardware connected to the PC, including the hard drives, video display
output (whether it be video card or on-board), keyboard and mouse.
29
Directions: Using the graphic organizer below. Write an example of types of device
drivers.
30
MODULE 6
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
1. Understand the basic disk contain partitions, and that dynamic disks contain
volumes
In the early days of computers, programmers wrote programs that worked directly at
the hardware level. If the program needed to access information from an external
piece of machinery such as a card reader for instance, the program had to deal
directly with that card reader in a highly detailed way. The same program might not
work with a different card reader, even when running on the same type of computer,
meaning that the program would have to be rewritten. Obviously, this caused a lot
of duplication of programming effort, resulting in higher cost software and non-
portable programs.
31
Functions
A device driver processes the request of an application and then sends the instruction
to the hardware device to produce the output. This is how the display information is
sent from the operating system to the display or monitor. A device driver typically
has a configuration interface that can be accessed so that the user can make an
adjustment to the hardware device.
Installation
A device driver is typically installed when the installation CD for a new hardware
device is used to run the setup program. The installation CD contains the device
drivers as well as any additional software applications that are needed to use the
new hardware device. A device driver will stay on the system until it is removed or
uninstalled.
Updating
If you do not know the manufacturer of the device for which you want to install the
driver, follow these steps to determine the manufacturer:
2. Under System Tools, click Device Manager. The devices that are installed on the
3. In the right pane, expand the category of the device that you want to configure.
For example, expand Display adapters. NOTE: The device may be listed under other
devices.
4. Right-click the device for which you want to install the driver, and then click
Properties. NOTE: The device may appear as an Unknown device or as a generic
device.
5. Click the General tab. Make a note of the manufacturer and model of the device.
32
Step 2: Obtain the Driver
To obtain the latest driver, use the following list of possible sources for the driver,
in the order in which they are presented.
● Installation CD or Floppy Disks If you have the original driver CD or floppy disks
that were included with the computer or device, and if no other source for the
drivers is available, use the original driver that is included with the computer or
device.
The driver files that you download from the OEM, device manufacturer, or chipset
manufacturer differ depending on how the driver is packaged by the manufacturer.
● If the file is an executable program, run the program to extract the files. If the file
is in .zip format, you can use a third-party utility such as WinZip to extract the
files. For more information about how to extract the driver files, see the
instructions that are provided by the manufacturer of the driver.
● The driver may use a setup program. The driver package may contain raw driver
files, or it may contain only raw driver files. Some examples include .inf files, and
.sys files.
Directions: From the previous module, you have learned the basic types of device
drivers. Using the graphic organizer below, write the words you can associate with
device drivers.
33
Directions: Find and shade those words in the word search grid. Look for them in
all directions
34
MODULE 7
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
35
1. Understand the benefits of working in a safe, clean, and neat environment.
ABOUT 5s
The 5 - S practice is a technique used to establish and maintain quality and safe
environment in an organization.
Introduction to 5s
36
Figure (5s+Safety)
https://www.slideshare.net/JaroslawGadek/5s-safety?from_action=save
What is 5s?
Directions: Use the clues below to fill in the crossword puzzle with the correct words.
37
Across
5. this step attacks the dirt and grime that inevitably builds up underneath the
clutter
6. Emphasis on being able to forge a workplace with good habits and discipline.
Down
Directions: Fill in the graphic organizer below with the words that can be
38
MODULE 8
This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.
TLE_IACSS9- 12ICCS-IIIf-j-32
39
2. Apply the reporting and documentation procedure to enhance workplace
organization.
Preventive Maintenance
Preventive Maintenance
40
➢ Condition Based Maintenance (CBM)
▪ is a maintenance strategy that uses the actual condition of the asset to decide
what maintenance needs to be done? CBM dictates that maintenance should only
be performed when certain indicators show decreasing performance or upcoming
failure. Checking a machine for these indicators may include non-invasive
measurements, visual inspection, performance data and scheduled tests.
41
Directions: Write True if the given statement is correct and False if otherwise.
___4. Condition Based Maintenance is a maintenance strategy that uses the actual
condition of the asset to decide what maintenance needs to be done.
42
Directions: Find and shade those words in the word search grid. Look for them in
all directions
43
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Malware is the collective name for a number of malicious software variants.
Which is not a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
2. This is a software that gives you the knowledge you need to be able to potentially
repair your own computer.
A. Software Updates Evaluation
B. Antivirus software Scan
C. Diagnostic Software Tools
D. Application software license agreements
3. It is a diagnostic software that gives you a quick view of vital information related
to your computer’s hardware.
A. Directory Statistics C. Resource Monitor
B. Antivirus software Scan D. Performance Monitor
4. Which Windows utility can scan disks for bad sectors and tries to repair them?
A. system restore C. disk cleanup
B. optimizing drives service D. check disk
5.__________ is the process that prepares a file system in a partition for files to be
stored.
A. disk cleanup C. arrangement
B. construction D. formatting
6. A way for software developers to fine-tune a product to make it the best it can
be. They offer small, frequent improvements rather than major changes.
A. system software C. software updates
B. programming software D. software upgrade
7. A Microsoft service for MS Windows operating systems that automates
downloads of Windows software updates is commonly referred to as _________
A. upgrade C. updates
B. patches D. software
8. Any ordinary files are automatically relocated on the disk to create the new
unallocated space. What is being described in the sentence?
A. shrink in disk C. formatting
B. disk cleanup D. optimizing Drives
9. This contains the operating system files. There can be up to four per hard drive
and cannot be subdivided into smaller sections.
A. primary partition C. extended partition
B. active partition D. logical drive
10. The technician is responsible for applying the most recent updates. Why do you
need to update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware
44
45
What's More
1. True
2. False
3. True
4. False
5. False
6. True
7. False
8. True
9. False
10. True
Module 8
What's More
1. F
2. T
3. T
4. F
5. F
6. T
7. F
8. T
9. T
10.T
Module 5
What I Know
1. C
2. C
3. A
4. A
5. A
6. A
7. C
8. D
9. D
10.d
References
Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood
Education Learning Module – Grade 9 - Information and Communications
Technology Computer Hardware Servicing CHS 9.
Jaroslaw Gadek, MBA (2016, June 14). Retrieved January 31, 2021, from
https://www.slideshare.net/JaroslawGadek/5s-safety?from_action=save
46
For inquiries or feedback, please write or call:
Telefax: 02-8332-77-64
Email Address: navotas.city@deped.gov.ph