0% found this document useful (0 votes)
138 views50 pages

Tle CSS G10 Q3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views50 pages

Tle CSS G10 Q3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

DIVISION OF NAVOTAS CITY

4
10
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(COMPUTER SYSTEM
SERVICING)
QUARTER 3

S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT-Computer System Servicing) – Grade 10
Alternative Delivery Mode
Quarter 3
Second Edition, 2021

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writer: Ericelle Bianca A. Baltazar
Editors: Eduardo T. Gallego
Reviewers: Grace R. Nieves
Illustrator: Ericelle Bianca A. Baltazar
Layout Artist: Ericelle Bianca A. Baltazar
Management Team: Alejandro G. Ibañez, OIC- Schools Division Superintendent
Isabelle S. Sibayan, OIC- Asst. Schools Division Superintendent
Loida O. Balasa, Chief, Curriculum Implementation Division
Grace R. Nieves, EPS In Charge of LRMS/EPP-TLE-TVL
Lorena J. Mutas, ADM Coordinator
Vergel Junior C. Eusebio, PDO II LRMS

Inilimbag sa Pilipinas ng ________________________

Department of Education – Navotas City


Office Address: BES Compound M. Naval St. Sipac-Almacen Navotas City
____________________________________________
Telefax: 02-8332-77-64
____________________________________________
E-mail Address: ____________________________________________
Navotas.city@deped.gov.ph
Table of Contents
What I Know ................................................................. 1

Module 1 ...................................................................... 3

Module 2 ...................................................................... 10

Module 3 ...................................................................... 17

Module 4 ...................................................................... 23

Module 5 ...................................................................... 27

Module 6 ...................................................................... 31

Module 7 ...................................................................... 35

Module 8 ...................................................................... 39

Assessment .................................................................. 44

Answer Key ................................................................... 45

References .................................................................... 46
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. A way for software developers to fine-tune a product to make it the best it can
be. They offer small, frequent improvements rather than major changes.
A. system software C. software updates
B. programming software D. software upgrade

2. A Microsoft service for MS Windows operating systems that automates


downloads of Windows software updates is commonly referred to as _________
A. upgrade C. updates
B. patches D. software

3. Any ordinary files are automatically relocated on the disk to create the new
unallocated space. What is being described in the sentence?
A. shrink in disk C. formatting
B. disk cleanup D. optimizing Drives

4. This contains the operating system files. There can be up to four per hard drive
and cannot be subdivided into smaller sections.
A. primary partition C. extended partition
B. active partition D. logical drive

5The technician is responsible for applying the most recent updates. Why do you
need to update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware

A6. Malware is the collective name for a number of malicious software variants.
Which is not a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite

7. This is a software that gives you the knowledge you need to be able to potentially
repair your own computer.
A. Software Updates Evaluation
B. Antivirus software Scan
C. Diagnostic Software Tools
D. Application software license agreements

1
8. It is a diagnostic software that gives you a quick view of vital information related
to your computer’s hardware.
A. Directory Statistics C. Resource Monitor
B. Antivirus software Scan D. Performance Monitor

9. Which Windows utility can scan disks for bad sectors and tries to repair them?
A. system restore C. disk cleanup
B. optimizing drives service D. check disk
10.__________ is the process that prepares a file system in a partition for files to be
stored.
A. disk cleanup C. arrangement
B. construction D. formatting

2
MODULE 1

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Install Application Software based on software installation guides, end-


user requirements and software license agreement

TLE_IACSS9-12ICCS-IIIa-e31

After going through this module, you are expected to:


1. install application software based on software installation guides, end-user
requirements and software license agreement
2. carry out variation to application software in accordance to customer/ client
Requirements
3. access software updates in accordance with manufacturer’s
recommendations and requirements and;
4. install software updates in accordance with manufacturer’s
recommendations and requirements

3
Lesson
SOFTWARE UPDATES
1
We know, updating your PC is a hassle–but it’s essential. New security flaws
are discovered on a regular basis, and most companies are pretty good about issuing
fixes for those flaws as they crop up. Plugging those holes, however, depends
primarily upon you making sure things are appropriately updated. In addition to
fixing security flaws, updates also come in the form of bug fixes and new features,
both of which are also nice to have. We’re going to be talking about how to keep three
major aspects of your PC up to date.

4
Software updates

Software updates are a way for software developers to fine-tune a product to


make it the best it can be. They offer small, frequent improvements rather than major
changes. Unlike a software upgrade, updates need the existing software program
you’re using to work.

Updates sometimes run automatically in the background. Other times,


software updates (commonly referred to as ‘patches’) come in the form of a free
download. They’re usually necessary for your product to continue running
successfully.

That’s because software updates address any new-found security issues, fix
recently discovered bugs, and add support for drivers and new hardware. They tweak
and improve the way the program operates, but they don’t fundamentally alter it.

Simply put, software updates modify, fix and alter your current software
program on a regular basis. They’re the software equivalent of keeping your bicycle
oiled. It’s still the same bike, it just runs smoother.

Software updates

Software updates are important to your digital safety and cyber security. The
sooner you update, the sooner you’ll feel confident your device is more secure — until
the next update reminder.

Why are software updates so important? There are a lot of reasons. Here are
5 reasons that show why it’s important to update software regularly.

1. Protect you against security risks

The most important reason to update software is to ensure that security


vulnerabilities are addressed as soon as possible. The most active cybercriminals
spend countless hours looking for vulnerabilities in the most popular, widely used
software products. Those vulnerabilities are what allow them to attack and infect
computer systems, and steal or encrypt sensitive data. By updating your computer
systems, you ensure that your business has the best protection possible against
cybercrime.

2. Help protect your data

You probably keep a lot of documents and personal information on your


devices. Your personally identifiable information from emails to bank account

5
information is valuable to cybercriminals. They can use it to commit crimes in your
name or sell it on the dark web to enable others to commit crimes. If it’s a
ransomware attack, they might encrypt your data. You might have to pay a ransom
for an encryption key to get it back. Or, worse, you might pay a ransom and not get
it back. Updating your software and operating systems helps keep hackers out.

3. Fix software bugs

Software is almost never released in a perfect condition – simply because it’s


impossible for developers to test and fix every single way that a programme might
break. Once a programme is released to the public, the thousands and millions of
people who use it do so in many ways.

That’s when most bugs are discovered. When that happens, software
developers find ways to fix the problems, and release those fixes as software updates.

4. Enhance software features

Another reason why software updates are important is that they may enhance
some of the program’s features, or even add new features. These are often considered
non-essential updates, but even if they’re not important to your business, it’s still
worthwhile updating, just to ensure that your software is fully compatible with what
clients, customers, and peers are using.

5. Compatibility updates

Sometimes, software needs to be updated because of the way it interacts with


other kinds of software. This is the case for any software programs that interact with
a computer system’s drivers. Drivers are software programs that tell computer
features such as graphics and sound how to function. When drivers are updated,
computer software that interacts with the drivers sometimes needs to be updated
too. These kinds of updates are crucial too, because without them, certain aspects
of the computer system may not function correctly.

How to update your software

Keeping your software up to date is a crucial practice in Internet safety. Most


software updates automatically by default, but you should know how to check the
updates and begin the process yourself. Knowing how to keep your software updated
can improve your computer's stability and security and let you know about new
features, helping you be an informed and empowered user.

Update your operating system

Keeping your operating system updated is one of the most important steps in
protecting yourself from viruses, malware, and other Internet security threats.

6
Windows

To update Windows, first open the Control Panel. If you don't know where the
Control Panel is, check out this lesson in Windows Basics. In the search bar in the
Control Panel, type update. Under Windows Update, click Check for updates. It may
take a moment for Windows to search for updates. Once it does, if there are any
updates available it will prompt you to install them. It may take a while to install all
the updates. It's safe to leave the computer and do something else while it finishes.
Once it's done, Windows will probably prompt you to restart the computer. If you
need to do anything else after this, Windows will prompt you; otherwise, you're up to
date!

Update your apps

For many apps, regular updates provide new features and stability rather than
security patches, so it isn't necessary to update them as frequently. However, for
more essential software like web browsers and antivirus software, security updates
are just as critical as operating system updates.

Many apps in both mac OS and Windows will automatically check for
updates when you open them. If you installed them through the App Store or
another distribution platform, the program will alert you about updates. For
standalone programs, take time to explore the program's menus and learn how to
run the update process. For example, in Avast! Free Antivirus, there is an Update
page on the Settings screen.

Windows Service pack

A service pack comprises a collection of updates, fixes, or enhancements to a


software program delivered in the form of a single installable package. Companies
often release a service pack when the number of individual patches to a given
program reaches a certain (arbitrary) limit, or the software release has shown to be
stabilized with a limited number of remaining issues based on users' feedback and
bug reports. In large software applications such as office suites, operating systems,
database software, or network management, it is not uncommon to have a service
pack issued within the first year or two of a product's release.

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

7
Directions: In this activity, you will use the Internet to research about software

updates.

1. What happens when you update your software?

2. List the configuration options available for important updates for the OS.

3. How do you check if all the software is up to date?

4. What is the latest update for Windows 10?

5. How do you get rid of software updates?

8
Directions: Research the environmental impact of hardware components such as
processors, motherboards, video cards and hard disks.

1. Find out what each of these components is made of and how it


should be disposed of.

2. What are the reasons for upgrading and installing new hardware components?

3. What consequences might there be if an IT system breaks down?

4. Compare the current and previous versions of Microsoft Windows. What do you
think about the hardware requirements and user reviews?

9
MODULE 2

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 2: Carry out variation to application software in accordance to customer/


client requirements.
TLE_IACSS9-12ICCS-IIIa-e31

After going through this module, you are expected to:

1. install application software based on software installation guides, end-user


requirements and software license agreement
2. carry out variation to application software in accordance to customer/
client requirements
3. access software updates in accordance with manufacturer’s
recommendations and requirements and;
4. install software updates in accordance with manufacturer’s
recommendations and requirements

10
Lesson
DISK MANAGEMENT
2
Disk Management is a utility built into different operating systems which
can be used to create, delete, format partitions, assign drive letters, and much
more. Disk Management can also be used to view partitions and their formatted file
systems on the hard drive. The most common way to access Disk Management is
via Computer Management

Disk Management
Disk Management is a Microsoft Windows utility first introduced in Windows
XP as a replacement for the disk command. It enables users to view and manage the
disk drives installed in their computer and the partitions associated with those
drives. As the image below shows, each drive is displayed followed by the layout,
type, file system, status, capacity, free space, % free, and fault tolerance.

The Disk Management command is the same in all versions of Windows, so


these instructions apply to Windows 8, Windows 7, Windows Vista, and Windows
XP. Follow these easy steps to start Disk Management from the Command Prompt in
Windows:
● In Windows 7 and Windows Vista, click on the Start button.
● In Windows XP and earlier, click on Start and then Run.
● Type the following command in the text box: diskmgmt.msc and then hit the
Enter key or press the OK button, depending on where you ran the command from.
To partition a hard drive in Windows 7 means to divide the hard drive into
parts and make those parts available to the operating system. It's also possible for
an entire hard drive to have a single partition.
In Disk Management’s Graphical view, right-click an unallocated or free area,
and then click New Simple Volume. This starts the New Simple Volume Wizard.

11
Figure 1 - Disk Management
https://www.slideshare.net/ArshadQureshi5/disk-management-dm

Read the Welcome page and then click Next.


The Specify Volume Size page specifies the minimum and maximum size for the
volume in megabytes and lets you size the volume within these limits. Size the
partition in megabytes using the Simple Volume Size field and then click Next.

On the Assign Drive Letter or Path page, specify whether you want to assign a drive
letter or path and then click Next. The available options are as follows:

Figure 2 - Disk Management, New Simple Volume


https://www.slideshare.net/ArshadQureshi5/disk-management-dm

Use the Format Partition page to determine whether and how the volume should be
formatted. If you want to format the volume, choose Format This Volume with the
Following Settings, and then configure the following options:
Click next, confirm your options, and then click Finish

12
Figure 3 - Disk Management, New Simple Volume
https://www.slideshare.net/ArshadQureshi5/disk-management-dm

The Windows 7 Disk Management tool will now show the space configured as a new
partition.

Figure 4 - Disk Management


https://www.slideshare.net/ArshadQureshi5/disk-management-dm

Here’s an easy way to shrink a volume to free up space so you can create a new
partition on your disk. To shrink a basic volume, follow these steps:

In Disk Management, right-click the volume that you want to shrink, and then
click Shrink Volume

13
Figure 5 - Disk Management
https://www.slideshare.net/ArshadQureshi5/disk-management-dm

In the field provided in the Shrink dialog box, enter the amount of space by which to
shrink the disk. Click Shrink.
When you shrink a partition, any ordinary files are automatically relocated on the
disk to create the new unallocated space. There is no need to reformat the disk to
shrink the partition

Figure 6 - Disk Management/Shrink a partition


https://www.slideshare.net/ArshadQureshi5/disk-management-dm

14
Directions: Using your smartphone or webcam, record a short video discussing the
use of disk management? Keep your video short with a maximum of 2-3 minutes.

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

15
Directions: Answer the following questions below:

1. What are the uses of disk management?


__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
2. What is the importance of disk?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

3. What are the advantages in creating a partition?


__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

16
MODULE 3

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 3: Access software updates in accordance with manufacturer’s


recommendations and requirements

TLE_IACSS9-12ICCS-IIIa-e31

After going through this module, you are expected to:


1. Identify commonly known anti-virus software to protect data and
computer systems from becoming corrupted.
2. Understand the importance of antivirus that will help protect your
computer against viruses.
3. Recognize how to protect your computer against viruses by knowing
how antivirus works

Lesson
ANTIVIRUS SOFTWARE
3
As a future computer technician, you need to understand computers and
security. Failure to implement proper security procedures can affect users,
computers, and the general public. private information, company secrets, financial
data, computer equipment, and items about national security are placed at risk if
proper security procedures are not followed.

17
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before they
infect a computer. Antivirus software becomes outdated quickly, however. The
technician is responsible for applying the most recent updates, patches, and virus
definitions as part of a regular maintenance schedule. Many organizations establish
a written security policy stating that employees are not permitted to install any
software that is not provided by the company. Organizations also make employees
aware of the dangers of opening e-mail attachments that may contain a virus or
worm.

Antivirus Software
Anti-virus is a security program you install on your computer or mobile device
to protect it from getting infected by malware. The term “malware” is a catch-all
phrase for any type of malicious software, such as viruses, worms, Trojans and
spyware. In fact, the term malware comes from combining the words malicious and
software. If your computer has become infected by malware, a cyber-attacker can
capture all your keystrokes, steal your documents or use your
computer to attack others. Contrary to what some people believe, any operating
system, including Mac OS X and Linux, can be infected.

You can purchase anti-virus software as a standalone solution, or it is often


included as part of a security package. The problem is that anti-virus can no longer
keep up with cyber attackers; they are constantly developing and releasing new types
of malware. There are so many new versions of malware released every day that no
anti-virus program can detect and protect against all of them. Therefore, it is
important for you to understand that anti-virus will help protect your computer.

TYPES OF ANTIVIRUS

Anyone who finds out on the internet and then knows about various antivirus
programs can benefit by allowing you to stay safe when you are online. Accessing a
website can open the way for hackers to infect your computer with a virus, and they
are also able to gather information or spy on you secretly.

18
Source: www.computerflu.com
Commonly Known Anti-Virus Software

Security Attacks
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security:

Physical: Events or attacks that steal, damage, or destroy such equipment as


servers, switches, and wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal
information.
Threats to security can come from inside or outside an organization, and the
level of potential damage can vary greatly. Potential threats include the following:

19
✔ Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
❖ Malicious threats are when an employee intends to cause damage.
❖ Accidental threats are when the user damages data or equipment
unintentionally.
✔ External: Users outside an organization who do not have authorized access
to the network or resources. External attacks can be characterized as follows:
❖ Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed to
vandalize.
❖ Structured attacks, which use code to access operating systems and
software.

Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly
changing as attackers find new ways to gain entry and commit their crimes.

Computer virus
Computer viruses are created with malicious intent and sent by attackers. A
virus is attached to small pieces of computer code, software, or document. The
virus executes when the software is run on a computer. If the virus spreads to
other computers, those computers could continue to spread the virus. Malware is
the collective name for a number of malicious software variants, including viruses,
ransom ware and spyware.

A virus is transferred to another computer through email, file transfers, and


instant messaging. The virus hides by attaching itself to a file on the computer.
When the file is accessed, the virus executes and infects the computer. A virus has
the potential to corrupt or even delete files on your computer, use your email to
spread itself to other computers, or even erase your hard drive. Some viruses can
be exceptionally dangerous. The most damaging type of virus is used to record
keystrokes. Attackers can use these viruses to harvest sensitive information, such
as passwords and credit card numbers.

A worm is a self-replicating program that is harmful to networks. A worm


uses the network to duplicate its code to the hosts on a network, often without any
user intervention. It is different from a virus because a worm does not need to
attach to a program to infect a host. Even if the worm does not damage data or
applications on the hosts it infects, it harms networks because it consumes
bandwidth.

A Trojan horse technically is a worm. It does not need to be attached to


other software. Instead, a Trojan threat is hidden in software that appears to do
one thing, and yet behind the scenes it does another. Trojans often are disguised as
useful software. The Trojan program can reproduce or replicate like a virus and
spread to other computers. Computer data damage and production loss could be

20
significant. A technician may be needed to perform the repairs, and employees may
lose or have to replace data.

Ransom ware is malicious software that infects your computer and displays
messages demanding a fee to be paid in order for your system to work again. This
class of malware is a criminal money making scheme that can be installed through
deceptive links in an email message, instant message or website.

A Spyware is unwanted software that infiltrates your computing device,


stealing your internet usage data and sensitive information. Spyware is classified
as a type of malware -malicious software designed to gain access to or damage your
computer, often without your knowledge.

Directions: Understanding Computer Viruses: What They Can Do, Why People Write
Them and How to Defend Against Them.

1. What does a computer virus do?


2. Why Do People Write Viruses?
3. What is the best defense against computer virus infection?
4. Use your web browser to investigate the technical difference between a virus,
a worm and a Trojan horse.
5. Did you find information on where the term “Trojan horse” comes from? If so,
briefly explain what you learned.

Directions: Use the internet to identify 5 best antiviruses for PC computers. Draw
the anti-virus logo inside the box and make a short description about its features.

_______________________________________________________

21
_______________________________________________________

_______________________________________________________

_______________________________________________________

_______________________________________________________

22
MODULE 4

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:


Lesson 1: Install software updates in accordance with manufacturer’s
recommendations and requirements

TLE_IACSS9-12ICCS-IIIa-e31

After going through this module, you are expected to:

1. identify computer diagnostics tools that will give you the knowledge to repair
your own computer.
2. understand the importance of computer diagnostics tools that will help you to
pinpoint problems with your computer and
3. recognize the steps by steps procedures on how to use the different computer
diagnostic tools.

Lesson
DIAGNOSTIC SOFTWARE TOOLS
4

Diagnostic software is used to identify problems on a computer or piece of


equipment. These programs test the onboard systems for issues and help to alert
users of potential problems or breakdowns. Over the years, these programs have
gone from very basic to complex and highly specialized. With this increase in
technology, the skill required to use the software has actually decreased to the point
where most people can use this software with little or no training.

23
Diagnostic Software Tools

Computer diagnostics tools are pieces of software that give you the knowledge
you need to be able to potentially repair your own computer. Some of these tools
come built into your operating system while others come from 3rd party software
developers. These programs test the onboard systems for issues and help to alert
users of potential problems or breakdowns. Diagnostic tools can be used to scan
your computer’s hard drive, check your ram for errors, check CPU temp and give you
information about any other devices connected to your computer. These tools are
made to find problems that may be disrupting your computer’s normal performance.
Once a problem is found, you can then plan your repair.

Programs that provide diagnostic information are common everywhere.


Something as simple as the oil light on a car dashboard is a type of diagnostic
software. These hardcoded diagnostic tools usually monitor one specific part of a
larger piece of equipment and typically are always operating. While these types of
diagnostic programs are the most common, they are usually the least versatile. When
people think of true diagnostic software, they usually think of the types used on
computers. These programs monitor the computer for problems involving every
aspect of the machine, from hardware to software far more complex and versatile
than the change oil light.

Computer Diagnostic Tools

1. Windows Performance Monitor

The performance monitor gives you a quick view of vital information related to your
computer’s hardware. From here, you can check out your CPU, Memory, Disk info
and Ethernet information. You can use Performance Monitor to examine the effects
of your running applications in both real time and by collecting data to check out for
later analysis.

24
1. Windows Resource Monitor
It is better suited for tracking individual aspects of CPU, Network, memory and disk
usage. This tool gives you an in depth look at what processes are affecting your CPU,
how much memory is being used, what is using it, individual process disk activity
and network information like current TCP connections and what processes are
listening on what port.

2. Windows Directory Statistics


WinDirStat is a free and open-source graphical disk usage analyzer for Microsoft
Windows. It is notable for presenting a sub-tree view with disk use percentage
alongside a usage-sorted list of file extensions that is interactively integrated with a
colorful graphical display.

3. Open Hardware Monitor


Open Hardware Monitor is a free open source application that runs on Windows and
Linux systems. This diagnostic tool monitors your computer's temperature sensors,
fan speeds, voltages, load and clock speeds. If your computer is shutting down by
itself, hanging or crashing, this tool can come in real handy by telling you that your
system is overheating, or the fans aren’t working properly.

4. Speccy
Speccy is another great computer diagnostic tool. This application gives information
on just about everything including software, hardware, peripherals, disk info,
graphics & network data. It’s easy to use, make troubleshooting and maintenance a
breeze. Great application to start with when you are looking for specific info about
your computer.

5. HD Tune
HD Tune Pro is a great tool for HDD and SSD diagnostics. This utility allows you to
benchmark your storage device showing you the minimum, maximum and average
transfer rates along with many other useful tools. The other features of HD Tune
include detailed drive info, error scanning, & drive health. The pro version allows you
to check the health status of multiple drives, offers folder usage info, secure erase,
file benchmark, disk monitor, cache test & extra tests.

25
Directions: Use the internet to identify steps on how to use the three
Diagnostic Software Tools. Write the steps through a graphic organizer. Use the
template below. Write your answer on a separate sheet of paper.

Directions: Write an essay about “Diagnostics Tools to Improve Your PC's Health”
(200 words)

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

26
MODULE 5

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 5: Test devices/ systems and/or installation to determine whether it


conforms to requirements.

TLE_IACSS9- 12ICCS-IIIf-j-32

After going through this module, you are expected to:


1. Identify types of device drivers.
2. Recognize the importance of device drivers.

INSTALLING AND CONFIGURING


Lesson
COMPUTER SYSTEMS DEVICE
5
DRIVERS
Drivers are small software programs that help the operating system use or “drive”
the device. Whenever a device does not work properly, ask if the proper driver has
been installed. In many cases, if Windows recognizes the device, drivers will be
installed automatically. In some cases, generic drivers are installed so that the
devices will work properly. Drivers are hardware-dependent and operating- system-
specific. They usually provide the interrupt handling, required for any necessary
asynchronous time-dependent hardware interface.

27
Types of Device Drivers
Device drivers are small computer programs that allow operating systems to
read pieces
of hardware connected to your computer. There are countless kinds of device drivers
for dozens of different pieces of computer hardware. However, for a computer to have
basic functionality there are a few select drivers that all computers must have.

1. BIOS (basic input/output system) - by definition, the most basic computer driver
in existence and is designed to be the first program that boots when a PC turns on.
The BIOS is stored on memory built into the motherboard and is designed to boot
the hardware connected to the PC, including the hard drives, video display output
(whether it be video card or on-board), keyboard and mouse.

2. Motherboard Drivers - Motherboard drivers are small programs that are read by
either Windows or Linux and allow for basic computer functions while inside the
operating system. These drivers normally include programs that allow broadband
ports, USB ports and I/O ports for the mouse and keyboard. Depending on the make
of the motherboard, the drivers may also have basic drivers for video and audio
support. BIOS are not the same as motherboard drivers.

3. Hardware Drivers are programs that are designed to allow pieces of computer
hardware, such as expansion slots, to function on a computer. Video cards, sound
cards, network cards and other expansion cards come with driver discs to ease the
installation process of the hardware. Other devices, like certain kinds of digital
cameras and MP3 players, have PC drivers programmed into their software for easy
use on most makes of personal computers.

4. Virtual Device Drivers - are different than most drivers. Unlike the majority of
drivers, which allow pieces of hardware to work with a particular operating system,
virtual device drivers emulate a piece of hardware and essentially trick the computer
into thinking that it is reading from a piece of actual hardware. A particularly popular
use for virtual device drivers is with reading .iso files without having an actual disc,
using one of these drivers to emulate a CD or DVD drive.

Notes to the Teacher


For the following activities you may inform
your students to write the answers on
their notebook

28
Directions. Read the given statement carefully. Write T if it is True, F if it is False.

___1. In some cases, generic drivers are installed so that the devices will work
properly.

___2. There are limited kinds of device drivers for dozens of different pieces of
computer hardware.

___3. Motherboard drivers normally include programs that allow broadband ports,
USB ports and I/O ports for the mouse and keyboard.

___4. Device drivers are small computer programs that allow operating systems to
read pieces of hardware connected to your computer.

___5. Drivers are software-dependent and operating- system-specific.

___6. In many cases, if Windows recognizes the device, drivers will not be installed

automatically.

___7. A driver typically communicates with the device through the computer bus or

communications subsystem to which the hardware connects.

___8. Motherboard drivers are programs that are designed to allow pieces of computer

hardware, such as expansion slots, to function on a computer.

___9. Virtual device drivers emulate a piece of hardware and essentially trick the

computer into thinking that it is reading from a piece of actual hardware.

___10. The BIOS is stored on memory built into the motherboard and is designed to
boot the hardware connected to the PC, including the hard drives, video display
output (whether it be video card or on-board), keyboard and mouse.

29
Directions: Using the graphic organizer below. Write an example of types of device
drivers.

30
MODULE 6

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Conduct stress tests to ensure reliability of equipment in accordance


with manufacturer’s instructions and system requirements.
TLE_IACSS9- 12ICCS-IIIf-j-32

After going through this module, you are expected to:

1. Understand the basic disk contain partitions, and that dynamic disks contain
volumes

Lesson INSTALLING AND CONFIGURING COMPUTER


SYSTEMS-DRIVERS/SOFTWARE UPDATE
6 PROCEDURES

Why Do We Need Device Drivers?

In the early days of computers, programmers wrote programs that worked directly at
the hardware level. If the program needed to access information from an external
piece of machinery such as a card reader for instance, the program had to deal
directly with that card reader in a highly detailed way. The same program might not
work with a different card reader, even when running on the same type of computer,
meaning that the program would have to be rewritten. Obviously, this caused a lot
of duplication of programming effort, resulting in higher cost software and non-
portable programs.

31
Functions

A device driver processes the request of an application and then sends the instruction
to the hardware device to produce the output. This is how the display information is
sent from the operating system to the display or monitor. A device driver typically
has a configuration interface that can be accessed so that the user can make an
adjustment to the hardware device.

Installation

A device driver is typically installed when the installation CD for a new hardware
device is used to run the setup program. The installation CD contains the device
drivers as well as any additional software applications that are needed to use the
new hardware device. A device driver will stay on the system until it is removed or
uninstalled.

Updating

Device drivers can be updated on a system using a variety of methods. Typically, a


device driver can be downloaded from the manufacturer if an update is available.
Many times, a manufacturer will update a device driver to add additional
functionality or to fix a bug in the program. A device driver can also be updated by
installing updates to the operating system or running the setup program from a
device's installation CD.

How to obtain and install drivers for hardware devices

Step 1: Determine the Hardware Manufacturer

If you do not know the manufacturer of the device for which you want to install the
driver, follow these steps to determine the manufacturer:

1. On the desktop, right-click My Computer, and then click Manage.

2. Under System Tools, click Device Manager. The devices that are installed on the

computer are listed in the right pane.

3. In the right pane, expand the category of the device that you want to configure.
For example, expand Display adapters. NOTE: The device may be listed under other
devices.

4. Right-click the device for which you want to install the driver, and then click
Properties. NOTE: The device may appear as an Unknown device or as a generic
device.

5. Click the General tab. Make a note of the manufacturer and model of the device.

6. Click Cancel, and then quit Computer Management.

32
Step 2: Obtain the Driver

To obtain the latest driver, use the following list of possible sources for the driver,
in the order in which they are presented.

● Original Computer Manufacturer If the device was installed by your computer


manufacturer, contact the manufacturer of your computer to find out how to
obtain, download, and install the latest drivers for the device.

● Device Manufacturer Contact the manufacturer of the device to inquire about


how to obtain, download, and install the latest drivers for the device.

● Installation CD or Floppy Disks If you have the original driver CD or floppy disks
that were included with the computer or device, and if no other source for the
drivers is available, use the original driver that is included with the computer or
device.

Step 3: Install the Driver

The driver files that you download from the OEM, device manufacturer, or chipset
manufacturer differ depending on how the driver is packaged by the manufacturer.

● If the file is an executable program, run the program to extract the files. If the file
is in .zip format, you can use a third-party utility such as WinZip to extract the
files. For more information about how to extract the driver files, see the
instructions that are provided by the manufacturer of the driver.

● The driver may use a setup program. The driver package may contain raw driver
files, or it may contain only raw driver files. Some examples include .inf files, and
.sys files.

Directions: From the previous module, you have learned the basic types of device
drivers. Using the graphic organizer below, write the words you can associate with
device drivers.

33
Directions: Find and shade those words in the word search grid. Look for them in
all directions

34
MODULE 7

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Follow 5S and 3Rs according to environmental policies.


TLE_IACSS9- 12ICCS-IIIf-j-32

After going through this module, you are expected to:

35
1. Understand the benefits of working in a safe, clean, and neat environment.

2. Explain how to apply the 5S principles to enhance workplace organization.

Lesson INSTALLING AND CONFIGURING COMPUTER


SYSTEMS-DRIVERS/APPLICATION SOFTWARE
7 LICENSE AGREEMENTS

ABOUT 5s

The 5 - S practice is a technique used to establish and maintain quality and safe

environment in an organization.

The 5 Japanese words are:

1. Seiri (Sort) –Sort out

2. Seiton (Set) –Systematic Arrangement

3. Seiso (Shine) –Spick and Span

4. Seiketsu (Standardize) –Standardization

5. Shitsuke (Sustain) –Self-discipline

Introduction to 5s

⮚ 5S is a structured process to enhance workplace safety, quality, efficiency, order,


and standardization.

⮚ 5S represents the disciplines for maintaining a visual workplace that supports


our safety culture of zero injuries & world class quality.

⮚ 5S is a foundation for Continuous Improvement.

36
Figure (5s+Safety)
https://www.slideshare.net/JaroslawGadek/5s-safety?from_action=save

What is 5s?

Directions: Use the clues below to fill in the crossword puzzle with the correct words.

37
Across

2. Set in ______ is the second step in 5s which means orderliness.

4. Japanese term for sorting

5. this step attacks the dirt and grime that inevitably builds up underneath the
clutter

and works to keep it from coming back.

6. Emphasis on being able to forge a workplace with good habits and discipline.

8. Japanese term for Standardize.

Down

1. It is the fourth step in 5s.

3. Japanese term for shine

7. Japanese word for sustain.

9. Japanese term for set in order.

10. The first step in the 5s which means tidiness.

Directions: Fill in the graphic organizer below with the words that can be

associated with 5s method.

38
MODULE 8

This module was designed and written with you in mind. It is here to help you master
the nature of Install application software, drivers for peripherals/ devices. The scope
of this module permits it to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The lessons are
arranged to follow the standard sequence of the course. But the order in which you
read them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

Lesson 1: Follow procedures in forwarding documentationto appropriate


personnel and/or authority on thetest conducted.

TLE_IACSS9- 12ICCS-IIIf-j-32

After going through this module, you are expected to:


1. Understand the benefits of reporting and documentation procedures.

39
2. Apply the reporting and documentation procedure to enhance workplace
organization.

Lesson Installing And Configuring Computer


8 Systems-Drivers/Tress-Testing Procedures

Preventive Maintenance

• Preventive maintenance (or preventative maintenance) is maintenance that is


regularly performed on a piece of equipment to lessen the likelihood of it failing. It
is performed while the equipment is still working so that it does not break down
unexpectedly.

Purpose of Preventive Maintenance


• The purpose of systematic inspection, detection and correction of existing / future
problems is very important to maintain equipment / facilities in satisfactory
condition before it may cause major problem.
• Preventive maintenance is given for maintaining equipment and facilities in
satisfactory operating condition to extend the life of the equipment.
• Corrective maintenance is task performed to identify, isolate and rectify a fault so
that the failed equipment or system can be restored to an operational condition
within the tolerances or limits.

Preventive Maintenance

➢ Planned Maintenance (PM) is any variety of scheduled maintenance to an object


or item of equipment. Specifically, PM is a scheduled service visit carried out by a
competent and suitable agent, to ensure that an item of equipment is operating
correctly to avoid any unscheduled breakdown and downtime of an equipment.

40
➢ Condition Based Maintenance (CBM)

▪ is a maintenance strategy that uses the actual condition of the asset to decide
what maintenance needs to be done? CBM dictates that maintenance should only
be performed when certain indicators show decreasing performance or upcoming
failure. Checking a machine for these indicators may include non-invasive
measurements, visual inspection, performance data and scheduled tests.

▪ CBM is a set of maintenance actions based on real-time or near-real time


assessment of equipment condition which is obtained from embedded sensors. It
allows maintenance to be scheduled, or other actions to be taken to avoid the
consequences of failure.

41
Directions: Write True if the given statement is correct and False if otherwise.

___1. Preventive Maintenance is maintenance that is regularly performed on a piece


of equipment to lessen the likelihood of it failing.

___2. Planned Maintenance is any variety of scheduled maintenance to an object or


item of equipment.

___3. Preventive Maintenance should be conducted once a year.

___4. Condition Based Maintenance is a maintenance strategy that uses the actual
condition of the asset to decide what maintenance needs to be done.

___5. Planned Maintenance is a set of maintenance actions based on real-time or


near-real time assessment of equipment condition which is obtained from
embedded sensors.

___6. The purpose of systematic inspection, detection and correction of existing /


future problems is not important to maintain equipment / facilities in satisfactory
condition before it may cause major problem.

___7. Corrective maintenance is task performed to identify, isolate and rectify a


fault so that the failed equipment or system can be restored to an operational
condition within the tolerances or limits.

___8. Planned Maintenance dictates that maintenance should only be performed


when certain indicators show decreasing performance or upcoming failure.

___9. Preventive Maintenance is performed while the equipment is still working so


that it does not break down unexpectedly.

___10. Planned Maintenance allows maintenance to be scheduled, or other actions


to be taken to avoid the consequences of failure.

42
Directions: Find and shade those words in the word search grid. Look for them in
all directions

43
Directions: Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. Malware is the collective name for a number of malicious software variants.
Which is not a type of malware?
A. marburg C. Trojan horses
B. worms D. multipartite
2. This is a software that gives you the knowledge you need to be able to potentially
repair your own computer.
A. Software Updates Evaluation
B. Antivirus software Scan
C. Diagnostic Software Tools
D. Application software license agreements
3. It is a diagnostic software that gives you a quick view of vital information related
to your computer’s hardware.
A. Directory Statistics C. Resource Monitor
B. Antivirus software Scan D. Performance Monitor
4. Which Windows utility can scan disks for bad sectors and tries to repair them?
A. system restore C. disk cleanup
B. optimizing drives service D. check disk
5.__________ is the process that prepares a file system in a partition for files to be
stored.
A. disk cleanup C. arrangement
B. construction D. formatting
6. A way for software developers to fine-tune a product to make it the best it can
be. They offer small, frequent improvements rather than major changes.
A. system software C. software updates
B. programming software D. software upgrade
7. A Microsoft service for MS Windows operating systems that automates
downloads of Windows software updates is commonly referred to as _________
A. upgrade C. updates
B. patches D. software
8. Any ordinary files are automatically relocated on the disk to create the new
unallocated space. What is being described in the sentence?
A. shrink in disk C. formatting
B. disk cleanup D. optimizing Drives
9. This contains the operating system files. There can be up to four per hard drive
and cannot be subdivided into smaller sections.
A. primary partition C. extended partition
B. active partition D. logical drive
10. The technician is responsible for applying the most recent updates. Why do you
need to update your antivirus software?
A. to counter the new viruses C. The updates are malware
B. It's a scam D. to delete malware

44
45
What's More
1. True
2. False
3. True
4. False
5. False
6. True
7. False
8. True
9. False
10. True
Module 8
What's More
1. F
2. T
3. T
4. F
5. F
6. T
7. F
8. T
9. T
10.T
Module 5
What I Know
1. C
2. C
3. A
4. A
5. A
6. A
7. C
8. D
9. D
10.d
References
Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood
Education Learning Module – Grade 9 - Information and Communications
Technology Computer Hardware Servicing CHS 9.

Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood


Education Learning Module – Grade 10 - Information and Communications
Technology Computer Hardware Servicing CHS 10.

Types of Device Drivers


https://slideplayer.com/slide/1593683/, Accessed January 17, 2021

Device Drivers Icon


https://www.flaticon.com/premium-icon/drivers_3104000, Accessed, January
18, 2021

Basic Computer Configuration Setup


RETRIEVED FROM: https://www.slideshare.net/ynlcadapan/ict-9-module-3-
lesson-25-basiccomputer-configuration-
setup?from_action=save&fbclid=IwAR3p6sefVqLwOAEUzaMB6AqAhwRgFTXH
4GDqv_sh0uotLVkfWrgii1qyt

Jaroslaw Gadek, MBA (2016, June 14). Retrieved January 31, 2021, from
https://www.slideshare.net/JaroslawGadek/5s-safety?from_action=save

Sudarshan Jadwal.(2017, January 31). This Presentation covers 5S


methodology, implementation technique, example and checklist for
implementation. ). Retrieved January 31, 2021, from
https://www.slideshare.net/sudarshanjadwal/5s-presentation-forbeginnersa

Retrieved from: https://sites.google.com/a/deped.gov.ph/mr-


vallejos/home/maintainingcomputer-and-
networksystems?tmpl=%2Fsystem%2Fapp%2Ftemplates%2Fprint%2F&showPrintDialog
=1

46
For inquiries or feedback, please write or call:

Department of Education – Schools Division Office Navotas


Learning Resource Management Section

Bagumbayan Elementary School Compound


M, Naval St., Sipac Almacen, Navotas City

Telefax: 02-8332-77-64
Email Address: navotas.city@deped.gov.ph

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy