TLE - Znnhs.zdnorte

2y ago
15 Views
2 Downloads
1,004.91 KB
24 Pages
Last View : 17d ago
Last Download : 3m ago
Upload by : Luis Waller
Transcription

78TLEQuarter 0 – Module 2:Performing Computer OperationsPart 2

TLE – ICT – Computer System Servicing – Grade 7Alternative Delivery ModeQuarter 0 – Module 2: Performing Computer OperationsFirst Edition, 2020Republic Act 8293, section 176 states that: No copyright shall subsist in anywork of the Government of the Philippines. However, prior approval of the governmentagency or office wherein the work is created shall be necessary for exploitation of suchwork for profit. Such agency or office may, among other things, impose as a conditionthe payment of royalties.Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,trademarks, etc.) included in this module are owned by their respective copyrightholders. Every effort has been exerted to locate and seek permission to use thesematerials from their respective copyright owners. The publisher and authors do notrepresent nor claim ownership over them.Published by the Department of EducationSecretary: Leonor Magtolis BrionesUndersecretary: Diosdado M. San AntonioDevelopment Team of the ModuleWriter: Louelyn M. LajotEditors: Mark Dave M. Vendiola, Jesusa D. PaladarReviewers: Mark Dave M. Vendiola, Jesusa D. Paladar, Ruth Marie B. EltanalTypesetter: Angelica G. ZambranoLayout Artist: Louelyn M. LajotManagement Team: Senen Priscillo P. Paulin, CESO VRosela R. AbieraFay C. Luarez, TM, Ed.D., Ph.D.Maricel S. RasidAdolf P. AguilarElmar L. CabreraNilita L. Ragay, Ed.D.Antonio B. Baguio, Jr.Printed in the Philippines byDepartment of Education –Region VII Schools Division of Negros OrientalOffice Address:Tele #:E-mail Address:Kagawasan, Ave., Daro, Dumaguete City, Negros Oriental(035) 225 2376 / 541 1117negros.oriental@deped.gov.ph

7TLEQuarter 0 – Module 2:Performing Computer OperationsPart 2

Introductory MessageFor the facilitator:Welcome to the TLE – ICT – Computer System Servicing 7 Alternative DeliveryMode (ADM) Module on Performing Computer Operations!This module was collaboratively designed, developed and reviewed byeducators both from public and private institutions to assist you, the teacheror facilitator in helping the learners meet the standards set by the K to 12Curriculum while overcoming their personal, social, and economicconstraints in schooling.This learning resource hopes to engage the learners into guided andindependent learning activities at their own pace and time. Furthermore, thisalso aims to help learners acquire the needed 21st century skills while takinginto consideration their needs and circumstances.In addition to the material in the main text, you will also see this box in thebody of the module:Notes to the TeacherThis contains helpful tips or strategiesthat will help you in guiding thelearners.As a facilitator, you are expected to orient the learners on how to use thismodule. You also need to keep track of the learners' progress while allowingthem to manage their own learning. Furthermore, you are expected toencourage and assist the learners as they do the tasks included in the module.ii

For the learner:Welcome to the TLE – ICT – Computer System Servicing 7 Alternative DeliveryMode (ADM) Module on Performing Computer Operations!This module was designed to provide you with fun and meaningfulopportunities for guided and independent learning at your own pace and time.You will be enabled to process the contents of the learning resource whilebeing an active learner.This module has the following parts and corresponding icons:What I Need toKnowWhat I KnowThis will give you an idea of the skills orcompetencies you are expected to learn inthe module.This part includes an activity that aimsto check what you already know aboutthe lesson to take. If you get all theanswers correct (100%), you may decideto skip this module.What’s InThis is a brief drill or review to help youlink the current lesson with the previousone.What’s NewIn this portion, the new lesson will beintroduced to you in various ways; astory, a song, a poem, a problem opener,an activity or a situation.What is ItThis section provides a brief discussion ofthe lesson. This aims to help you discoverand understand new concepts and skills.What’s MoreWhat I HaveLearnedWhat I Can DoThis comprises activities for independentpractice to solidify your understandingand skills of the topic. You may check theanswers to the exercises using theAnswer Key at the end of the module.This includes questions or blanksentence/paragraph to be filled in toprocess what you learned from thelesson.This section provides an activity whichwill help you transfer your newiii

knowledge or skill into real life situationsor concerns.AssessmentThis is a task which aims to evaluate yourlevel of mastery in achieving the learningcompetency.Additional ActivitiesIn this portion, another activity will begiven to you to enrich your knowledge orskill of the lesson learned.Answer KeyThis contains answers to all activities inthe module.At the end of this module you will also find:ReferencesThis is a list of all sources used indeveloping this module.The following are some reminders in using this module:1. Use the module with care. Do not put unnecessary mark/s on any partof the module. Use a separate sheet of paper in answering the exercises.2. Don’t forget to answer What I Know before moving on to the otheractivities included in the module.3. Read the instruction carefully before doing each task.4. Observe honesty and integrity in doing the tasks and checking youranswers.5. Finish the task at hand before proceeding to the next.6. Return this module to your teacher/facilitator once you are throughwith it.If you encounter any difficulty in answering the tasks in this module, donot hesitate to consult your teacher or facilitator. Always bear in mind thatyou are not alone.We hope that through this material, you will experience meaningfullearning and gain deep understanding of the relevant competencies. Youcan do it!iv

What I Need to KnowThis module was designed and written with you in mind. It is here to help youmaster the nature of Biology. The scope of this module permits it to be usedin many different learning situations. The language used recognizes thediverse vocabulary level of students. The lessons are arranged to follow thestandard sequence of the course. But the order in which you read them canbe changed to correspond with the textbook you are now using.The module is divided into three lessons, namely: Lesson 4 – Transfer Data Using Computer SoftwareLesson 5 – Using Browser to Locate InformationLesson 6 – Basic Computer MaintenanceAfter going through this module, you are expected to:1. transfer files and data between compatible systems using computersoftware, hardware/peripheral devices;2. adhere to standard operating procedures when transferring files anddata;3. establish information requirements for internet search;4. follow steps in launching browser and loading search engine;5. implement basic file maintenance procedures in line with the standardsoperating procedures;6. appreciate the importance of basic file maintenance.

What I KnowMultiple Choice. Select the letter of the correct answer for each question.Write the answers in your notebook.1. It is a wireless technology that allows the exchange of data betweendifferent devices in short distances.a. Wi-Fib. ShareItc. Bluetoothd. USB2. Which of the following does not belong to the group?a. flash driveb. iCloudc. Dropboxd. OneDrive3. It is an application use to share files between cellphones with only theBluetooth is on.a. Wi-Fib. ShareItc. Blueteethd. USB4. Which is an example of online storage?a. One Driveb. Googlec. Twitter5. What is the complete name of WWW?a. World Wire Webb. World Wire Wedd. Disk Drivec. World Wide Webd. World Wise Wed6. What year was this URL-based information system published publicly?a. 1990b. 1991c. 1992d. 19937. Which of the following does not belong to the group?a. Google Chromec. Microsoft Edgeb. Mozilla Firefoxd. Safari Forest8. It is a process in which you create a copy of your computer files.a. System Updatec. Virus Scanb. Data Backupd. All of the Above9. What will happen if you avoid computer updates?a. slows down computer systemb. gives a disk clean upc. speeds up computer systemd. nothing happens

10. It is a malicious code in our computer system which infiltrates personaldata.a. Anti-Virusb. Softwarec. Malware d. Pandemic11. As a computer technician we should maintain our computer systemsby a. Scanning viruses regularlyc. Maintaining software updatesb. Checking system problemsd. All of the above12. A process of computer system which cleans up your disk and improvesperformance.a. Malware maintenancec. Disk maintenanceb. Data maintenanced. None of the above13.To avoid data infiltration from viruses you musta. Install anti-virus/spyware programc. Install operating systemc. Install disk defragment programd. Install system updater14.It is a type of data backup which happens once a day.a. System image backupc. Full File Backupb. Differential file backupd. None of the above15. A type of malware which steals your internet data usage and sensitiveinformation.a. Trojanb. Wormc. Spywared. Spam

Lesson4Transfer Data UsingComputer SoftwareWhat’s InFor the review and introduction to this lesson, answer the followingquestions: What are the different input and output devices? What devices will you use in transferring data from one device toanother? How is data transferred from one device to another done?What’s NewIdentification.Direction: Identify four (4) other hardware or peripheral devices or softwarethat are used to transfer data. Write answers in your notebook.1. Bluetooth2.3.4.5.

What is ItTransfer Files and DataThere are several ways on how to transfer files and data betweencompatible systems using computer software, hardware and peripheralsdevices. You need to know the following:1. Files such as documents, pictures, music and email, and2. Peripherals or hardware this is where you can transfer from onedevice to another just like computer to flash disk or vice versa,cellphone to cellphone, computer to computer and so on.Ways to Transfer Files and Data1. Computer to ComputerIn this way, you will use a localconnection or router either wired orwireless connections where the computersare connected to the same network to meetand can transfer files to each other.2. Computer to External Storage DeviceHere, you need of course an externalstorage just like flash disk or memory cardwhere you can transfer files from computerto external storage or vice versa.3. Mobile Phone to Mobile PhoneIn these two same devices, Bluetoothconnection should be turned on in order totransfer files from each other. Others prefer to usethe ShareIt (third party software) applicationsbecause it is very fast and easy to install.4. Computer, Cellphone, Laptop to Online StorageYou can transfer files from computers andcellphones or vice versa easily using cloud storageservices like OneDrive, Dropbox or Google drive.When transferring files from different devices toonline storage, make sure you are connected to theinternet. Applications are available to download andinstall for easy access of the online storage.

What’s MoreIdentify the following images of the hardware/peripherals that is usedto transfer files from the computer system to other peripherals. Choose youranswers from the WORD BANK. Write your answer in your notebook.WORD BANKHardware/PeripheralAnswer1. Universal Serial Bus (USB)Universal Serial Bus (USB)2.External Hard DriveShareIt3.CellphoneBluetooth4.5.

What I Have LearnedBelow are some important concepts regarding the previous lesson. Addanother item to show what you have learned from the lesson. Write youranswer in your notebook.1. Bluetooth is a wireless technology that allows the exchange of databetween different devices. However it is only on a short distance for thedevices to stay connected.2. Online Storage is a cloud storage of the files and data especially for backup purposes. It is for free. Most of the websites allowed limited storageonly.3. External Storage device comes in many forms, both removable and nonremovable. It includes flash drive, floppy disk, hard drive or compact drive.4.What I Can DoIn this activity, you are to write a detailed steps in any one of the waysin transferring files and data. Write the answer on a short sized bond paper.The rating criteria is shown below.Relevance and Content CreativityTotal -70%30%100%

Lesson5Using Browser to LocateInformationWhat’s InIn the early age, researching of information is quite hard andchallenging. You need to locate the book and the author name in order toresearch in the library. Today locating information is being made easy. In justone click, you can see many options to choose from the same topic.How do you think using computer browser make locating informationeasier?What’s NewCan you name the different browsers? Try to identify four (4) otherbrowsers in the World Wide Web. Write your answers in your notebook.1. Google Chrome2.3.4.5.What is ItWeb Browser and World Wide WebWeb Browsers are software installed on your PC. On the Web, when younavigate through pages of information, this is commonly known as webbrowsing or web surfing.

Sir Tim Berners-Lee is a British computer scientist. He invented theWorld Wide Web in October 1990. He wrote the first web page editor/browserwhich is WorldWideWeb.app and the first server which httpd. The first webpage was served on the open internet by the end of 1990.It was in the year 1993 that CERN, a European Organization for NuclearResearch, where Sir Tim was working, to announced the global wave ofcreativity, collaboration and innovation.In 1994, Sir Tim moved to Massachusetts Institute of Technology tofound the World Wide Web Consortium (W3C), an international communitydevoted to developing open web standards. He remains the Director of W3Cto this day.Parts of Web browser: HyperText Markup Language (HTML) - This is the markup or format languagefor the web. Uniform Resource Identifier (URI) - A kind of “address” that is unique andused to identify to each resource on the web. It is also commonly calleda URL. Hypertext Transfer Protocol (HTTP) - Allows for the retrieval of linkedresources from across the web.Web Browser TypesInternet ExplorerInternet Explorer (IE) is a product from software giantMicrosoft. This is the most commonly used browser in the universe.This was introduced in 1995 along with Windows 95 launch and ithas passed Netscape popularity in 1998.Google ChromeThis web browser is developed by Google and its beta versionwas first released on September 2, 2008 for Microsoft Windows.Today, chrome is known to be one of the most popular web browserwith its global share of more than 50%.Mozilla FirefoxFirefox is a new browser derived from Mozilla. It was releasedin 2004 and has grown to be the second most popular browser onthe Internet.

SafariSafari is a web browser developed by Apple Inc. and includedin Mac OS X. It was first released as a public beta in January 2003.Safari has very good support for latest technologies like XHTML,CSS2 etc.OperaOpera is smaller and faster than most other browsers, yet itis full- featured. Fast, user-friendly, with keyboard interface,multiple windows, zoom functions, and more.What’s MoreIn this activity, identify the owner or company of the followingbrowser images. Choose your answers from the WORD BANK. Write youranswer in your notebook.WORD BANKHardware/PeripheralAnswer1.Mozilla Corporation2.Google CompanyApple Company3.Microsoft CompanyNorwegian Company4.5.

What I Have LearnedBelow are some important concepts regarding the previous lesson. Addanother item to show what you have learned from the lesson. Write youranswer in your notebook.1. World Wide Web is called as WEB. It is an information system on theInternet which allows documents or pages to be connected to otherdocuments using hypertext links, which enable the user to search forinformation or data by moving from one document to another.2. HyperText Markup Language (HTML). This is the markup (formatting)language for the web.3. Uniform Resource Identifier (URI). A kind of “address” that is uniqueand used to identify to each resource on the web. It is also commonly calleda URL.4. Hypertext Transfer Protocol (HTTP). Allows for the retrieval of linkedresources from across the web.5.What I Can DoIn this activity, you will use a web browser to locate the information onthe topic “computer maintenance” and answer the questions that follow inyour notebook.Note: (As this activity needs a cellphone/PC and internet connection, pleaseproceed only if you have them. If you don’t have them, please ask assistancethrough call to any relative who can assist you. However, if the first twooptions are still difficult to do, you may perform this activity later when thehealth advisories will allow for face-to-face classes.)1.2.3.4.What browser did you use in locating the information?What website location did you click? What is the URL of the site?What copyright year and name of the website?Copy one paragraph about computer maintenance on the site that youvisit.

Lesson6Basic ComputerMaintenanceWhat’s InDo you own any device? What do you do to keep it working? In thislesson, you will learn how to take care of computers.What’s NewQuick CheckCopy the worksheet below in your notebook and check thecorresponding column for the status of your knowledge on basic computermaintenance.STATUSAREAI have no ideaI have a littleI can performabout this.knowledge on this.this task.1. Anti-Spyware Program2. Anti-Virus Program3. System MaintenanceWhat is ItMaintenance of Computer SystemPerhaps you have handpicked the finest computer with the selectedfastest processor and graphic card and with a few gigabytes of memory. So,you thought to yourself that your machine is probably going to sustain youfor the next five (5) years. But little did you discover that some six monthsdown the road, your computer is behaving like a Pentium computer,perpetually flustering you with its choppy images, frustrating pop-ups andtremendously slow disk access. Gradually, your computer crashes and allyour data is lost on one fine afternoon.

One thing you have probably missed out is the need for systemmaintenance. The basic routine maintenance comprises of the 3 basicprocesses: data backup, malware maintenance and disk or file maintenance.Data BackupBacking up basically means creating aredundant copy of a data so that in caseanything happens to the original data, youhave a spare copy. This is typically a simplething to do.What data should I back up?In general, you should back up any work or data that cannot bereplaced easily. Some examples are word processing documents,spreadsheets, databases (for financial data), customer data, and personal filessuch as pictures, music files, emails, etc. As a rule of thumb, do not backupprograms or system folders. Programs will need to be reinstalled before youcan run them and system folders can be restored from your operating systeminstall disc. Be sure to save program installation discs, operating systemdiscs, and registration information in a safe place. If you have downloadedany of your applications, you should save the install files whenever possible.Malware MaintenanceMalware refers to any kind of malicious codes, objects or content thatinfiltrates your computer, resulting in damage and causing your system toact in an undesirable manner. Commonly, these include viruses, spyware,worms, trojan horses, spams and many more. When you are infected, you canlose your privacy, confidential data, and access to your system when softwareand hardware are damaged. Fortunately, there are a couple of preventivemeasures you can take to protect yourself from malware.One thing you can do to scan the file for anyvirus infection before you attempt to open it. If thescan shows nothing, it is probably a safe file. Butthen again, it may be a new virus yet to be updatedin your virus scan. You can either wait and apply thenext virus signature update and perform a secondscan or risk it all and open the file.Disk MaintenanceDid anyone tell you that your hard disk is a trickymachine? When you first installed your operating system,you may be pleased to know how smooth and efficient yoursoftware applications are running. But gradually, it slowsdown and this bothers you. What truly causes the declinein performance? This has much to do with the way youoperate on your system.To do disk maintenance, uninstall any unnecessary software anddefragment your disk. Typically, your system performance will decline whenthe amount of data in your hard disk starts to grow.

What’s MoreIn this activity, list down the five (5) types of malware. Write youranswer in your notebook.1.2.3.4.5.What I Have LearnedBelow are some important concepts regarding the previous lesson. Addanother item to show what you have learned from the lesson. Write youranswer in your notebook.1. Malware refers to any kind of malicious codes, objects or content thatinfiltrates your computer, resulting in damage and causing your system toact in an undesirable manner.2. Disk Clean-up (cleanmgr.exe) is a computer maintenance utility includedin Microsoft Windows designed to free up disk space on a computer's harddrive.3. Back up It means creating a redundant copy of a data so that in caseanything happens to the original data, you have a spare copy.4.What I Can DoWrite an essay about the importance of Data Backup. Relate yourstatements to the most treasured skills you acquired in the lesson. Give alsoyour own title for the essay (minimum of 400 words). Write it in a short sizebondpaper.The rating criteria is shown below.Relevance and Content 70%Creativity30%Total 100%

AssessmentMultiple Choice. Select the letter of the correct answer for each question.Write the answers in your notebook.1. It is a wireless technology that allows the exchange of data betweendifferent devices in short distances.a. Wi-Fib. ShareItc. Bluetoothd. USB2. Which of the following does not belong to the group?a. flash driveb. iCloudc. Dropboxd. OneDrive3. It is an application use to share files between cellphones with only theBluetooth is on.a. Wi-Fib. ShareItc. Blueteethd. USB4. Which is an example of online storage?a. One Driveb. Googlec. Twitter5. What is the complete name of WWW?a. World Wire Webb. World Wire Wedd. Disk Drivec. World Wide Webd. World Wise Wed6. What year was this URL-based information system published publicly?a. 1990b. 1991c. 1992d. 19937. Which of the following does not belong to the group?a. Google Chromec. Microsoft Edgeb. Mozilla Firefoxd. Safari Forest8. It is a process in which you create a copy of your computer files.a. System Updatec. Virus Scanb. Data Backupd. All of the Above9. What will happen if you avoid computer updates?a. slows down computer systemb. gives a disk clean upc. speeds up computer systemd. nothing happens

10. It is a malicious code in our computer system which infiltrates personaldata.a. Anti-Virusb. Softwarec. Malware d. Pandemic11. As a computer technician we should maintain our computer systemsby a. Scanning viruses regularlyc. Maintaining software updatesb. Checking system problemsd. All of the above12. A process of computer system which cleans up your disk and improvesperformance.a. Malware maintenancec. Disk maintenancec. Data maintenanced. None of the above13.To avoid data infiltration from viruses you musta. Install anti-virus/spyware programc. Install operating systemc. Install disk defragment programd. Install system updater14.It is a type of data backup which happens once a day.a. System image backupc. Full File Backupb. Differential file backupd. None of the above15. A type of malware which steals your internet data usage and sensitiveinformation.a. Trojanb. Wormc. Spywared. SpamAdditional ActivitiesDirection: Answer the riddle below about computer. Write the answer in yournotebook. I have many keys but usually only two or three locks. What am I?

References2004-2020. neosmart.net. Accessed August 12, 020. webfoundation.org. Accessed August 12, y-of-the-%20web/2020. cisco.com. Accessed August 12, ty/advancedmalware-protection/what-is-malware2020. en.wikipedia.org. Accessed August 12, 2020.https://en.wikipedia.org/wiki/Disk Cleanup2020. tutorialpoints.com. Accessed August 11, 2020.https://www.tutorialspoint.com/web developers guide/web browsertypes.htmGoodman, Paul. (June 15, 2020). “Computer Basics: What Is an OutputDevice? 10 Examples”. Accessed August 12, sics-10-Examplesof-Output-DevicesPatkar, Mihir. (November 26, 2019). “5 Ways to Transfer Files From OneComputer to Another”. makeuseof.com. Accessed August 11, fer-files-from-onecomputer-to-another/Pequiro, Chemby Mae S. and Sam Uriel U. Reyes. Computer System ServicingQuarter 1 – Module 3: Performing Computer Operations Part 3 Module.1st Edition. Cagayan de Oro: DepEd, Division of Cagayan de Oro City,2020.Vaughan-Nichols, Steven J. (June 8, 2020). “Best Cloud Services in 2020”.zdnet.com. Accessed August 12, efer/mergedProjects/sending/snd tutorialspoint.com/web developers guide/web browser otect-your-site-frommalware/

For inquiries or feedback, please write or call:Department of Education – Schools Division of Negros OrientalKagawasan, Avenue, Daro, Dumaguete City, Negros OrientalTel #: (035) 225 2376 / 541 1117Email Address: negros.oriental@deped.gov.phWebsite: lrmds.depednodis.net

transfer files from each other. Others prefer to use the ShareIt (third party software) applications because it is very fast and easy to install. 4. Computer, Cellphone, Laptop to Online Storage You can transfer files from computers and cellphones or vice versa easily using cloud

Related Documents:

DIPOLOG CITY GOVERNMENT TLE - Dressmaking Grade 7/8 SUPPORT MATERIAL FOR INDEPENDENT LEARNING ENGAGEMENT Quarter 1 - Module 1: Sewing Tools and Their Uses First Edition, 2020 Printed in the Philippines by _ Department of Education - Region IX - Dipolog City Schools Division Office Address: Purok Farmers, Olingan, Dipolog City

The TLE that is functional is one which equips students with skills for lifelong learning. TLE that is concerned only with mere definition of terms is meaningless and shallow. TLE that is focused on mastery of skills and processes without right work values is anemic and dangerous.

Grades 7-8 TLE – Certificate of Competency The 26 TLE specializations are EXPLORATORY. Teaching of these TLE specializations is focused on 5 common competencies : 1. Use of tools 2. Maintenance of tools 3. Measurement and computation 4. Interpreting drawing 5. Occupational safety and health 51

carnival Grand Opening! Arrgh! These Preschool 1 students from TLE West Palm Beach, FL are all dressed up for their “Pirate’s Life” party! This TLE student had the right to be adorable while trying out new careers at the Manahawkin center. It was all smiles when the TLE East Brunswick,

English – Grade 7 Alternative Delivery Mode Quarter 3 – Module 1: Multimedia Resources First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of

Isinalin sa Filipino ni Roderic P. Urgelles Isinilang si Liongo sa isa sa pitong bayang nasa baybaying- dagat ng Kenya. Siya ay nagmamay-ari ng karangalan bilang pinakamahusay na makata sa kanilang lugar. Malakas at mataas din siya tulad ng isang higante, na hindi nasus

pindang na usa at isang hita ng patong-bundok sa kanilang kapitbahay na si Mang Tasyo, at nagsaing ng maputing bigas na pinag-inutan niyang pulutin sa . magputok ang dibdib ni Sisa sa sama ng loob ay nakuha pa rin niyang matuwa . masunurin, matapat at mabait sa

American Gear Manufacturers Association 500 Montgomery Street, Suite 350 Alexandria, VA 22314--1560 Phone: (703) 684--0211 FAX: (703) 684--0242 E--Mail: tech@agma.org website: www.agma.org Leading the Gear Industry Since 1916. May 2004 iii Publications Catalog How to Purchase Documents Unless otherwise indicated, all current AGMA Standards, Information Sheets and papers presented at Fall .