3 Slkm-css-7 - 8 5 Using Www-Browser To Locate Information (No Answer Key)
3 Slkm-css-7 - 8 5 Using Www-Browser To Locate Information (No Answer Key)
In this lesson, you will learn how to use the WWW-browser using
internet to locate information. You can maintain computer equipment and
systems to prolong the life span of a computer system.
II. Objective
Browser - are applications or program used in displaying and viewing pages on the
World Wide Web.
Disk Defragmenter - rearranges fragmented data so your disks and drives can work
more efficiently.
Homepage - starting point of a website. It gives you an overview of what you’ll find
at the website, or acts like a cover of a magazine.
1|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Hyperlink - are words, phrases or graphic images that have URLs hidden in them.
Hypertext Transfer Protocol (HTTP) - Allows for the retrieval of linked resources
from across the web.
Malware - refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an
undesirable manner.
Scan Disk - is designed to repair damaged hard drive sectors and clusters on your
computer’s hard drive.
Uniform Resource Locator (URL) - A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.
IV. Pre-Test
Direction: Select the best answer for each question. Write your answer on a
separate sheet of paper.
3. It is the process of navigating from one web page or web site to the another
site.
a. URL c. Hyperlink
2|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
b. Internet d. Browsing
V. Learning Activities
Item Function
3|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
for data.
Web Browsers are applications or program used in displaying and viewing pages
on the WWW.
4|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Uniform Resource Locator (URL) addresses end in extensions that indicate the
type of organization sponsoring the web site. This specifies the internet address of
a file stored on a host computer connected to the internet.
Example of URL:
http://www.congress.gov.ph/leadrship/index.htm
Structure of URL
Protocol – http
Host Computer Name – www
Second Level domain name – congress
Top Level domain name - .gov
Directory name – leadership
File Name - index.htm
Domain Name the name of the web page to be visited, always the name that
is easy to remember.
Hyperlinks is an underlined word in web sites usually on color blue and even
picture can be hyperlinked. It is the process of navigating from one web page or
web site to the another site. If a word or image has a hyperlink, once you click the
text or image you will be directed/transferred to another webpage.
Web pages are stored on web browsers located around the world. Entering
the URL (Universal Resource Locator) of a web page in your web browser (ex.
Internet Explorer & Google) or clicking a link sends request to the server which
hosts the page. The server sends the web page to your computer and your web
browser displays it on your screen.
5|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Uses of Internet
1. Communication/E-mail (electronic mail) - it enables us to send and receive
messages through e-mail all over the world.
2. Information (researching) - you can access any information on any subject
through the internet. It is an important tool for research works and educational
purposes.
3. Group discussion (chatting and instant messaging) - we can meet around the
world with similar taste and preferences. Common topics of interests can be
discussed.
4. Entertainment (viewing movies and listening to musics) - offers thousands of
sites to access your favorite celebrity, current movie reviews and TV schedules
or even chat with your favorite movie stars and the latest happenings in sports
worldwide.
5. News - Update current news from news stations like CNN, NBC ABS-CBN or
from National papers.
6. On-Line Shopping - order desired goods and services in the comforts of your
home.
7. Free-Program/Software) (downloads) - Download of thousands of freeware
and shareware from the internet.
8. Online Games – playing online games that can be connected to each other.
9. Social Media – Using facebook, instagram, twitter and other social networking
sites.
Or: Double Click the Icon on the desktop or Click the Icon on the task bar.
6|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
at any time to view the web page again without having to search the Internet to find
it.
viewing. To bookmark a page using your mouse, click the icon (or something
similar) to the right of the address bar. In Microsoft Internet Explorer, bookmarks are
referred to as favorites.
Note: If you forget to bookmark a page and have forgotten the address, you can view your browser history.
Below is a list of keyboard shortcuts that access and view the bookmarks
in your browser.
Internet Explorer
Users may also press Ctrl+D, or click the start icon on the right side of
the address bar to add a bookmark.
4. In the window that appears, name your new bookmark (A), select a
destination for it (B), and then click the button (C).
7|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Chrome
1. Open the Google Chrome browser.
3. Press Ct
rl+D or click the icon on the far right side of the address bar.
4. Name the bookmark (A), select the folder you want it saved (B), and then
Firefox
1. Open the Mozilla Firefox browser.
8|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. Press Ctrl+D.
4. In the menu that appears, name your new bookmark (A), select the folder
you'd like it saved (B), and then click the button (C).
Bookmarked
Websites
Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5)
years. But little did you discover that some six months down the road, your computer
is behaving like a Pentium computer, perpetually flustering you with its choppy
9|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
images, frustrating pop-ups and tremendously slow disk access. Gradually, your
computer crashes and all your data is lost on one fine afternoon.
If you feel that you should backup your valuable data, then you should decide
and select what are the data to be backup. Depending on your needs, you may
choose to backup your windows registry, or your Outlook Express mail data, or even
your windows security keys. Windows operating system's friendly interface allows
you to drag and drop computer files from one storage device to another. And this
can be as simple as copying a document file from your desktop into a flash drive,
CD/DVD, or external hard disk drive.
One thing you have probably missed out is the need for system maintenance.
The basic routine maintenance comprises of the 3 basic processes:
1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
1. Data Backup
Backing up basically means creating a redundant copy of a data so that in
case anything happens to the original data, you have a spare copy. This is typically
a simple thing to do.
10 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
downloaded any of your applications, you should save the install files whenever
possible.
2. Malware Maintenance
Malware refers to any kind of malicious codes, objects or content that
infiltrates your computer, resulting in damage and causing your system to act in an
undesirable manner. Commonly, these include viruses, spyware, worms, trojan
horses, spams and many more. When you are infected, you can lose your privacy,
confidential data, and access to your system when software and hardware are
damaged. Fortunately, there are a couple of preventive measures you can take to
protect yourself from malware.
One thing you can do to scan the file for any virus infection before you
attempt to open it. If the scan shows nothing, it is probably a safe file. But then
again, it may be a new virus yet to be updated in your virus scan. You can either
wait and apply the next virus signature update and perform a second scan or risk it
all and open the file.
Use the antivirus to check your computer HDDs, flash drives and other
storage devices for any files infected with viruses and malware. Make sure that your
antivirus has the latest update.
11 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. Disk Maintenance
Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and
efficient your software applications are running. But gradually, it slows down and this
bothers you. What truly causes the decline in performance? You may argue that
your disk is just a couple of months old. This has much to do with the way you
operate on your system. Try to imagine a big tool bucket filled with gadgets.
Initially, the bucket only contains a few spanners, a hammer and some
screws. So every time you search for a particular item, it is relatively easy to find.
But soon as you keep filling the bucket with all sorts of items and especially when
the amount of items grows, you will discover that you may need more time just to
search for a particular screw head. In such cases, uninstall any unnecessary
software and defragment your disk. Typically, your system performance will decline
when the amount of data in your hard disk starts to grow.
12 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Procedure in Cleaning Hardware Components
Cleaning your computer and its components and peripherals helps keep the
in good working condition and helps keep the computers from spreading germs.
The frequency of how often you should clean your computer varies on
several different factors. To help you determine how often you need to clean your
computer, we have created the chart below. Check the appropriate boxes below
that apply to your computer’s environment to determine how often it should be
cleaned.
1. Never spray or squirt any liquid onto any computer component. If a spray is
needed, spray the liquid onto a cloth and then use that cloth to rub down the
component.
2. You can use a vacuum to clean up dirt, dust, or hair around the computer on
the outside case. However, do not use a vacuum for the inside of your
computer as it generates a lot of static electricity that can damage the internal
components of your computer. If you need to use a vacuum to clean the
inside of your computer, use a portable battery powered vacuum designed to
do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before cleaning.
13 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
4. Be cautious when using any cleaning solvents; some individuals may have
allergic reactions to chemicals in cleaning solvents and some solvents can
even damage the case. Try to always use water or a highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or controls. In
addition, when cleaning the back of the computer, if anything is plugged in,
make sure turn off the PC and unplug the power cable.
6. When cleaning fans, especially the smaller fans within a portable computer or
laptop it is suggested that you either hold the fan or place something in-
between the fan blades to prevent it from spinning. Spraying compressed air
into a fan or cleaning a fan with a vacuum may cause damage or back
voltage to be generated.
7. Never eat or drink around the computer area.
Case Cleaning
Procedures:
1) The plastic case that houses the PC components can be cleaned with a lint-
free cloth that has been slightly dampened with water. For stubborn stains,
add a little household detergent to the cloth. It is recommended that you
never use a solvent cleaner on plastics.
2) Make sure all vents and air holes are hair and lint free by rubbing a cloth over
the holes and vents. It is also helpful to take a vacuum around each of the
hole, vents, and crevices on the computer. It is safe to use a standard
vacuum when cleaning the outside vents of a computer. However, if you
need to clean the inside of the computer, use a portable battery powered
vacuum to prevent static electricity.
14 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Procedure: Disk Management can be accessed in the Control Panel, look
for Administrative Tools, then double-click on the Computer Management icon. In
the System and Security window, click on the Administrative Tools. In the
Administrative Tools window, double-click on the Computer Management icon.
Keyboard Cleaning
Procedure: Before cleaning the keyboard, turn off the computer or unplug
the USB keyboard. Not unplugging the keyboard can result in causing other
computer problems as you may press keys that cause the computer to perform an
unwanted task.
Many people clean the keyboard by turning it upside down and shaking. A
more effective method is to use compressed air. Compressed air is pressurized air
contained in a can with a very long nozzle. Aim the air between the keys and blow
away all of the dust and debris that has gathered there. A vacuum cleaner can also
be used, but make sure the keyboard does not have loose "pop off" keys that could
possibly be drawn up by the vacuum.
After the dust, dirt, and hair had been removed spray a disinfectant onto a
cloth or use disinfectant cloths and rub each of the keys on the keyboard. As
mentioned in our general cleaning tips, never spray any liquid onto the keyboard.
Why do we need to clean the LCD screen? Dirt, dust, and finger prints can
cause the computer screen to project blurry images/texts.
When cleaning the LCD screen, it is important to remember not to spray any
liquids onto the LCD directly. Press gently while cleaning, and do not use a paper
towel as it may cause the LCD to gather scratches.
15 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
To clean the LCD screen, use a non-rugged microfiber cloth, soft cotton
cloth, or swiffer duster. If a dry cloth does not completely clean the screen, you can
apply rubbing alcohol to the cloth and wipe the screen with the damp cloth.
Rubbing alcohol is used to clean the LCD before it leaves the factory.
Motherboard Cleaning
Caution: When working with motherboard, take necessary ESD precautions and
avoid unplugging any cables or other connections if you are not yet familiar with
it.
If there is a smudge on the lens, gently clean the area with a plain cotton-
tipped swab. If there is debris in the lens, gently blow the debris away from the area.
Check the surface on which you are using the mouse.
Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's
mouse movement.
16 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Ways to Improve your Computer's Performance
1. DISK DEFRAGMENTATION
Fragmentation makes your hard disk do extra work that can slow down your
computer. Removable storage devices such as USB flash drives can also become
fragmented. Disk Defragmenter rearranges fragmented data so your disks and
drives can work more efficiently. Disk Defragmenter runs on a schedule, but you can
also analyze and defragment your disks and drives manually.
When you store data into the hard disk, the data will normally occupy the disk
in continuous manner if there is sufficient data space on disk. Imagine if you delete
some data files, this will then leave some "gaps" in data space. When new data files
need to be stored and if the size of these data files could not fit into a single gap, the
data files will be segmented and fitted across several gaps with interval. Your hard
disk progressively becomes fragmented after excessive usage of writing, deleting
and storing of data into your disk.
A file is typically broken into several small parts and stored in various areas
on a hard disk. When a read request is executed, the disk will search for the
multiple pieces, process and link them and finally present it on screen from the
computer when you read a file or execute an application.
Once Windows is finished analyzing the disk, you can check the
percentage of fragmentation on the disk in the Last Run column. If the
number is above 10%, you should defragment the disk.
17 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Disk Defragmenter might take from several minutes to a few hours to finish,
depending on the size and degree of fragmentation of your hard disk. You can still
use your computer during the defragmentation process.
Notes:
When using the computer, users may have experienced quite a number of
problems relating to registry issues that may result in severe consequences such as
error messages pop-up, noticeably slow performance of a system or even system
crash. The reasons leading to these problems, however, are mainly caused by
missing or invalid registry key(s) from the Windows registry.
18 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
And because of the above reasons, cleaning Windows registry has become
an essential and crucial action that you need to implement regularly.
Do it regularly or you might experience losing all important data due to the system
breakdown.
The answer is "No". When you attempt to remove the registry by your own,
the risk that you may remove the valid registry is high because without the registry
cleaner software, it is not easy to determine which registry belongs to which
application. Therefore, this may cause the system to crash or the software to
malfunction.
You can either buy Windows Registry cleaner software available in the
market or download a free trial package from the Internet to try out before paying a
full version. When run, this software will first identify the problems with your
Windows registry such as missing/invalid key references. After that, it will proceed
to probe your request for registry removal.
Below are some basic and useful features that you must consider when
choosing the Registry Cleaner software:
• ability to scan for the whole computer system for invalid/ orphan registry
• ability to backup all the current registry in the system
• have an "undo" feature to restore the cleaning action
• options on which to choose registry key(s) to be deleted
• online updating of the software should be available
Now, with the software running regularly, it will have saved up a large amount
of disk space for your PC. The system then will run as smoothly and efficiently like
before.
Scan Disk is one of the most common maintenance tools bundled with an
operating system. This is an application that checks the computer’s hard drive for
errors and bad sectors. Once Scan Disk finds an error in the hard drive, it will
attempt to fix it.
There are a number of reasons for the errors found inside a hard drive and
these include:
19 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
the existence of harmful programs such as viruses, trojans, etc.
Once Scan Disk finishes its task, it provides a report that contains the errors
it has found and the amount of disk space it has scanned. It is therefore important
for users to use the Scan Disk application because it ensures that their data is safe
from being corrupted. Aside from this, there is a guarantee that their computer will
perform at optimum levels.
If the computer drive is in use, the Operating System will display a dialogue
menu asking if you desire to schedule a full scan in the future.
20 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
4. DELETING TEMPORARY FILES
Files and programs that are left idle or cluttering in your computer tend to
affect the performance of your system. This happens when the disk space is heavily
occupied and more computer resources are allocated to keep track of them. During
a read request, the disk needs to bypass all unnecessary files to access the
required data. Hence, there is a significant performance dip. In certain situations,
poorly written applications can cause undesirable effects such as erratic system
hangs, blue screens or conflict with other software.
These are usually the software program that you have installed but used rarely if
not at all. To remove unwanted programs and applications, follow these steps:
These are files that accumulate in your computer when you surf the web. Temporary
files such as graphics, web pages and cookies are downloaded into a special
temporary folder to facilitate efficient web browsing. To delete all temporary Internet
files, follow these steps:
21 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
• Click Start, point to Settings,
select Control Panel.
• Double click on Internet Options.
• Under the Temporary Internet
Files group box, click the Delete
File button.
• Check the Delete All Offline
Content option on the new
window and click Ok.
22 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
5. DISK CLEANUP
Here is the list of all the files that can be deleted in performing Disk Cleanup:
1. Downloaded program files
2. Temporary Internet files
3. Offline webpages
4. File for the Recycle Bin
5. Temporary files
6. Web client/publisher temporary files
7. Compressed old files
8. Catalog files for the content indexer
To reduce the number of unnecessary files on your hard disk to free up disk
space and help your computer run faster, use Disk Cleanup. It removes temporary
files, empties the Recycle Bin, and removes a variety of system files and other items
that you no longer need.
23 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. In the Drives list, click the hard disk
drive that you want to clean up, and
then click OK.
4. In the Disk Cleanup dialog box, on
the Disk Cleanup tab, select the
check boxes for the file types that
you want to delete, and then click
OK.
5. In the message that appears, click
Delete files.
6. System Update
System Updates were designed to address software and security issues and
problems in our computers. This ensures safe computing.
To update your operating system, just follow the steps below:
1. Click on the Windows 10 start button
2. Click the Settings – the one with gear-liked icon.
3. In the windows Settings that would appear on your screen, scroll down to
Update and Security and click it.
4. In the Windows update window, click Check for updates. Restart your
computer after the installation of updates.
24 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
VI. Practice Tasks
Practice Task 1
1. 4.
2. 5.
3.
Column A Column B
1. Designed to repair damaged hard drive A. Disk Cleanup
sectors and clusters on your computer’s
hard drive.
2. It is a system-defined database which is B. Data Backup
used by an Operating System to store all
the information needed to configure the
Windows settings.
3. It is a computer maintenance utility included C. Scan Disk
in Microsoft Windows designed to free up
disk space on a computer's hard drive.
4. Creating a redundant copy of a data so that D. Registry
in case anything happens to the original
data, you have a spare copy.
5. Rearranges fragmented data so your disks E. Disk Defragmentation
and drives can work more efficiently.
Practice Task 2
25 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
A. Direction: Using the internet, identify the owner or company and the date it
was introduced or developed of the following browser images. Write
your answer on a separate sheet of paper.
Year
Web Name of the Owner of the
Introduced/
Browser Web Browser Company/Developer
Developed
1.
2.
3.
4.
5.
Practice Task 3
26 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Direction: Perform the following computer maintenance procedure task. You
can refer to this module or you can search for a video in youtube and
bookmark the video for easy access and reference.
Task 5 4 3 2 1
Excellent Very Good Fair Poor
Good
Disk Cleanup
Disk Defragmentation
Scan Disk/Check Disk
Delete Temporary Files
Clean Windows Registry
Total Score
Interpretation of Score
25-21 – Excellent
20-16 – Very Good
15-11 – Good
10-6 – Fair
5-1 – Poor
Direction: Select the best answer for each question. Write your answer on a
separate sheet of paper.
3. It is the process of navigating from one web page or web site to the another
site.
a. Surfing c. Hyperlink
b. Internet d. Browsing
VIII. Assignment
28 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
questions were thoroughly answered
Organization The paper was well-written with ideas 3
easily conveyed to readers
Development Points are thoroughly developed 3
Total 10
References:
https://www.computerhope.com/issues/ch000858.htm
https://webfoundation.org/about/vision/history-of-theweb/
Computer Hardware Servicing Grade 10-Learning Materials
29 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)