0% found this document useful (0 votes)
83 views29 pages

3 Slkm-css-7 - 8 5 Using Www-Browser To Locate Information (No Answer Key)

1. The document provides information on using a web browser to locate information on the internet. It discusses the basic components of the internet, examples of web browsers like Google Chrome and Mozilla Firefox, and how to navigate between web pages using hyperlinks. 2. It also explains key terms related to browsing the web, such as the uniform resource locator (URL), hypertext transfer protocol (HTTP), and hyperlinks. 3. The overall objective is to teach the learner how to effectively use a web browser to search for information online.

Uploaded by

Lyssa Bas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views29 pages

3 Slkm-css-7 - 8 5 Using Www-Browser To Locate Information (No Answer Key)

1. The document provides information on using a web browser to locate information on the internet. It discusses the basic components of the internet, examples of web browsers like Google Chrome and Mozilla Firefox, and how to navigate between web pages using hyperlinks. 2. It also explains key terms related to browsing the web, such as the uniform resource locator (URL), hypertext transfer protocol (HTTP), and hyperlinks. 3. The overall objective is to teach the learner how to effectively use a web browser to search for information online.

Uploaded by

Lyssa Bas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

I.

Module 4 – Performing Computer Operations

Welcome to this Self-Learning Module. In this learning material, you


have find out what you already know by taking the pre-test, then you are
tasked to study the learning activities and perform the various practice tasks
1, 2 and 3. After studying and performing the practice tasks you may take the
post- test to determine the knowledge and skills you gained from this lesson.
You have to accomplish your assignment found in this module and you must
be able to apply what you have learned in another activity or in real life
situation.

In this lesson, you will learn how to use the WWW-browser using
internet to locate information. You can maintain computer equipment and
systems to prolong the life span of a computer system.

II. Objective

At the end of the module, the learner should be able to:


1. Use basic functions of a www-browser to locate information;
2. Maintain computer equipment and systems.

III. Vocabulary List

Back up - It means creating a redundant copy of a data so that in case anything


happens to the original data, you have a spare copy

Bookmark - is a method of saving a web page's address.

Browser - are applications or program used in displaying and viewing pages on the
World Wide Web.

Database - a collection of data records (webpages, graphics, audio files, newspaper,


books, movies or press releases)

Disk Clean-up - is a computer maintenance utility included in Microsoft Windows


designed to free up disk space on a computer's hard drive.

Disk Defragmenter - rearranges fragmented data so your disks and drives can work
more efficiently.

Homepage - starting point of a website. It gives you an overview of what you’ll find
at the website, or acts like a cover of a magazine.
1|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Hyperlink - are words, phrases or graphic images that have URLs hidden in them.

HyperText Markup Language (HTML) - This is the markup (formatting) language


for the web.

Hypertext Transfer Protocol (HTTP) - Allows for the retrieval of linked resources
from across the web.

Internet - is the interconnection of computers on a global scale in information


system.

Malware - refers to any kind of malicious codes, objects or content that infiltrates
your computer, resulting in damage and causing your system to act in an
undesirable manner.

Registry - is a system-defined database which is used by an Operating System to


store all the information needed to configure the Windows settings

Scan Disk - is designed to repair damaged hard drive sectors and clusters on your
computer’s hard drive.

Uniform Resource Locator (URL) - A kind of “address” that is unique and used to
identify to each resource on the web. It is also commonly called a URL.

World Wide Web is simply called as WEB. - it is an information system on the


Internet which allows documents or pages to be connected to other documents using
hypertext links, which enable the user to search for information or data by moving
from one document to another.

IV. Pre-Test

Direction: Select the best answer for each question. Write your answer on a
separate sheet of paper.

1. Which is the following does not belong to the group?


a. Google Chrome c. Microsoft Office
b. Microsoft Edge d. Mozilla Firefox

2. What is the application or program used in displaying and viewing pages on


the WWW?
a. Application Software c. Domain Name
b. Web Browser d. Microsoft Office

3. It is the process of navigating from one web page or web site to the another
site.
a. URL c. Hyperlink
2|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
b. Internet d. Browsing

4. It is a process which you create a copy of your computer files


a. System Update c. Virus Scan
b. Data Backup d. Copy and Paste

5. A process of computer system which cleans up your disk and improves


performance.
a. Malware Maintenance c. Disk Maintenance
b. Data Maintenance d. None of the above

V. Learning Activities

Read Information Sheet 1

USING WWW-BROWSER TO LOCATE INFORMATION


In the early age, researching of information is quite hard and challenging. You need
to locate the book and the author name in order to research in the library. Today locating
information is being made easy. In just one click, you can see many options to choose from
the same topic. This new era of technology, makes everything easy and simply but
sometimes it makes us lazier enough to understand and comprehend because we are
bombarded with so much information from the web.

Internet is the interconnection of computers on a global scale in information


system. It consists of millions of computers interconnected with one another via a
modem and Transmission Control Protocol/Internet Protocol suite, (TCP/IP).

Basic Components of Internet

Item Function

Computers  Accepts data or input from the


people.
 Process the input data.
 Produces an output, or information.
Telecommunicatio  Physically connects computers
n lines, broadband, routers, and other devices with each
or satellite other.
 Facilitates data transmission.
Routers/Modem  Manages the flow of data to ensure
that data goes to the correct
destination.
Electrical signals  The physical form or representation

3|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
for data.

How to Access the Internet?


A computer must be connected to an ISP (Internet Service Provider) to
access the Internet. ISP are companies that sells access to the internet.

Common ISP in the Philippines


 Bayantel
 Digitel
 Globe
 Smart
 DCTV
 Converge, Inc.
Products offered by the ISPs:
 Digital Subscriber Lines (DSL)
 Broadband (Smart, Globe)
 Satellite (WiFi)

World Wide Web

Sir Tim Berners-Lee is a British computer scientist. He invented the


World Wide Web in October 1990. He wrote the first web page editor/browser
which is WorldWideWeb.app and the first server which httpd. The first web
page was served on the open internet by the end of 1990.

It was in the year 1993 that CERN, a European Organization for


Nuclear Research, where Sir Tim was working, to announced the global wave
of creativity, collaboration and innovation.

In 1994, Sir Tim moved to Massachusetts Institute of Technology to


found the World Wide Web Consortium (W3C), an international community
devoted to developing open web standards. He remains the Director of W3C
to this day.

Web Browsers are applications or program used in displaying and viewing pages
on the WWW.

Examples of Web Browsers:

4|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Uniform Resource Locator (URL) addresses end in extensions that indicate the
type of organization sponsoring the web site. This specifies the internet address of
a file stored on a host computer connected to the internet.

Example of URL:
http://www.congress.gov.ph/leadrship/index.htm

Structure of URL
 Protocol – http
 Host Computer Name – www
 Second Level domain name – congress
 Top Level domain name - .gov
 Directory name – leadership
 File Name - index.htm

Hyper Text Transfer Protocol (HTTP) it transmits hypertext over networks.


This is the protocol of WWW

World Wide Web (WWW) or simply called as web is a computer-based


network of information resources that combines text and multimedia. It is a set of
protocols and software that allows the global computer network called the Internet
to display multimedia documents.

Domain Name the name of the web page to be visited, always the name that
is easy to remember.

Web Site is file of information located on a server connected to the World


Wide Web (WWW). It is a collection of web pages connected with each other called
hyperlinks which includes text, photographs, illustrations, video, music, or computer
programs.

Web Page is simply text documents written in HyperText Markup Language


(HTML). This can display text, images, and videos and can play sounds and
access another web page through hyperlink.

Hyperlinks is an underlined word in web sites usually on color blue and even
picture can be hyperlinked. It is the process of navigating from one web page or
web site to the another site. If a word or image has a hyperlink, once you click the
text or image you will be directed/transferred to another webpage.

How does the Web Works?

Web pages are stored on web browsers located around the world. Entering
the URL (Universal Resource Locator) of a web page in your web browser (ex.
Internet Explorer & Google) or clicking a link sends request to the server which
hosts the page. The server sends the web page to your computer and your web
browser displays it on your screen.

5|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Uses of Internet
1. Communication/E-mail (electronic mail) - it enables us to send and receive
messages through e-mail all over the world.
2. Information (researching) - you can access any information on any subject
through the internet. It is an important tool for research works and educational
purposes.
3. Group discussion (chatting and instant messaging) - we can meet around the
world with similar taste and preferences. Common topics of interests can be
discussed.
4. Entertainment (viewing movies and listening to musics) - offers thousands of
sites to access your favorite celebrity, current movie reviews and TV schedules
or even chat with your favorite movie stars and the latest happenings in sports
worldwide.
5. News - Update current news from news stations like CNN, NBC ABS-CBN or
from National papers.
6. On-Line Shopping - order desired goods and services in the comforts of your
home.
7. Free-Program/Software) (downloads) - Download of thousands of freeware
and shareware from the internet.
8. Online Games – playing online games that can be connected to each other.
9. Social Media – Using facebook, instagram, twitter and other social networking
sites.

Steps in Opening a Web Browser


1. Click Start
2. Click All Programs
3. Click Internet Explorer or Chrome or any web browser installed on your
computer.

Or: Double Click the Icon on the desktop or Click the Icon on the task bar.

Steps in Using a Search Engine


1. Open any web browser (Internet Explorer, Google Chrome, Opera)
2. Type in the Search Bar the keywords or topics to search for.
3. Click Internet Explorer or Chrome or any web browser installed on your
computer.

Why create a bookmark?


A bookmark is handy when you find a web page that you want to remember
and be able to look at another day. When you bookmark a web page, you are
creating a shortcut for quick access to that web page. You can access that bookmark

6|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
at any time to view the web page again without having to search the Internet to find
it.

Bookmark or electronic bookmark is a method of saving a web page's


address. While using most browsers, pressing Ctrl+D bookmarks the page you are

viewing. To bookmark a page using your mouse, click the icon (or something
similar) to the right of the address bar. In Microsoft Internet Explorer, bookmarks are
referred to as favorites.
Note: If you forget to bookmark a page and have forgotten the address, you can view your browser history.

How to View Bookmarks using Shortcuts?

Below is a list of keyboard shortcuts that access and view the bookmarks
in your browser.

 Google Chrome - Ctrl+Shift+O or Cmd+Shift+B


 Mozilla Firefox - Ctrl+B or Ctrl+Shift+B
 Microsoft Edge - Ctrl+I
 Internet Explorer - Ctrl+I
 Opera - Ctrl+Shift+B

Internet Explorer

If you're using Internet Explorer, follow these steps.

1. Open the Microsoft Internet


Explorer browser.

2. Navigate to the page you'd like to bookmark.

3. Right-click on a blank portion of the page and select Add to


Favorites... from the drop-down menu that appears.

Users may also press Ctrl+D, or click the start icon on the right side of
the address bar to add a bookmark.

4. In the window that appears, name your new bookmark (A), select a
destination for it (B), and then click the button (C).

7|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Chrome
1. Open the Google Chrome browser.

2. Navigate to the page you'd like to bookmark.

3. Press Ct

rl+D or click the icon on the far right side of the address bar.

4. Name the bookmark (A), select the folder you want it saved (B), and then

the button (C).

Firefox
1. Open the Mozilla Firefox browser.

2. Navigate to the page you'd like to bookmark.

8|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. Press Ctrl+D.

4. In the menu that appears, name your new bookmark (A), select the folder
you'd like it saved (B), and then click the button (C).

Bookmarked
Websites

Read Information Sheet 2

MAINTENANCE OF COMPUTER SYSTEM

Perhaps you have handpicked the finest computer with the selected fastest
processor and graphic card and with a few gigabytes of memory. So, you thought to
yourself that your machine is probably going to sustain you for the next five (5)
years. But little did you discover that some six months down the road, your computer
is behaving like a Pentium computer, perpetually flustering you with its choppy

9|Page
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
images, frustrating pop-ups and tremendously slow disk access. Gradually, your
computer crashes and all your data is lost on one fine afternoon.

If you feel that you should backup your valuable data, then you should decide
and select what are the data to be backup. Depending on your needs, you may
choose to backup your windows registry, or your Outlook Express mail data, or even
your windows security keys. Windows operating system's friendly interface allows
you to drag and drop computer files from one storage device to another. And this
can be as simple as copying a document file from your desktop into a flash drive,
CD/DVD, or external hard disk drive.

One thing you have probably missed out is the need for system maintenance.
The basic routine maintenance comprises of the 3 basic processes:

1. Data Backup
2. Malware Maintenance
3. Disk or File Maintenance

1. Data Backup
Backing up basically means creating a redundant copy of a data so that in
case anything happens to the original data, you have a spare copy. This is typically
a simple thing to do.

Why should I back up?


In general, you should back up any work or data that cannot be replaced
easily. Some examples are word processing documents, spreadsheets, databases
(for financial data), customer data, and personal files such as pictures, music files,
emails, etc.
As a rule of thumb, do not backup programs or system folders. Programs will
need to be reinstalled before you can run them and system folders can be restored
from your operating system install disc. Be sure to save program installation discs,
operating system discs, and registration information in a safe place. If you have

10 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
downloaded any of your applications, you should save the install files whenever
possible.

2. Malware Maintenance
Malware refers to any kind of malicious codes, objects or content that
infiltrates your computer, resulting in damage and causing your system to act in an
undesirable manner. Commonly, these include viruses, spyware, worms, trojan
horses, spams and many more. When you are infected, you can lose your privacy,
confidential data, and access to your system when software and hardware are
damaged. Fortunately, there are a couple of preventive measures you can take to
protect yourself from malware.

One thing you can do to scan the file for any virus infection before you
attempt to open it. If the scan shows nothing, it is probably a safe file. But then
again, it may be a new virus yet to be updated in your virus scan. You can either
wait and apply the next virus signature update and perform a second scan or risk it
all and open the file.

Installing and Updating Antivirus

Use the antivirus to check your computer HDDs, flash drives and other
storage devices for any files infected with viruses and malware. Make sure that your
antivirus has the latest update.

11 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. Disk Maintenance
Did anyone tell you that your hard disk is a tricky machine? When you first
installed your operating system, you may be pleased to know how smooth and
efficient your software applications are running. But gradually, it slows down and this
bothers you. What truly causes the decline in performance? You may argue that
your disk is just a couple of months old. This has much to do with the way you
operate on your system. Try to imagine a big tool bucket filled with gadgets.

Initially, the bucket only contains a few spanners, a hammer and some
screws. So every time you search for a particular item, it is relatively easy to find.
But soon as you keep filling the bucket with all sorts of items and especially when
the amount of items grows, you will discover that you may need more time just to
search for a particular screw head. In such cases, uninstall any unnecessary
software and defragment your disk. Typically, your system performance will decline
when the amount of data in your hard disk starts to grow.

12 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Procedure in Cleaning Hardware Components

Cleaning your computer and its components and peripherals helps keep the
in good working condition and helps keep the computers from spreading germs.

How often should I clean my computer?

The frequency of how often you should clean your computer varies on
several different factors. To help you determine how often you need to clean your
computer, we have created the chart below. Check the appropriate boxes below
that apply to your computer’s environment to determine how often it should be
cleaned.

General Cleaning Tips


Below is a listing of general tips that should be taken when cleaning any of the
components or peripherals of a computer, as well as tips to help keep a computer
clean.

1. Never spray or squirt any liquid onto any computer component. If a spray is
needed, spray the liquid onto a cloth and then use that cloth to rub down the
component.
2. You can use a vacuum to clean up dirt, dust, or hair around the computer on
the outside case. However, do not use a vacuum for the inside of your
computer as it generates a lot of static electricity that can damage the internal
components of your computer. If you need to use a vacuum to clean the
inside of your computer, use a portable battery powered vacuum designed to
do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before cleaning.

13 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
4. Be cautious when using any cleaning solvents; some individuals may have
allergic reactions to chemicals in cleaning solvents and some solvents can
even damage the case. Try to always use water or a highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or controls. In
addition, when cleaning the back of the computer, if anything is plugged in,
make sure turn off the PC and unplug the power cable.
6. When cleaning fans, especially the smaller fans within a portable computer or
laptop it is suggested that you either hold the fan or place something in-
between the fan blades to prevent it from spinning. Spraying compressed air
into a fan or cleaning a fan with a vacuum may cause damage or back
voltage to be generated.
7. Never eat or drink around the computer area.

PROCEDURES IN CLEANING HARDWARE COMPONENTS

Case Cleaning

Why do we need to clean the computer case regularly? It keeps the


appearance of the computer looking new. During cleaning, if ventilation locations
are found, these can be cleaned helping the case keep a steady airflow to the
computer, keeping components cool and in good working condition.

Procedures:

1) The plastic case that houses the PC components can be cleaned with a lint-
free cloth that has been slightly dampened with water. For stubborn stains,
add a little household detergent to the cloth. It is recommended that you
never use a solvent cleaner on plastics.
2) Make sure all vents and air holes are hair and lint free by rubbing a cloth over
the holes and vents. It is also helpful to take a vacuum around each of the
hole, vents, and crevices on the computer. It is safe to use a standard
vacuum when cleaning the outside vents of a computer. However, if you
need to clean the inside of the computer, use a portable battery powered
vacuum to prevent static electricity.

Hard Drive Cleaning

Why do we need to clean a hard drive? While hard drives cannot be


cleaned physically, they can be cleaned with various utilities on the computer to
help it run fast and more efficiently. Disk Management is one of the utilities that will
prevent the hard drive from slowing down.

14 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Procedure: Disk Management can be accessed in the Control Panel, look
for Administrative Tools, then double-click on the Computer Management icon. In
the System and Security window, click on the Administrative Tools. In the
Administrative Tools window, double-click on the Computer Management icon.

When Computer Management opens, click on Disk Management on the left


side of the window, located under Storage. After a brief loading period, Disk
Management should now appear on the right side of the Computer Management
window.

Keyboard Cleaning

Why do we need to clean the keyboard? The computer keyboard is often


the most germ infected item in your computer. Often, it will contain more bacteria
than your toilet seat. Cleaning it can help remove any dangerous bacteria. Dirt, dust
and hair can also build up causing the keyboard to malfunction.

Procedure: Before cleaning the keyboard, turn off the computer or unplug
the USB keyboard. Not unplugging the keyboard can result in causing other
computer problems as you may press keys that cause the computer to perform an
unwanted task.

Many people clean the keyboard by turning it upside down and shaking. A
more effective method is to use compressed air. Compressed air is pressurized air
contained in a can with a very long nozzle. Aim the air between the keys and blow
away all of the dust and debris that has gathered there. A vacuum cleaner can also
be used, but make sure the keyboard does not have loose "pop off" keys that could
possibly be drawn up by the vacuum.

After the dust, dirt, and hair had been removed spray a disinfectant onto a
cloth or use disinfectant cloths and rub each of the keys on the keyboard. As
mentioned in our general cleaning tips, never spray any liquid onto the keyboard.

LCD Monitor Screen Cleaning

Why do we need to clean the LCD screen? Dirt, dust, and finger prints can
cause the computer screen to project blurry images/texts.

Procedure: Unlike a computer monitor, the LCD or flat-panel display is not


made of glass, it therefore requires special cleaning procedures.

When cleaning the LCD screen, it is important to remember not to spray any
liquids onto the LCD directly. Press gently while cleaning, and do not use a paper
towel as it may cause the LCD to gather scratches.

15 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
To clean the LCD screen, use a non-rugged microfiber cloth, soft cotton
cloth, or swiffer duster. If a dry cloth does not completely clean the screen, you can
apply rubbing alcohol to the cloth and wipe the screen with the damp cloth.
Rubbing alcohol is used to clean the LCD before it leaves the factory.

Motherboard Cleaning

Why do we need to clean the motherboard? Dusts can build up and


corrode circuitry causing various problems such as computer lockups.

Caution: When working with motherboard, take necessary ESD precautions and
avoid unplugging any cables or other connections if you are not yet familiar with
it.

Procedure: Compressed air is recommended when cleaning the


motherboard from dust, dirt, or hair. When using compressed air, hold it in the up-
right position; otherwise, it is possible that chemicals may come out of the container
that could damage or corrode the motherboard or other component within the
computer. Also, make sure to always blow the dust or dirt away from the
motherboard, or out of the case.

Another good alternative to compressed air is to use a portable battery


powered vacuum that can effectively remove the dust, dirt, and hair from the
motherboard completely and prevent it from getting trapped within the case.
However, do not use a standard electric vacuum as it can cause a lot of static
electricity that can damage the computer. When using the vacuum, it is vital that you
stay a couple of inches away from the motherboard and all other components to
help prevent contact as well as to help prevent anything from being sucked into the
vacuum. Ensure that you do not remove any small components with the vacuum
such as jumpers.

Optical Mouse Cleaning

Why do we need to clean optical mouse


regularly? A dirty mouse (mouse with a ball) can be
difficult to move. It can also cause strange mouse
movement.

Procedure: To clean the optical mouse, you


must first wipe the bottom cover of the mouse. Turn
the mouse upside down to look at the lens.

If there is a smudge on the lens, gently clean the area with a plain cotton-
tipped swab. If there is debris in the lens, gently blow the debris away from the area.
Check the surface on which you are using the mouse.

Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's
mouse movement.
16 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Ways to Improve your Computer's Performance

1. DISK DEFRAGMENTATION

Fragmentation makes your hard disk do extra work that can slow down your
computer. Removable storage devices such as USB flash drives can also become
fragmented. Disk Defragmenter rearranges fragmented data so your disks and
drives can work more efficiently. Disk Defragmenter runs on a schedule, but you can
also analyze and defragment your disks and drives manually.

When you store data into the hard disk, the data will normally occupy the disk
in continuous manner if there is sufficient data space on disk. Imagine if you delete
some data files, this will then leave some "gaps" in data space. When new data files
need to be stored and if the size of these data files could not fit into a single gap, the
data files will be segmented and fitted across several gaps with interval. Your hard
disk progressively becomes fragmented after excessive usage of writing, deleting
and storing of data into your disk.

A file is typically broken into several small parts and stored in various areas
on a hard disk. When a read request is executed, the disk will search for the
multiple pieces, process and link them and finally present it on screen from the
computer when you read a file or execute an application.

Besides improvement in system performance, disk defragmentation will also


improve data recovery yield in case your disk needs to be sent in for recovery
process. For a similar reason, you should not perform defragmentation after
accidental data deletion as this will overwrite the deleted data when data blocks are
moved or replaced.

To defrag your hard disk, follow these steps:

1. Open Disk Defragmenter by clicking the Start button. or


2. In the search box, type Disk Defragmenter, and then, in the list of results,
click Disk Defragmenter.
3. Under Current status, select the disk you want to defragment.
4. To determine if the disk needs to be defragmented or not, click Analyze disk.
If you are prompted for an administrator password or confirmation, type the
password or provide confirmation.

Once Windows is finished analyzing the disk, you can check the
percentage of fragmentation on the disk in the Last Run column. If the
number is above 10%, you should defragment the disk.

5. Click Defragment disk. If you are prompted for an administrator password or


confirmation, type the password or provide confirmation.

17 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Disk Defragmenter might take from several minutes to a few hours to finish,
depending on the size and degree of fragmentation of your hard disk. You can still
use your computer during the defragmentation process.

Notes:

• If the disk is already in exclusive


use by another program or is
formatted using a file system other
than NTFS file system, FAT, or
FAT32, it cannot be defragmented.
• Network locations cannot be
defragmented.
• If a disk that you are expecting to
see under Current status is not
showing up there, it might be
because it contains an error. Try to
repair the disk first, then return to
Disk Defragmenter to try again.

2. CLEANING WINDOWS REGISTRY

Registry is a system-defined database which is used by an Operating System to


store all the information needed to configure the Windows settings for 1 or more
users, applications and hardware devices. Information contained in registry includes
user's profiles, application installed on the computer, types of documents that are
created, setting of properties sheet for each application folder and icon, existing
hardware in the system, and all the ports that are being used.

Why cleaning the registry is important?

When using the computer, users may have experienced quite a number of
problems relating to registry issues that may result in severe consequences such as
error messages pop-up, noticeably slow performance of a system or even system
crash. The reasons leading to these problems, however, are mainly caused by
missing or invalid registry key(s) from the Windows registry.

Usually, when any particular application is uninstalled from Windows, it is


recommended that you should use Add or Remove Programs feature to proceed
(Start menu>Control Panel >Add or Remove Programs) However, if you delete any
program manually without using this function, you might mistakenly move away the
registry key in the OS or even leave behind the orphaned registry key. This, of
course, will cause the problem of missing/ invalid registry entries. Other actions
include deletion of startup programs, installation of software embedded with
spyware or changes in hardware.

18 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
And because of the above reasons, cleaning Windows registry has become
an essential and crucial action that you need to implement regularly.
Do it regularly or you might experience losing all important data due to the system
breakdown.

Can I Delete the Registry by Myself?

The answer is "No". When you attempt to remove the registry by your own,
the risk that you may remove the valid registry is high because without the registry
cleaner software, it is not easy to determine which registry belongs to which
application. Therefore, this may cause the system to crash or the software to
malfunction.

How Do I Clean Windows Registry?

You can either buy Windows Registry cleaner software available in the
market or download a free trial package from the Internet to try out before paying a
full version. When run, this software will first identify the problems with your
Windows registry such as missing/invalid key references. After that, it will proceed
to probe your request for registry removal.

Below are some basic and useful features that you must consider when
choosing the Registry Cleaner software:

• ability to scan for the whole computer system for invalid/ orphan registry
• ability to backup all the current registry in the system
• have an "undo" feature to restore the cleaning action
• options on which to choose registry key(s) to be deleted
• online updating of the software should be available

Now, with the software running regularly, it will have saved up a large amount
of disk space for your PC. The system then will run as smoothly and efficiently like
before.

3. SCAN DISK/CHECK DISK

Scan Disk is one of the most common maintenance tools bundled with an
operating system. This is an application that checks the computer’s hard drive for
errors and bad sectors. Once Scan Disk finds an error in the hard drive, it will
attempt to fix it.

There are a number of reasons for the errors found inside a hard drive and
these include:

 frequent system crashes;


 critical system applications that have been improperly closed; and

19 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
 the existence of harmful programs such as viruses, trojans, etc.

What Does Scan Disk/Check Disk Do?

Scan Disk is designed to repair damaged


hard drive sectors and clusters on your computer’s
hard drive. Majority of errors detected with the
utility programs permit the application to recover
the data stored in the damaged regions of the hard
drive. When Scan Disk finds a bad or damaged
cluster during a scan, it will move the information
stored in that cluster to a new location on the
computer’s hard drive. Scan Disk also checks and
repairs the integrity of file systems such as FAT,
FAT32, and NTFS.

Scan Disk requires exclusive access to a drive when it executes. Hence,


if one or more of the files are open on the drive that you want to scan, Scan Disk
may display a prompt asking if you want to schedule the drive check the next
time you restart your computer.

Once Scan Disk finishes its task, it provides a report that contains the errors
it has found and the amount of disk space it has scanned. It is therefore important
for users to use the Scan Disk application because it ensures that their data is safe
from being corrupted. Aside from this, there is a guarantee that their computer will
perform at optimum levels.

In the deployment of Windows 7, the Scan Disk utility underwent a name


change and is now called “CHKDSK” that performs the same functions as the
legacy application for the Operating System.

Run CHKDSK Using the Graphical User Interface (GUI)

Step 1 – Select the “Computer” option from the Start menu.


Step 2 – Right click the drive to check for errors followed by clicking the
“Properties” menu button.
Step 3 – Select the “Tools” menu option followed by the “Check Now” menu
button.

If the computer drive is in use, the Operating System will display a dialogue
menu asking if you desire to schedule a full scan in the future.

20 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
4. DELETING TEMPORARY FILES

Remove Unnecessary Data Files and Programs

Files and programs that are left idle or cluttering in your computer tend to
affect the performance of your system. This happens when the disk space is heavily
occupied and more computer resources are allocated to keep track of them. During
a read request, the disk needs to bypass all unnecessary files to access the
required data. Hence, there is a significant performance dip. In certain situations,
poorly written applications can cause undesirable effects such as erratic system
hangs, blue screens or conflict with other software.

A. Unused Software Application

These are usually the software program that you have installed but used rarely if
not at all. To remove unwanted programs and applications, follow these steps:

 Click Start, point to


Settings,
 select Control Panel.
 Double click on the
Add/Remove Programs
icon.
 Select the unused
program and click on the
Remove button.

B. Temporary Internet Files

These are files that accumulate in your computer when you surf the web. Temporary
files such as graphics, web pages and cookies are downloaded into a special
temporary folder to facilitate efficient web browsing. To delete all temporary Internet
files, follow these steps:

21 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
• Click Start, point to Settings,
select Control Panel.
• Double click on Internet Options.
• Under the Temporary Internet
Files group box, click the Delete
File button.
• Check the Delete All Offline
Content option on the new
window and click Ok.

C. Windows Temporary Files

Windows temporary files are


generated and stored in your computer
each time you perform a software
installation or procedure. Very often,
poorly written programs fail to delete
them, hence causing them to be left idle
in your disk.

To delete these temporary files, follow these steps:

• Click Start, point to


Programs, point to
Accessories.
• Point to System Tools
and select Disk
Cleanup.
• Select the drive to clean
up
• Click OK.

22 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
5. DISK CLEANUP

Disk Cleanup is a computer maintenance utility that is included in the


Microsoft Windows operating system and is designed to free up space on the hard
drive. Disk Cleanup helps free up space on your hard drive. Disk Cleanup searches
your drive, and then shows you temporary files, Internet cache files, and
unnecessary program files that you can safely delete. The cleanup process involves
searching and analyzing the hard drive for files that are no longer needed. Then it
proceeds to remove them and thus freeing up disk space on the hard drive.

Here is the list of all the files that can be deleted in performing Disk Cleanup:
1. Downloaded program files
2. Temporary Internet files
3. Offline webpages
4. File for the Recycle Bin
5. Temporary files
6. Web client/publisher temporary files
7. Compressed old files
8. Catalog files for the content indexer

Disk Cleanup is a feature of Windows that enables a user to delete system/junk


files safely. For example, by using the disk cleanup feature, you can free up a
considerable amount of space on your PC, like getting rid of TIF (Temporary
Internet Files) and other 'useless', and not required, files.

To reduce the number of unnecessary files on your hard disk to free up disk
space and help your computer run faster, use Disk Cleanup. It removes temporary
files, empties the Recycle Bin, and removes a variety of system files and other items
that you no longer need.

To delete files using Disk Cleanup


The following procedure cleans up files associated with your user account. You
can also use Disk Cleanup to clean up all the files on your computer.

1. Open Disk Cleanup by clicking the Start button or


2. In the search box, type Disk Cleanup, and then, in the list of results, click
Disk Cleanup.

23 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
3. In the Drives list, click the hard disk
drive that you want to clean up, and
then click OK.
4. In the Disk Cleanup dialog box, on
the Disk Cleanup tab, select the
check boxes for the file types that
you want to delete, and then click
OK.
5. In the message that appears, click
Delete files.

6. System Update

System Updates were designed to address software and security issues and
problems in our computers. This ensures safe computing.
To update your operating system, just follow the steps below:
1. Click on the Windows 10 start button
2. Click the Settings – the one with gear-liked icon.
3. In the windows Settings that would appear on your screen, scroll down to
Update and Security and click it.
4. In the Windows update window, click Check for updates. Restart your
computer after the installation of updates.

24 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
VI. Practice Tasks

Practice Task 1

A. Direction: Identify web browsers on the boxes. Write your answer on a


separate sheet of paper.

1. 4.

2. 5.

3.

B. Direction: Match items on Column B with Column A that best describes


the statement. Write your answers on a separate sheet of paper.

Column A Column B
1. Designed to repair damaged hard drive A. Disk Cleanup
sectors and clusters on your computer’s
hard drive.
2. It is a system-defined database which is B. Data Backup
used by an Operating System to store all
the information needed to configure the
Windows settings.
3. It is a computer maintenance utility included C. Scan Disk
in Microsoft Windows designed to free up
disk space on a computer's hard drive.
4. Creating a redundant copy of a data so that D. Registry
in case anything happens to the original
data, you have a spare copy.
5. Rearranges fragmented data so your disks E. Disk Defragmentation
and drives can work more efficiently.

Practice Task 2
25 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
A. Direction: Using the internet, identify the owner or company and the date it
was introduced or developed of the following browser images. Write
your answer on a separate sheet of paper.

Year
Web Name of the Owner of the
Introduced/
Browser Web Browser Company/Developer
Developed
1.

2.

3.

4.

5.

B. Direction: Write an essay about the importance of cleaning computer


hardware components. Relate your statements to the most treasured
skills you acquired in the lesson.
Rubrics:
Excellent Good Poor
CONTENTS
(3) (2) (1)
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but one
with uppercase letters.
Punctuation Correct ending punctuation in
every sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing and
alignment.
Total Points

Practice Task 3

26 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
Direction: Perform the following computer maintenance procedure task. You
can refer to this module or you can search for a video in youtube and
bookmark the video for easy access and reference.

Task 5 4 3 2 1
Excellent Very Good Fair Poor
Good
Disk Cleanup
Disk Defragmentation
Scan Disk/Check Disk
Delete Temporary Files
Clean Windows Registry
Total Score

Interpretation of Score
25-21 – Excellent
20-16 – Very Good
15-11 – Good
10-6 – Fair
5-1 – Poor

VII. Post Test

Direction: Select the best answer for each question. Write your answer on a
separate sheet of paper.

1. What is the application or program used in displaying and viewing pages on


the WWW?
a. Application Software c. Domain Name
b. Web Browser d. Microsoft Office

2. Which is the following does not belong to the group?


a. Google Chrome c. Microsoft Office
b. Microsoft Edge d. Mozilla Firefox

3. It is the process of navigating from one web page or web site to the another
site.
a. Surfing c. Hyperlink
b. Internet d. Browsing

4. A process of computer system which cleans up your disk and improves


performance.
a. Malware Maintenance c. Disk Maintenance
b. Data Maintenance d. None of the above
27 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
5. It is a process which you create a copy of your computer files.
a. System Update c. Virus Scan
b. Data Backup d. Copy and Paste

6. What will happen if you avoid computer updates?


a. It slows down your computer system
b. It will give a disk clean up
c. It speeds up your computer system
d. It will receive additional protection.

7. It is a malicious code in our computer system which infiltrates personal data.


a. Anti-Virus b. Software c. Malware d. All of the above

8. As a computer technician, we should maintain our computer systems by


_____________.
a. Scan viruses regularly
b. Maintain software updates
c. Check both hardware and software problems
d. All of the above

9. To avoid data infiltration from viruses you must


a. Install anti-virus/spyware program
b. Install operating system
c. Install system updater
d. Install disk defragment program

10. How often should you run an Anti-virus software?


a. Once a week, full scan
b. Every hour, deep scan
c. Everyday, full scan and deep scan
d. Every year, full and deep scan

VIII. Assignment

Directions: Write an essay on Why computer system maintenance is


important? You can refer to this module or you can search in any search
engine and bookmark the site for easy access and reference until you are
not done with the activity.

RUBRIC FOR ESSAY


Content The content was well-thought, guide 4

28 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)
questions were thoroughly answered
Organization The paper was well-written with ideas 3
easily conveyed to readers
Development Points are thoroughly developed 3
Total 10

References:
 https://www.computerhope.com/issues/ch000858.htm
 https://webfoundation.org/about/vision/history-of-theweb/
 Computer Hardware Servicing Grade 10-Learning Materials

29 | P a g e
COMPUTER SYSTEMS SERVICING
Grade 7/8 (Exploratory Course)

You might also like