0% found this document useful (0 votes)
45 views22 pages

Grade 10 MODULE

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views22 pages

Grade 10 MODULE

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

u

ICT 10: CSS

Name:
________________________________

Grade & Sec.:


________________________________

Computer System Servicing


for Digital learners
Asia Academic School
Don MC
ICT Enriquez
Tools for Digital Drive,
LearnersDon Alfaro St.
1
M.M. Ayesha Allian-Schuck City
Tetuan Zamboanga
ICT Teacher
ASIA ACADEMIC SCHOOL
. Introduction to Computer System Servicing
 The relevance of CSS in Today's industry

In today’s industry, almost every establishment needs the assistance of technology and uses technology in almost
every aspect of the workflow. These establishments and businesses are now transitioning their services towards the use
of information technology to promote them.

The demand for personnel who offers computer servicing and repair continues to rapidly increase as industries
changes automate their process. With that being said, these sectors require individuals that are capable of adapting to the
ever-increasing demand for support for those technologies.
In most cases, companies that provide services such as internet connections, telecommunication and the like have
technology that requires repairs and maintenance. Computer hardware, Network Infrastructure, and Computer Equipment
are some of the technologies that need the expert care of Computer System Servicing personnel.

What is
Computer System Servicing?
Computer Systems Servicing (CSS NCII) is the upgraded version of what is then
called Computer Hardware Servicing (CHS NCII)qualification. During the late
CHS, the qualification was said to be of the NCII level, meaning that in a
ranking basis, it is the baseline level.

This consists of competencies that an aspirant must possess to enable to install


and configure computers systems, set-up computernetworks and servers, and to
maintain and repair computer systemsand networks.

This course is designed to develop knowledge, skills, and attitudes of a


Computer Service Technician in accordance with industry standards. It covers
basic and common competencies such as installing, maintaining, configuring,
and diagnosing computer systemsand networks.

ICT Tools for Digital Learners 2


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 What are the Opportunities for CSS aspirants?
Since society is now becoming more technology-driven and technology-dependent, it is no wonder that more
and more establishments are in need of the expertise of computer service providers. The Computer Systems
Servicing trains its learners with competencies that will allow them to diagnose and troubleshoot PC systems and
software issues, as well as restoring its parts to return the device to its normal function.

Here are Oportunities for CSS aspirants:

2.Personal Entrepreneurial Competencies

ICT Tools for Digital Learners 3


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 Personal Entrepreneurial Competencies

Entrepreneurs are those with the skills and capabilities to see and evaluate business opportunities. They are
individuals who can strategically identify products or services needed by the community, and have the capacity to deliver
them at the right time and at the right place.
Entrepreneurs are agents of economic change; they organize, manage, and assume risks of a business. Some of the
good qualities of entrepreneurs are: opportunity-seeker, risk-taker, goal-setter, excellent planner, confident problem-
solver, hardworking, persistent and committed.

Entrepreneurship, on the other hand, is not just a simple business activity but a strategic process of innovation and
new product creation. Basically, entrepreneurship is both an art and science of converting business ideas into marketable
products or services to improve the quality of living.

 Assessment of Personal Entrepreneurial Competencies (PECs)


Entrepreneurial competencies refer to the important characteristics that should be possessed by
an individual in order to perform entrepreneurial functions effectively. In this module, you will learn some of the most
important characteristics, attributes, lifestyle, skills and traits of a successful entrepreneur or an employee to be successful
in a chosen career.

Below are few important characteristics / traits / attributes of a good entrepreneur:

 Hardworking: One of the important characteristics of a good entrepreneur is hardworking. This means working
diligently and being consistent about it. Hardworking people keep improving their performance to produce good
products and/or provide good services.

 Confident: Entrepreneurs have self-reliance in one’s ability and judgment. They exhibit self-confidence to cope
with the risks of operating their own business.

 Disciplined: Successful entrepreneurs always stick to the plan and fight the temptation to do what is unimportant.

 Committed: Good entrepreneurs assume full responsibility over their business. They give full commitment and
solid dedication to make the business successful.

 Ability to accept change: Nothing is permanent but change. Change occurs frequently. When you own a
business, you should cope with and thrive on changes. Capitalize on positive changes to make your business
grow.

ICT Tools for Digital Learners 4


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 Creative: An entrepreneur should be creative and innovative to stay in the business and in order to have an edge
over the other competitors.

 Has the initiative: An entrepreneur takes the initiative. You must put yourself in a position where you are
responsible for the failure or success of your business.

 Profit-oriented: An entrepreneur enters the world of business to generate profit or additional income. The
business shall become your bread and butter. Therefore, you must see to it that the business can generate income.

Listed below are the important skills of a successful entrepreneur:

 Excellent planner: Planning involves strategic thinking and goal setting to achieve objectives by carefully
maximizing all the available resources. A good entrepreneur develops and follows the steps in the plans diligently
to realize goals. A good entrepreneur knows that planning is an effective skill only when combined with action.

 Possesses people skills: This is a very important skill needed to be successful in any kind of business. People
skills refer to effective and efficient communication and establishing good relationship to the people working in
and out of your business. In day-to-day business transactions, you need to deal with people. A well-developed
interpersonal skill can make a huge difference between success and failure of the business.

 Sound decision maker: Successful entrepreneurs have the ability to think quickly and to make wise decisions
towards a pre-determined set of objectives. No one can deny that the ability to make wise decisions is an
important skill that an entrepreneur should possess. Sound decisions should be based on given facts and
information and lead towards the pre-determined objectives.

3. CONFIGURING COMPUTER SYSTEMS AND NETWORKS

 Plan and Prepare for Configuration of


Computer Systems and Networks

 Safety Procedures

ICT Tools for Digital Learners 5


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
It is essential to maintain safe working conditions to prevent accidents and injury to any person or damage
to any object in a work area. New staff and visitors must be informed of the appropriate safety procedures. Any
transgression of the procedures must be reported.
As an aspiring computer technician, you should be aware of all possible dangers in the workplace. It is a
must to follow proper procedures for handling computer equipment. Failure to follow the prescribed safety
procedures could result in fines, criminal convictions, and damage to equipment, claims for damage from the
owner of the property and data, injury, or death.
A safe work space is clean, organized, and well-lit. The disposal or recycling of hazardous computer
components must be done properly. Make sure to follow regulations that govern how to dispose specific items.
When an organization violates these regulations, there can be legal consequences.
 General Safety Guidelines
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight.
As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury. Here
are some general safety guidelines:
 Remove your watch or any other jewelry and secure loose clothing.
 Turn off the power and unplug equipment before opening the case and performing service.
 Cover any sharp edges inside the computer case with tape.
 Never open a power supply or a monitor.
 Do not touch areas in printers that are hot or those which use high voltage.
 Know where the fire extinguisher is located and learn how to use it.
 Know where the first aid kit is located.
 Keep food and drinks out of your workspace.
 Keep your workspace clean and free of clutter.
 Lift heavy objects with sturdy leg support to avoid back injury.

 Fire Safety Guidelines
Follow fire safety guidelines to protect equipment and lives. Turn off and unplug the computer before
beginning a repair to avoid damage to the computer or electric shock to the technician. Fire can spread rapidly and
be very costly. Proper use of a fire extinguisher can prevent a small fire from getting out of control. When
working with computer components, always consider the possibility of an accidental fire and prepare how to react.
If there is a fire, you should follow these safety procedures:
 Always have a planned fire escape route before beginning any work.
 Never fight a fire that is out of control or not contained.
 Get out of the building quickly in case of an out-of-control fire.

ICT Tools for Digital Learners 6


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 Contact emergency services immediately for help.
 Prepare Materials and Tools Used for Configuration
A key to a well-tuned, trouble-free system is proper configuration. In order to accomplish this, you must start
by understanding its configuration. It can be difficult to figure out all the devices in your system and the resources they
are using.
To assist in this, several software tools have been created. These are typically called diagnostic utilities or
programs. Some of them are built-in to your operating system and others are available either for free download or
commercial purchase.
Some of the built-in tools used in Microsoft system configuration involves Microsoft System
Configuration, Register Edit, Direct X and Control Panel Applets.
Microsoft System Configuration: This boot configuration utility allows you to set the programs that will run at
startup and to edit configuration files. It also offers simplified control over Windows Services.
System Configuration Utility consists of five functional tabs such as General, Boot, Services, Startup and
Tools. The succeeding table describes the use and functionality of each tab:

Tab Function and Description

ICT Tools for Digital Learners 7


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
The general tab is the default tab in the System configuration and shows how
the computer will start, by default Normal startup should be selected.
List of choices for startup configuration:
General  Normal Startup. Starts Windows in the usual manner. Use this
mode to start Windows after you are done using the other two
modes to troubleshoot the problem.
 Diagnostic Startup. Starts Windows with basic services and
drivers only. This mode can help rule out basic Windows files
as the problem.
 Selective Settings. Starts Windows with basic services and
drivers and the other services and startup programs that you
select.

This tab allows you to make the same adjustments you can make in the
Boot Windows boot.ini file without having to edit the file. It shows configuration
options for the operating system and advanced debugging settings.

The Services tab allows you to enable or disable any of the Microsoft
Services Windows services or other program services running on the computer.

The Startup tab is one of the most frequent reasons most Windows users enter
Startup the System Configuration utility.

This Provides a convenient list of diagnostic tools and other advanced tools
Tools that you can run.

Control Panel applets


The names of various applets in the Control Panel differ slightly depending on the version of Windows
installed. In Windows XP, the icons are grouped into categories:
 Appearance and Themes: Applets that control the look of windows:
 Display
 Taskbar and Start menu
 Folder options
 Network and Internet Connections: Applets that configure all the connection types:
 Internet options
 Network connections
 Add or Remove Programs: An applet to add or remove programs and windows components safely
 Sounds, Speech, and Audio Devices: Applets that control all the settings for sound:
 Sounds and audio devices
 Speech
 Portable media devices
 Performance and Maintenance: Applets to find information about your computer or perform maintenance:
 Administrative tools
 Power options
 Scheduled tasks
 System
 Printers and Other Hardware: Applets to configure devices connected to your computer:

ICT Tools for Digital Learners 8


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 Game controllers
 Keyboard
 Mouse
 Phone and modem options
 Printers and faxes
 Scanners and cameras
 User Accounts: Applets to configure options for users and their e-mail:
 E-mail
 User accounts
 Date, Time, Language, and Regional Options: Applets to change settings based on your location and
language:
 Date and time
 Regional and language options
 Accessibility Options: A wizard used to configure windows for vision, hearing, and mobility needs
 Security Center: Applet used to configure security settings for:
 Internet options
 Automatic updates
 Windows firewall

4. Configure Computer System and Network


System Configuration is the way a system is set up, it is the collection of components that make up the
system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical
configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-
ROM drive, a VGA monitor, and the Windows Operating System.
Many software products require that the computer has a certain minimum configuration. For example, the
software might require a graphics display monitor and a video adapter, a particular microprocessor, and a
minimum amount of main memory capacity.
When you install a new device or program, you sometimes need to configure it, which
means that you need to set various switches and jumpers (for hardware) and to define values of parameters (for
software). For example, the device or program may need to know what type of video adapter you have and what
type of printer is connected to the computer.
Thanks to technological advancements, such as plug-and-play, much of this configuration is now
performed automatically.

Safety Precautions Related to Networks


Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables
must be pulled through ceilings and walls where there are obstacles or toxic materials. You should wear clothing
such as long pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to protect you from those
toxic materials.
Most importantly, wear safety glasses. If possible, ask building management, or someone responsible for
the building, if there are any dangerous materials or obstacles that you need to be aware of before entering the
ceiling area.
 Safety precautions when using a ladder:
 Read the labels on the ladder, and follow any safety instructions written on it.
 Never stand on the top rung of the ladder. You could easily lose your balance and fall.
 Make sure that people in the area know you will be working there.

ICT Tools for Digital Learners 9


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
 Cordon off the area with caution tape or safety cones.
 When you are using a ladder that leans up against a wall, follow the instructions written on the ladder, and
have someone hold the ladder to help keep it steady.

 Safety rules when working with cables:


The tools required to install copper and fiber-optic cable may cause danger through improper use. When
working with cables, strictly follow these safety rules:
 Make sure that the tools you are using are in good working condition.
 Watch what you are doing, and take your time. Make sure that you do not cut yourself or place anyone in
danger.
 Always wear safety glasses when cutting, stripping, or splicing cables of any kind. Tiny fragments can
injure your eyes.
 Wear gloves whenever possible, and dispose any waste properly.

Use common sense when installing cables and fixing network problems. Call for assistance for tasks that
you cannot do on your own.

 Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
 Dangerous chemicals
 Tools with sharp edges
 Light which you cannot see that can burn your eyes
 Glass shards produced by cutting fiber-optic cable that can cause bodily harm

Specific types of tools and chemicals are used when working with fiber-optic cable. These materials must be
handled with care.

Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme care.
Read the instructions on the label, and follow them carefully. Also, read the material safety data sheet (MSDS)
that accompanies the chemicals to know how to treat someone in case of emergency.

Tools
When working with any tool, safety should always be your first priority. Any compromise in safety could
result in serious injury or even death. The tools used for working with fiber optics have sharp cutting surfaces that
are used to scribe glass. Other tools pinch cables with high pressure to fasten connectors to them. These tools can
produce shards of glass that can splinter and fly into the air. You must avoid getting them on your skin and in your
mouth or eyes.

Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of glass
or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be extremely difficult to
see on your skin because they are clear and small. When you work with fiber-optic cabling, the working surface

ICT Tools for Digital Learners 10


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
should be a dark mat so that you can see the tiny glass or plastic fragments. The mat should also be resistant to
chemical spills.

You should keep the work area clean and neat. Never pick-up fiber-optic fragments with your fingers. Use
tape to pick up small fragments, and dispose them off properly. Use a disposable container, such as a plastic bottle
with a screw-on lid, to store fiber fragments. Close the lid tightly before disposing the container.

Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color that
humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier to inspect fiber-
optic cable and connectors, the light emitted from the fiber could be directed into your eyes. When working with
fiber, be sure to disconnect the light source. Use special detectors to help you tell if a fiber is energized.

 Networking Devices, Media and Connector


To make data transmission more extensible and efficient than a simple peer-to-peer network, network
designers use specialized network devices such as hubs, switches, routers, and wireless access points to send data
between devices. You have already discussed in your Grade 9 CHS class the different devices used in networking
and which provides you the knowledge on the common networking cables that are essential in putting up a
network.

 Common Network Cables


Until recently, cables were the only medium used to connect devices on networks. A wide variety of
networking cables are available. Coaxial and twisted-pair cables use copper to transmit data. Fiber-optic cables
use glass or plastic to transmit data. These cables differ in bandwidth, size, and cost.

 Twisted Pair
is a type of copper cabling that is used for telephone communications and most Ethernet networks. A
pair of wires forms a circuit that transmits data. The pair is twisted to provide protection against crosstalk, the
noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded
plastic insulation and are twisted together. An outer jacket protects the bundles of twisted pairs.

When electricity flows through a copper wire, a magnetic field is created around the
wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the
two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the
cancellation effect. Without the cancellation effect, your network communications become slow because of the
interference caused by the magnetic fields.

ICT Tools for Digital Learners 11


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
The two basic types of twisted-pair cables are as follows:
 Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires. This type of cable relies solely
on the cancellation effect produced by the twisted-wire pairs that limits signal degradation caused by
electromagnetic interface (EMI) and radio frequency interference (RFI). UTP is the most commonly used cabling
in networks. UTP cables have a range of 328 feet (100 m).
 Shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to better shield the wires from
noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP reduces electrical noise from
within the cable. It also reduces EMI and RFI from outside the cable.
Although STP prevents interference better than UTP, STP is more expensive because of the extra shielding. It is
also more difficult to install because of the thickness. In addition, the metallic shielding must be grounded at both
ends.

Category Rating
UTP comes in several categories that are based on two factors:
 The number of wires in the cable
 The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Megabyte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.

These extra twists further prevent interference from outside sources and from the other wires
within the cable. Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents
interference. The pairs also have more twists than Category 5e cable.

 Coaxial Cable
is a copper-cored cable surrounded by a heavy shielding. Coaxial
cable is used to connect the computers to the rest of the
network. Coaxial cable uses “British Naval Connectors (BNC)”
or “Bayonet Neill- Concelman” connectors, at the ends of the
cables to make the connection. Several types of coaxial cable
exist:

 Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500
meters.
 Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 185
meters.
 RG-59 is most commonly used for cable television in the U.S.
 RG-6 is higher-quality cable than RG-59, with more bandwidth and less susceptibility to interference.

 Fiber-Optic Cable

ICT Tools for Digital Learners 12


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
An optical fiber is a glass or plastic
conductor that transmits information using light. Fiber
optic cable has one or more optical fibers enclosed in a
sheath or jacket. Because it is made of glass, fiber- optic
cable is not affected by EMI or RFI. All signals are
converted to light pulses to enter the cable and are
converted back into electrical signals when they leave
it. This means that fiber-optic cable can deliver
signals that are clearer, and can go farther, without
compromising the clarity of signals. Fiber-optic cable
can reach distances of several miles or kilometers before
the signal needs to be regenerated. Fiber-optic cable
usually is more expensive to use than copper cable, and the connectors are more costly and harder to assemble.

These are the two types of glass fiber-optic cable:


 Multimode is the cable that has a thicker core than single-mode cable. It is easier to make, can use simpler light
sources such as Light Emitting Diodes (LEDs), and works well over distances of a few kilometers or less.
 Single-mode is the cable that has a very thin core. It is harder to make, uses lasers as a light source, and can
transmit signals dozens of kilometers with ease.

Creating Ethernet Cable

Ethernet cabling has been the standard in networking installation for years. It is the fastest way of
connecting PC to a peer or to your router or a central switch.

Fabricating an Ethernet Cross-over and Straight-through Cable

In an Ethernet networking environment – like in a home or an office with multiple PCs that are wired – the
computers need to be connected to a central router to allow data transfer. The router takes all the bits being sent
out by the computers and relays them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a network hub and
router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices directly, without the
need for a router in the middle. It simply reverses some of the pins so that the output on one computer is being
sent to the input of another. Bear in mind that safety precautions must always be applied and observed during the
fabrication of the said cables.
Also, materials and tools to be used must always be complete and functional to save time, money and
effort.
The following items are the materials and tools used for making Ethernet cables:
 Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
 RJ45 crimpable connectors for Cat5e;
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable tester.

ICT Tools for Digital Learners 13


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
ICT Tools for Digital Learners 14
M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
  Network Security
The Importance of Security in Computer System and Networks Computer and network security
help keep data and equipment safe by giving only the appropriate people access. Everyone in an organization should
give high priority to security, because everyone can be affected by a lapse in security. Theft, loss, network intrusion,
and physical damage are some of the ways a network or computer can be harmed. Damage or loss of equipment can
mean a loss of productivity. Repairing and replacing equipment can cost the company time and money. Unauthorized
use of a network can expose confidential information and reduce network resources. An attack that intentionally
degrades the performance of a computer or network can also harm an organization’s production. Poorly implemented
security measures that allow unauthorized access to wireless network devices demonstrate that physical connectivity
is not necessary for security breaches by intruders.

 Security Attacks
To successfully protect computers and the network, a technician must understand both of the following
types of threats to computer security:
 Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.
 Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information. Threats to
security can come from inside or outside an organization, and the level of potential damage can vary greatly. Potential
threats include the following:
 Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as
follows:
 Malicious threats are when an employee intends to cause damage.
 Accidental threats are when the user damages data or equipment unintentionally.
 External: Users outside an organization who do not have authorized access to the network or resources. External
attacks can be characterized as follows:
 Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and
run programs designed to vandalize.
 Structured attacks, which use code to access operating systems and software. Physical loss or damage to
equipment can be expensive, and data loss can be detrimental to your business and reputation. Threats
against data are constantly changing as attackers find new ways to gain entry and commit their crimes.

Viruses, Worms, and Trojan Horses

Computer viruses are created with malicious intent and sent by attackers.
A virus is attached to small pieces of computer code, software, or
ICT Tools for Digital Learners 15
M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
document. The virus executes when the software is run on a computer.
If the virus spreads to other computers, those computers could continue
to spread the virus. A virus is transferred to another computer through
e-mail, file transfers, and instant messaging. The virus hides by attaching
itself to a file on the computer. When the file is accessed, the virus
executes and infects the computer.
A virus has the potential to corrupt or even delete files on your computer,
use your e-mail to spread itself to other computers, or even erase your
hard drive. Some viruses can be exceptionally dangerous.
The most damaging type of virus is used to record keystrokes. Attackers can use these viruses to harvest sensitive
information, such as passwords and credit card numbers. Viruses may even alter or destroy information on a computer.
Stealth viruses can infect a computer and lay dormant until summoned by the attacker.

A worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the
hosts on a network, often without any user intervention. It is different from a virus because a worm does not need to
attach to a program to infect a host. Even if the worm does not damage data or applications on the hosts it infects, it harms
networks because it consumes bandwidth.

A Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden
in software that appears to do one thing, and yet behind the scenes it does another. Trojans often are disguised as useful
software. The Trojan program can reproduce or replicate like a virus and spread to other computers. Computer data
damage and production loss could be significant.

Security Procedures

You should use a security plan to determine what will be done in a critical situation.
Security plan policies should be constantly updated to reflect the latest threats to a network.
A security plan with clear security procedures is the basis for a technician to follow. Security plans should be
reviewed each year. Part of the process of ensuring security is conducting tests to determine areas where security is
weak. Testing should be done on a regular basis.
New threats are released daily. Regular testing provides details of any possible weaknesses in the current security
plan that should be addressed.
A network has multiple layers of
security, including physical, wireless,
and data. Each layer is subject to security
attacks. The technician needs to
understand how to implement security
procedures to protect equipment
and data.

ICT Tools for Digital Learners 16


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
Virus protection software, known as antivirus software, is software designed to detect, disable, and remove viruses,
worms, and Trojans before they infect a computer. Antivirus software becomes outdated quickly, however.
The technician is responsible for applying the most recent updates, patches, and virus definitions as part of a regular
maintenance schedule. Many organizations establish a written security policy stating that employees are not permitted to
install any software that is not provided by the company. Organizations also make employees aware of the dangers of
opening e-mail attachments that may contain a virus or worm.

Name: _________________________________________
Grade: _________________________________________

Activity 1:
Directions: Match the entrepreneurial competencies in column A with their meaning in column B. Write
the letter of the correct answer on the space provided before each number.

A B

____1. Creative A. makes wise decisions towards the set objectives

____2. Profit-oriented B. strategic thinking and setting of goals

____3. Disciplined C. trusting in one’s ability

____4. Sound decision maker D. adoptable to change


____5. Possess people skills
E. innovates to have an edge over other competitors
____6. Excellent Planner
F. solid dedication
____7. Confident
G. skillful in record keeping
____8. Hardworking
H. always sticks to the plan

ICT Tools for Digital Learners 17


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
____9. Ability to accept
Change I. work diligently

____10. Committed J. effective and efficient communication


skills and relates well to people

K. always looking for an opportunity to have/earn


income.

Activity 2:
Directions: Write SECURITY if the underlined word on the subsequent statement makes it true and
VIRUS if it is makes the statement a false one then write the correct term/word to correct it. (2 points each).
Write your answer on the space provided.

1. Computer and network security help keep data and equipment safe. __________
2. A technician’s secondary responsibilities include data and network security. __________
3. Threats to security can come from inside and outside the organization. __________
4. Computer viruses are created and sent by attackers who have malicious intent. __________
5. A virus is transferred to another computer through e-mail, file transfer and instant messaging. __________

Activity 3:
True or False
Directions: Write TRUE if the statement is correct and FALSE if otherwise.

_______1. A safe workplace is clean, organized and well-lit.


_______2. One must unplug the power from the source before opening a case and performing services.
_______3. It is a best practice that a fire extinguisher and first aid kit be available in the workplace.
_______4. You are allowed to open the power supply or a monitor.
_______5. You can bring food and drinks inside the laboratory.
_______6. The key to a well-tuned computer system is the proper configuration.
_______7. Boot log stores all information from the boot process.
_______8. Registry is a collection of databases of configuration of database of configuration in Windows
Operating System.
_______9. The shortcut of Microsoft Configuration is Ipconfig.
_______10. Configuration is the way a system is set up.

Activity 4:

ICT Tools for Digital Learners 18


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
ACRONYMS
Directions: Give the complete meaning of the following acronyms. Write your answer on the space provided
for.

1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC

Activity 5:
MS Configuration Command Classification

Directions: There are five functional tabs in MS Configuration utility, namely General, Boot, Services, Startup
and Tools. Classify the following items according to the tabs they belong to. Write your answer on the space
provided.

1. Event Viewer ___________________

2. Safe Boot ___________________

3. List of services that start when computer boots ___________________

4. Make all boot settings permanent ___________________

5. Normal startup ___________________

6. No GUI Boot ___________________

7. OS Boot information ___________________

ICT Tools for Digital Learners 19


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
8. Hide All Microsoft Services ___________________

9. Convenient List of Diagnostic Tools ___________________

10. Base Video ___________________

Activity 6:
Criss-Cross Puzzle Directions: Complete the criss-cross puzzle and familiarize yourself
of the cables being described. Write your answer in a clean sheet of paper.
CABLES

1 2

ICT Tools for Digital Learners 20


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
5

Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes

Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable

Activity 7:
Answer the following guide questions and submit it to your teacher. Write your answer in a
clean sheet of paper.

1. What are the different types of fiber connectors? Cite their advantages and disadvantages.

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

2. List down the different types of connectors.

__________________________________________________________
ICT Tools for Digital Learners 21
M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
__________________________________________________________

__________________________________________________________

3. What are the characteristics of UTP, STP and coaxial cable?

__________________________________________________________

__________________________________________________________

__________________________________________________________

ICT Tools for Digital Learners 22


M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL

You might also like