Common3 Perform Computer Operations 6pgs
Common3 Perform Computer Operations 6pgs
Materials
(CBLM)
Module Title:
Competency Based Learning Materials (CBLM) | Prepared by: Mr. Eric M. Talamisan
Maintain computer equipment and systems
CSS NC II Trainer/Asse
Implement procedures for ensuring security of data, including
regular
backups and virus check in accordance with standard operating
procedures.
Matching Type:
Match the following data security from Column A with its meaning in Column B.
Write your answer in sheet of paper.
Column A Column B
3. Data security
_______2. By creating backup copies of data,
4. Data masking
organizations can recover data should it
5. Data erasure be erased or corrupted accidentally or
stolen. during a data breach.
Data erasure: There are times when data that is no longer active or used
needs to be erased from all systems. For example, if a customer has
requested for their name to be removed from a mailing list, the details
should be deleted permanently.
Reference:
Data Security
https://www.forcepoint.com/cyber-edu/data-security
Let Us Assess
Self-Check 1.1
1.
2.
3.
1.
2.
3.
4.
5.
Let Us Study
Computer Virus
It corrupts files
It slows down the speed of the computer system
It causes the system to hang frequently
It deletes various files
A virus can enter the system and infect it through various sources. Some
of the sources are
Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.
Removing the virus – When the virus can be easily identified and can be
removed without affecting other files, then the antivirus removes it from the host
place.
Quarantine – This is done when the virus cannot be easily identified
removed from the file and the removal of virus means the removal of the
complete file. In this method, although the virus is not eliminated, it is
rendered inactive by moving the file into "quarantine" and renaming it.
Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if
the computer tries to read the disk while it is booting.
Polymorphic viruses: A virus that can encrypt its code in different ways so
that it appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software
Materials
Anti-virus Software (AVG anti-virus)
Virus removal
CRITERIA Rating
Total 100%
Let Us Study
File Maintenance
Disk Defragment
To reorganize the disk by putting files into contiguous order. Because the
operating system stores new data in whatever free space is available,
data files become spread out across the disk as they are updated. Large
files may be broken into thousands of fragments, causing the read/write
head to move back and forth numerous extra times to read the data. A
"defragger" or "optimizer program" rewrites all the files and stores them
in adjacent sectors.
Some users are fanatical about defragging their disks on a regular basis.
Others rarely do it, if ever. After defragmenting, performance increases
are most noticeable on very large databases that had been heavily
fragmented. Because today's computers are so fast, users may not notice
any increase in speed with routine applications such as word processing
and spreadsheets, especially if the files are small.
A Good Habit
Diskeeper is one of the most popular defraggers on the market. The red in
the drive map at the top shows all the fragmented files. After
defragmenting, the new drive map was pasted on the bottom for
comparison. Diskeeper can be set up to defrag the disk whenever the
machine is idle. As soon as the user clicks the mouse or presses a key, the
defragging is suspended.
Let Us Assess
Self-check 1.2
Self-Check 1.1
1. Data encryption
2. Data resilience
3. Data masking
4. Data erasure
Examples of an antivirus
Self-Check 1.2
Reference:
Data Security
https://www.forcepoint.com/cyber-edu/data-security
File Maintenance
https://www.pcmag.com/encyclopedia/term/file-maintenance