0% found this document useful (0 votes)
19 views18 pages

Common3 Perform Computer Operations 6pgs

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views18 pages

Common3 Perform Computer Operations 6pgs

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Competency-Based Learning

Materials
(CBLM)

COMPUTER SYSTEMS SERVICING NC II


COMMON COMPETENCY

Module Title:

Performing Computer Operations


Unit of Competency:

Perform Computer Operations


Let Us Learn!

Competency Based Learning Materials (CBLM) | Prepared by: Mr. Eric M. Talamisan
Maintain computer equipment and systems
CSS NC II Trainer/Asse
 Implement procedures for ensuring security of data, including
regular
backups and virus check in accordance with standard operating
procedures.

 Implement basic file maintenance procedures in line with the


standards operating procedures
Let Us Try!
PRE-TEST

Matching Type:

Match the following data security from Column A with its meaning in Column B.
Write your answer in sheet of paper.

Column A Column B

_______1. Applies a code to every individual


piece of data and will not grant access to
1. Data encryption encrypted data without an authorized key
being given.
2. Data resilience

3. Data security
_______2. By creating backup copies of data,
4. Data masking
organizations can recover data should it
5. Data erasure be erased or corrupted accidentally or
stolen. during a data breach.

_______3. is a set of standards and


technologies that protect data from
intentional or accidental destruction,
modification or disclosure.

_______4. Masking specific areas of data can


Let Us Study

Information Sheet 1.1

What is Data Security?

Data security is a set of standards and


technologies that protect data from
intentional or accidental destruction,
modification or disclosure. Data security can
be applied using a range of techniques and
technologies, including administrative
controls, physical security, logical controls,
organizational standards, and other safeguarding techniques that limit
access to unauthorized or malicious users or processes.

Why is Data Security Important?

All businesses today deal in data to a degree. From the banking


giants dealing in massive volumes of personal and financial data to the
one-man business storing the contact details of his customers on a mobile
phone, data is at play in companies both large and small.

The primary aim of data security is to protect the data that an


organization collects, stores, creates, receives or transmits. Compliance is
also a major consideration. It doesn't matter which device, technology or
process is used to manage, store or collect data, it must be protected.
Data breaches can result in litigation cases and huge fines, not to mention
damage to an organization's reputation. The importance of shielding data
from security threats is more important today than it has ever been.
Different Data Security Technologies

Data security technology comes in many shapes and forms and


protects data from a growing number of threats. Many of these threats are
from external sources, but organizations should also focus their efforts on
safeguarding their data from the inside, too. Ways of securing data
include:
Data encryption: Data encryption applies a code to every individual
piece of data and will not grant access to encrypted data without an
authorized key being given

Data masking: Masking specific areas of data can protect it from


disclosure to external malicious sources, and also internal personnel who
could potentially use the data. For example, the first 12 digits of a credit
card number may be masked within a database.

Data erasure: There are times when data that is no longer active or used
needs to be erased from all systems. For example, if a customer has
requested for their name to be removed from a mailing list, the details
should be deleted permanently.

Data resilience: By creating backup copies of data, organizations can


recover data should it be erased or corrupted accidentally or stolen during
a data breach.

Reference:
Data Security
https://www.forcepoint.com/cyber-edu/data-security
Let Us Assess

Self-Check 1.1

Give at least three (3) ways of securing data

1.

2.

3.

Give at least (5) examples of an antivirus

1.

2.

3.

4.

5.
Let Us Study

Information Sheet 1.2

Removing viruses from infected machines

Computer Virus

 A virus is a destructive executable program that


infects the other programs in the system and
spreads by replicating itself.
 Such a program is designed to damage the
victim’s computer files.
 Viruses are coded by malicious programmers in a
way that they can spread in the system without one's permission
and knowledge.

Different Aspects of Computer Virus

Finder- searches for the new uninfected files and the

Replicator- actually targets these files and infects it by multiplying itself.

How do Virus Affects a System?

 It corrupts files
 It slows down the speed of the computer system
 It causes the system to hang frequently
 It deletes various files

Sources of Virus Infection

A virus can enter the system and infect it through various sources. Some
of the sources are

 Infected CDs, DVDs, pen drives, etc


 E-mail
 Browsing infected sites
 Downloading files from the internet

Steps to Remove Viruses

Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.

The basic steps are:


 Buy or download an antivirus software
 Install the antivirus software

 Update antivirus software with the latest virus definitions


 Do a complete system scan

Methods of Eliminating Viruses

Removing the virus – When the virus can be easily identified and can be
removed without affecting other files, then the antivirus removes it from the host
place.
Quarantine – This is done when the virus cannot be easily identified
removed from the file and the removal of virus means the removal of the
complete file. In this method, although the virus is not eliminated, it is
rendered inactive by moving the file into "quarantine" and renaming it.

Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if
the computer tries to read the disk while it is booting.

Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those


with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device
driver). These programs are loaded in memory during execution, taking
the virus with them. The virus becomes active in memory, making copies
of itself and infecting files on disk.

Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect


program files and when the infected program is executed, these viruses
infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection.


They may either redirect the disk head to read another sector instead of
the one in which they reside or they may alter the reading of the infected
file’s size shown in the directory listing. size given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so
that it appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software

Software designed to cure virus infected machines. An antivirus is a


program that searches for, identifies and removes potential viruses
existing in the computer system

Examples of Anti-virus software

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus
 Avast
 Avira
 Norton
 SMADAV
 Windows Defender
 Bitdefender
Let Us Practice

OPERATION SHEET 2.1


Virus removal

Equipment and Materials:


Equipment
System unit
Monitor
Keyboard and Mouse

Materials
Anti-virus Software (AVG anti-virus)

Virus removal

Provided with the necessary equipment and materials troubleshoot the


virus infected area.

You will be assessed using the following criteria


Evaluation:

CRITERIA Rating

1.Periodic maintenance is observed 20%

2. Observance of safety precautions. 20%

3. Appropriate materials are used virus removal. 30%

4. Confirmation of computers normal function . 30%

Total 100%
Let Us Study

Information Sheet 1.3

File Maintenance

File Maintenance is periodic updating of master files. For example,


adding/deleting employees and customers, making address changes and
changing product prices. It does not refer to daily transaction processing
and batch processing (order processing, billing, etc.). The terms file
maintenance and "file management" are used synonymously.

File Maintenance also refers to periodic reorganization of the disk


drives. Data that is continuously updated becomes physically fragmented
over the disk space and requires regrouping. An optimizing program is run
(daily, weekly, etc.) that rewrites all files contiguously.

Disk Defragment

To reorganize the disk by putting files into contiguous order. Because the
operating system stores new data in whatever free space is available,
data files become spread out across the disk as they are updated. Large
files may be broken into thousands of fragments, causing the read/write
head to move back and forth numerous extra times to read the data. A
"defragger" or "optimizer program" rewrites all the files and stores them
in adjacent sectors.

Windows comes with the DEFRAG.EXE utility, which can be activated by


the Run dialog from the Start menu. Other popular defraggers, such as
Diskeeper, offer enhanced capabilities.

Users Run the Gamut

Some users are fanatical about defragging their disks on a regular basis.
Others rarely do it, if ever. After defragmenting, performance increases
are most noticeable on very large databases that had been heavily
fragmented. Because today's computers are so fast, users may not notice
any increase in speed with routine applications such as word processing
and spreadsheets, especially if the files are small.

A Good Habit

Nevertheless, defragmenting disks regularly is good practice because it


reduces wear and tear on the drive mechanism. In addition, should the
hard disk ever crash and you did not back up important files, data
recovery experts will tell you that a defragged disk is much easier to
restore.
Before and After

Diskeeper is one of the most popular defraggers on the market. The red in
the drive map at the top shows all the fragmented files. After
defragmenting, the new drive map was pasted on the bottom for
comparison. Diskeeper can be set up to defrag the disk whenever the
machine is idle. As soon as the user clicks the mouse or presses a key, the
defragging is suspended.
Let Us Assess

Self-check 1.2

Answer the following questions briefly

1. How does Disk Defragmentation work?

2. What is File Maintenance?

3. What is the advantage of performing disk defragmentation?


Let Us Remember

Data security can be applied using a range of techniques and


technologies, including administrative controls, physical security, logical
controls, organizational standards, and other safeguarding techniques
that limit access to unauthorized or malicious users or processes.

A virus is a destructive executable program that


infects the other programs in the system and spreads by
replicating itself. Such a program is designed to
damage the victim’s computer files.
Answer key to Activities

Self-Check 1.1

Ways of securing data

1. Data encryption
2. Data resilience
3. Data masking
4. Data erasure

Examples of an antivirus

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus
 Avast
 Avira
 Norton
 SMADAV
 Windows Defender
 Bitdefender

Self-Check 1.2

1. How does Disk Defragmentation work?


-To reorganize the disk by putting files into contiguous order.
Because the operating system stores new data in whatever free
space is available, data files become spread out across the disk as
they are updated.

2. What is File Maintenance?


-File Maintenance also refers to periodic reorganization of the disk
drives. Data that is continuously updated becomes physically
fragmented over the disk space and requires regrouping.

3. What is the advantage of performing disk defragmentation?


-It reduces wear and tear on the drive mechanism.
References

Reference:
Data Security
https://www.forcepoint.com/cyber-edu/data-security

File Maintenance
https://www.pcmag.com/encyclopedia/term/file-maintenance

You might also like