0% found this document useful (0 votes)
57 views50 pages

SDO Navotas TLE CSS9 Q1 FV

The document is a curriculum module for Technology and Livelihood Education (ICT-Computer Systems Servicing) for Grade 9 in Navotas City, Philippines, covering various lessons on assessing quality and maintaining computer systems. It includes guidelines on receiving materials, assessing work quality, and understanding quality standards in production processes. The module aims to equip students with the necessary skills and knowledge to ensure quality in their work and materials used.

Uploaded by

Erwin Llame
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views50 pages

SDO Navotas TLE CSS9 Q1 FV

The document is a curriculum module for Technology and Livelihood Education (ICT-Computer Systems Servicing) for Grade 9 in Navotas City, Philippines, covering various lessons on assessing quality and maintaining computer systems. It includes guidelines on receiving materials, assessing work quality, and understanding quality standards in production processes. The module aims to equip students with the necessary skills and knowledge to ensure quality in their work and materials used.

Uploaded by

Erwin Llame
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

DIVISION OF NAVOTAS CITY

4
9
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(ICT)
Computer Systems Servicing
QUARTER 1

S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT- CSS) Grade 9
Alternative Delivery Mode
Quarter 1
Second Edition-2021

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
an agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module

Writer: Henry A. De los Reyes, Reynaldo L. Glendro


Editors: Eduardo Gal Lego
Reviewers: Grace R. Nieves
Illustrator: Henry A. De los Reyes, Reynaldo L. Glendro
Layout Artist: Henry A. De los Reyes, Reynaldo L. Glendro
Management Team: Alejandro G. Ibañez, OIC- Schools Division Superintendent
Isabelle S. Sibayan, OIC- Asst. Schools Division Superintendent
Loida O. Balasa, Chief, Curriculum Implementation Division
Grace R. Nieves, EPS In Charge of LRMS/EPP-TLE-TVL
Lorena J. Mutas, ADM Coordinator
Vergel Junior C. Eusebio, PDO II LRMS

Inilimbag sa Pilipinas ng ________________________

Department of Education – Navotas City


Office Address: BES Compound M. Naval St. Sipac-Almacen Navotas City
____________________________________________
Telefax: 02-8332-77-64
____________________________________________
E-mail Address: [email protected]
____________________________________________
Table of Contents
What I Know ................................................................................1

Module 1......................................................................................3

Module 2......................................................................................5

Module 3......................................................................................10

Module 4......................................................................................14

Module 5......................................................................................20

Module 6......................................................................................24

Module 7…………………………………………………………………………29

Module 8......................................................................................35

Assessment ..................................................................................41

Answer Key ..................................................................................42

References ...................................................................................46
Directions: Read each question carefully, Select the letter of the correct answer.
Write your answers on a separate sheet of paper.
1.Protecting your files means creating backups, storing your file on your hard
drive or any removable storage device regularly is ________________.
A. Update anti-virus and spyware C. Delete temporary files
B. Install or secure passwords D. Back-up your files
2.Computer maintenance is one factor you'll be able to do which will keep you
maintain the disc space in your computer. Maintenance aims are ___________.
A. Develop new system in line with business need
B. Preserve our IT systems in optimal condition
C. Report the problem as they occur
D. Update anti-virus and spyware.
3.Which of the following job position is responsible for returning the materials
to the supplier or to the store where it was bought and make arrangements
with the vendor for replacement.
A. Manager C. Quality Check
B. Supervisor D. Quality Checker
4.Inappropriate communication style: over-aggressive and passive are
examples of what work behavior problem?
A. Inappropriate behavior C. Inappropriate interpersonal
B. Resistance to change D. Inappropriate physical behavior
5.Complete the given statement: Quality __________ is the planned or
systematic actions necessary to provide enough confidence that a
product or service will satisfy the given requirements for quality.
A. Standard C. Assurance
B. Procedure D. Safety
6.Safety protocol must be followed to avoid the possibility of hazards
developing into risks. What should you do if you see someone not following
safety regulations?
A. Ignore as it is not my job C. Report to supervisor immediately
B. Do not report confidential D. Capture it on camera
7.What do you called a collection of data or computer instructions that tell the
computer how to work?
A. Hardware C. Application
B. Software D. Program
8.There are varied kinds of input, output and backing storage devices that
are being created by many various makers. Which of the following is
most found in PCs?
A. Solid State Storage C. Cloud Storage
B. Optical Storage D. Magnetic Storage

1
9.A program that allows a user to find, view, hear, and interact with material on
the World Wide Web. What do you call that program?
A. World Wide Wait C. Search Engine
B. World wide web D. Web browser
10. The coding language used to create Hypertext documents for use on the World
Wide Web, designed to be displayed in a web browser.
A. How to Make Laptop C. Hashtag Markup Language
B. Hypertext Markup Language D. Hypertext Mainframe

MODULE 1

Welcome to the world of Computer System Servicing!


This module was created to help you understand how to assess the quality of
received materials. It was designed and written with you in mind. For that reason,
the scope of this module permits it to be used in many different learning situations;
the language used recognizes the diverse vocabulary level of different learners; and
the lessons are arranged to follow the standard sequence of the course. However, the
order of the lessons, as you read them, can be changed to correspond with the
textbook you are now using.

The module is divided into eight lessons, namely:

Lesson 1 – Assess quality of received materials (TLE_IACSS9-12AQS-Ia-1)

After going through this module, you are expected to:


1. obtain work instruction in accordance with standard operating procedures
2. check the received materials against workplace standards and specifications
3. identify and isolate faulty materials related to work
4. record and/ or report defects and any identified causes to the supervisor
concerned in accordance with workplace procedures
5. replace faulty materials in accordance with workplace

2
Lesson
Applying Quality Standard
1

Fault Identification and Reporting


These are the things to be considered when:

A. Receiving Materials:
1. Match the packing slip to the items received and ensures that the materials are
destined for the tour department.
2. That you are receiving the materials indicated on the purchase order with regard
to quantity and discount.
3. That the materials are in acceptable condition.
4. That terms regarding installation and/or set-up of equipment are met.

B. Receiving Reports

Whenever goods are received:

1. The person receiving the goods must document, using the administrative software,
that all goods were received for each requisition before any payment can be made to
the vendor.

2. Any exceptions must be noted so that partial payments can be processed, or


defective goods can be returned.
C. Return of Merchandise

When merchandise is received which is incomplete or defective, the supervisor will


return the materials to the supplier or to the store where it was bought and make
arrangements with the vendor for replacement.

D. Make an Inventory Report of the Materials

All materials received must be listed and be reported to monitor how many materials
are already on hand, purchased or damaged. Effective management checks are an
important means of providing assurance of the integrity and security of the benefit
processes. They are also useful in identifying training needs; indicating possible
weaknesses in procedure and ensuring the section meets its accuracy target set for
Best Value Performance Indicators purposes.

The Quality checker will record the date of receipt, name of the materials
purchased, quantity, official receipt number, signature of the person who bought the
materials and signed his name afterwards. The Quality checker will identify if the
materials are in good condition or damage and /or needing for replacements. This
will also be recorded on his report.

3
Example of Log Report (to be completed by the Quality checker)

Date Received OR # Item Name Quantity Signature Quality


Checker

Example of Assessment of Materials Received (to be completed by the Quality


checker)

Quality Checker: (Name ) Date:


Item Name Total no. in Good Total no. of Errors Comments
Condition

Characteristics of Materials Used in Specific Projects


1. Selection of material
Material selection is one of the most common tasks for design engineering. The ability
to assess the material’s impact on the performance of a product is crucial for reliable
performance. Sometimes, buyers are also considering the label or name of the
company which are producing great quality materials and are known in the market.
Examples are the name HP for printers and Intel for some computer hardware.

2. Testing of material
The testing of material properties is widely understood to be the key to obtaining data
for a project, performing failure analysis, or understanding material interactions.
Material testing also provides information on the quality of incoming and outgoing
products. Inspection test equipment and techniques are demonstrated for a wide
range of materials and assemblies during the class. This provides the participants
with both knowledge of the common failure modes.

3. Cost of material
The cost of material is also considered when buying or selecting materials for a
specific project. The amount may vary but never taken for granted the quality and
the reliability of the material. Will you buy material which is less expensive but of
worse quality? Will you buy material which you cannot afford? People look for places
which can meet their standards and the right cost for materials to buy.

4
Directions: Find and shade those words in the word search grid.
Look for them in all directions.

QUALITY
STANDARDS
MATERIALS
COST
TESTING
RELIABLE
PURPOSES
RECEIVING
REPORT
MERCHANDISE

Directions: Fill in the graphic organizer with the characteristics of materials used
in specific project and its description.

Characteristics of Materials
Used in Specific Projects

Characteristic Characteristic Characteristic

Description Description Description

5
MODULE 2

This module was created to help you understand some tips on how to assess
your own work. It was designed and written with you in mind. For that reason, the
scope of this module permits it to be used in many different learning situations; the
language used recognizes the diverse vocabulary level of different learners; and the
lessons are arranged to follow the standard sequence of the course. However, the
order of the lessons, as you read them, can be changed to correspond with the
textbook you are now using.

The module is divided into eight lessons, namely:

Lesson 2 - Assessing Own Work (TLE_IACSS9-12AQS-Ib-2)

After going through this module, you are expected to:

1. Identify and use documentation relative to quality within the prescribed


standard
2. Check completed work against workplace standards relevant to the task
undertaken
3. Identify and isolate errors
4. Record information on the quality and other indicators of production
performance in accordance with workplace procedures
5. Document and report cases of deviations from specific quality standards in
accordance with the workplace’s procedures

Lesson
Assessing Own Work
2

TYPES AND WORK-RELATED ERRORS


A. Quantity of work (untimely completion, limited production)
1. Poor prioritizing, timing, scheduling
2. Lost time
Tardiness, absenteeism, leaving without permission
Excessive visiting, phone use, break time, use of the Internet
Misuse of sick leave

6
3. Slow response to work requests, untimely completion of assignments
4. Preventable accidents

B. Quality of work (failure to meet quality standards)

1. Inaccuracies, errors
2. Failure to meet expectations for product quality, cost or service
3. Customer/client dissatisfaction
4. Spoilage and/or waste of materials
5. Inappropriate or poor work methods

Work Behavior Which Results in Performance Problems

A. Inappropriate behavior (often referred to as "poor attitude")

● Negativism, lack of cooperation, hostility


● Failure or refusal to follow instructions
● Unwillingness to take responsibility ("passing the buck")
● Insubordination
● Power games

B. Resistance to change

● Unwillingness, refusal, or inability to update skills


● Resistance to policy, procedure, work method changes
● Lack of flexibility in response to problems

C. Inappropriate interpersonal relations

● Inappropriate communication style: over-aggressive, passive


● Impatient, inconsiderate, argumentative
● Destructive humor, sarcasm, horseplay, fighting
● Inappropriate conflict with others, customers, co-workers,
supervisors

D. Inappropriate physical behavior

● Smoking, eating, drinking in inappropriate places


● Sleeping on the job
● Alcohol or drug use
● Problems with personal hygiene
● Threatening, hostile, or intimidating behavior

7
QUALITY STANDARD

Standards are sets of rules that outline specification of dimensions, design


of operation, materials and performance, or describe quality of materials, products
or systems. These standards should cover the performance expectations of the
product for particular applications. The intent of standards is to provide at least
minimum quality, safety or performance specifications so as to ensure relatively
uniform products and performance, and to remove ambiguity as to the suitability of
certain commercial products for particular applications. Following standards may
reduce the risk of error in working.

Specific quality standards for:


1. Hardware

The durability of the work depends on the quality of its component parts and
the assembly skills of those who install it. If the best-quality products or hardware
are used but are installed incorrectly, the system will be a failure.

The application of suitable hardware and products must be supported by


adequate levels of training of people who use them so that they can identify and use
only appropriate products.

In judging a product or hardware, the person must consider factors such as


the following:
Is the product or hardware under consideration suitable for the
application or purpose?

Will it be harmful to the health of the community in its normal use?


Is there a risk of this hardware being released into the environment (e.g.
the water) in the first instance or after the working life of the product or
hardware has expired?

2. Production Process

In the production process, checking of quality assurance must be highly


considered. Quality assurance covers all activities from design, development,
production, installation, servicing and documentation. This introduced the rules: "fit
for purpose" and "do it right the first time". It includes the regulation of the quality
of raw materials, assemblies, products and components; services related to
production; and management, production, and inspection processes.
A. FAILURE TESTING

A valuable process to perform on a whole consumer product is failure


testing, the operation of a product until it fails, often under stresses such as
increasing vibration, temperature and humidity. This exposes many
unanticipated weaknesses in a product, and the data is used to drive
engineering and manufacturing process improvements.

8
B. STATISTICAL CONTROL

Many organizations use statistical process control to bring the organization to


Six Sigma levels of quality, in other words, so that the likelihood of an unexpected
failure is confined to six standard deviations on the normal distribution. Traditional
statistical process controls in manufacturing operations usually proceed by
randomly sampling and testing a fraction of the output. Variances of critical
tolerances are continuously tracked, and manufacturing processes are corrected
before bad parts can be produced
C. COMPANY QUALITY

The company-wide quality approach places an emphasis on three aspects:

1. Elements such as controls, job management, adequate processes, performance


and integrity criteria and identification of records
2. Competence such as knowledge, skills, experience, and qualifications
3. Soft elements, such as personnel integrity, confidence, organizational culture,
motivation, team spirit and quality relationships.

The quality of the outputs is at risk if any of these three aspects are deficient in any
way.

D. TOTAL QUALITY CONTROL

Total Quality Control is the most necessary inspection control of all in cases
where, despite statistical quality control techniques or quality improvements
implemented, sales decrease.

As the most important factor had been ignored, a few refinements had to be
introduced:

1. Marketing had to carry out their work properly and define the customer’s
specifications.
2. Specifications had to be defined to conform to these requirements.

3. Conformance to specifications i.e. drawings, standards and other relevant


documents, were introduced during manufacturing, planning and control.
4. Management had to confirm all operators are equal to the work imposed on them
and holidays, celebrations and disputes did not affect any of the quality levels.

5. Inspections and tests were carried out, and all components and materials,
bought in or otherwise, conformed to the specifications, and the measuring
equipment was accurate, this is the responsibility of the QA/QC department.

9
The Table below shows the Quality System Elements required by ISO 9000 in the
making of the final product.

Quality System Elements


Quality System
Requirements Contents

1 Management Define and document commitment, policy and objectives,


responsibility responsibility and authority, verification resources and
personnel. Appoint a management representative and
conduct regular reviews of the system
2 Quality system Establish and maintain a documented quality system
ensuring that products conform to specified requirements

3 Contract Review Ensure that customer's contractual requirements are


evaluated and met
4 Product Plan, control and verify product development to ensure
Development that specified requirements are met
5 System for control and identification of all documents
Document Control regarding quality, e.g. procedures, instructions, and
specifications
6 Purchasing Ensure that purchased products conform to
specified requirements

Directions: Fill in the graphic organizer with types of work behavior that you know
and its example. Do this in your notebook.

10
Directions: Match each quality system elements with its correct function and
description. Write your answer on the space provided.
___1. Management a. Ensure that customer's contractual requirements are
responsibility evaluated and met

___2. Quality system b. Define and document commitment, policy and


objectives, responsibility and authority, verification
resources and personnel. Appoint a management
representative and conduct regular reviews of the
system
___3. Contract c. Ensure that purchased products conform to specified
Review requirements
___4. Purchasing d. System to identify and control traceability of product at
all stages from raw materials through production to the
final product as delivered to the customer
___5. Document e. Establish and maintain a documented quality
Control system ensuring that products conform to specified
requirements

MODULE 3

This module was created to help you understand how to engage in quality
improvement. It was designed and written with you in mind. For that reason, the
scope of this module permits it to be used in many different learning situations; the
language used recognizes the diverse vocabulary level of different learners; and the
lessons are arranged to follow the standard sequence of the course. However, the
order of the lessons, as you read them, can be changed to correspond with the
textbook you are now using.

The module is divided into eight lessons, namely:

Lesson 3 - Engage in Quality Improvement (TLE_IACSS9-12AQS-Ic-3)


After going through this module, you are expected to:

1. participate process improvement procedures in relative to workplace


assignment
2. carry out work in accordance with process improvement procedures
3. monitor performance of operation or quality of product of service to ensure
customer satisfaction.

11
Lesson Engage in Quality
3 Improvement

Quality Management Terms:


o Quality Improvement can be distinguished from Quality Control in that
Quality Improvement is the purposeful change of a process to improve the
reliability of achieving an outcome.

o Quality Control is the ongoing effort to maintain the integrity of a process to


maintain the reliability of achieving an outcome.

o Quality Assurance is the planned or systematic actions necessary to provide


enough confidence that a product or service will satisfy the given
requirements for quality.

Quality and Task-Completion Checking

With development teams of two or three in daily contact and frequently


exchanging views and criticisms, detailed, written quality and task-completion
checking procedures may be felt to be unnecessary. Procedures still need to be
agreed and the results need to be documented. The need to check quality and task
completion applies at all stages of the development process but is underlined
especially during the prototype validation stages.

The importance of documenting checks applies whatever the size of the team
and whatever the complexity of the software. In the production of assets, this may
involve checking to confirm the following,
● that all the asset files listed in the product specification document have been
produced;
● that files are correctly named;
● that files are the correct byte size or near the projected file size (examining
the file-sizes in a directory listing can be helpful in identifying problem files
which are either much too large or much too small);
● that files are the correct resolution (screen-size and bit depth in the case of
graphics; duration, sampling frequency and bit-depth in the case of sound
files);
● that the quality of files displaying on the target monitor or heard on target
listening equipment is acceptable.

12
Quality Improvement Processes

Manufacturers can choose from a variety of tools to improve their quality


processes. The trick is to know which tools to use for each situation and increasing
the sophistication of the tools in the repertoire.

Easy to implement and follow up, the most commonly used and well-known
quality process is the plan/do/check/act (PDCA) cycle (Figure 1). Other processes
are a takeoff of this method, much in the way that computers today are takeoffs of
the original IBM system. The PDCA cycle promotes continuous improvement and
should thus be visualized as a spiral instead of a closed circle.

Another popular quality improvement process is the six-step PROFIT model in


which the acronym stands for:
P = Problem definition.

R = Root cause identification and analysis.

O = Optimal solution based on root cause(s).


F = Finalize how the corrective action will be implemented.

I = Implement the plan.

T = Track the effectiveness of the implementation and verify that the desired
results are met.

If the desired results are not met, the cycle is repeated. Both the PDCA and
the PROFIT models can be used for problem solving as well as for continuous quality
improvement. In companies that follow total quality principles, whichever model is
chosen should be used consistently in every department or function in which quality
improvement teams are working.
P= PLAN
● Define a problem or opportunity.
● Analyze the situation. Study and define the problem: brainstorm for cause
and corrective actions: and think creatively to determine the best approach
and best possible corrective action.
● Develop an implementation plan
D=DO
● Implement corrective action.
● Document the procedures and observations
● Use data-gathering tools to collect information.
C=CHECK
● Analyze information
● Monitor trends
● Compare obtained results against expected results from the plan.
A=ACT
● If the results are as expected, do nothing
● If the results are not as expected, repeat the plan/do/check/act cycle.
● Documents the process and the revised plan.

Once the basic problem-solving or quality improvement process is understood,


the addition of quality tools can make the process proceed more quickly and

13
systematically. Seven simple tools can be used by any professional to ease the quality
improvement process: flowcharts, check sheets, Pareto diagrams, cause and effect
diagrams, histograms, scatter diagrams, and control charts. (Some books describe a
graph instead of a flowchart as one of the seven tools.)

The key to successful problem resolution is the ability to identify the problem,
use the appropriate tools based on the nature of the problem, and communicate the
solution quickly to others. Inexperienced personnel might do best by starting with
the Pareto chart and the cause and effect diagram before tackling the use of the other
tools. Those two tools are used most widely by quality improvement teams.

Directions: Fill in the graphic organizer with the most common process for
quality improvement.

14
Directions: Find and shade those words in the word search gird.
Look for them in all directions. Use a separate sheet for this activity

Improvement
Control
Assurance
Cause
Effect
Materials
Quality
Analyze
Profit
Process

MODULE 4

This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as Plan and Prepare for Task to be
Undertaken. The scope of this module permits it to be used in many different learning
situations. The language used recognizes the diverse vocabulary level of students.
The lessons are arranged to follow the standard sequence of the course. But the order
in which you read them can be changed to correspond with the textbook you are now
using.

The module is divided into eight lessons, namely:

Lesson 4 – Plan and prepare for task to be undertaken (TLE_IACSS912PCO-Ic-d-4)

15
After going through this module, you are expected to:
1. determine requirements of task in accordance with the required output
2. select appropriate hardware and software according to task assigned and
required outcome
3. plan a task to ensure that OHS guidelines and procedures are followed
4. follow client-specific guidelines and procedures
5. apply required data security guidelines in accordance with existing
procedures

Lesson Planning and Preparation for


4 Task to be Undertaken

Planning for Safety in the Working Area

As a future computer specialist, you should bear in mind all possible dangers
within the work. It’s a requirement to follow correct procedures for handling PC
equipment. If you do not follow the safety protocol procedures it might be dangerous
to your client and could result in fines and criminal convictions. A secure working
place is one that is free from hazards, clean, organized, and well-lit and compliant
with all OHS regulations.
The disposal or recycling of unsafe computer elements should be done
properly. Make sure to follow regulations that govern how to dispose of specific items.
This module provides the general and safety guidelines that protects the technician
and the equipment.

General Safety Guidelines

Secure computer working areas prevent untoward incident or injury to the


technician and other people in the area and avoid damage to computer devices and
equipment. Your working area must be clean, organized, and properly lighted.
Everybody should understand and observe safety measures. This is the key factor
for all the industries in order to promote the wellness and safety in a workplace and
will improve the productivity and quality of the products and a lot more.

Safety measures to be taken are:


1. Proper lighting: The computer laboratory should be properly lighted,
increasing the visibility of moving machinery and other safety hazards can
prevent untoward incidents in the workplace.

16
2. Setting computers: When setting a computer room, the following must be
taken into consideration: The computer set should have enough space, free
entry and exit, peripheral devices and cables are properly managed.
3. Dust free Workplace: Dust should be prevented as often as possible in the
Computer workplace and computer devices. Dust build up can suffocate your
PC’s hardware and can harm inside parts of your computer.
4. Proper Ventilation Room: The need for an air conditioner or fan is necessary
for the computer user to be comfortable. When the computer room is cool,
you're guaranteed protection for your computer hardware and software.
5. Protect devices from voltage spikes: Unwanted voltage fluctuations can
damage your computer devices. The use of surge protector or AVR
as a voltage stabilizer can prevent damage to your devices.

Safety Signs in The Workplace


Safety signage and symbols in the computer laboratory must be placed
properly to identify and warn everyone about potential risk and hazard in the
workplace. It can help in the communication of important directions, reinforce
security messages and give instruction for emergency circumstances.

The Safety Signs and Symbols must be understood and followed to be effective.
It must be within the right place, and for the correct reasons. Check that it's clear to
all what precisely is supposed by the sign. The language must be easy, clear, and
customary. It should be comprehensible by the overall use of the workplace. The
signs stand out for straightforward recognition even from a decent distance.

Occupational Health and Safety (OHS)


OHS policies and procedures are well-defined rules that must be followed so
that the possibility of hazards developing into risks can be minimized. Procedures
must be discussed in the planning stage, prior to the start of any formal activity and
must always be made available since this will serve as a guide for all the personnel
involved in a workplace. If it is not established yet, the team may formulate it during
the planning and preparation stage. Here are some OHS policies and procedures.

Personal Safety While Working with PC’s

1. Always ground or discharged before touching any part of the computer.


2. Do not troubleshoot on components that are plugged into their power source.
Turn off the power source and unplug the devices before working.
3. Take away jewelry when working any computer related task and secure loose
clothing.
4. Check properly the connecting cable and secure that the pins are properly
aligned to the connection. Hold the components by edge and do not touch the
Circuit board.

17
5. Keep food and drinks out of your workspace and your workspace must be
clean and free of clutter.

Hazard and Risk


A hazard is any substance which will cause damage or injury to any persons
in a workplace, property, or the atmosphere, e.g. electricity, chemicals, operating up
a ladder, noise, a keyboard, a bully at work, stress, etc. A risk is the probability, high
or low, that any hazard can really cause someone injury or damage to devices.
In the computer industry, a hazard is something that poses a threat to a
computer's security, performance, or purpose. Samples of PC hazards are malware,
viruses, online hackers, corrupted system files, and defective hardware. You can
lessen the chance of computer hazards by putting in antivirus and anti-malware
programs, allowing a firewall, often putting in updates, and replacement defective
hardware.

Occupational Health and Safety (OHS)


Directions: Complete the given table to identify hazards of ICT tools and indicate its
correction procedure. Write your answers on a separate sheet of paper.

TOOLS /EQUIPMENT Hazard Correction Procedure


EXAMPLE: Connect and make an insulation
Electric drill Broken /Damage cord using electrical tape or replace
with new one.

1.

2.

3.

4.

5.

18
6.

7.

8.

Figure 1 - Creative Commons Images,


https://publicdomainvectors.org

Hazard Report Form


Directions: Complete this form if you notice a hazardous situation. Fix the hazard
immediately if you can do so and report what action you have taken. Write your
answers on a separate sheet of paper.

Details of person reporting hazard

Name:
Address:
Grade level: Phone no.:

Identify the hazard


Date hazard identified: Time hazard identified:
Location of hazard:

Describe the Hazard:

How is it a Hazard:

19
Actions recommended to be taken By Whom By When

Rubrics for the Task

Criteria 1 2 3 4 5
Identify the hazard
Correct Actions
Presentation
Time Frame
Total

20
MODULE 5

This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as Input data into computer. It was
designed and written with you in mind. For that reason, the scope of this module
permits it to be used in many different learning situations; the language used
recognizes the diverse vocabulary level of different learners; and the lessons are
arranged to follow the standard sequence of the course. However, the order of the
lessons, as you read them, can be changed to correspond with the textbook you are
now using.

The module is divided into eight lessons, namely:

Lesson 5 - Input data into computer (TLE_IACSS9- 12PCO–Id-e-5)

After going through this module, you are expected to:

1. enter the data into the computer using appropriate program/application in


accordance with company procedures.
2. check the accuracy of information and save the information in accordance
with standard operating procedures
3. store inputted data is in storage media according to requirements
4. perform work within ergonomic guidelines

Lesson
Input data into computer
5

TYPES OF SOFTWARE

Computer software is also divided in four major types


● System Software
● Programming Software
● Application Software
● Utility Software

21
System Software

System software helps in running the computer hardware and the


computer system. Examples of system software’ are

● Device Drivers

In computing, a device driver is a computer program allowing higher-


level computer programs to interact with a hardware device

● Operating Systems

An operating system is an interface between hardware and user; it is


responsible for the management and coordination of activities and the sharing
of the limited resources of the computer.

Application Software

It enables the users to accomplish certain specific tasks. Following are


the types of application software

● Web Browsing Software


It allows users to surf the Web. Example MS Internet Explorer, Google,
and Mozilla Firefox

● Word Processing Software


Allows users to create, edit a document. Example MS Word

● Spreadsheet Software

Allows users to create documents and perform calculations. Example:


MS Excel etc.

● Database Software
Allows users to store and retrieve vast amounts of data.
Example: MS Access etc.

● Presentation Software
Allows users to create visual presentations. Example MS Powerpoint

Utility Software
Utility software helps in the management of computer hardware and
application software. It performs a small range of tasks. Some typical examples
of utility software are

● Disk Defragmenters
It detects computer files whose contents are stored on the hard disk in
disjointed fragments and move the fragments together to increase
efficiency.

22
● Backup
This utility makes a copy of all information stored on a disk, and restore
either the entire disk or selected files

● Disk Partitioner
It divides an individual drive into multiple logical drives, each with its
own file system which can be mounted by the operating system and
treated as an individual drive.

● Anti-Virus
These utilities scan computers for viruses.

Directions: Find and shade those words in the word search gird. Look for them in
all directions.

COMPUTER SOFTWARE

1. SYSTEM 2. PROGRAM 3. BACKUP

4. APPLICATION 5. COMPUTER 6. SPREADSHEET

7. PRESENTATION 8.DATABASE 9. SOFTWARE

10. GRAPHIC

23
Directions: Use the hint given to fill in the crossword puzzle with the correct
words.

Across

3. _____allows users to create documents and perform calculations.


7. _____software allows users to store and retrieve vast amounts of data.
9. _____software enables the users to accomplish certain specific tasks.
10._____Defragmentors It detects computer files whose contents are stored on the
hard disk in disjointed fragments and moves the fragments together to increase
efficiency.

Down

1.______software helps in running the computer hardware and the computer system.
2.______software allows users to create a visual presentation.
4. _____ Practitioner divides an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
5._____ This utility makes a copy of all information stored on a disk, and restore
either the entire disk or selected files
6._____browsing software allows users to surf.
8. This utility make a copy of all information stored on a disk, and restore either the
entire disk or selected files

24
MODULE 6

This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as producing output and data using
a computer system. The scope of this module permits it to be used in many different
learning situations. The language used recognizes the diverse vocabulary level of
students. The lessons are arranged to follow the standard sequence of the course.
But the order in which you read them can be changed to correspond with the
textbook you are now using.

The module is divided into eight lessons, namely:

Lesson 6 - Produce output/ data using computer system

(TLE_IACSS912PCO-Ic-d-4)

After going through this module, you are expected to:

1. process entered data using appropriate software commands


2. print out data as required using computer hardware /peripheral devices
in accordance with standard operating procedures
3. transfer files and data between compatible systems using computer
software, hardware/peripheral devices in accordance with standard
operating procedures

25
Lesson Produce output/ data using
6 computer system

Computer Software

The computer program or software could be a sequence of instructions that a


computer can interpret and execute. Modify a user to perform some specific tasks or
to operate a PC. It directs all the peripheral devices on your system to try to
undertake and the way to perform work. Minus the application software, we cannot
operate hardware and cannot perform any calculations.

Computer software is a collection of computer programs that enables a


computer to perform a specific task. It consists of data that provides the instructions
for telling a computer what to do and how to do it. After the computer software is run
on the computer, it can be used anytime you want by searching the program on the
computer memory. On a Windows 10 computer, a program icon or shortcut is added
to the Start menu or Start screen. The software installed on your PC, might need to
be updated to fix any found errors. After the updates are installed, some problems
that may have been encountered in the program will no longer occur.

System Software

System computer code provides a platform to run PC hardware and computer


applications to utilize system resources and solve their computation issue. It controls
the operation of peripheral devices. System computer code acts as a hardware for the
execution of method or processes and organizes the sequence in step with their
priority and I/O devices demand and creation of the process. The known example of
system software code is the operating system (OS). It is liable for managing all the
opposite programs on the PC.

Examples of system software include the following:

A. Utility software
B. System servers
C. Device drivers
D. Operating system (OS)
E. Windows/graphical user interface (GUI) systems

26
Application Software

A Software program that performs a personal, academic, and business task.


Every program is intended to help the user with a specific method, which can be
associated with productivity, creativity, and communication. Applications software
programs will understand user inputs and help the user to finish the task. it's
additionally referred to as end-user programs or solely associated as apps. It resides
higher than system software.

Cloud Suite - use of software to deliver a service over a network through the
Internet. With cloud suite, users will access files and use applications from any
device that may access them online. Associate example of a Cloud suite supplier is
Google Suite and Adobe Creative cloud.

Examples of Application Software are the following:

A. Multimedia
B. Presentation Software
C. Word processing software,
D. Spreadsheets Software,
E. Presentation, Graphics,
F. Communication

Computer Peripheral Devices


A computer peripheral may be a device which will be hooked up to the pc
system. Peripheral devices will be external, like a mouse, keyboard, printer, monitor
or scanner. Peripheral devices also can be internal, like a CD-ROM drive, DVD-R
drive or electronic equipment. Device’s area unit is sometimes classified as input,
output or backing storage devices.

A PC printer could be a piece of hardware output device. It permits a user to


print things on paper, like letters and photos. Largely a printer prints beneath the
management of your computer system several also can work as a repetition machine
or with a camera to print directly while not employing a PC.

Storage devices
Storage Devices Backing storage may be a device that holds and retains
information. These devices permit the user to avoid wasting information during an
additional permanent manner than RAM so information isn't lost and should be used
later. samples of common backing storage devices are hard disc drive, CD-RW drive,
non-volatile storage and DVD-RAM drives.

Every form of device has its own characteristics. Some peripheral devices are
quicker at transmittal data; will store additional data; are unit extra accurate; devices
are smaller in physical size and portable, wireless connectivity and Some of this
product are sold at affordable prices

27
Hard disk drives (HDDs) square measure primarily found in computers and
laptops. The disk within the hard disc drive is coated with a magnetic media that
records information in binary code.

Solid-state drives (SSDs) may be a larger, more subtle version of your


common thumb drive. For instance, you’re a memory stick, the SSD stores info on
microchips and contains no moving elements. Meanwhile, a hard disc drive records
info on a storage platter by moving a mechanical arm with a read/write head over a
spinning platter. Solid state drives are getting a lot more common in computers and
laptops, and are found in tablets, cell phones, portable drives and mp3 players.
consider the acquainted USB memory stick.

Directions: Identify the Application and System software. Choose from the option
below.

Figure 2 - Creative Commons. https://commons.wikimedia.org

PowerPoint Task Manager Skype Photoshop AVG


Any Video Converter Defragment Windows Defender Linux

Computer software

Application System
1 6
2 7
3 8
4 9
5 10

28
Computer Application and System software
Directions: Write down the tasks you have completed using various application
software. Make a screenshot of your work. Make an E-Portfolio.

Example:
Microsoft word apps I have used Microsoft word apps to write my
assignment in English.

Application & System Software Task I have completed using this software
1. Antivirus
2. Video editing Apps
3. Microsoft PowerPoint
4. Facebook Chat
5. Microsoft Windows
6. Email

Rubrics for the Task

Criteria 1 2 3 4 5

Task sheet completed

Screenshot of task completed

Presentation

Time Frame

Total

29
MODULE 7

This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as using basic functions of a www-
browser to locate information. The scope of this module permits it to be used in many
different learning situations. The language used recognizes the diverse vocabulary
level of students. The lessons are arranged to follow the standard sequence of the
course. But the order in which you read them can be changed to correspond with
the textbook you are now using.

The module is divided into eight lessons, namely:

Lesson 7 - Use basic functions of a www- browser to locate information


(TLE_IACSS912PCO-Ig-h-8)

After going through this module, you are expected to:

1. establish information requirements for internet search


2. launch browser
3. load search engine
4. enter appropriate search criteria/or URL of site
5. follow relevant links to locate required information
6. bookmark useful pages and print as required

30
Lesson Use basic functions of a www-
7 browser to locate information

Basic functions of a www- browser


The World Wide Web (WWW) is an information-sharing platform where you
can view information with the help of a web browser or a search engine. A window
that allows you to view online content and data. There is so much information on the
Internet and different websites and pages that are growing every day, for that reason
it would be hard to find what you were looking for by just browsing. You need to have
a web address of a particular website. We use a web browser to access a search
engine to deal with this issue and allow us to search for a particular topic, website
or information. The three popular web browsers are called Google Chrome, Mozilla
Firefox and Safari. You should be able to use at least one of these browsers on your
PC.

1. Web browser

A web browser - is a software application for accessing information on the


World Wide Web. When a user requests a web page from a website, the web browser
retrieves the necessary content from a web server and then displays the page on the
screen. The browser is the entryway to your Internet searches. You can use a variety
of different search engines to help you begin your research, including Google, MSN's
Bing and Yahoo! Etc.

Tim Berners-Lee invented the first web browser called World Wide Web in
1990. His contribution helps so many people around the world and set off creativity,
collaboration and innovation worldwide.

31
Parts of a Google Web Browser

Figure 5 - (Desktop Screenshot)

2. Search engine

Figure 6 - (Desktop Screenshot)

A web search engine or Internet search engine is a software system that is


designed to carry out web search, which means to search the World Wide Web in a
systematic way for information specified in a textual web search query. You give the
search engine a query/search phrase/keyword and it returns a list of web pages it
feels best answer your query. It puts the most relevant ones at the top of the search
results. Clicking a search result opens the linked web page (content) in the web
browser.

32
The search results are generally presented in a line of results, often referred
to as search engine results pages (SERPs). The information may be a mix of links to
web pages, images, videos, infographics, articles, research papers, and other types
of files. Some search engines also mine data available in databases or open
directories. Unlike web directories, which are maintained only by human editors,
search engines also maintain real-time information by running an algorithm on a
web crawler.

Example of Search Engines

1. Google
2. Bing
3. Yahoo
4. Baidu
5. AOL

Figure 7 - Creative Commons. https://commons.wikimedia.org

3. URL - Uniform Resource Locator

Figure 8 - (Desktop Screenshot)

A Uniform Resource Locator (URL), colloquially termed a web address, is a


reference to a web resource that specifies its location on a computer network and a
mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifier
(URI), although many people use the two terms interchangeably. URLs occur most
commonly to reference web pages (http) but are also used for file transfer (ftp), email,
database access (JDBC), and many other applications.

33
Domain names
Domain names are used to identify one or more IP addresses. For example,
the domain name microsoft.com represents about a dozen IP addresses. Domain
names are used in URLs to identify Web pages. For example, in the URL
http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com.

Hyperlink

A hyperlink is a word, phrase, or image that you can click on to jump to a new
document or a new section within the current document. Hyperlinks are found in
nearly all Web pages, allowing users to click their way from page to page. The three
types of hyperlinks are: Text hyperlink – Uses a word or phrase to take visitors to
another page, file or document. Image hyperlink – Uses an image to take visitors to
another page, file or document. Bookmark hyperlink – Uses text or an image to take
visitors to another part of a web page.

Activity 1 - Identify the Parts of a Google Web Browser


Directions: Identify the Parts of a Google Web Browser. Write your answer
on the separate sheet of paper.

Figure 9 - (Desktop Screenshot)

Parts of a Google Web Browser


1 6
2 7
3 8
4 9
5 10

34
Directions: Use Google or Mozilla search engine to find out where each of the
landmarks below can be found in the world. Make an E-Portfolio.

Figure 10 - (Desktop Screenshot)


LANDMARK WHERE IN THE WORLD? Image of Landmark
1 Machu Picchu
2 Stonehenge
3 Big Ben
4 Shwedagon Pagoda
5 Statue of Liberty
6 Burj Khalifa, UAE
7 The Acropolis
8 Eiffel Tower
9 Corcovado
10 Notre Dame Cathedral

Rubrics

Criteria Percentage Score


1. Proper use of browser 20 %
2. Search Landmark 35 %
3. Images landmark 35 %
4. Creativity 10%
PERFORMANCE RATING 100%

35
MODULE 8

This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as maintaining computer equipment
and systems. The scope of this module permits it to be used in many different
learning situations. The language used recognizes the diverse vocabulary level of
students. The lessons are arranged to follow the standard sequence of the course.
But the order in which you read them can be changed to correspond with the
textbook you are now using.

The module is divided into seven lessons, namely:

Lesson 8 - Maintaining Computer Equipment and Systems


(TLE_IACSS912PCO-Ii-j-9)

After going through this module, you are expected to:


1. implement procedures for ensuring security of data, including regular
backups and virus checks in accordance with standard operating
procedures

2. implement basic file maintenance procedures in line with the standards


operating procedures

36
Lesson Maintaining Computer
8 Equipment and Systems

Computer maintenance is one factor you'll be able to do which will keep you
sustain the disc space in your computer and assist you release a valuable system
resource. What is more, actual physical clean-up, as in dusting, can enable your PC
to virtually breathe easier, and successively prolong the lifetime of your system.
Perhaps you have handpicked the best PC with the chosen the quickest processor
and graphic card and with a couple of gigabytes of memory. Therefore, you thought
to yourself that your machine perhaps will last long years, however very little did you
discover one year down the road, your PC is behaving like an old version laptop,
constantly flustering you with its stormy pictures, frustrating pop-ups and
staggeringly slow access. Gradually, your laptop crashes and everyone's information
is lost on one fine afternoon.

One factor you have got in all probably omitted is that they would like for
system maintenance. The fundamental routine maintenance contains of the three
basic processes:
1. Disk cleanup
2. Backup your data
3. Malware Maintenance

DISK CLEANUP

Figure 5 - Creative Commons Images. https://commons.wikimedia.org

When your computer is brand new you may be pleased to know how smooth,
and efficient your applications are running. But one year down the road, it slows
down, and this bothers you. What truly causes the decline in performance? You'll

37
argue that your disk is simply one years old. This may be the approach you use on
your system that is causing the problem.

Disk Clean-up utility is a tool that permits you quickly to delete stuff like
temporary and cache files so you can free up space on your hard drive. The software
tool will let you scroll through and see what is taking up space on the hard drive.
You can read a brief description of what it’s you’d be deleting. You'll be able to
additionally read the files at any time by clicking on the “View Files” button, or if
you've got admin access, you'll be able to click disk Clean-up files and can restart in
admin mode.

To delete temporary files:

1. In the search box on the taskbar, type disk


cleanup, and select Disk Cleanup from the
list of results.
2. Select the drive you want to clean up, and
then select OK.
3. Under Files to delete, select the file types to
get rid of. To get a description of the file
type select it.
4. Select OK.

If you need to free up more space, you can


also delete system files:

1. In Disk Cleanup, select Clean up system


files.
2. Select the file types to get rid of. To get a
Figure 6 - (Desktop Screenshot) description of the file type selects it.
3. Select OK.

DATA BACKUP

Figure 7 - Creative Commons Images


https://publicdomainvectors.org

38
Creating a duplicate copy of a data so that in case anything happens to the
original data, you have a spare copy. This is typically a simple thing to do. First, you
must ask yourself why you should back up the data or system? then you should
decide and select what data to be backed up. Depending on your needs, you may
choose to back up, any personal documents, photos, home videos, and any other
data

Most operating system's have a friendly interface that allows you to drag and
drop computer files from one storage device to another. This may be as easy as
copying a document file from your desktop into a preferred storage device. But when
these files gradually occupy a lot of disk space, you may need to seek help from
archive utilities such as Win zip which enables you to compact your files into a single
compressed file. You can then break up this large file into several pieces to be stored
in several media’s storage devices.

Use File History to back up to an external drive or


network location.

Select Start > Settings >


Update & Security > Backup > Add a drive +,
and then choose an external drive or network
location for your backups.

Figure 8 - (Desktop Screenshot)

Find your backups created on previous versions of Windows

If you used Backup and Restore to back up files or create system image
backups in previous versions of Windows, your old backup is still available in
Windows 10. In the search box on the taskbar, type control panel. Then select
Control Panel > System and Security > Backup and Restore (Windows 7).

MALWARE MAINTENANCE

Figure 9 - Creative Commons Images.


https://publicdomainvectors.org

39
Malware is any program or file that is harmful to a computer or content that
infiltrates your PC, leading to damage to the system and causing it to act in an
undesirable manner. Commonly, these embody viruses, spyware, worms, Trojan
horses, spams and many more. Once the system is infected, you can lose your
privacy, confidential data and access to your system when software and hardware
are damaged. Luckily, there are preventive measures you can take to protect yourself
from malware. One factor you’ll be able to do is to scan the file for any virus before
you plan to open it. If the scan shows nothing, it is probably a secure file. But then
once more, it might be a new virus updated version of malware in your virus scan.
You'll be able to apply a successive virus signature update and conduct a second
scan.

Remove malware from your PC

Windows Security is a powerful scanning tool that finds and


removes malware from your PC. Here's how to use it in Windows
10 to scan your PC. Before you use Windows Defender Offline,
make sure to save any open files and close apps and programs.

The Windows Defender Offline scan takes about 15 minutes to run, and then your
PC will restart and will automatically detect and remove or quarantine malware.
1. Open your Windows Security settings.
2. Select Virus & threat protection > Scan options.
3. Select Windows Defender Offline scan, and then select Scan now.
View the results of your scan
1. Open your Windows Security settings.
2. Select Virus & threat protection > Protection history.

40
Directions: Using the graphic organizer below. Enumerate the steps in performing
disk cleanup, backup your data and Malware Maintenance. Write your
answers on a separate sheet of paper.

Maintain Computer Equipment

Directions: Perform the following computer maintenance. Make a screenshot of


your work. Make an E-Portfolio.

Computer Maintenance Task I have completed using this software

1. Scan your computer using


antivirus

2. Backup your Data

3. Disk Cleanup

41
Directions: Read each question carefully, Select the letter of the correct answer.
Write your answers on a separate sheet of paper.
1.Safety protocol must be followed to avoid the possibility of hazards
developing into risks. What should you do if you see someone not following
safety regulations?

A. Ignore as it is not my job C. Report to supervisor immediately


B. Do not report confidential D. Capture it on camera
2.What do you called a collection of data or computer instructions that tell the
computer how to work?
A. Hardware C. Application
B. Software D. Program

3.There are varied kinds of input, output and backing storage devices that
are being created by many various makers. Which of the following is
most found in PCs?

A. Solid State Storage C. Cloud Storage


B. Optical Storage D. Magnetic Storage
4.A program that allows a user to find, view, hear, and interact with material on
the World Wide Web. What do you call that program?

A. World Wide Wait C. Search Engine


B. World wide web D. Web browser
5.The coding language used to create Hypertext documents for use on the World
Wide Web, designed to be displayed in a web browser.
A. How to Make Laptop C. Hashtag Markup Language
B. Hypertext Markup Language D. Hypertext Mainframe

6.Protecting your files means creating backups, storing your file on your hard
drive or any removable storage device regularly is ________________.
A. Update anti-virus and spyware C. Delete temporary files
B. Install or secure passwords D. Back-up your files

7.Computer maintenance is one factor you'll be able to do which will keep you
maintain the disc space in your computer. Maintenance aims is ___________.
A. Develop new system in line with business need
B. Preserve our IT systems in optimal condition
C. Report the problem as thy occur
D. Update anti-virus and spy ware.

8.Which of the following job position is responsible for returning the materials
to the supplier or to the store where it was bought and make arrangements
with the vendor for replacement.
A. Manager C. Quality Check
B. Supervisor D. Quality Checker

9.Inappropriate communication style: over-aggressive and passive are


examples of what work behavior problem?

42
A. Inappropriate behavior C. Inappropriate interpersonal
B. Resistance to change D. Inappropriate physical behavior

10. Complete the given statement: Quality __________ is the planned or


systematic actions necessary to provide enough confidence that a
product or service will satisfy the given requirements for quality.
A. Standard C. Assurance
B. Procedure D. Safety

10. B C
9. D C
8. D B
7. B B
D 6. C
What I Know

Module 1

10. Merchandise 5. Testing application


9. Report 4. Cost Suitable for the
8. Receiving 3. Materials Reliable True
7. Purposes 2. Standard Good Quality
6. Reliable 1. Quality
What can I do? What’s More

Module 2

5. D

behavior 4. C
Inappropriate physical
3. A
interpersonal relations
Inappropriate 2. E
Resistance to change
Inappropriate behavior 1. B

What’s More What can I do?

43
44
What's More What can I do?
1. SYSTEM
1. SYSTEM
2. PROGRAM
2. PROGRAM
3. BACKUP
3. SPREADSHEET
4. APPLICATION 4. DISK
5. BACKUP
5. COMPUTER 6. WEB
6. SPREADSHEET 7. DATABASE
7. PRESENTATION 8. UTILITY
9. APPLICATION
8.DATABASE 10. DISK
9. SOFTWARE
Module 5
What's More What can I do?
Identify hazards of Task to be done
ICT tools Hazard Report Form
Complete the Tasks See Rubrics Criteria
Module 4
What's More What can I do?
1. Improvement
2. Control
3. Assurance
4. Cause
5. Effect
Module 3
45
Assessment
1. C 6. D
2. B 7. B
3. D 8. B
4. D 9. C
5. B 10. C
What can I do?
What's More
Perform computer maintenance
1. Steps in Disk cleanup, 1. Scan your computer using
2. Steps in Backup your data and antivirus
3. Steps in Malware Maintenance 2. Back up your Data
3. Disk Cleanup
Module 8
What's More What can I do?
1. Frequently used 1. Peru
icons 2. England
2. Search box 3. England
3. Webpage 4. Myanmar
4. Bookmark bar 5. USA
5. Reload 6. UAE
6. Address bar 7.Greece
7. Tab 8. France
8. Customize & 9. Brazil
control 10. France
9. Account
10. Apps
Module 7
What's More What can I do?
Task to be done
1. Antivirus 1. Skype
2. Video editing Apps 2. Photoshop
3. PowerPoint 3. Any Video Converter
4. Facebook Chat
4. Task Manager
5. Microsoft Windows
6. Email 5. PowerPoint
6. Windows
Module 6
References

Printed Sources

Rosalie P. Lujero, K to 12 Basic Education Curriculum- Technology and Livelihood


Education Learning Module – Grade 10 - Information and Communications
Technology Computer Hardware Servicing CHS 10.

Owen M. Milambiling, Cesar T. Arriola, Dante B. Bermas, K to 12 Basic Education


Curriculum-Technology and Livelihood Education Learning Module –
Computer Hardware Servicing 9

Ronaldo V. Ramilo and Deover M. Pasco , K to 12 Basic Education Curriculum-


Technology and Livelihood Education Learning Module – Computer
Hardware Servicing

Online Sources

Brewster Kahle - Window managers and desktop environments – Linux 101.


clemsonlinux.org. Archived from the original on 2008-07-04.
Retrieved from: https://bit.ly/37Q8rqp

Basnayaka W.B.M.C.M. - 2016 - Introduction to computer Software


Retrieved from: https://www.academia.edu/24804336/

Barrie JM, Presti DE. 1996. The World Wide Web as an instructional tool.
Science 274:371-372. Available at http://science-mag.aaas.org/science/
scripts/di splay/full/274/5286/371. Html

Images: Creative Common Images. https://commons.wikimedia.org.


https://publicdomainvectors.org. and Henry delos Reyes Computer Desktop.
Reduce size of the images convert all in grayscale.
“PC HARDWARE SERVICING”
https://kapitolyohs.files.wordpress.com/2011/06/applying-quality-
standard.pdf (accessed June 24, 2020)

. “Illustration of Quality Logo”


https://pixabay.com/illustrations/quality-check-mark-hook-2470673/
(accessed July 11, 2020)

Mubashir Ahmed ( 2012 ) “Hardware and Software” Slideshare.net


https://www.slideshare.net/mubi89/hardware-software-
12234806?fbclid=IwAR33AOotHhbSCYuBfEFZzju8sOFdaPe40zRDRAujimrk
Dw-GXiyne8yFv0g
(accessed June 23, 2020)

“Different Types of Software with Examples”


https://squareboat.com/blog/different-types-of-software-with-
examples?fbclid=IwAR0Hv_VhUJtOd9zI7COhu-
jgLcbVCi0YcMG9K_7dPv62UlGsE9j8c641wOI (accessed June 23, 2019)

46
For inquiries or feedback, please write or call:

Department of Education – Schools Division Office Navotas


Learning Resource Management Section

Bagumbayan Elementary School Compound


M, Naval St., Sipac Almacen, Navotas City

Telefax: 02-8332-77-64
Email Address: [email protected]

You might also like