SDO Navotas TLE CSS9 Q1 FV
SDO Navotas TLE CSS9 Q1 FV
4
9
TECHNOLOGY AND
LIVELIHOOD EDUCATION
(ICT)
Computer Systems Servicing
QUARTER 1
S.Y. 2021-2022
NAVOTAS CITY PHILIPPINES
Technology and Livelihood Education (ICT- CSS) Grade 9
Alternative Delivery Mode
Quarter 1
Second Edition-2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
an agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Module 1......................................................................................3
Module 2......................................................................................5
Module 3......................................................................................10
Module 4......................................................................................14
Module 5......................................................................................20
Module 6......................................................................................24
Module 7…………………………………………………………………………29
Module 8......................................................................................35
Assessment ..................................................................................41
References ...................................................................................46
Directions: Read each question carefully, Select the letter of the correct answer.
Write your answers on a separate sheet of paper.
1.Protecting your files means creating backups, storing your file on your hard
drive or any removable storage device regularly is ________________.
A. Update anti-virus and spyware C. Delete temporary files
B. Install or secure passwords D. Back-up your files
2.Computer maintenance is one factor you'll be able to do which will keep you
maintain the disc space in your computer. Maintenance aims are ___________.
A. Develop new system in line with business need
B. Preserve our IT systems in optimal condition
C. Report the problem as they occur
D. Update anti-virus and spyware.
3.Which of the following job position is responsible for returning the materials
to the supplier or to the store where it was bought and make arrangements
with the vendor for replacement.
A. Manager C. Quality Check
B. Supervisor D. Quality Checker
4.Inappropriate communication style: over-aggressive and passive are
examples of what work behavior problem?
A. Inappropriate behavior C. Inappropriate interpersonal
B. Resistance to change D. Inappropriate physical behavior
5.Complete the given statement: Quality __________ is the planned or
systematic actions necessary to provide enough confidence that a
product or service will satisfy the given requirements for quality.
A. Standard C. Assurance
B. Procedure D. Safety
6.Safety protocol must be followed to avoid the possibility of hazards
developing into risks. What should you do if you see someone not following
safety regulations?
A. Ignore as it is not my job C. Report to supervisor immediately
B. Do not report confidential D. Capture it on camera
7.What do you called a collection of data or computer instructions that tell the
computer how to work?
A. Hardware C. Application
B. Software D. Program
8.There are varied kinds of input, output and backing storage devices that
are being created by many various makers. Which of the following is
most found in PCs?
A. Solid State Storage C. Cloud Storage
B. Optical Storage D. Magnetic Storage
1
9.A program that allows a user to find, view, hear, and interact with material on
the World Wide Web. What do you call that program?
A. World Wide Wait C. Search Engine
B. World wide web D. Web browser
10. The coding language used to create Hypertext documents for use on the World
Wide Web, designed to be displayed in a web browser.
A. How to Make Laptop C. Hashtag Markup Language
B. Hypertext Markup Language D. Hypertext Mainframe
MODULE 1
2
Lesson
Applying Quality Standard
1
A. Receiving Materials:
1. Match the packing slip to the items received and ensures that the materials are
destined for the tour department.
2. That you are receiving the materials indicated on the purchase order with regard
to quantity and discount.
3. That the materials are in acceptable condition.
4. That terms regarding installation and/or set-up of equipment are met.
B. Receiving Reports
1. The person receiving the goods must document, using the administrative software,
that all goods were received for each requisition before any payment can be made to
the vendor.
All materials received must be listed and be reported to monitor how many materials
are already on hand, purchased or damaged. Effective management checks are an
important means of providing assurance of the integrity and security of the benefit
processes. They are also useful in identifying training needs; indicating possible
weaknesses in procedure and ensuring the section meets its accuracy target set for
Best Value Performance Indicators purposes.
The Quality checker will record the date of receipt, name of the materials
purchased, quantity, official receipt number, signature of the person who bought the
materials and signed his name afterwards. The Quality checker will identify if the
materials are in good condition or damage and /or needing for replacements. This
will also be recorded on his report.
3
Example of Log Report (to be completed by the Quality checker)
2. Testing of material
The testing of material properties is widely understood to be the key to obtaining data
for a project, performing failure analysis, or understanding material interactions.
Material testing also provides information on the quality of incoming and outgoing
products. Inspection test equipment and techniques are demonstrated for a wide
range of materials and assemblies during the class. This provides the participants
with both knowledge of the common failure modes.
3. Cost of material
The cost of material is also considered when buying or selecting materials for a
specific project. The amount may vary but never taken for granted the quality and
the reliability of the material. Will you buy material which is less expensive but of
worse quality? Will you buy material which you cannot afford? People look for places
which can meet their standards and the right cost for materials to buy.
4
Directions: Find and shade those words in the word search grid.
Look for them in all directions.
QUALITY
STANDARDS
MATERIALS
COST
TESTING
RELIABLE
PURPOSES
RECEIVING
REPORT
MERCHANDISE
Directions: Fill in the graphic organizer with the characteristics of materials used
in specific project and its description.
Characteristics of Materials
Used in Specific Projects
5
MODULE 2
This module was created to help you understand some tips on how to assess
your own work. It was designed and written with you in mind. For that reason, the
scope of this module permits it to be used in many different learning situations; the
language used recognizes the diverse vocabulary level of different learners; and the
lessons are arranged to follow the standard sequence of the course. However, the
order of the lessons, as you read them, can be changed to correspond with the
textbook you are now using.
Lesson
Assessing Own Work
2
6
3. Slow response to work requests, untimely completion of assignments
4. Preventable accidents
1. Inaccuracies, errors
2. Failure to meet expectations for product quality, cost or service
3. Customer/client dissatisfaction
4. Spoilage and/or waste of materials
5. Inappropriate or poor work methods
B. Resistance to change
7
QUALITY STANDARD
The durability of the work depends on the quality of its component parts and
the assembly skills of those who install it. If the best-quality products or hardware
are used but are installed incorrectly, the system will be a failure.
2. Production Process
8
B. STATISTICAL CONTROL
The quality of the outputs is at risk if any of these three aspects are deficient in any
way.
Total Quality Control is the most necessary inspection control of all in cases
where, despite statistical quality control techniques or quality improvements
implemented, sales decrease.
As the most important factor had been ignored, a few refinements had to be
introduced:
1. Marketing had to carry out their work properly and define the customer’s
specifications.
2. Specifications had to be defined to conform to these requirements.
5. Inspections and tests were carried out, and all components and materials,
bought in or otherwise, conformed to the specifications, and the measuring
equipment was accurate, this is the responsibility of the QA/QC department.
9
The Table below shows the Quality System Elements required by ISO 9000 in the
making of the final product.
Directions: Fill in the graphic organizer with types of work behavior that you know
and its example. Do this in your notebook.
10
Directions: Match each quality system elements with its correct function and
description. Write your answer on the space provided.
___1. Management a. Ensure that customer's contractual requirements are
responsibility evaluated and met
MODULE 3
This module was created to help you understand how to engage in quality
improvement. It was designed and written with you in mind. For that reason, the
scope of this module permits it to be used in many different learning situations; the
language used recognizes the diverse vocabulary level of different learners; and the
lessons are arranged to follow the standard sequence of the course. However, the
order of the lessons, as you read them, can be changed to correspond with the
textbook you are now using.
11
Lesson Engage in Quality
3 Improvement
The importance of documenting checks applies whatever the size of the team
and whatever the complexity of the software. In the production of assets, this may
involve checking to confirm the following,
● that all the asset files listed in the product specification document have been
produced;
● that files are correctly named;
● that files are the correct byte size or near the projected file size (examining
the file-sizes in a directory listing can be helpful in identifying problem files
which are either much too large or much too small);
● that files are the correct resolution (screen-size and bit depth in the case of
graphics; duration, sampling frequency and bit-depth in the case of sound
files);
● that the quality of files displaying on the target monitor or heard on target
listening equipment is acceptable.
12
Quality Improvement Processes
Easy to implement and follow up, the most commonly used and well-known
quality process is the plan/do/check/act (PDCA) cycle (Figure 1). Other processes
are a takeoff of this method, much in the way that computers today are takeoffs of
the original IBM system. The PDCA cycle promotes continuous improvement and
should thus be visualized as a spiral instead of a closed circle.
T = Track the effectiveness of the implementation and verify that the desired
results are met.
If the desired results are not met, the cycle is repeated. Both the PDCA and
the PROFIT models can be used for problem solving as well as for continuous quality
improvement. In companies that follow total quality principles, whichever model is
chosen should be used consistently in every department or function in which quality
improvement teams are working.
P= PLAN
● Define a problem or opportunity.
● Analyze the situation. Study and define the problem: brainstorm for cause
and corrective actions: and think creatively to determine the best approach
and best possible corrective action.
● Develop an implementation plan
D=DO
● Implement corrective action.
● Document the procedures and observations
● Use data-gathering tools to collect information.
C=CHECK
● Analyze information
● Monitor trends
● Compare obtained results against expected results from the plan.
A=ACT
● If the results are as expected, do nothing
● If the results are not as expected, repeat the plan/do/check/act cycle.
● Documents the process and the revised plan.
13
systematically. Seven simple tools can be used by any professional to ease the quality
improvement process: flowcharts, check sheets, Pareto diagrams, cause and effect
diagrams, histograms, scatter diagrams, and control charts. (Some books describe a
graph instead of a flowchart as one of the seven tools.)
The key to successful problem resolution is the ability to identify the problem,
use the appropriate tools based on the nature of the problem, and communicate the
solution quickly to others. Inexperienced personnel might do best by starting with
the Pareto chart and the cause and effect diagram before tackling the use of the other
tools. Those two tools are used most widely by quality improvement teams.
Directions: Fill in the graphic organizer with the most common process for
quality improvement.
14
Directions: Find and shade those words in the word search gird.
Look for them in all directions. Use a separate sheet for this activity
Improvement
Control
Assurance
Cause
Effect
Materials
Quality
Analyze
Profit
Process
MODULE 4
This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as Plan and Prepare for Task to be
Undertaken. The scope of this module permits it to be used in many different learning
situations. The language used recognizes the diverse vocabulary level of students.
The lessons are arranged to follow the standard sequence of the course. But the order
in which you read them can be changed to correspond with the textbook you are now
using.
15
After going through this module, you are expected to:
1. determine requirements of task in accordance with the required output
2. select appropriate hardware and software according to task assigned and
required outcome
3. plan a task to ensure that OHS guidelines and procedures are followed
4. follow client-specific guidelines and procedures
5. apply required data security guidelines in accordance with existing
procedures
As a future computer specialist, you should bear in mind all possible dangers
within the work. It’s a requirement to follow correct procedures for handling PC
equipment. If you do not follow the safety protocol procedures it might be dangerous
to your client and could result in fines and criminal convictions. A secure working
place is one that is free from hazards, clean, organized, and well-lit and compliant
with all OHS regulations.
The disposal or recycling of unsafe computer elements should be done
properly. Make sure to follow regulations that govern how to dispose of specific items.
This module provides the general and safety guidelines that protects the technician
and the equipment.
16
2. Setting computers: When setting a computer room, the following must be
taken into consideration: The computer set should have enough space, free
entry and exit, peripheral devices and cables are properly managed.
3. Dust free Workplace: Dust should be prevented as often as possible in the
Computer workplace and computer devices. Dust build up can suffocate your
PC’s hardware and can harm inside parts of your computer.
4. Proper Ventilation Room: The need for an air conditioner or fan is necessary
for the computer user to be comfortable. When the computer room is cool,
you're guaranteed protection for your computer hardware and software.
5. Protect devices from voltage spikes: Unwanted voltage fluctuations can
damage your computer devices. The use of surge protector or AVR
as a voltage stabilizer can prevent damage to your devices.
The Safety Signs and Symbols must be understood and followed to be effective.
It must be within the right place, and for the correct reasons. Check that it's clear to
all what precisely is supposed by the sign. The language must be easy, clear, and
customary. It should be comprehensible by the overall use of the workplace. The
signs stand out for straightforward recognition even from a decent distance.
17
5. Keep food and drinks out of your workspace and your workspace must be
clean and free of clutter.
1.
2.
3.
4.
5.
18
6.
7.
8.
Name:
Address:
Grade level: Phone no.:
How is it a Hazard:
19
Actions recommended to be taken By Whom By When
Criteria 1 2 3 4 5
Identify the hazard
Correct Actions
Presentation
Time Frame
Total
20
MODULE 5
This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as Input data into computer. It was
designed and written with you in mind. For that reason, the scope of this module
permits it to be used in many different learning situations; the language used
recognizes the diverse vocabulary level of different learners; and the lessons are
arranged to follow the standard sequence of the course. However, the order of the
lessons, as you read them, can be changed to correspond with the textbook you are
now using.
Lesson
Input data into computer
5
TYPES OF SOFTWARE
21
System Software
● Device Drivers
● Operating Systems
Application Software
● Spreadsheet Software
● Database Software
Allows users to store and retrieve vast amounts of data.
Example: MS Access etc.
● Presentation Software
Allows users to create visual presentations. Example MS Powerpoint
Utility Software
Utility software helps in the management of computer hardware and
application software. It performs a small range of tasks. Some typical examples
of utility software are
● Disk Defragmenters
It detects computer files whose contents are stored on the hard disk in
disjointed fragments and move the fragments together to increase
efficiency.
22
● Backup
This utility makes a copy of all information stored on a disk, and restore
either the entire disk or selected files
● Disk Partitioner
It divides an individual drive into multiple logical drives, each with its
own file system which can be mounted by the operating system and
treated as an individual drive.
● Anti-Virus
These utilities scan computers for viruses.
Directions: Find and shade those words in the word search gird. Look for them in
all directions.
COMPUTER SOFTWARE
10. GRAPHIC
23
Directions: Use the hint given to fill in the crossword puzzle with the correct
words.
Across
Down
1.______software helps in running the computer hardware and the computer system.
2.______software allows users to create a visual presentation.
4. _____ Practitioner divides an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
5._____ This utility makes a copy of all information stored on a disk, and restore
either the entire disk or selected files
6._____browsing software allows users to surf.
8. This utility make a copy of all information stored on a disk, and restore either the
entire disk or selected files
24
MODULE 6
This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as producing output and data using
a computer system. The scope of this module permits it to be used in many different
learning situations. The language used recognizes the diverse vocabulary level of
students. The lessons are arranged to follow the standard sequence of the course.
But the order in which you read them can be changed to correspond with the
textbook you are now using.
(TLE_IACSS912PCO-Ic-d-4)
25
Lesson Produce output/ data using
6 computer system
Computer Software
System Software
A. Utility software
B. System servers
C. Device drivers
D. Operating system (OS)
E. Windows/graphical user interface (GUI) systems
26
Application Software
Cloud Suite - use of software to deliver a service over a network through the
Internet. With cloud suite, users will access files and use applications from any
device that may access them online. Associate example of a Cloud suite supplier is
Google Suite and Adobe Creative cloud.
A. Multimedia
B. Presentation Software
C. Word processing software,
D. Spreadsheets Software,
E. Presentation, Graphics,
F. Communication
Storage devices
Storage Devices Backing storage may be a device that holds and retains
information. These devices permit the user to avoid wasting information during an
additional permanent manner than RAM so information isn't lost and should be used
later. samples of common backing storage devices are hard disc drive, CD-RW drive,
non-volatile storage and DVD-RAM drives.
Every form of device has its own characteristics. Some peripheral devices are
quicker at transmittal data; will store additional data; are unit extra accurate; devices
are smaller in physical size and portable, wireless connectivity and Some of this
product are sold at affordable prices
27
Hard disk drives (HDDs) square measure primarily found in computers and
laptops. The disk within the hard disc drive is coated with a magnetic media that
records information in binary code.
Directions: Identify the Application and System software. Choose from the option
below.
Computer software
Application System
1 6
2 7
3 8
4 9
5 10
28
Computer Application and System software
Directions: Write down the tasks you have completed using various application
software. Make a screenshot of your work. Make an E-Portfolio.
Example:
Microsoft word apps I have used Microsoft word apps to write my
assignment in English.
Application & System Software Task I have completed using this software
1. Antivirus
2. Video editing Apps
3. Microsoft PowerPoint
4. Facebook Chat
5. Microsoft Windows
6. Email
Criteria 1 2 3 4 5
Presentation
Time Frame
Total
29
MODULE 7
This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as using basic functions of a www-
browser to locate information. The scope of this module permits it to be used in many
different learning situations. The language used recognizes the diverse vocabulary
level of students. The lessons are arranged to follow the standard sequence of the
course. But the order in which you read them can be changed to correspond with
the textbook you are now using.
30
Lesson Use basic functions of a www-
7 browser to locate information
1. Web browser
Tim Berners-Lee invented the first web browser called World Wide Web in
1990. His contribution helps so many people around the world and set off creativity,
collaboration and innovation worldwide.
31
Parts of a Google Web Browser
2. Search engine
32
The search results are generally presented in a line of results, often referred
to as search engine results pages (SERPs). The information may be a mix of links to
web pages, images, videos, infographics, articles, research papers, and other types
of files. Some search engines also mine data available in databases or open
directories. Unlike web directories, which are maintained only by human editors,
search engines also maintain real-time information by running an algorithm on a
web crawler.
1. Google
2. Bing
3. Yahoo
4. Baidu
5. AOL
33
Domain names
Domain names are used to identify one or more IP addresses. For example,
the domain name microsoft.com represents about a dozen IP addresses. Domain
names are used in URLs to identify Web pages. For example, in the URL
http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com.
Hyperlink
A hyperlink is a word, phrase, or image that you can click on to jump to a new
document or a new section within the current document. Hyperlinks are found in
nearly all Web pages, allowing users to click their way from page to page. The three
types of hyperlinks are: Text hyperlink – Uses a word or phrase to take visitors to
another page, file or document. Image hyperlink – Uses an image to take visitors to
another page, file or document. Bookmark hyperlink – Uses text or an image to take
visitors to another part of a web page.
34
Directions: Use Google or Mozilla search engine to find out where each of the
landmarks below can be found in the world. Make an E-Portfolio.
Rubrics
35
MODULE 8
This module was designed and written with you in mind. It is here to help you
master Performing Computer Operations such as maintaining computer equipment
and systems. The scope of this module permits it to be used in many different
learning situations. The language used recognizes the diverse vocabulary level of
students. The lessons are arranged to follow the standard sequence of the course.
But the order in which you read them can be changed to correspond with the
textbook you are now using.
36
Lesson Maintaining Computer
8 Equipment and Systems
Computer maintenance is one factor you'll be able to do which will keep you
sustain the disc space in your computer and assist you release a valuable system
resource. What is more, actual physical clean-up, as in dusting, can enable your PC
to virtually breathe easier, and successively prolong the lifetime of your system.
Perhaps you have handpicked the best PC with the chosen the quickest processor
and graphic card and with a couple of gigabytes of memory. Therefore, you thought
to yourself that your machine perhaps will last long years, however very little did you
discover one year down the road, your PC is behaving like an old version laptop,
constantly flustering you with its stormy pictures, frustrating pop-ups and
staggeringly slow access. Gradually, your laptop crashes and everyone's information
is lost on one fine afternoon.
One factor you have got in all probably omitted is that they would like for
system maintenance. The fundamental routine maintenance contains of the three
basic processes:
1. Disk cleanup
2. Backup your data
3. Malware Maintenance
DISK CLEANUP
When your computer is brand new you may be pleased to know how smooth,
and efficient your applications are running. But one year down the road, it slows
down, and this bothers you. What truly causes the decline in performance? You'll
37
argue that your disk is simply one years old. This may be the approach you use on
your system that is causing the problem.
Disk Clean-up utility is a tool that permits you quickly to delete stuff like
temporary and cache files so you can free up space on your hard drive. The software
tool will let you scroll through and see what is taking up space on the hard drive.
You can read a brief description of what it’s you’d be deleting. You'll be able to
additionally read the files at any time by clicking on the “View Files” button, or if
you've got admin access, you'll be able to click disk Clean-up files and can restart in
admin mode.
DATA BACKUP
38
Creating a duplicate copy of a data so that in case anything happens to the
original data, you have a spare copy. This is typically a simple thing to do. First, you
must ask yourself why you should back up the data or system? then you should
decide and select what data to be backed up. Depending on your needs, you may
choose to back up, any personal documents, photos, home videos, and any other
data
Most operating system's have a friendly interface that allows you to drag and
drop computer files from one storage device to another. This may be as easy as
copying a document file from your desktop into a preferred storage device. But when
these files gradually occupy a lot of disk space, you may need to seek help from
archive utilities such as Win zip which enables you to compact your files into a single
compressed file. You can then break up this large file into several pieces to be stored
in several media’s storage devices.
If you used Backup and Restore to back up files or create system image
backups in previous versions of Windows, your old backup is still available in
Windows 10. In the search box on the taskbar, type control panel. Then select
Control Panel > System and Security > Backup and Restore (Windows 7).
MALWARE MAINTENANCE
39
Malware is any program or file that is harmful to a computer or content that
infiltrates your PC, leading to damage to the system and causing it to act in an
undesirable manner. Commonly, these embody viruses, spyware, worms, Trojan
horses, spams and many more. Once the system is infected, you can lose your
privacy, confidential data and access to your system when software and hardware
are damaged. Luckily, there are preventive measures you can take to protect yourself
from malware. One factor you’ll be able to do is to scan the file for any virus before
you plan to open it. If the scan shows nothing, it is probably a secure file. But then
once more, it might be a new virus updated version of malware in your virus scan.
You'll be able to apply a successive virus signature update and conduct a second
scan.
The Windows Defender Offline scan takes about 15 minutes to run, and then your
PC will restart and will automatically detect and remove or quarantine malware.
1. Open your Windows Security settings.
2. Select Virus & threat protection > Scan options.
3. Select Windows Defender Offline scan, and then select Scan now.
View the results of your scan
1. Open your Windows Security settings.
2. Select Virus & threat protection > Protection history.
40
Directions: Using the graphic organizer below. Enumerate the steps in performing
disk cleanup, backup your data and Malware Maintenance. Write your
answers on a separate sheet of paper.
3. Disk Cleanup
41
Directions: Read each question carefully, Select the letter of the correct answer.
Write your answers on a separate sheet of paper.
1.Safety protocol must be followed to avoid the possibility of hazards
developing into risks. What should you do if you see someone not following
safety regulations?
3.There are varied kinds of input, output and backing storage devices that
are being created by many various makers. Which of the following is
most found in PCs?
6.Protecting your files means creating backups, storing your file on your hard
drive or any removable storage device regularly is ________________.
A. Update anti-virus and spyware C. Delete temporary files
B. Install or secure passwords D. Back-up your files
7.Computer maintenance is one factor you'll be able to do which will keep you
maintain the disc space in your computer. Maintenance aims is ___________.
A. Develop new system in line with business need
B. Preserve our IT systems in optimal condition
C. Report the problem as thy occur
D. Update anti-virus and spy ware.
8.Which of the following job position is responsible for returning the materials
to the supplier or to the store where it was bought and make arrangements
with the vendor for replacement.
A. Manager C. Quality Check
B. Supervisor D. Quality Checker
42
A. Inappropriate behavior C. Inappropriate interpersonal
B. Resistance to change D. Inappropriate physical behavior
10. B C
9. D C
8. D B
7. B B
D 6. C
What I Know
Module 1
Module 2
5. D
behavior 4. C
Inappropriate physical
3. A
interpersonal relations
Inappropriate 2. E
Resistance to change
Inappropriate behavior 1. B
43
44
What's More What can I do?
1. SYSTEM
1. SYSTEM
2. PROGRAM
2. PROGRAM
3. BACKUP
3. SPREADSHEET
4. APPLICATION 4. DISK
5. BACKUP
5. COMPUTER 6. WEB
6. SPREADSHEET 7. DATABASE
7. PRESENTATION 8. UTILITY
9. APPLICATION
8.DATABASE 10. DISK
9. SOFTWARE
Module 5
What's More What can I do?
Identify hazards of Task to be done
ICT tools Hazard Report Form
Complete the Tasks See Rubrics Criteria
Module 4
What's More What can I do?
1. Improvement
2. Control
3. Assurance
4. Cause
5. Effect
Module 3
45
Assessment
1. C 6. D
2. B 7. B
3. D 8. B
4. D 9. C
5. B 10. C
What can I do?
What's More
Perform computer maintenance
1. Steps in Disk cleanup, 1. Scan your computer using
2. Steps in Backup your data and antivirus
3. Steps in Malware Maintenance 2. Back up your Data
3. Disk Cleanup
Module 8
What's More What can I do?
1. Frequently used 1. Peru
icons 2. England
2. Search box 3. England
3. Webpage 4. Myanmar
4. Bookmark bar 5. USA
5. Reload 6. UAE
6. Address bar 7.Greece
7. Tab 8. France
8. Customize & 9. Brazil
control 10. France
9. Account
10. Apps
Module 7
What's More What can I do?
Task to be done
1. Antivirus 1. Skype
2. Video editing Apps 2. Photoshop
3. PowerPoint 3. Any Video Converter
4. Facebook Chat
4. Task Manager
5. Microsoft Windows
6. Email 5. PowerPoint
6. Windows
Module 6
References
Printed Sources
Online Sources
Barrie JM, Presti DE. 1996. The World Wide Web as an instructional tool.
Science 274:371-372. Available at http://science-mag.aaas.org/science/
scripts/di splay/full/274/5286/371. Html
46
For inquiries or feedback, please write or call:
Telefax: 02-8332-77-64
Email Address: [email protected]