0% found this document useful (0 votes)
14 views24 pages

CSS 11 - Q1 - Mod2 - Wk2 - Maintain Computer Equipment and Systems - FRITCHIE PALADEN

This document is a localized self-learning module for Senior High School students in Computer Systems Servicing, focusing on maintaining computer equipment and systems. It outlines the objectives, learning competencies, and various maintenance procedures, including preventive maintenance, disk cleanup, and data backup strategies. The module is designed to facilitate guided and independent learning while helping students acquire essential 21st-century skills.

Uploaded by

ERWIN LLAME
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views24 pages

CSS 11 - Q1 - Mod2 - Wk2 - Maintain Computer Equipment and Systems - FRITCHIE PALADEN

This document is a localized self-learning module for Senior High School students in Computer Systems Servicing, focusing on maintaining computer equipment and systems. It outlines the objectives, learning competencies, and various maintenance procedures, including preventive maintenance, disk cleanup, and data backup strategies. The module is designed to facilitate guided and independent learning while helping students acquire essential 21st-century skills.

Uploaded by

ERWIN LLAME
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Senior

High School

Computer Systems
Servicing 11
Quarter 1 – Module 2: Week 2
Maintain Computer Equipment and Systems
Engr. Juren Andrew G. Nieves

A Localized Self-Learning Module for Senior High School of the


SCHOOLS DIVISION OF DIPOLOG CITY
Computer Systems Servicing – Grade 11
Quarter 1 – Module 2, Week 2: Maintain Computer Equipment and Systems
First Edition, 2023

Republic Act 8293, section 176 states that no copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for the exploitation of such work for
profit. Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Sara Z. Duterte
Undersecretary:

Development Team of the Module

Author: Engr. Juren Andrew G. Nieves


Editors:
Reviewer: Helen M. Ogoc
Illustrator:
Layout Artist: Fritchie S. Paladen
Management Team:
Ma. Liza R. Tabilon, CESO V -Schools Division Superintendent
Lourma I. Poculan, CESO VI -Asst. Schools Division Superintendent
Amelinda D. Montero -Chief Education Supervisor, CID
Nur N. Hussien -Chief Education Supervisor, SGOD
Serapino E. Estebat Jr. -Education Program Supervisor, LRMS
Leo Martinno O. Alejo -Project Development Officer II, LRMS

Published by the Department of Education – Division of Dipolog


City Office Address : Farmers, Olingan, Dipolog City
Telephone Nos. : (065) 212 6986 and (065) 212-5818
E-mail Address : [email protected]
Website : www.depeddipolog.net
Senior High School

Computer
Systems
Servicing 11
Quarter 1 – Module 2: Week 2
Maintain Computer Equipment
and Systems
Introductory Message

For the facilitator:

This module was collaboratively designed, developed and reviewed by educators


from public institutions to assist you, the teacher or facilitator in helping the
learners to meet the standards set by the K to 12 Curriculum while overcoming
their personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.

For the learner:

This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.

ii
This module has the following parts and corresponding icons:

What I Need to This will give you an idea of the skills or


Know competencies you are expected to learn in
the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as
a story, a song, a poem, a problem opener,
an activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.
What I Have This includes questions or blank
Learned sentences/paragraphs to be filled in to
process what you learned from the lesson.

What I Can Do This section provides an activity that will


help you transfer your new knowledge or
skill into real-life situations or concerns.

Assessment This is a task that aims to evaluate your


level of mastery in achieving the learning
competency.
Additional In this portion, another activity will be
Activities given to you to enrich your knowledge or
skill of the lesson learned. This also tends
to the retention of learned concepts.

Answer Key This contains answers to all activities in the


module.

iii
At the end of this module, you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Handle this module with extra care. Do not put unnecessary mark/s on any
part of the module.
2. Use a separate sheet of paper in answering the exercises.
3. DO NOT forget to answer What I Know (Pre-Test) before moving on to the
other activities included in the module.
4. Read the instructions carefully before doing each task.
5. Observe honesty and integrity in doing the tasks and checking your
answers.
6. Finish the task at hand before proceeding to the next.
7. Return this module to your teacher/facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, DO NOT
hesitate to consult your teacher or facilitator. Always bear in mind that you
ARE NOT ALONE.

We hope that through this material, you will experience meaningful learning
and gain a deep understanding of the relevant competencies. You can do it!

iv
What I Need to Know

This module was created and written with you in mind. It is


here to assist you in mastering how to Maintain Computer
Equipment and Systems. The scope of this module allows it to be
used in a variety of learning contexts. The language utilized
acknowledges the kids' varied vocabulary levels. The lessons are
organized to follow the course's typical sequence. However, the
order in which you read them can be altered to fit with the textbook
you are now using.
Content Standard: The learners demonstrate and understanding
of concepts and underlying principles in performing computer
operations.
Performance Standard: The learners shall be able to perform
computer operations based on a given tasks.

Learning Competency: Maintain Computer Equipment and Systems


TLE_IACSS9-12PCO-Ii-j-9

After going through this module, you are expected to:


1. Implement procedures for ensuring security of data,
including regular backups and virus checks in accordance
with standard operating procedures; and
2. Implement basic file maintenance procedures in line with the
standards operating procedures.

1
What I Know

Direction: Read each statement below carefully. Write T if the statement is


TRUE. Write F if the statement is FALSE.

______1. Regularly updating antivirus software is an essential part of maintaining


computer systems.

______2. It's acceptable to place a desktop computer directly on a carpeted floor


as long as it has proper ventilation.

______3. Defragmentation is a beneficial process that improves the performance


of a computer's hard drive.

______4. Cleaning computer components with a vacuum cleaner is a safe and


effective way to remove dust and debris.

______5. Backing up data only needs to be done once a year to ensure the safety
of important files.

2
Lesso
n
Maintain Computer
1 Equipment and Systems

What is computer equipment and systems?

Computer equipment and systems refer to the physical electronic


components and the interconnected set of software that make up a
computer or computing system.

https://i.pinimg.com/564x/31/5b/82/315b82b86a9bcebac829ab601d412eea.jpg

What’s In

Try to answer the following questions:


What is maintenance?
Why do you need to maintain our computers?
How do you maintain computer equipment and systems?

3
What’s New

Direction: Make a checklist of things you'd regularly do to keep


your computer healthy and working well. Include both
the physical parts (like the actual computer) and the
programs (like the stuff you use on it). Write a short
explanation for each thing on your list.

What is It

Why do we need Computer Maintenance?


Maintaining computer equipment and systems involves a set
of practices and activities aimed to ensure the proper functioning,
security, and longevity of computers and its components. This
includes both hardware and software elements of computer
systems.

Preventive Maintenance

Preventive maintenance is the systematic and scheduled


maintenance activities undertaken to prevent equipment or systems
from failing by addressing potential issues before they occur.

How often should you perform computer maintenance?

The frequency of computer maintenance depends on factors


such as usage, environment, and the specific components involved.
Generally, regular tasks like software updates, antivirus scans, and
disk cleanup can be done monthly. Hardware cleaning and checks
may be done every 3-6 months. However, it's essential to adjust the
schedule based on your computer's needs and any specific
recommendations from manufacturers.

4
5
Computer Maintenance

 Disk Cleanup
Disk cleanup is the process of removing unnecessary or
temporary files from a computer's hard drive to free up
storage space and improve overall system performance.
This typically involves deleting temporary files, system
caches, and other files that are no longer needed for the
proper functioning of the computer.

Steps for disk cleanup:


1. Press the Start
button and
search
“Disk Cleanup”.

2. Select Drive C:.

3. Select the files


you want to
delete and
press OK.

 Checking Disk Errors


Checking disk errors is the process of inspecting a
computer's storage device (Hard Disk Drive or Solid State
Drive) for any issues or errors that may affect its
performance or data integrity. This can be done using disk
checking or disk utility tools, which scan the storage device
for bad sectors, file system errors, or other issues, and
attempt to repair or isolate them. This is a maintenance
task to ensure the health and reliability of the storage
medium.

Steps for CHKDSK:


1. Press the Start button and search “cmd”.
2. Right click the program and select “Run as
administrator”.
3. Type “chkdsk” and press Enter.

6
 Dusting the external and internal part of the computer
Dusting your computer system involves the physical
cleaning of both the outer surfaces (such as the casing,
keyboard, and monitor) and the internal components (such
as fans, heat sinks, and circuit boards) to remove dust and
debris. This preventive maintenance task helps prevent
overheating, improve airflow, and maintain the overall
cleanliness and functionality of the computer system.

Steps for physical dusting:


1. Clean your computer
screen with dry cloth
to remove the excess
dust.

https://cdn.mos.cms.futurecdn.net/GuvigrnRs53oEWRv5DzvAg-650-
80.jpg.webp

2. Clean your keyboard


by using a can of
compressed air to
remove the crumbs,
dust, and other
debris. Then, you
can use a clean cloth
dampen with
isopropyl alcohol and
run it over the full https://media.wired.com/photos/63759ed907aaf5e4eb27d0a8/
master/w_1920,c_limit/keyboard_clean_gear_GettyImages-
keyboard. 1217341013.jpg

3. Open the case of


your system unit and
use a can of
compressed air to
spray inside until all
of the dust is gone.
Avoid using a
vacuum cleaner, as
they create static
electricity that can
damage your device.
Use a soft paintbrush
https://www.ccsipro.com/wp-content/uploads/2021/02/pexels-
to remove the hardened dust buildup.
anete-lusina-4792719.jpg

7
File Maintenance

 Disk Defragmenter
Disk Defragmenter is a utility tool that helps improve
the performance of a computer's hard drive by rearranging
fragmented data.

Here are three simple objectives related to Disk


Defragmenter:
1. Optimize disk performance: Run Disk
Defragmenter regularly to reorganize fragmented
data on the hard drive, reducing access times and
improving overall system speed.

2. Schedule automatic defragmentation: Set up a


regular schedule for automatic disk
defragmentation to ensure that the process is
consistently performed without manual
intervention, maintaining optimal disk efficiency.

3. Monitor disk health: Use Disk Defragmenter to


assess the health of your disk and identify any
potential issues related to fragmentation. Address
these issues promptly to prevent performance
degradation and data loss.

Steps for disk defragment:


1. Press the Start button and search “Defragment
and Optimize Drives.”
2. Select the drives you want to defragment and
press “Optimize.”

Windows 11 Defragment and Optimize Drives

8
 Add/Remove Programs

Steps to add a program:


1. Download the program installer.
2. Run the installer.
3. Follow the installation prompt.
4. Complete the installation.

Steps to remove a program:


1. Open the Control Panel.
2. Access the "Programs" or "Applications" section.
3. Select the program to uninstall.
4. Uninstall or Remove the program you want to
uninstall.
5. Follow additional instructions.

 Back up your files


Backing up our files is essential because it acts as
a safety net for our digital files. In the face of
unexpected events like hardware failures, cyberattacks,
or accidental deletions, having backups ensures that we
can recover our valuable data, preventing potential loss
to our work and personal lives.

Here are three common ways to back up your files:

1. External Hard Drive or USB Flash Drive:


 Connect an external hard drive or USB flash drive
to your computer.
 Manually copy and paste your important files to
the external drive.
 This provides a physical backup that you can store
in a different location when not in use.

9
2. Cloud Storage Services:
 Use cloud storage services such as Google Drive,
Dropbox, or OneDrive.
 Upload your files to the cloud, and they will be
stored securely on remote servers.
 Access your files from any device with an internet
connection.
 Some services offer automatic synchronization,
keeping your files up to date.

3. Automated Backup Software:


 Use backup software that automates the process
of backing up your files.
 Set up a schedule for regular backups, ensuring
that new and modified files are included.
 The software may offer options for full or
incremental backups, optimizing storage space.

 Internet Predators and Protection


Malware (malicious software) is any software designed
to harm or exploit devices, networks, or data.

Three types of malwares:


1. Virus - A computer virus is a type of malware
that is designed to infect computer systems and
spread from one device to another. Similar to
biological viruses, computer viruses replicate
and attach themselves to programs or files with
the intention of causing harm to the host
computer.
2. Worm - A computer worm is a type of malicious
software (malware) that is designed to replicate
itself and spread independently across
computer networks. Unlike viruses, worms don't
need to attach themselves to other programs or
files to spread; they can operate on their own.
3. Spyware - Computer spyware is a type of
malware designed to secretly gather
information about a user's activities on a
computer. Unlike viruses and worms, spyware
doesn't typically replicate itself, but it operates
silently in the background, collecting data
without the user's knowledge or consent.

Here are three basic objectives to protect against


malware:

10
1. Install Antivirus Software – Choose a credible
antivirus program and keep it regularly updated.
Antivirus software can detect and remove various
types of malwares, providing a vital layer of defense.

2. Regular System Scans – Schedule and perform


regular scans of your computer or device to identify
and eliminate any potential malware threats. This
proactive approach helps catch issues before they can
cause significant harm.

3. Exercise Caution Online – Be mindful of the websites


you visit, emails you open, and files you download.
Avoid clicking on suspicious links, and only download
software from trusted sources. Educate yourself and
practice safe online habits to reduce the risk of
malware infections.

By combining these objectives, you can establish a


solid foundation for protecting your system against
malware and maintaining a secure computing
environment.

 System Restore point


A system restore point is like a time-travel
checkpoint for your computer. It's a snapshot of its
settings and configuration at a specific moment.

Creating a restore point in Windows is just a


simple procedure. Here's how you can do it:

1. Open the Start Menu


Click on the Windows icon in the taskbar or
press the Windows key on your keyboard to
open the Start Menu.

2. Access "Settings":
Click on the gear-shaped icon in the left column
or search for "Settings" and select it.

3. Go to "System":
In the Settings window, click on "System" in the
left sidebar.

4. Navigate to "Storage":
In the System settings, click on "Storage" in the
left sidebar.

11
5. Click on "Advanced storage settings":
Scroll down and click on "Advanced storage
settings" under the Storage settings.

6. Select "System Restore":


In the Advanced storage settings, click on
"System Restore."

7. Create a Restore Point:


Click on the "Create a restore point" button.

8. Provide a Name:
In the System Properties window that opens,
click the "Create" button, and then provide a
descriptive name for the restore point.

9. Create:
Click "Create" again to confirm.

10. Wait for Completion:


Windows will then create the restore point. This
might take a few moments.

11. Finish:
Once the process is complete, you'll receive a
confirmation message. Click "Close" to finish.

Now you have a restore point that you can return


to if needed. It's a good practice to create restore points
before major system changes or updates for you to be
able to go back to your previous settings.

12
What’s More

“TechCare Challenge”
Direction: Complete the crossword by filling in a word that fits each clue.

What I Have Learned

Direction: Read and answer the following questions carefully in two to


three sentences each number.
1. What are the importance of maintaining your computer systems and
equipment?

13
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. Cite a specific situation in which applying proactive maintenance to


computer equipment and systems would be crucial.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

What I Can Do

Directions: Copy and the diagram below in your notebook to solidify your
understanding of Maintaining Computer Equipment and Systems
Flowchart.

Assessment

Directions. Read each statement carefully. Encircle the letter of the


correct answer.

1. What is the primary purpose of regular software updates in maintaining


computer equipment and systems?
a. Enhancing system aesthetics.
b. Improving hardware durability.
c. Ensuring compatibility and security.
d. Increasing storage capacity.

14
2. How does routine cleaning contribute to the longevity of hardware in
computer systems?
a. Boosting internet speed.
b. Preventing dust accumulation.
c. Enhancing file organization.
d. Expanding storage capacity.
3. Why is establishing an organized file management system important in
maintaining computer equipment?
a. Improving processor speed.
b. Enhancing system aesthetics.
c. Increasing RAM capacity.
d. Optimizing storage efficiency.
4. What role do automated backup systems play in effective system
maintenance?
a. Minimizing data loss risks.
b. Enhancing gaming performance.
c. Improving graphic design capabilities.
d. Increasing processor speed.
5. How does maintaining computer equipment and systems contribute to
minimizing downtime?
a. By prioritizing system aesthetics.
b. By enhancing file organization.
c. By ensuring optimal performance and reliability.
d. By increasing storage capacity.

Additional Activities

Direction. Answer the questions below about maintaining computer


equipment and systems in general. Write your answer in your notebook.

1. Why is it important to perform regular disk cleanup on a


computer?
2. What is a recommended practice to enhance the security of
computer systems?

15
Answer Key

Assessment What’s More What I Know


1. c
2. b Down: 1. T
3. d 1. Maintenance 2. F
4. a 2. Restore 3. T
5. c 3. Programs 4. F
4. Antivirus 5. F

Across:
5. Defragmentation
6. Malware

Additional Activities
Answers vary.

16
References
https://www.slideshare.net/roanokedirector/computer-maintenance-36795404

https://www.dell.com/support/kbdoc/en-ph/000148643/using-the-chkdsk-
utility#:~:text=Click%20Start%20and%20then%20click,Click%20Check
%20under%20error%20checking.

https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/
how-to-clean-your-computer-inside-out#:~:text=After%20you%20open%20the
%20case,duster%20may%20also%20cause%20damage.

https://worksheets.theteacherscorner.net/make-your-own/crossword/

17
For inquiries or feedback, please write or call:

Published by the Department of Education – Division of Dipolog


City Office Address : Farmers, Olingan, Dipolog City
Telephone Nos. : (065) 212 6986 and
(065) 212-5818
E-mail Address : [email protected]
Website : www.depeddipolog.net

18

You might also like