Date: Grade/Section: Teacher: Subject: Activity No
Date: Grade/Section: Teacher: Subject: Activity No
Suggested
IV. LEARNING PHASES Timeframe
Learning Activities
A. Introduction 30 minutes LEARNING TASK 1. Arrange the following jumbled letters to form the correct words.
Panimula
1. ERTURPOMC USIRV _________________
2. SMROW _________________
3. AREWYPS _________________
4. YKSERPASK _________________
5. NOTRON _________________
6. ORCAM ESSRUVI _________________
7. BEW TELAPP SESRUVI _________________
8. TIB DEFENDER _________________
9. TORAJN _________________
10. ARVIA _________________
3. It is a type of utility used for scanning and removing viruses from your computer.
a. drivers
b. anti-virus
c. social media
d. operating system
4. Are techniques for ensuring that data stored in a computer cannot be read or
compromised by any stranger without the owner’s authorization.
a. Permit
b. Protecting Hardware
c. Protecting computer from security
d. Computer Security
1. Clean the outer surface with a simple cloth and water solution. A damp cloth is
the best cleaning tool for computer hardware. A small, handy paint brush can be used to
remove dust inside the system unit.
2. Apply an anti-static spray or solution to prevent a build-up of static charges on
computer parts.an economical and effective anti-static solution can be created by
combining 10 parts of water 1 part of fabric conditioner.
3. Observe the correct handling procedures for printed circuit boards and cables to
prevent oxidation build ups or corrosion on electrical connectors, which can reduce the
flow of electricity.
4. Rub off the oxidation build ups using an emery board, a common pencil eraser,
a special solvent white or an electrical contact cleaner spray.
5. Use a lint-free foam swab and isopropyl alcohol or methanol for cleaning other
internal components such as a disk drive head.
Types of Viruses
A computer virus that displays more than one characteristic of a regular computer virus
is known as multi-part computer virus. A computer virus may be categorized with one
or more of the following designations.
1. A file infector works by running together with the executable file that is
attached with. It reproduce as its own code by attaching itself on to an executable
program such as .COM and .EXE files. On the other hand, a boot sector virus infects the
computer when it reads an infected drive or floppy disk.
2. Macro virus is one of the most widespread types of viruses. Macro virus is
written in a macro language and associated with documents, word processing and
spreadsheet. Itu ses an email attachment to spread and can infect the computer when a
user opens an email attachment with a macro virus.
4. Web applet virus is a newer type of virus that can exist using the three most
popular web scripting languages - ActiveX, JavaScript and Java. The virus infects the
computer when a user installs an infected file.
5. Spyware is technically not a virus since it cannot replicate itself, but it can spy
a user when he serves or does business on the internet. If there is a pop up add on the
computer or in the browser, there is a possibility that the spyware might be installed on
the computer.
2. The computer takes longer than the usual to start up. If the user did not
install anything new on the computer but it takes a long time to start up, it is a symptom
that something is wrong. A virus might also be initializing, so make it a habit to scan the
computer regularly.
3. The web browser keeps crashing or there is a new homepage. If the browser
is crashing constantly and the home page is being modified, then there is a possibility
that the browser has been hijacked.
4. When the preferences in the folder options are set to Read-Only. The folder
option gives the user a lot of control on how the files in the computer will function. One
of them is to show or hide the accepted file extension on the computer. if the user
changes the setting of the file and it reverts or returns to the previous setting right away,
then there is a possibility that the virus was able to infiltrate the computer.
5. When the user cannot access the windows registry editor. Windows registry
editor is where most of the operating system and application process are stored. Viruses
that penetrate the registry usually disables it so that the system administrators cannot
change the setting manually.
Anti-Virus Software
Computers have become an integral parts of people’s life and it is important to protect
computers from threat of viruses. Viruses come in many forms and sometimes, it is
difficult to detect them. Here is a list of different anti-virus software that are available in
the market.
Bit Defender Anti-virus Plus- uses a secure browser that the user can use if he want
to do online banking or shopping.
● F-Secure Anti-virus - offers excellent protection against viruses, spyware worms and
trojans. It can also eliminate and locate rootkits. It also provides protection against infected e-
mail attachments.
Anti-Virus Installation
There is a lot software available in the market nowadays. Avira Antivirus is just one of
software that is commonly used. The instructions given below are the steps on how to
install the Avira Antivirus software.
1. Open the folder where the installer is saved then double-click the icon and click
Accept and Install button to proceed.
2. When the User Account Control dialog appears, click the YES button to
continue.
3. Avira will prepare the installation.
4. The next screen shows the progress of the installation. The install button is just
a promotion of Avira. Do not click the Install button, unless interested in the product.
The blue progress bar above indicates that the Avira is installing.
5. Then wait until the installation is done and click Start Avira. If the program did
not run, click the Avira icon in the taskbar.
6. The Avira Antivirus automatically scans the computer for a minute or two.
7. After scanning, the control panel of Avira appears. This indicates that the
program is ready use.
PC Securities
Computer Security are techniques for ensuring that the data stored in a computer
cannot be read or compromised by any stranger without the owner’s authorization. It is
protecting computer systems and information from harm, theft, and unauthorized use.
Most computer security measures involve data encryption and password. Data
encryption is the translation of data into a form that is meaningless without a
deciphering mechanism.
3. On the left side of the window, click Turn Windows Firewall on or off.
4. Click the radio button to Turn on Windows Firewall, then select OK.
Protecting Hardware
The problem that a computer may encounter depend on its environment and the manner
it is used. Below are some examples.
1. Avoid heat buildup.
Excessive heat can cause premature aging and failure of the electronic components of
the computer. Make sure that the area is uncluttered so air flows freely around the
computer. Check also if the power supply’s fan is working and operational.
Troubleshooting Methodology
A good computer technicians will follow some sort of formalized troubleshooting
methodology. Below are the basic troubleshooting practices one must know before
performing an actual PC troubleshooting.
1. Information gathering
a. Identify what the user wants to accomplish - Maintenance, upgrade, Repair.
b. For repair, identify any symptoms, determine if anything has changed and
establish probable cause.
2. Create an action plan
For maintenance and upgrades: tool gathering, backup, parts identification and action.
For repairs, there is a step at the beginning – try a quick fix.
3. Implement and test the solution
Again, if performing a repair, try a quick fix and then try the most likely solution first.
4. Identify the results and effects of the solution
Did the upgrade work? Did the maintenance work as expected? Did the repair fix the
problem.
5. Document the solution and process
___2. Rona wants an anti-virus in her computer that can protect her from infected
websites. Which of the following computer anti-virus Rona needs?
a. Kaspersky Anti-Virus
b. Norton Anti-Virus
c. G-Data Anti-Virus
d. F-Secure Anti-Virus
___4. Jessie wants to clean her keyboard. Which of the following is proper material to
use?
a. Aerosol spray
b. Soft cloth
c. Solvent
d. Clean water
___5. Jonas is a technician, and her customers wants to upgrade his computer for
gaming. Which of the is the first step he must do?
a. Document the solution and process
b. Identify the result and effects of the solution
c. Create an Action plan
d. Information gathering
___6. Which of the following is NOT the reason of heat buildup of the computer?
a. Air flows freely around the computer
b. Dust and lint build up over the fan
c. Power supply fan is not working properly
d. Computer vents are block.
___7. Angelo repairs his own computer, in what part of troubleshooting methodology
his doing?
a. Information gathering
b. Create an action plan
c. Implement and test the solution
d. Identify the results and effects of the solution.
___8. It a secret word or phrase that gives the user access to a particular program or
system.
a. Data encryption
b. password
c. firewall
d. hardware firewall
_____3. It is an electronic set of instruction that a computer uses to test the hardware to
complete the system startup.
VI. REFLECTION The learner, in their notebook, will write their personal insights about the lesson using
the prompts below.
I understand that ___________________.
I realize that ________________________.
I need to learn more about __________.
Prepared by: Arlene T. Villanueva Checked by: Melinda S. Abraham
Mercy Ann Giere