Grade 10 Q2 TLE-CSSNCII LAS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 72

10

COMPUTER
SYSTEMS
SERVICING

LEARNING ACTIVITY SHEET


2nd Quarter
Republic of the Philippines
Department of Education
Region II – Cagayan Valley

COPYRIGHT PAGE

LEARNING ACTIVITY SHEETS IN


COMPUTER SYSTEMS SERVICING
(Grade 10)
Copyright © 2020

DEPARTMENT OF EDUCATION
Regional office No. 02 (Cagayan Valley)
Regional Government Center, Carig Sur, Tuguegarao City, 3500

“No copy of this material shall subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit.”
This material has been developed for the implementation of K to 12 Curriculum through the Curriculum
and Learning Management Division (CLMD). It can be reproduced for educational purposes and the
source must be acknowledged. Derivatives of the work including creating an edited version, an
enhancement of supplementary work are permitted provided all original works are acknowledged and the
copyright is attributed. No work may be derived from this material for commercial purposes and profit.

Consultants:
Regional Director : ESTELA L. CARIÑO, EdD., CESO IV
Assistant Regional Director : RHODA T. RAZON, EdD., CESO V
Schools Division Superintendent : RACHEL D. LLANA, PhD., CESO VI
Asst. Schools Division Superintendent : JONATHAN A. FRONDA, PhD., CESE
Chief Education Supervisor, CLMD : OCTAVIO V. CABASAG, PhD.
Chief Education Supervisor, CID : EVELYN V. RAMOS

Development Team
Writers : JONATHAN DJ. DIONISIO, ZENAIDA B. TACADENA,
MARIE JOY C. REYES, NIKO NEAL P. FARIÑAS,
FERDINAND L. FRANCO, RICARDO E. JUEVES JR.
Content Editor : OSMUND R. ESPEJO
Language Editor : MARIA ANGELICA B. CARBONELL
Illustrators : NIKO NEAL P. FARIÑAS, MARIE JOY C. REYES
Layout Artist : ZENAIDA B. TACADENA
Focal Persons : ORLANDO D. VICENTE, PhD.
: BERMELITA E. GUILLERMO, PhD.
: LESLIE S. DOMINGO
: RIZALINO G. CARONAN

Printed by: DepEd Regional Office No. 02


Regional Center, Carig Sur, Tuguegerao City

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: _________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEET


Installing and Configuring Computer Systems

Background Information for Learners


Installing and configuring computer systems involves competencies to assemble
computer hardware, install operating systems and drivers for peripherals/devices, and install
application software as well as to conduct testing and documentation.
This learning activity sheet will help you understand better the concepts and skills of
installing and configuring computer systems. Try your best to go over the activities and
answer the questions or items asked for.

Note: Practice Personal Hygiene protocols at all times.


Learning Competencies with Code
LO 3. Install Operating System and Drivers for Peripherals / Devices (TLE_IACSS9-
12ICCS-IIa-j-30)
3.1 Install Operating System (OS) in accordance with established installation procedures
and to comply with end-user requirements
3.2 Install peripherals/ devices in accordance with manufacturer’s instructions and/ or
OS installation procedures
3.3 Configure peripherals/ devices in accordance with manufacturer’s instructions and/
or OS installation procedures
3.4 Access OS and drivers updates/ patches in accordance with manufacturer’s
recommendations and requirements
3.5 Install OS and drivers updates/ patches in accordance with manufacturer’s
recommendations and requirements
3.6 Check the quality of the work undertaken in accordance with established procedures

For your information.

Operating System (OS) An operating system or OS is software that enables the


computer hardware to communicate and operate with the computer software. Without a
computer operating system, computer and software programs would be useless.

The Purpose of an Operating System


The operating system (OS) controls almost all functions on a computer.

Roles of an Operating System


a. All computers rely on an operating system (OS) to provide the interface for
interaction between users, applications, and hardware.
b. The operating system boots the computer and manages the file system.
c. Almost all modern operating systems can support more than one user, task, or CPU.
d. The operating system has four main roles:
-Control hardware access
-Manage files and folders
-Provide user interface
-Manage applications

Note: Practice Personal Hygiene protocols at all times.


Characteristics of Operating Systems
1. Control hardware access
2. OS automatically discover and configure PnP hardware
3. File and folder management
4. User interface
5. Command-line interface (CLI)
6. Graphical user interface (GUI)
7. Application management
8. Open Graphics Library (OpenGL)
9. DirectX

How to Install Windows Server 2008


Installing Windows Server 2008 is pretty straightforward and is very much like
installing Windows Vista. For those of you who have never installed Vista before, the entire
installation process is different than it used to be in previous Microsoft operating systems,
and notably much easier to perform.

To use Windows Server 2008 you need to meet the following hardware requirements:
Component Requirement
a. Processor
● Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor) • Recommended: 2GHz
or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for
Itanium-based Systems
b. Memory
● Minimum: 512MB RAM • Recommended: 2GB RAM or greater • Maximum (32-bit
systems): 4GB (Standard) or 64GB (Enterprise and Datacenter) • Maximum (64 bit
systems): 32GB (Standard) or 2TB (Enterprise, Datacenter and Itanium-based
Systems)
c. Available Disk Space
● Minimum: 10GB • Recommended: 40GB or greater Note: Computers with more than 16GB
of RAM will require more disk space for paging, hibernation, and dump files d. Drive
● DVD-ROM drive
e. Display and Peripherals

Note: Practice Personal Hygiene protocols at all times.


● Super VGA (800 x 600) or higher-resolution monitor • Keyboard • Microsoft Mouse
or compatible pointing device
Peripherals/devices drivers
Device Drivers A device driver (commonly referred to as a driver) is a computer
program that operates or controls a particular type of device that is attached to a computer. A
driver provides a software interface to hardware devices, enabling operating systems and
other computer programs to access hardware functions without needing to know precise
details of the hardware being used.
A driver typically communicates with the device through the computer bus or
communications subsystem to which the hardware connects. When a calling program invokes
a routine in the driver, the driver issues commands to the device. Once the device sends data
back to the driver, the driver may invoke routines in the original calling program. Drivers are
hardware-dependent and operating-system-specific. They usually provide the interrupt
handling required for any necessary asynchronous time-dependent hardware interface.
Because of the diversity of modern hardware and operating systems, drivers operate in many
different environments.

Drivers may interface with:


1. printers
2. video adapters
3. Network cards
4. Sound cards
5. Local buses of various sorts—in particular, for bus mastering on modern systems
6 Low-bandwidth I/O buses of various sorts (for pointing devices such as mice,
keyboards, USB, etc.)
7. Computer storage devices such as hard disk, CD-ROM, and floppy disk buses
(ATA, SATA, SCSI)
8. Implementing support for different file systems
9. Image scanners
10. Digital cameras

Note: Practice Personal Hygiene protocols at all times.


Activity 1: Rearrange the Procedures
Directions: Arrange the following procedures on How to Install Windows 7. Use numbers
to indicate their order of precedence. Write your answer on the space provided
for.

______ Set your BIOS to boot from CD.


______ Check your specs.
______ Choose your preferences.
______ Backup your data.
______ Watch the Windows files load.
______ Read and accept the terms.
______ Delete the partition.
______ Click Install Now.
______ Wait while Windows installs files.
______ Begin Setup.
______ Choose Custom installs.
______ Enter your user name and computer name.
______ Select the Unallocated Space and click Next.
______ Select your Windows Update option.
______ Enter your product key.
______ Select network preferences
______ Run Windows Update.
______ Select your date and time.
______ Check your devices and drivers.

Note: Practice Personal Hygiene protocols at all times.


Activity 2: Match Me
Directions: Match the process performed in Windows Server Installation 2008 with the
images below. Choose your answer from the box and write the letter of the
correct answer on the space provided before each number.

A. Reboot the computer G. Installation language


B. Begin the installation process H. Product activation
C. Select your correct version I. Read and accept the license
D. Which type of installation do you want J. Where do you want to install Windows
E. The installation now begins K. Configuration
F. Initial server configuration

___1.
___2.

https://www.petri.com/images/core_inst_
https://www.petri.com/images/core_inst_

___3.
___4.

https://www.petri.com/images/core_inst https://www.petri.com/images/core_inst_

___5. ____6.

Note: Practice Personal Hygiene protocols at all times.


https://www.petri.com/images/core_inst_ https://www.petri.com/images/core_inst

____7. ____8.

https://www.petri.com/images/core_inst https://www.petri.com/images/core_inst_
_

____9. ____10.

https://www.petri.com/images/core_inst_
https://www.petri.com/images/core_inst
_

Activity 3: Install Peripherals/Device Drivers


Directions: Prepare your own drivers installer using CD/DVD/Flash Drive and install on a
personal computer.

Performance Rubrics for Preparing Drivers Installer


CRITERIA Excellent Good Fair Poor
4 3 2 1

Note: Practice Personal Hygiene protocols at all times.


Safety Procedures (15%)
- Copy all drivers’
installers to the folder.

Adherence to the
Procedures (30%)
- Burn your
“INSTALLER” folder
to DVD.
- Copy and paste the
“INSTALLER” folder
to your USB flash
drive.
Workmanship (15%)
- Check the needed
drivers to be installed.
Functionality (40%)
- Had set up a functional
customized installer.

My Reflection
Congratulations! You have reached the end of the module. Did you fully understand
the activity? Let us now reflect on your learning journey with us. Complete the following
phrase.

⮚ I believe that
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

⮚ I learned that
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

⮚ I want to learn more about


_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


References:
● DepED Learners Material in ICT CSS for Grade 10
● Kto12 TLE ICT CSS Curriculum Guide
● HASOP (Hardware, Software, and Peripherals) Reference Manual, 2005
● SICAT TESDA
● Training Regulation TESDA
● Understanding Assembly, Upgrade, Repair, and Digital Design by Jemma
Development Group.

Answer Key:

Activity 1: Rearrange the Procedures


3, 1, 6, 2, 5, 8, 10, 7, 12, 4, 9, 13, 11, 15, 14, 17, 19, 16, 18,

Activity 2: Match Me
1. F 6. C
2. E 7. H
3. J 8. B
4. I 9. G
5. D 10. A

Activity 3: Install peripherals/Device Drivers


Performance Task

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ___________________________ Grade Level __________________
Section: ___________________________________ Date Submitted: _______________

LEARNING ACTIVITY SHEET


Prepare Installer

Background Information for Learners


A portable application (portable app) is a software product designed to be easily
moved from one computing environment to another. They include portable versions of
regular applications – such as browsers as well as specialized apps designed to enhance
mobile computing. Portable apps are typically open-source and either free or low-cost.
Portable apps are usually stored on USB drives but can be stored on some other flash
media. They may also be uploaded to a cloud storage service, such as Dropbox or Google
Drive, and accessed online. In either case, portable apps can be used on any compatible
device, wherever the user is. If no configuration information is required a portable program
can be run from read-only storage such as CD-ROMs and DVD-ROMs.
A portable app is not installed and as a rule, does not put associated files and
configuration information on the host device but stores all application files and data together.
Because files and data are self-contained, portable apps run independently of the host
operating system (OS).
Nevertheless, portable apps are created for compatibility with specific operating
systems. The portability in portable apps refers to the way they can be physically carried
from one place to another, not interoperability among different operating systems. Software
portability (a different concept) involves software that is written so that the source code can
be compiled for different platforms.
Some of the apps whose names you’re likely to recognize include Firefox, Chrome,
Google Drive, Dropbox, Blender, Inkscape, Audacity, Calibre, LibreOffice, KeePass,7-zip,
TeamViewer, uTorrent, CCleaner, and a lot more.
There are apps for office work, accounting, audio production, desktop publishing,
graphic design, 3D design, web design, app development, encryption, systems administration,
eBook management, torrent downloading, music players, file management, and games,
games, and more games.
Like any application, portable applications must be compatible with the computer
system hardware and operating system.

Note: Practice Personal Hygiene protocols at all times.


Learning Competency with Code

LO 2 Prepare Installer. (TLE_IACSS9- 12ICCS-IIIa-e- 31)


2.3 Carry out the installation of portable applications in accordance with software user
guide and software license

Given below is a list of portable applications that you might want to use and store.
These portable applications are compatible with Windows, Linux, and Mac.

Portable Uses &Function/s


Applications
Apache OpenOffice - word processor, spreadsheet, presentations with
Microsoft compatibility
Audacity - a simple audio editor and recorder
CamStudio Portable - screen recorder and video produce
Cleaner - an easy-to-use, safe, well-known drive cleaner with
other additional features including a conservative
registry cleaner, startup manager, and more.
Chromium - a more lightweight version of Chrome that’s less
strenuous on the CPU and has a version that will run on
Macs off your USB stick.
Dropbox - an easy-to-use, safe, well-known drive cleaner with
other additional features including a conservative
registry cleaner, startup manager, and more.
EraserDrop - easily secure-erase files and data
VLC Media Player - a highly portable multimedia player for various audio
and video formats
Gimp - a free, open-source image-editing suite
Google Drive - can store files, save email attachments, and back up
photos and videos
LibreOffice - word processor, spreadsheet, presentations with
excellent compatibility
Mozilla Firefox - an award-winning web browser that's safe and secure
Password Safe - Password Safe Portable - Secure password manage
Rufus - format and create bootable USB drives
USB Sudoku - wildly popular and addictive puzzle game
Stickies - a lightweight, unobtrusive sticky note utility that allows
you to place virtual sticky notes on your screen
TeamViewer - remote PC support and screen-sharing
7-Zip - File archiver and compressor

Note: Practice Personal Hygiene protocols at all times.


CREATING A PORTABLE APPLICATION USING WINRAR and UNIEXTRACT

STEP PROCEDURES IMAG

✔ Download the following if these are not available on


your computer;
1. App you want to create as portable (Firefox,
1 Audacity, etc)
2. Winrar
3. Universal Extractor or UniExtract
*you may download these for free at www.filehippo.com

✔ Install Winrar and Uniextract after downloading


● Install both programs–we need both to make this
2 work. Make sure you allow both programs to
associate with their respective file-types and restart
the computer if prompted.

✔ UniExtract the Setup file


● Right-click your downloaded setup file (example
Audacity or Firefox) and click “UniExtract here”.
● Go ahead and specify a folder that you would like to
extract the setup file to. A folder will be created with
3
the extracted files inside. Open up that folder for the
next step.
Note: If UniExtract fails to Extract the content, you
can use Winrar  to Extract the setup files

Note: Practice Personal Hygiene protocols at all times.


✔ Find the EXE file that runs the program
● In that extracted folder, look for the .exe file that
runs the program. It’s pretty easy to spot and usually
has the same name as the program you’re trying to
4
install. For instance, the .exe is named
“audacity.exe” or “firefox.exe”.
● Double click the file and verify that it runs the
program successfully.

✔ Pack all the files into an archive


● Highlight every file in that folder, right-click on
them, and click “Add to archive” in the contextual
menu.

● In the resulting dialogue box, name your archive


“Audacity Portable” or whatever you prefer. Under
compression method, select “Best”, and be sure to
check “Create SFX archive”.

● Next, click the ‘Advanced’ tab and click “SFX


Options…”. In the “Run after extraction” field, input
the name of the .exe file that you located in Step 4.
In my case, the name was “audacity.exe”.

Note: Practice Personal Hygiene protocols at all times.


● Head on over to the ‘Modes’ tab and select “Unpack
to temporary folder” and “Hide all”

● Lastly, go to the ‘Update’ tab and select “Overwrite


all files”. Now go ahead and hit OK, and watch
WinRAR generate an application file.

✔ Copy the file to your USB drive


● Drag the application to your Flash drive (or any storage device) and then give it a te
6
● Double click the application to run it.
Note: This sample is applicable for Computers with installed Windows Operating System.

Activity 1: NAME ME!


Directions: Given in Table 1 are the names of portable apps and in Table 2 are the logos that
represent each portable apps. Match the logo of the app with its corresponding
name found in Table 1. Write your answer in the space provided below each
image.
Table 1. List of Portable Application Software
Google Chrome VLC Media Player Apache Open Office
Dropbox Google Drive Firefox
7 -zip Team Viewer Ccleaner
Stickies Gimp Audacity

Table 2. Portable Applications Logo

Note: Practice Personal Hygiene protocols at all times.


1. ______________ 2. ______________ 3. ______________

4. ______________ 5. ______________ 6. ______________

7.

______________ 8._________________ 9._____________

10._____________ 11.________________ 12.______________

Note: Practice Personal Hygiene protocols at all times.


Note: Practice Personal Hygiene protocols at all times.
Activity 2: STORE ME
Directions: Given in Table 1 are images of storage devices. Identify those devices that can be
used to store portable applications. Write your answers on the space provided
below the table.
Table 1. Images of devices used for storing application software
Flash Drive DVD R or DVD RW

CD ROM

External Drive Memory Card Hard Disk Drive (HDD)

Random Access Memory Read-Only Memory


(RAM) (ROM)

Solid State Drive

Write your answers here:


___________________ ___________________ ___________________

___________________ ___________________ ___________________

___________________ ___________________ ___________________

Note: Practice Personal Hygiene protocols at all times.


Activity 3: ARRANGE ME
Directions: Given below are the steps in creating portable applications. Arrange these steps
from the first step to the last step by placing a number (1-6) before the statement
that corresponds to the correct step.

______ Install Universal Extractor and WinRAR


______ Find the EXE file that runs the program
______ Copy the file to your USB drive
______ Download the application setup file, Universal Extractor, and WinRAR
______ UniExtract the Setup file
______ Pack all the files into an archive and create SFX archive in Winrar

Activity 4: ANSWER ME
Directions: Answer the following questions based on your understanding.
1. What are the benefits of knowing how to create portable applications?

________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_______________________________________________________________________.

2. In what instances can you use these portable devices you were able to create?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________.

REFLECTION: Complete the statement:


From this activity, I learned
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_______________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


REFERENCES:

Michael Todd Peterson, A Guide to Developing Portable Applications, August 1, 1995,


https://www.amazon.com/Dce-Developing-Portable-Applications-
Léon, Aline, Mobile and Portable Applications, Springer-Verlag Berlin Heidelberg, 2008,
https://www.springer.com/gp/book/9783540790273

Christensson, Per. "Portable Software Definition." TechTerms. (July 2, 2016). Accessed Aug
3, 2020. https://techterms.com/definition/portable_software.

Ionescu, Alex. "Secrets of the Application Compatibility Database (SDB) – Part 1".
Retrieved January 19, 2012.

"Portable Application Conversion Technology". Sphinx Software. Archived from the original
on September 7, 2010. Retrieved January 19, 2012.

https://www.stickpng.com

ANSWER KEY

Activity 1: Name Me Activity 2: Store Me Activity 3: Arrange Me


1. VLC Media Player Flashdrive 2
2. Mozilla DVD R or DVD RW 3
3. Dropbox Memory Card 6
4. Google CD ROM 1
5. Gimp External Drive 4
6. 7-zip Hard Disk Drive (HDD) 5
7. Audacity Solid State Drive
8. Stickies
9. Google Drive
10. Apache Open Office
11. Ccleaner
12. Dream Viewer

Activity 4: Answer Me
1. Answers may vary
2. Answers may vary

Prepared by:

MARIE JOY C. REYES


QUEZON NATIONAL HIGH SCHOOL

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: ________________
Section: ________________________________________ Date: ______________________

LEARNING ACTIVITY SHEET


Prepare Installer
Background Information for Learners
Portable Bootable Devices is a live USB is a USB flash drive or a USB external hard
disk drive containing a full operating system that can be booted. Live USBs are closely
related to live CDs but sometimes have the ability to persistently save settings and
permanently install software packages back onto the USB device. Like live CDs, live USBs
can be used in embedded systems for system administration, data recovery, or the testing of
operating system distributions without committing to a permanent installation on the local
hard disk drive. Many operating systems including Mac OS 9, Mac OS X, Microsoft
Windows XP Embedded, and many of the Linux and BSD distributions can also be used from
a USB flash drive. Windows 8 is also capable of running from a USB drive.

Learning competency with code


LO 2. Prepare installer
2.1 Create portable bootable devices in accordance with software manufacturer
instruction TLE_IACSS912ICCS-If-j-29

KEY CONCEPTS:
Prepare Installer

How to Make a USB Bootable


Have an old USB drive lain around that you don't use anymore? Turn it into an
operating install disk for Windows, Linux, or Mac, or a diagnostic tool for your PC. Follow
this guide to learn how.
A. Open the Command Prompt. You will need to run Command Prompt as an
Administrator. Right-click on it and select Run as Administrator. You may need to enter the
Administrator password.

Note: Practice Personal Hygiene protocols at all times.


a. This method will create a bootable USB drive. You can then copy the contents of an
operating installation disc onto the drive to create a portable installation drive.
b. This method only works in Windows Vista, 7, and 8

B. Open the disk management utility.


This can be opened by entering the command disk part.

C. Display the connected disks.


Type the command list disk to show a list of all the drives connected to your
computer. Your USB drive should be listed here as well. Make note of the number next to
your USB drive. Select the USB drive. Enter the command select disk #, replace “#” with the
number from the previous step.

Note: Practice Personal Hygiene protocols at all times.


Note: Practice Personal Hygiene protocols at all times.
D. Clean the flash drive.
Enter the command clean to have the disk management utility verify the integrity of the USB
drive, and erase all data.

E. Create a bootable partition. Once the USB drive is clean, type in create partition
primary. You will see a message saying that the operation was successful.

Note: Practice Personal Hygiene protocols at all times.


F. Select the new partition. Enter the command select partition 1 and press Enter. Once you
receive a confirmation message, type active, and press Enter. This will activate the partition.

G. Format the USB drive. Input the command format fs=fat32. When you press Enter, the
program will work for a few minutes (if it is a small USB, e.g. 32Gb could actually take
hours to SLOW format), and the progress will be displayed as a percentage.

Note: Practice Personal Hygiene protocols at all times.


H. Assign the USB a drive letter. Enter the command assign to give the thumb drive a letter
designation. Type exit to end the disk management program.

I. Copy the operating system. Once the USB drive has been made bootable, you can copy
over the installation files for the operating system you want to install. You can do this by
dragging and dropping using your preferred file manager/explorer.

a. Copy over any drivers you might need during the operating system installation to
make the process much smoother.

Note: You can also create a bootable USB Drive using a third-party software.

Note: Practice Personal Hygiene protocols at all times.


Activity 1: Rearrange the Procedures
Directions: Arrange the following procedures on how to make a Bootable USB using CMD.
Use numbers (1-10) to indicate their order of precedence. Write your answer on
the space provided.

_______. Display the connected disks


_______. Format the USB drive
_______. Create a bootable partition
_______. Open the disk management utility
_______. Copy the operating system
_______. Assign the USB a drive letter
_______. Test your bootable USB
_______. Open the Command Prompt
_______. Select the new partition
_______. Clean the flash drive

Activity 2: True or False


Directions: Write T if the statement is True and F if the statement is False. Write your
answer on the space provided before each number.

_________1. A live USB is a USB flash drive.


_________2. Live USBs can’t be used in embedded systems
for system administration, data recovery, or the testing of operating system
distributions without committing to a permanent installation on the local hard
disk drive.
_________3. Many operating systems including Mac OS 9, Mac OS X,
Microsoft Windows XP Embedded and many of the Linux and
BSD distributions can also be used from a USB flash drive.
________4. Windows 8 can be run from both USB drive and Windows To Go.
________5. In creating a Bootable flash drive you will need to run Command
Prompt as an Administrator.

Activity 3: Preparing customized installers


Directions: Prepare your customized installers. Copy all needed installers to the folder. Be
guided by the given rubric.

1. Diver pack
2. Antivirus
3. Disk utilities
4. WinRAR/WinZip
5. PDF reader
6. Flash Player
7. Internet browser

Note: Practice Personal Hygiene protocols at all times.


8. Office applications
9. CD and DVD burning software (Power ISO, Nero, or Magic Iso)
10. Installer and run CD/DVD burning software on your computer
11. Burn your “INSTALLER” folder to DVD. If you are using Flash Drive, just
copy and paste the “INSTALLER” folder to your USB flash drive.

Performance Rubrics for Preparing Customized Installer


CRITERIA Excellent Good Fair Poor
4 3 2 1
Safety Procedures (15%)
- Copy all needed installers to the
folder.
Adherence to the Procedures (30%)
- Installer and run CD/DVD burning
software on your computer
- Burn your “INSTALLER” folder
to DVD.
- Copy and paste the
“INSTALLER” folder to your
USB flash drive.
Workmanship (15%)
- Had organized materials and tools
while accomplishing the task and
has time management
Functionality (40%)
- Had set up a functional customized
installer.

Reflection:
Complete this statement:
I have learned in this activity...
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Prepared by:

JONATHAN DJ. DIONISIO

Note: Practice Personal Hygiene protocols at all times.


References:
BOOKS

● DepED Learners Material in ICT CSS for Grade 10


● Kto12 TLE ICT CSS Curriculum Guide
● HASOP (Hardware, Software, and Peripherals) Reference Manual, 2005
● SICAT TESDA
● Training Regulation TESDA
● Understanding Assembly, Upgrade, Repair, and Digital Design by Jemma
Development Group.

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name: __________________________________ Grade Level: _____________
Date: ___________________________________ Score: __________________

LEARNING ACTIVITY SHEET


Maintaining and Repairing Computer Systems and Networks (MRCN)

Background Information

In preparing a maintenance procedure, one also has to consider designing a systematic


plan for both hardware and software. This saves time, money, and frustration to prevent
injury to people and damage to computer equipment

This learning activity sheet will help you understand better the concepts and skills of
maintaining and repairing computer systems and networks. Try your best to go over the
activities and answer the questions or items asked for.

Learning Competency:
LO 1. Plan and prepare for maintenance and repair. (TLE_IACSS9-12MRCN-IIa-e-
40)

Objective/s:
1. plan on how to maintain computer and network systems.
2. identify faulty computer and network systems.

Note: Practice Personal Hygiene protocols at all times.


Activity 1. Plan it
Directions: Read the given information below before answering the given activity.

For your information…


Preventive Maintenance can be described as maintenance of equipment or
systems before fault occurs. It can be divided into two sub groups: Planned
Maintenance and Conditioned Based Maintenance.
Planned Maintenance (PM) is any variety of scheduled maintenance to an
object or item of equipment. Specifically, PM is scheduled service visit carried out by
a competent and suitable agent, to ensure that an item of equipment is operating
correctly to avoid any unscheduled breakdown and downtime of an equipment.
Condition Based Maintenance (CBM) is a maintenance strategy that uses the
actual condition of the asset to decide what maintenance needs to be done. CBM
dictates that maintenance should only be performed when certain indicators show
decreasing performance or upcoming failure.

Directions: The following items are descriptions of Planned


Maintenance (PM) and Condition Based Maintenance (CBM).
Identify the given descriptions by putting a checkmark
(√) on the corresponding column for Planned Maintenance
(PM) and Condition Based Maintenance (CBM).

No. Description PM CBM


1 It is scheduled    

2 It uses the actual condition of the asset    

3 It is done by a competent agent    

4 To avoid any unscheduled breakdown    

5 Can only be done when certain indicators show    


decreasing performance

Note: Practice Personal Hygiene protocols at all times.


Activity 2 Soft and hard
In preparing maintenance procedure, one also have to consider designing a systematic
plan for both hardware and software. This saves time, money and frustration to prevent
injury to people and damage to computer equipment.

Directions: The following are ways of designing a systematic maintenance plan. Identify if
the plan is for hardware or software. Write your answer on the blank provided.

1. Update anti-virus and spyware ________________________

2. Treat your computer properly ________________________


Install or secure passwords
3. ________________________
 
Move the computers only when
4. ________________________
it is turned off
Back up your files
5. ________________________

Activity 3. Protect me
Activity 3.A
Directions: Study the given table below that contains the guidelines describing how
computer technicians, students, and computer users can work together to achieve a
productive workplace environment. Then answer the activity that follows.

Guidelines Descriptions
1 Place your computer in   This will allow proper circulation of air inside the
. a well-ventilated area computer unit
2 Treat your Computer   This means taking care of your computer. It
. properly. should be properly turned off.
3 Back up your files   This protects your files by storing your file
. backups on your hard drive or any removable
device regularly.
4 Delete temporary files.   This enhances speed and will create more spaces
. for your files

Note: Practice Personal Hygiene protocols at all times.


5 Install or secure   This makes your files more secure
. passwords.
6 Update anti-virus   This is for your computer protection against
. viruses
7 Move the computer   This to avoid damages by turning off when
. only when it is turned transferring the computer to another location
off or unplugged.
8 Schedule the use of a   This Helps lessen the attack of viruses and
. computer for its longer increases the life span of your computer
life.
Activity 3.B
Directions: The following pictures show the proper care and maintenance of your computer.
Match them with the guidelines in Activity 3.A. Write the corresponding number
of the guideline only in the third column

No Picture Answer
.

1.
_________________________

2
_________________________

3
_________________________

4
_________________________
 
5
_________________________

Note: Practice Personal Hygiene protocols at all times.


Note: Practice Personal Hygiene protocols at all times.
Activity 4. What’s your issue?
Preventing Computer System Failure
Computers in general, are pretty stable, and you can easily rely on them not to
fail you. However, If you develop some basic habits, you can postpone serious
computer problems, if not avoiding them entirely.
Directions: The crossword puzzle below consists of issues related to computer system failure.
You can find them in horizontal (rightward or leftward), vertical (upward or
downward), and diagonal directions. Encircle the words then write each issue
below the puzzle.
A B W A R R A N T Y D W
R B A C K U P X X U T E
E R R O R M E S S A G E
G I N M X X R T R I E T
A M I P Y Y A Y T R I S
S E N U Z Z W M A R I U
U S G T X X L Y A R R D
L Y R E E R A W D R A H
R S S R E S M S U R I V

____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________

Activity 5. Failure no More


Directions: The following are ways of preventing computer system failure. Unscramble the
letters in the third column to determine the issue being prevented. Write your
answer on the blanks below the unscrambled letter.

No Preventive Maintenance Issue

Note: Practice Personal Hygiene protocols at all times.


.
1 Make sure that there is not too much dust inside U S D T
especially on the fans of your computer. ___ ___ ___ ___
2 Make sure that your anti-virus software is updated to L W A R E A M
be able to scan unnecessary files that enter your PC. __ __ __ __ __ __ __
3 Give your computer a break. Your computer likes rest AGEUS
too.
___ ___ ___ ___ ___
4 Get a warranty to protect your hardware, so it can be T W A R A N Y R
replaced in case of failure __ __ __ __ __ __ __
__
5 Investigate if the same error message shows up every G I N N W A R
time you log in. __ __ __ __ __ __ __
Activity 6. What’s your problem?
Network Problems
When you suddenly cannot connect to the internet, any of several things
could be wrong. Use the problem checklist to find and solve common internet
connection problems.

Directions: Fill the blanks in the third column to complete the action statement. The first
letter of the word is given.
No Network Problem Action
1 Unplugged Ensure your wired or wireless network hardware is
Network Cable switched on and P____________in.
2 Website Try visiting several popular W______________rather
Temporarily than just one.
Offline
3 Computer Firewall Temporarily disable S_____________ firewalls installed
Malfunctions on your computer to determine whether it may be the
cause of internet connection problems.
4 Wireless Network Confirm that the W_______________channel number
Configuration and encryption keys on your router have not recently
changed.
5 Broadband Router Check the router’s lights and console if possible to
or Access Point ensure it is running and responding properly.
Malfunctions Troubleshoot and reset the R________________ if
necessary.
6 Blocked By Your Contact your I_______________ Service Provider (ISP)
Service Provider if you suspect your account has been blocked.
7 Computer Glitches Check the computer and remove any
M________________that you will find.
8 Network Downtime Contact your internet provider to verify whether they are
experiencing an outage. Some providers also give advice
on T______________________ problems connecting to

Note: Practice Personal Hygiene protocols at all times.


their network.

Note: Practice Personal Hygiene protocols at all times.


Assessment 1. Fill me
Directions: Read the questions that follow and fill the missing vowels to complete the word.
Write your answer on the blank provided.

What maintenance can be described as maintenance of equipment or systems


before fault occurs?
P R __ V __ N T __ V __
Answer: ___________________________

What maintenance refers to a scheduled service visit carried out by a competent


and suitable agent?
P L __ N N __ D
Answer: ____________________________

What maintenance refers to task performed to identify, isolate and rectify a fault
so that the failed equipment or system can be restored?
C __ R R __ C T __ V __
Answer: _____________________________

What kind of ware is maintained when you treat your computer properly?
H __ R D W __ R ___
Answer: _____________________________

What kind of ware is maintained when you update antivirus?


S __ F T W __ R __
Answer: _____________________________

Assessment 2. Missing in Action


Directions: Complete the following tips/guidelines in maintaining computers and achieve
maximum efficiency and safety in the workplace. Choose from the action words
in the box:

Back – up Delete
Schedule Update
Treat Move
Install Unplug

1. ____________________ temporary files


2. ____________________ anti – virus and spy ware
3. ____________________ passwords
4. ____________________ your computer properly
5. ____________________ the use of computer for its longer life
6. ____________________ files using flash drive or hard disk
7._____________________before moving the computer

Note: Practice Personal Hygiene protocols at all times.


Enrichment
In action…
What actions should be best done to address the following network problems?

Directions: Rearrange the letters inside the parenthesis to form the correct word that will
complete the sentence. Write your answer on the blank provided.
For unplugged ______________________ (TENWORK) cable, ensure
your wired or wireless hardware is switched on and plugged in.

For website temporarily offline, try visiting several


_____________________________ (SITESBEW) rather than just one.

For computer__________________________(LLAWREFI)
malfunctions, temporarily disable to determine whether it may be the cause
of internet connection problems.

When blocked by service _______________________ (ORPDERVI),


contact your ISP if you suspect your account has been blocked.

For computer glitches, check the computer and remove any

Note: Practice Personal Hygiene protocols at all times.


Key Concepts

PLANNED MAINTENANCE (PM) - any variety of scheduled


maintenance to an object or item of equipment.
CONDITIONED BASED MAINTENANCE (CBM) - is a maintenance
strategy that uses the actual condition of the asset to decide what
maintenance needs to be done.
PREVENTIVE - is performed while the equipment is still working so
that it does not break down unexpectedly.
HARDWARE - a general term for various physical components of a
computer system.
SOFTWARE - a type of computer program that is designed to run a
computer's hardware and application programs.
MALWARE - any software that brings harm to a computer system.
FIREWALL - a system designed to prevent unauthorized access to or
from a private network.
WARRANTY - a written guarantee promising to repair or replace it if
necessary within a specified period of time.
INSTALL - the particular configuration of a software or hardware with
a view to making it usable with the computer.
BACK-UP - a copy of computer data taken and stored elsewhere so that
it may be used to restore the original after a data loss event.
UPDATE - make it more modern, usually by adding new parts to it or
giving new information.

Reflection
Complete the sentence starters by writing what you have learned and what you want to learn
more about the lesson

● I learned that ____________________________________________


_________________________________________________________
_________________________________________________________
_________________________________________________________

● I want to learn more on _____________________________________


_________________________________________________________
_________________________________________________________
_________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


Answer Key
Activity 1 Activity 4 Assessment 1
1. PM WARRANTY PREVENTIVE
2. CBM BACKUP PLANNED
3. CBM ERROR MESSAGE CORRECTIVE
4. PM HARDWARE HARDWARE
5. CBM USAGE SOFTWARE
WARNING
Activity 2 COMPUTER Assessment 2
Software MALWARE DELETE
Hardware VIRUS UPDATE
Software SYSTEM INSTALL
Hardware TREAT
Software Activity 5 SCHEDULE
DUST BACKUP
Activity 3 MALWARE UNPLUG
USAGE
WARRANTY Enrichment
WARNING NETWORK
WEBSITES
Activity 6 FIREWALL
Plugged PROVIDE
Websites MALWARE
System
Wi-Fi
Router
Internet
Malware

References
● DepED Learners Material in ICT CSS for Grade 10
● Kto12 TLE ICT CSS Curriculum Guide
● VectorStock.com
● Shutterstock.com
● Dreamstime.com

Prepared by:

Note: Practice Personal Hygiene protocols at all times.


FERDINAND L. FRANCO- NVGCHS
Writer

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: _______
Section: _________________________________________ Date: ______________

LEARNING ACTIVITY SHEET


Maintaining and Repairing Computer Networks

Background Information for Learners


PC diagnostic is a method of testing a computer hardware device or software program
to ensure it is working as it should be. Diagnosing computer problems requires a great deal of
patience and an eye for detail, coupled with troubleshooting skills, logical thinking, and
understanding of the equipment that you can use to assist you in fixing the problem at hand.
Many different devices can be used to test the functionality of various PC components,
ranging from multipurpose devices such as Multimeters and Oscilloscope to specific tools
such as Network Protocol Analyzers.
This will be the source of information for you to acquire the knowledge and skills
with minimum supervision or help from your trainer. You will acquire the competency
independently and at your own pace.

Learning Competencies with Code


LO 3. Diagnose faults of computer systems and networks (TLE_IACSS912MRCN-IIIa-h42)
3.1 Use appropriate personal protective equipment in line with the standard
procedures
3.2 Diagnose faults or problems in the computer systems and networks according to
requirements and in line with the standard procedures
3.3 Manage contingency measures in accordance with established procedures
3.4 Implement contingency measures in accordance with established procedures
3.5 Respond to unplanned events or conditions in accordance with established procedures

Note: Practice Personal Hygiene protocols at all times.


For Your Information…
Has your computer ever stopped working for no apparent reason? The frustration
brought on by technological advancements can cause any sane person to yank the plug right
out of the wall. Luckily, there's a better way. Learn what to do when your computer freezes,
facts about different kinds of computer failure, the various ways to restart Macs and PCs, and
how to prevent future freezes.
The three main types of computer failures are system errors, freezing, and
applications quitting. Simply put, Mac system errors warn you with the dreaded bomb Alert
box. A system error occurs when there is a conflict between the operating system and one or
more applications, like Microsoft Word or Internet Explorer. The next type of computer
failure is freezing, also known as crashing or hanging. In this case, the computer locks up and
the mouse and keyboard become useless accessories. Freezing exists both at the individual
program level and on a system-wide basis. An application suddenly quitting is the third type
of computer failure and probably the most common. This means that only one program is
affected rather than the whole system. All three types of computer failures are frustrating if
you do not know what to do, but by following these steps you will learn how to properly
unfreeze your computer.

Activity 1: Diagnose faults or problems in the computer systems and networks

Direction: Identify the Symptoms & Resolutions of the following system Errors

System Error Symptoms Action/resolutions


1. The remote computer
is not available
2. The network name
cannot be found
3. The credentials
supplied conflict with
an existing set of
credentials
4. The network location
cannot be reached.

Note: Practice Personal Hygiene protocols at all times.


ACTIVITY 2: Diagnosing Errors
Directions: Given the different equipment, diagnose and identify the common connection
error messages and symptoms in the computer system.
Problem Diagnosing
Error Description Action Taken
1. Processor Error

2. Memory Error

3. Video Card Error

4. Shutdown Error

5. Keyboard Error or no
Keyboard present

6. Hard Disk(s) install failure

7. CMOS Battery failed

Note: Practice Personal Hygiene protocols at all times.


Activity 3: Match Me
Directions: The following pictures in column A show how to diagnose a computer problem.
Match them according to their respective step in column B. Write the correct
answer in the answer column.

No Picture Description Answer


. COLUMN A COLUM B
1. a. Check for the problem in safe
mode. As a last-ditch effort,
check the problem in safe
mode, it is a fair bet that the
operating system itself is to
blame. You may need to
Reinstall Windows
2. b. Run a virus and malware
scan. Performance problems
can be caused by malware on
the computer. Running a virus
scan can unearth any
problems.

3. c. Listen to the computer. If the


hard drive is scratching or
making loud noises, shut off
the computer and have a
professional diagnose the hard
drive.

4 d. Check the RAM and CPU


consumption. If your
computer CPU graph is
running 80% - 100% most of
the time you may be able to
upgrade your computer
processor. in your computer is
using too much memory,
close all unneeded programs
and browser tabs and see if
your computer’s performance
improve.

Note: Practice Personal Hygiene protocols at all times.


5 e. Check any newly installed
software. Uninstall any
recently installed programs
and see if the problems
continue.

6 f. Check for hardware problems.


Computer problems are
caused by failures or
problems with hardware
drivers.

7 g. Check for any graphics


problems. The computer is
able to boot properly, but you
notice graphics problems, this
may indicate driver failures or
hardware failures with the
graphics card.

8 h. Check the load time of the


operating system. It takes for
an operating system to load
when a computer boots up
greatly depend on the
hardware of the computer is
running

Note: Practice Personal Hygiene protocols at all times.


9 i. Check the post. This part of a
computer’s startup program
is used to diagnose the
keyboard, random access
memory (RAM), disk drives,
and other hardware to make
sure they are working
properly.

10 j. Check that the cables and


components are properly
connected. This especially
important if you recently
upgraded your computer.

Prepared by:

ZENAIDA B. TACADENA
Writer

Note: Practice Personal Hygiene protocols at all times.


Things to REMEMBER…
FAULT – is the property that enables a system to continue
operating properly in the event of the failure of (or one or more
faults within) some of its components. If its operating quality
decreases at all, the decrease is proportional to the severity of the
failure, as compared to a naively designed system, in which even a
small failure can cause total breakdown.

DIAGNOSE – programs that address the efficiency of a


network configuration. This type of tool is helpful when a specific
workstation experiences difficulty when attempting to connect to a
network via a server or some type of remote connection.

Maintenance – to help keep equipment up and running,


preventing any unplanned downtime and expensive costs from
unanticipated equipment failure.

Defect - Refers to an error, fault or flaw in


any computer program or a hardware system. A bug produces
unexpected results or causes

Configuration – Physical layout, interconnections, and


functional characteristics of a computer system (usually called
Configuration Item), set forth in its technical documentation as
required for its assembly, testing, installation, operation, and
maintenance.

Personal Protective Equipment (PPE) –  is equipment worn to


minimize exposure to hazards that cause serious workplace injuries
and illnesses.

ERRORS- he occurrence of an incorrect result produced by a


computer

Preventive Maintenance - that is regularly performed on a


piece of equipment to lessen the likelihood of it failing. It is
performed while the equipment is still working so that it does not
break down unexpectedly.

Note: Practice Personal Hygiene protocols at all times.


Personal Reflection

Congratulations!!!

You have reached the end of the module. Did you fully understand the activity? Let us
now reflect on your learning journey with us. Complete the following phrase.

⮚ I believe that I know


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
____________________________________________________________________

⮚ I learned that
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

⮚ I want to learn more about


_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


Answer Key…
Activity 1: Diagnose faults or problems in the computer systems and networks
System Error Symptoms Action/resolutions
The remote You can ping a host Make sure server service is running on the
computer is not but not net view it. remote computer
available When using net view
\\hostname, you get
system error 52 - a
duplicate name exists
on the network.
The network When using net view 1.Make sure you type the correct computer
name cannot be \\computer or net name or shared name.
found use \\IP, you may
receive the above error 2. Make sure the Workstation service is
message. running on the local computer while the
Server service is running on the remote
computer.

1) When you log on to This may cause because of attempting to


The credentials
a domain from w2k make two or more connections to the same
supplied conflict
client; 2) when server using two or more sets of credentials
with an existing
attempting to join a 1. Go to windows explorer and disconnect
set of credentials
domain,  you may all network drives. Then re-login.
receive the following 2. Delete the profile or copy another
error message: The profile. Note: you may lose all settings
credentials supplied and data in My Documents when
conflict with an deleting or copying the profile.
existing set of 3. If solution 1 and 2 doesn't work,
credentials
The network When using net view 1. make sure Client for MS Networks is
location cannot \\computername, you enabled,
be reached. may receive System 2. make sure you have permission to
error 1231. access it.

Note: Practice Personal Hygiene protocols at all times.


ACTIVITY 2: Diagnosing Errors
Error Description Action Taken
1. Processor Error Check for proper motherboard installation, loose
screws, foreign objects causing shorts, and over-
tightened screws. Make sure the processor and heatsink
are installed properly; remove and reseat them. Replace
the processor. Replace the motherboard.

2. Memory Error Clean the memory contacts, and reseat the modules.
Remove all modules except the first bank. Replace the
memory. Replace the power supply. Replace the
motherboard.

3. Video Card Error Check the video card for proper installation. Try
replacing the video card memory, and replace the video
card. Replace the motherboard.

4. Shutdown Error Check for proper motherboard installation, loose


screws, foreign objects causing shorts, and over-
tightened screws. Replace the keyboard. Replace the
motherboard. Replace the processor.

5. Keyboard Error or no Can't initialize the keyboard. Make sure the keyboard is
attached correctly and no keys are pressed during
Keyboard present POST. To purposely configure the system without a
keyboard, set the error halt condition in Setup to HALT
ON ALL, BUT KEYBOARD. The BIOS then ignores
the missing keyboard during POST.

6. Hard Disk(s) install Can't find or initialize the hard drive controller or the
drive. Make sure the controller is installed correctly. If
failure no hard drives are installed, be sure the Hard Drive
selection in Setup is set to NONE.

7. CMOS Battery failed The CMOS battery is no longer functional. Contact


your system dealer for a replacement battery.

Activity 3: Match Me
10 6. 5
9 7. 4
8 8. 3
7 9. 2
6 10. 1

Note: Practice Personal Hygiene protocols at all times.


References:
Cahapay Venus J. (2020) Lab General Safety – Contributor to DepEd Commons
Retrieved from: https://drive.google.com/drive/folders/1fbbK8_wEcmCK9Q_
RmA0BDn6WjV5coB6a

Maningas, Sherwin (2020) Occupational Health and Safety contributor to DepEd Commons
Retrieved from: https://drive.google.com/drive/folders/1Sd7sUBl_hKNhYG9PIHA
qcjOsgXFg-TUC

DepED Learners Material in ICT CSS for Grade 10


Kto12 TLE ICT CSS Curriculum Guide
TESDA .gov.ph
Training Regulation TESDA
Upgrading and Repairing PC’s 17th Edition, by Que.
Retrieved from: https://www.wikihow.com/Diagnose-a-Computer-Problem
Retrieved from: https://www.slideshare.net/ynlcadapan/ict-9-module-4-lesson-
13-diagnosing-computer-systems?from_action=save

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: ________
Section: _________________________________________ Date: ______________

LEARNING ACTIVITY SHEET


Maintaining and Repairing Computer Networks

Background Information for Learners


Maintaining and repairing a computer is one of the practices in keeping computers in
good condition. Without regular maintenance efforts, computer equipment won’t last as long
and will require a replacement rather than repair. To ensure that the computers function
properly and allow for optimal productivity, make sure to follow the computer maintenance
tips.
No matter how well built your PC is and how well written its software, something is
eventually going to go wrong, and you might not always have a support system available to
resolve the problem. Diagnostic software can be vitally important to you anytime your
computer malfunctions or you are in the process of upgrading a system component or
especially building an entirely new system from scratch.
You also might find that your system problems are caused by a hardware malfunction
and that you must open the computer case to perform repairs. This activity also examines the
tools and testers used to upgrade and repair PCs both the basic items every user should own
and some of the more advanced devices.
Of course, the best way to deal with a problem is to prevent it from occurring in the
first place. Preventive maintenance describes the procedures you should perform regularly to
keep your system in good working order. It also details the various ROM BIOS audio codes
and error codes and examines aftermarket diagnostics and public-domain diagnostic software.

Learning Competencies with Code


LO 4. Rectify/ correct defects in computer systems and networks (TLE_IACSS9-12MRCN-
IIIh-jIVa-e-43)
4.1 Use appropriate PPE in line with standard procedures.
4.2 Replace defective components or parts without damage to the surrounding
environment or services
4.3 Install correct components or parts without damage to the surrounding
environment or services
4.4 Make the necessary adjustments in accordance with established procedures
4.5 Respond to unplanned events or conditions in accordance with established
procedures

Note: Practice Personal Hygiene protocols at all times.


For Your Information…
If you had used your computer for more than 6 months without running any kind of
maintenance you are increasing your risks of getting your system broken, especially if you
browse the web constantly, which we know that’s where we spend most of the time when
using a computer. Computers need regular maintenance to run smoothly; cleaning
unnecessary files, defragmenting your hard drive, secure your data, run regular backups are
just a few of the tasks performed when doing maintenance on a computer.

Activity 1: Personal Protective Equipment (True or False)


Scenario 1: Mark is the head Technician of ABC Computer Repair and
Services. He has a lot of computers to maintain, configure and Repair. What
should he do to protect himself?

Directions: Write Pak if the statement is True and Bluff if the statement is False. Write your
answer on the space provided before each number.

1. Using Personal Protective Equipment (PPE) protects the wearer’s body or clothing
from injury by electrical hazards, heat, chemicals, and infections.
2. It is important that students and teachers during laboratory on demonstration of
skill should be required to use personal protective equipment
3. Googles is large spectacles with a shield around the rims that cannot protect the
eyes from dust, excessive light, wind, etc.
4. A special type of rubber shoes is used to prevent electrical shock and for
waterproofing and insulating purposes
5. Apron is not a garment worn over the front of the body as a protection for one’s
cloth
6. Face mask is used to cover the face to prevent the inhaling or absorbing dust and
other chemicals
7. Using gloves for each finger is not for hand protection during laboratory.
8. Little shock you experience while you are walking across the carpeted floor or
when touched a doorknob, table, or even another person is a result of static
electricity.
9. Do not use an anti-static wrist strap when working on a computer.
10. Never plug an ATX power supply into AC power unless it is connected either to a
computer’s motherboard or to a dummy test load.

Note: Practice Personal Hygiene protocols at all times.


Activity 2: Troubleshooting and Repair Techniques (Multiple Choice)
Scenario 2: Eddie a computer technician employee on A3 Ace Enterprises
was assigned to maintain a school. When he got there he inspected the
Computer laboratory room and he noticed that it needs a lot of repair on the
devices and networks.
Directions: Choose the letter of the best answer. Write your answer on the space provided
for.

1. When replacing computer parts and peripherals, what needs to consider the following
factors?
a. Compatibility of the component
b. Specification of the component
c. Component form factor
d. All of the above

2. Corazon hears a series of long beeps on her computer. What components should be
replaced?
a. RAM c. Video Card
b. Power Supply d. System Speaker

3. What is probably wrong when your computer monitor turns on but doesn’t seem to
display an image?
a. The light bulb (or LED bulb which provides the lighting of the monitor isn’t
working correctly
b. Your computer monitor isn’t connected to your computer correctly
c. The monitor firmware is broken
d. You used the wrong device driver on your computer for the current monitor

4. When you see a Blue Screen of death, what is the most likely cause of a windows
error on a typical home computer?
a. Bad computer memory (RAM) causes most Windows errors
b. Damage to the operating system (OS) from computer viruses causes most
Windows errors.
c. Bugs in Microsoft Windows cause most Windows errors
d. Bugs in non-Microsoft products cause most Windows errors

5. Just by listening to your computer, what are two computer problems easily
diagnosed?
a. You can hear magnetic hard drive problems and fan problems
b. You can hear network card problems and CPU problems
c. You can hear memory problems and computer monitor
d. You can hear sound card problem and video problems

6. You want to replace your sound card and video card in your integrated (built-in)
motherboard, can you replace the said component?
a. Yes you can replace built-in components, but you will need custom
replacement parts
b. No, you can’t normally replace built-in components

Note: Practice Personal Hygiene protocols at all times.


c. Yes, you can replace built-in component by using the right replacement
modules
d. Yes, you can replace built-in component using generic replacement modules

Note: Practice Personal Hygiene protocols at all times.


7. What do you call when you check the condition of the computer whether it is good or
bad?
a. Power-On-Self Test (POST)
b. A redundant array of independent disk (RAID) can warm you when a device
fails
c. Self-Monitoring and Reporting Technology SMART
d. Microsoft check-disk

8. What would you do if you suspect that the cause of the trouble in the network is the
cable?
a. Change the patch cable
b. Crimp another cable
c. Check the suspected cable using Multi-tester
d. Get a LAN tester and check the cable swap a good or working cable in place
with the suspected cable

9. Which component(s) should be replaced when a customer is complaining that his


monitor is not functioning? After examining the computer and diagnosing the
defects, you notice that the problem is coming from memory.
a. Monitor b. Power Supply c. RAM d.
CPU

10. After replacing a good cable, still, the computer cannot connect with each other,
what are the possible causes if the network is using static IP addresses?
a. Check for the IP address if it properly configured
b. Wrong DNS setting
c. Wrong IP address – maybe some computer doesn’t belong to the workgroup –
wrong subnet mask
d. Did not configure add a role

Note: Practice Personal Hygiene protocols at all times.


Activity 3: Problem Solving Emergency Situation (Match Me)
Directions: Match the definitions from column A to the words from Column B. Write your
answer to the space provided before each number.

Answer COLUMN A COLUMN B


_____ 1. This test operates whenever any PC a. CPU
is powered up (switched on). These b. RAM
routines are contained within the c. POST
motherboard ROM as well as ROMs d. Video/ display Error
on the expansion Card. e. Normal POST, Computer is Ok
_____ 2. These errors are heard through the f. Keyboard Error
speaker attached to the motherboard. g. Beep Codes
_____ 3. Error messages are displayed h. Onscreen Messages
onscreen after the video adapter is i. No power, loose card, or
initialized. shorted
_____ 4. Series of Long beep or beeps
j. POST Error, review screen
repeating endlessly
from error code
_____ 5. Two short beep
_____ 6. One long two short beeps
_____ 7. Repeated High-Low alternating beep
while PC is running
_____ 8. Three short beep
_____ 9. One short beep
_____ 10. No beep

Activity 4: Corrective Action (re-arrange the procedures)


Before starting any system troubleshooting, a few basic steps should be performed
to ensure a consistent starting point and to enable isolating the failed component:

Directions: Read the given basic steps of system troubleshooting. Arrange the given steps in
chronological order. Write the corresponding number of steps on the table
provided.

1. To enable the system to boot from a hard disk, make sure no floppy disk is in the floppy
drive. Or put a known-good bootable floppy with DOS or diagnostics on it in the floppy
drive for testing.
2. Turn off the system and any peripheral devices. Disconnect all external peripherals from
the system, except for the keyboard and video display.
3. Turn on the system. Observe the power supply, chassis fans (if any), and lights on either
the system front panel or power supply. If the fans don't spin and the lights don't light, the
power supply or motherboard might be defective.
4. Make sure the system is plugged into a properly grounded power outlet.
5. Observe the power-on self-test (POST). If no errors are detected, the system beeps once
and boots up. Errors that display onscreen (nonfatal errors) and that do not lock up the
system display a text message that varies according to BIOS type and version. Record any

Note: Practice Personal Hygiene protocols at all times.


errors that occur and refer to the disc accompanying this book for a list of BIOS error
codes for more information on any specific codes you see. Errors that lock up the system
(fatal errors) are indicated by a series of audible beeps. Refer to the disc for a list of beep
error codes.
6. Make sure the keyboard and video displays are connected to the system. Turn on the
video display, and turn up the brightness and contrast controls to at least two-thirds of the
maximum. Some displays have onscreen controls that might not be intuitive. Consult the
display documentation for more information on how to adjust these settings. If you can't
get any video display but the system seems to be working, try moving the card to a
different slot (not possible with AGP or PCI Express video adapters) or try a different
video card or monitor.
7. Confirm that the operating system loads successfully

Write your answer here


1.
2.
3.
4.
5.
6.
7.

ACTIVITY 5: Performance Task


Inspection Checklist Template
INSPECTION CHECKLIST
Name: ______________________________________________
Equipment Type: ____________________________________
Property Code: ______________________________________
Number: _____________________
Location:____________________________________________
Confidently With I am not
3 Assistance confident
2 1
1. I can eliminate unnecessary variables or
components that are not pertinent to the
problem
2. I can reinstall, reconfigure, or replace
only one component at a time without
damage
3. I can test after each change I make
4. I don’t give up! Every problem has a
solution
5. I can take a break, and work on
another problem.
6. I can double – and – triple check the
installation and configuration of
each component
7. I can keep in mind that the power

Note: Practice Personal Hygiene protocols at all times.


supply is one of the most failure-
prone parts in a PC, as well as one
of the most overlooked components
8. I can check all the cables connected
and secured
9. I can configure all resource settings
on add-in boards and peripherals
devices set so that no conflicts exist.
10. I can configure network settings
properly
11. I can troubleshoot problems arises
on the server.
TOTAL
GRAND TOTAL

Add all the scores to get the grand total and then divide it by the total number of
items.

Numerical and Verbal Interpretation

Numerical Value Verbal Interpretation


2.51-3.0 Confident
1.51-2.50 Needs assistance
1.00 -1.50 Not yet confident

Prepared by:

ZENAIDA B. TACADENA
Writer

Note: Practice Personal Hygiene protocols at all times.


Things to REMEMBER…

1. RAM – Random Access Memory, is a primary memory. This memory is used inside
the computer to hold programs and data while it is running.

2. Power-On-Self-Test (POST) – is a test the computer must complete verifying all


hardware is working properly before starting the remainder of the boot process

3. Maintenance – to help keep equipment up and running, preventing any unplanned


downtime and expensive costs from unanticipated equipment failure.

4. Defect - This refers to an error, fault, or flaw in any computer program or a hardware


system. A bug produces unexpected results or causes

5. Configuration – Physical layout, interconnections, and functional characteristics of a


computer system (usually called Configuration Item), outlined in its technical
documentation as required for its assembly, testing, installation, operation, and
maintenance.

6. Personal Protective Equipment (PPE) –  is equipment worn to minimize exposure


to hazards that cause serious workplace injuries and illnesses.

7. Rectifying- enables you to perform specific tasks- solve problems, perform work.

8. Sound Device Driver Installer / Sound and Audio Devices – A windows 7.0
Control Panel applet, called Sounds, and Multimedia in Windows 2000, for
configuring the system’s sound card.

9. Preventive Maintenance - that is regularly performed on a piece of equipment to


lessen the likelihood of it failing. It is performed while the equipment is still working
so that it does not break down unexpectedly.

10. Repair - to put something damaged, broken, or not working correctly back into good
condition or make it work again

Note: Practice Personal Hygiene protocols at all times.


Personal Reflection
Congratulations!!!

You have reached the end of the module. Did you fully understand the activity? Let us
now reflect on your learning journey with us. Complete the following phrase.

⮚ I believe that I know


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
____________________________________________________________________

⮚ I learned that
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

⮚ I want to learn more about


_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


References:

DepED Learners Material in ICT CSS for Grade 10


Kto12 TLE ICT CSS Curriculum Guide
TESDA .gov.ph
Training Regulation TESDA
Upgrading and Repairing PC’s 17th Edition, by Que.
Retrieved from: https://www.pcsintl.com/top-6-computer-maintenance-repair-tips/
Retrieved from: http://pcweb.services/services/computer-repairs-and-maintenance/
Retrieved from: https://ehs.ucsc.edu/programs/safety-ih/ppe.html
Retrieved from: https://www.scribd.com/document/346444834/CHS-Module
Retrieved from: http://amparonians.weebly.com/uploads/5/4/6/2/54623275/e-
chs_lm_module4_q3-q4dec.pdf
Retrieved from: https://www.proprofs.com/quiz-school/quizshow.php?title=PC-
Troubleshooting-1&q=1
https://www.computerhope.com/beep.htm

Note: Practice Personal Hygiene protocols at all times.


Answer Key:

Activity 1. True or False

1. PAK
2. PAK
3. BLUFF
4. PAK
5. PAK
6. PAK
7. BLUFF
8. PAK Activity 2 : Multiple
9. PAK
Choice
10. PAK
d
a
a
b
d
b
a
Activity 3: Matchingd
type c
c a
g cv
h
b
j
d
a
f
Activity 4: Arrange Me: e
4, 1, 5, 2, 6, 3, 7 i

Activity 5: Performance Task

Note: Practice Personal Hygiene protocols at all times.


COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: ________
Section: _________________________________________ Date: ______________

LEARNING ACTIVITY SHEET


Maintaining and Repairing Computer Systems and Networks

Background Information for Learners

In general, testing is finding out how well something works. For human beings,
testing tells what level of knowledge or skill has been acquired. In computer hardware and
software development, testing is used at key checkpoints in the overall process to determine
whether objectives are being met. For example, in software development, product objectives
are sometimes tested by product user representatives. When the design is complete, coding
follows and when finished, this is then tested at the unit or module level by each programmer;
at the component level by the group of programmers involved; and at the system level when
all components are combined. At the early or late stages, a product or service may also be
tested for usability

Learning Competency with code

LO 5. Inspect and test the computer systems and networks (TLE_IACSS9-12MRCN-IVf-j-


44)

Note: Practice Personal Hygiene protocols at all times.


Activity 1: Accident Report Form
Forms are used to give specific details with regard to accidents that happened in the
laboratory during experiments.
Accident reports contain the following details:
● Name of the person injured
● Date and time of the accident
● Type of injury
● First aid is given
● Action is taken to prevent further accidents

Scenario:
Jhon, a grade 10 student of diamond section at Malaya National High School is
tasked to dis-assemble and assemble a tower type system unit. The lab room number is
Room 101 on February 21, 2020. As his lab partner, you are asked to assist him.
Unfortunately, Jhon accidentally cut himself because of a sharp object inside the object.

Directions: Make an Accident Report about what happened to Jhon by filling in the form
provided below. Be guided by the rubric given.

Form No: _____ Accident Report Form Date:


Room No:
Name: Year/Section:
Type of Injury Cause of Injury Remedy

Rubric for scoring


Criteria Score
Complete data 10
1 data is missing 8
2 data are missing 6
3 or more data are missing 5

Reflection
In this lesson, I learned
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


Activity 2: Technical Report on Test Conducted
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation.

Directions: Complete the form by writing your answer in the space provided.

Name of Technician: _____________________________________________


Date of Inspection: _________________________ Time: ____________

Reflection
In this lesson, I learned
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


Activity 3: Testing the Wireless NIC
Directions: In this activity, you will check the status of your wireless connection, investigate
the availability of wireless networks, and test connectivity. After accomplishing
the task write a technical report regarding the test conducted.

Data:
The device needs to be tested: Wireless NIC
Specification: Intel 3160HMW Wifi Bluetooth 4.0 Wireless AC 3160
Diagnosis: Cannot connect to the internet

Device Tested:

Specification:

Diagnosis:

Action taken:

Remarks:

Reflection
In this lesson, I learned
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Note: Practice Personal Hygiene protocols at all times.


Activity 4: Configuration Skills
Directions: Listed below are the most important skills one must have to configure computer
systems and networks. The matrix lists the skills expected you to master. Check
the appropriate column which describes the level of your confidence with the
given skills.

I can do it I can do it but I am not


Configuration Skills confidently with assistance confident
3 2 1
1. I can use different tools for
configuration.
2. I can inspect networking
devices and connectors.
3. I can create a cross over and
straight-through Ethernet Cable
4. I can test the functionality of an
Ethernet cable
5. I can assign and configure IP
address.
6. I can execute the ipconfig
command properly
7. I can manage to create peer-to-
peer networking.
8. I can configure Network
interface card using DHCP.
9. I can enable firewall
10. I can configure file and printer
sharing
Total
Grand total

Add all the scores to get the grand total and then divide it by the total number of
items. Refer to the verbal interpretation to determine your initial configuration ability.

Numerical and Verbal Interpretation


Numerical Value Verbal Interpretation
2.51 – 3.00 Confident
1.76 – 2.50 Confident but needs assistance
1.00 – 1.75 Not yet confident

Prepared by:

NIKO NEAL P. FARIÑAS

Note: Practice Personal Hygiene protocols at all times.


Answer key

Activity 1: Accident Report Form


Form No: 1 Accident Report Form Date: (date)
Room No: 101
Name: Jhon Year/Section: 10/diamond
Type of Injury Cause of Injury Remedy

Wound Sharp object First aid

Activity 2: Technical Report on Test Conducted


Device Tested: Slim-type system unit

Specification: Corei7, 8GB RAM, 1TB hard disk

Diagnosis: No display

What will you do to fix the problem:


Reseat the RAM (may vary)

Remarks:
RAM was not properly connected (may vary)

Activity 3: Testing the Wireless NIC


Device Tested:
Wireless NIC

Specification:
Intel 3160HMW Wifi Bluetooth 4.0 Wireless AC 3160

Diagnosis:
Cannot connect to the internet

Action taken:
Check for IP Address (convert IP address from static to dynamic)

Remarks:
IP address is static

Note: Practice Personal Hygiene protocols at all times.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy