SlideShare a Scribd company logo
1 of 24
LO.1 Transfer Data to Other
Devices
1.Files such as documents, pictures, music and
email.
2. Peripherals or hardware this is where you can
transfer from one device to another just like
computer to flash disk or vice versa, cellphone to
cellphone, computer to computer and so on.
Ways to transfer Files and Data:
1. Computer to computer
2. Computer to External storage device
3. Mobile Phone to Mobile Phone
4. Computer, Cellphone, Laptop to Online
Storage
LESSON 2. Using WWW browser
to locate information
1. Google Chrome
2.
3.
4.
5.
Activity 6 – Identification of browsers
Identify five browsers that is now available in the World Wide
Web. Write your answers in the empty spaces.
World Wide Web
Sir Tim Berners-Lee is a British computer scientist. He
invented the World Wide Web in October 1990.
 He wrote the first web page editor/browser which is
World Wide Web. app and the first server which http. The
first web page was served on the open internet by the end
of 1990.
 It was in the year 1993 that CERN, a European Organization for
Nuclear Research, where Sir Tim was working, to announced the
global wave of creativity, collaboration and innovation.
In 1994, Sir Tim moved to Massachusetts Institute of Technology
to found the World Wide Web Consortium (W3C), an
international community devoted to developing open web
standards. He remains the Director of W3C to this day.
Parts of Web browser:
• HyperText Markup Language (HTML) o This is the markup
or format language for the web.
• Uniform Resource Identifier (URI) o A kind of “address”
that is unique and used to identify to each resource on the
web. It is also commonly called a URL.
https://r.search.yahoo.com/_ylt=AwrKC.ijO3Jj7m8bNV.zRwx.;_ylu=Y29sbwNzZzMEcG9zAzEEdnRpZ
AMEc2VjA3Ny/RV=2/RE=1668459556/RO=10/RU=https%3a%2f%2fen.wikipedia.org%2fwiki%2fUni
form_Resource_Identifier/RK=2/RS=T3nOiLRikZ8RyGs5NgK0vHcjB1I-
• Hypertext Transfer Protocol (HTTP) o Allows for the
retrieval of linked resources from across the web.
Multiple Choice.
Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.
1. 1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
1. 2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
1. 3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
1. 4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
1. 5. What is the complete of HTML?
2. a. Hypertext Transfer Protocol b. Hypertext Trans Protocol
1. c. Hyperlink Transfer Protocol
1. 6. What is the example of online storage?
a. one drive b.google.com c. twitter
1. 7. It is a wireless technology that allows the exchange of data between different devices.
a. Wi-Fi b. share it c. Bluetooth
1. 8. The transferring of files is has many ways.
a. True b. False
1. 9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
1. 10. It is an application use to share files between cellphones when only the Bluetooth is on.
a. Shareit b. OneDrive c. shareme
Lesson 3.
BASIC COMPUTER MAINTENANCE
The basic routine maintenance
comprises of the 3 basic processes:
1.Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
Data Backup- Backing up basically means
creating a redundant copy of a data so
that in case anything happens to the
original data, you have a spare copy. This is
typically a simple thing to do.
What data should I back up?
In general, you should back up any work or
data that cannot be replaced easily. Some
examples are word processing documents,
spreadsheets, databases (for financial data),
customer data, and personal files such as
pictures, music files, emails, etc.
 Malware refers to any kind of malicious codes, objects or
content that infiltrates your computer, resulting in damage
and causing your system to act in an undesirable manner.
Commonly, these include viruses, spyware, worms, trojan
horses, spams and many more.
 One thing you can do to scan the file for any virus infection
before you attempt to open it. If the scan shows nothing, it
is probably a safe file.
Malware Maintenance
88
Uninstall any unnecessary software and
defragment your disk.
Disk Maintenance
TYPES OF MALWARE:
• Spyware is a form of malware that hides on your device, monitors activity, and steals
sensitive information like financial data, account information, logins, and more.
• Adware, a contraction of ‘advertising-supported software’, displays unwanted and
sometimes malicious advertising on a computer screen or mobile device, redirects
search results to advertising websites, and captures user data that can be sold to
advertisers without the user's consent.
• Ransomware is malware designed to lock users out of their system or deny access to
data until a ransom is paid. Crypto-malware is a type of ransomware that encrypts user
files and requires payment by a specific deadline and often through a digital currency
such as Bitcoin.
• A Trojan (or Trojan Horse) disguises itself as legitimate software to trick you into
executing malicious software on your computer. Because it looks trustworthy, users
download it, inadvertently allowing malware onto their device.
Activity 13. Essay Writing Activity
Write an essay about the importance
of Data Backup. Relate your statements to
the most treasured skills you acquired in the
lesson. Give also your own title for the essay
(minimum of 400 words).

More Related Content

Similar to Css- 2nd quarter.pptx

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet workAnand Bhushan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Internet Terms and Definitions
Internet Terms and DefinitionsInternet Terms and Definitions
Internet Terms and DefinitionsRoi Fernandez
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyDr. Jayarama Reddy
 

Similar to Css- 2nd quarter.pptx (20)

History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
Mis pdf
Mis pdfMis pdf
Mis pdf
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet work
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
 
Internet terms and definitions
Internet terms and definitionsInternet terms and definitions
Internet terms and definitions
 
Internet Terms and Definitions
Internet Terms and DefinitionsInternet Terms and Definitions
Internet Terms and Definitions
 
Internt.pptx
Internt.pptxInternt.pptx
Internt.pptx
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
unit oe 1.pdf
unit oe 1.pdfunit oe 1.pdf
unit oe 1.pdf
 
Going Online
Going OnlineGoing Online
Going Online
 

More from MaryGraceHeredero3

Performing Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptxPerforming Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptxMaryGraceHeredero3
 
CERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptxCERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptxMaryGraceHeredero3
 
essentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptxessentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptxMaryGraceHeredero3
 
TRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptxTRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptxMaryGraceHeredero3
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptxMaryGraceHeredero3
 
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptxINTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptxMaryGraceHeredero3
 

More from MaryGraceHeredero3 (9)

Performing Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptxPerforming Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptx
 
MEYA PR2.docx
MEYA PR2.docxMEYA PR2.docx
MEYA PR2.docx
 
LP3.docx
LP3.docxLP3.docx
LP3.docx
 
CERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptxCERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptx
 
essentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptxessentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptx
 
TRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptxTRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptx
 
Media and government.pptx
Media and government.pptxMedia and government.pptx
Media and government.pptx
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptx
 
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptxINTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Css- 2nd quarter.pptx

  • 1. LO.1 Transfer Data to Other Devices
  • 2. 1.Files such as documents, pictures, music and email. 2. Peripherals or hardware this is where you can transfer from one device to another just like computer to flash disk or vice versa, cellphone to cellphone, computer to computer and so on.
  • 3. Ways to transfer Files and Data: 1. Computer to computer
  • 4. 2. Computer to External storage device
  • 5. 3. Mobile Phone to Mobile Phone
  • 6. 4. Computer, Cellphone, Laptop to Online Storage
  • 7. LESSON 2. Using WWW browser to locate information
  • 8. 1. Google Chrome 2. 3. 4. 5. Activity 6 – Identification of browsers Identify five browsers that is now available in the World Wide Web. Write your answers in the empty spaces.
  • 9. World Wide Web Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web in October 1990.  He wrote the first web page editor/browser which is World Wide Web. app and the first server which http. The first web page was served on the open internet by the end of 1990.
  • 10.  It was in the year 1993 that CERN, a European Organization for Nuclear Research, where Sir Tim was working, to announced the global wave of creativity, collaboration and innovation. In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World Wide Web Consortium (W3C), an international community devoted to developing open web standards. He remains the Director of W3C to this day.
  • 11. Parts of Web browser: • HyperText Markup Language (HTML) o This is the markup or format language for the web. • Uniform Resource Identifier (URI) o A kind of “address” that is unique and used to identify to each resource on the web. It is also commonly called a URL. https://r.search.yahoo.com/_ylt=AwrKC.ijO3Jj7m8bNV.zRwx.;_ylu=Y29sbwNzZzMEcG9zAzEEdnRpZ AMEc2VjA3Ny/RV=2/RE=1668459556/RO=10/RU=https%3a%2f%2fen.wikipedia.org%2fwiki%2fUni form_Resource_Identifier/RK=2/RS=T3nOiLRikZ8RyGs5NgK0vHcjB1I- • Hypertext Transfer Protocol (HTTP) o Allows for the retrieval of linked resources from across the web.
  • 12.
  • 13. Multiple Choice. Direction: Select the best answer for each question. Write your answer on a separate sheet of paper. 1. 1. What is the complete name of WWW? a. World Wire Web b. World Wire Wed c. World Wide Web 1. 2. Who discovered the World Wide Web? a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee 1. 3. What year that the first World Wide Web was published? a. 1990 b. 1991 c. 1992 1. 4. Which is the following does not belong to the group? a. Google chrome b. Mozilla corporation c. Microsoft Edge 1. 5. What is the complete of HTML? 2. a. Hypertext Transfer Protocol b. Hypertext Trans Protocol 1. c. Hyperlink Transfer Protocol
  • 14. 1. 6. What is the example of online storage? a. one drive b.google.com c. twitter 1. 7. It is a wireless technology that allows the exchange of data between different devices. a. Wi-Fi b. share it c. Bluetooth 1. 8. The transferring of files is has many ways. a. True b. False 1. 9. Which is the following does not belong to the group? a. Flash drive b. icloud c. dropbox 1. 10. It is an application use to share files between cellphones when only the Bluetooth is on. a. Shareit b. OneDrive c. shareme
  • 16. The basic routine maintenance comprises of the 3 basic processes: 1.Data Backup 2. Malware Maintenance 3. Disk or File Maintenance
  • 17. Data Backup- Backing up basically means creating a redundant copy of a data so that in case anything happens to the original data, you have a spare copy. This is typically a simple thing to do.
  • 18. What data should I back up? In general, you should back up any work or data that cannot be replaced easily. Some examples are word processing documents, spreadsheets, databases (for financial data), customer data, and personal files such as pictures, music files, emails, etc.
  • 19.  Malware refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more.  One thing you can do to scan the file for any virus infection before you attempt to open it. If the scan shows nothing, it is probably a safe file. Malware Maintenance
  • 20. 88
  • 21.
  • 22. Uninstall any unnecessary software and defragment your disk. Disk Maintenance
  • 23. TYPES OF MALWARE: • Spyware is a form of malware that hides on your device, monitors activity, and steals sensitive information like financial data, account information, logins, and more. • Adware, a contraction of ‘advertising-supported software’, displays unwanted and sometimes malicious advertising on a computer screen or mobile device, redirects search results to advertising websites, and captures user data that can be sold to advertisers without the user's consent. • Ransomware is malware designed to lock users out of their system or deny access to data until a ransom is paid. Crypto-malware is a type of ransomware that encrypts user files and requires payment by a specific deadline and often through a digital currency such as Bitcoin. • A Trojan (or Trojan Horse) disguises itself as legitimate software to trick you into executing malicious software on your computer. Because it looks trustworthy, users download it, inadvertently allowing malware onto their device.
  • 24. Activity 13. Essay Writing Activity Write an essay about the importance of Data Backup. Relate your statements to the most treasured skills you acquired in the lesson. Give also your own title for the essay (minimum of 400 words).

Editor's Notes

  1. After making or creating a new document and all the encoded information, designed a cover page or edit some photo, you need to know how to transfer files from device to another. There are ways on how to transfer files from a certain device to another. Files need to be kept and stored securely to prevent others from acquiring it illegally. In this topic, you will learn what are ways on how to transfer files and data between compatible systems using computer software, hardware/peripheral devices.
  2. There are several ways on how to transfer files and data between compatible systems using computer software, hardware and peripherals devices. You need to know the following:
  3. In this way, you will use a local connection or router either wired or wireless connections where the computers are connected to the same network to meet and can transfer files to each other. Some are using third party to install and use in transferring files from each other like Zinstall Winwin.
  4. Here, you need of course an external storage just like flash disk or memory card where you can transfer files from computer to external storage or vice versa. How to tranfer? 1. Make sure you have wire connectors if you want to transfer files from mobile phone and external hard drive to computer and vice versa.
  5. In these two same devices, Bluetooth connection should be turned on in order to transfer files from each other. Others prefer to use the ShareIt applications because it is very fast and easy to install. Others are preferred to use a third party software called ShareIt
  6. How to transfer files? When transferring files from different devices to online storage, make sure you are connected to the internet. Internet access is needed when saving and transferring files. Applications are available to download and install for easy access of the online storage.
  7. In the early age, researching of information is quite hard and challenging. You need to locate the book and the author name in order to research in the library. Today locating information is being made easy. In just one click, you can see many options to choose from the same topic. This new era of technology, makes everything easy and simply but sometimes it makes us lazier enough to understand and comprehend because we are bombarded with so much information from the web. In this topic, you will learn the basic function of World Wide Web browsers to locate information
  8. 1. Google chrome 2. Opera Mini 3. Microsoft Edge
  9. Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW) in 1989, while working at CERN. The web was originally conceived and developed to meet the demand for automated information-sharing between scientists in universities and institutes around the world. WWW APP renamed into NEXUS browser to avoid confusion between WWW SOFTWARE AND WWW APP. At first it was called a Passive browsers which do not have the ability to edit eventually adapted many version and development of the WWW. (html and other communication protocols).
  10.  is the main international standards organization for the World Wide Web. Founded in 1994 and led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working together in the development of standards for the World Wide Web. As of 21 March 2022, W3C had 459 members. W3C also engages in education and outreach, develops software and serves as an open forum for discussion about the Web.
  11. HTML stands for HyperText Markup Language.  is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books.  Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate. You see HTTP when you visit a website because the protocol appears in the URL (for example, http://www.lifewire.com).
  12. C B A B A A C A A a
  13. As a rule of thumb, do not backup programs or system folders. Programs will need to be reinstalled before you can run them and system folders can be restored from your operating system install disc. Be sure to save program installation discs, operating system discs, and registration information in a safe place. If you have downloaded any of your applications, you should save the install files whenever possible.
  14. When you are infected, you can lose your privacy, confidential data, and access to your system when software and hardware are damaged. Fortunately, there are a couple of preventive measures you can take to protect yourself from malware. When you are infected, you can lose your privacy, confidential data, and access to your system when software and hardware are damaged. Fortunately, there are a couple of preventive measures you can take to protect yourself from malware.
  15. Did anyone tell you that your hard disk is a tricky machine? When you first installed your operating system, you may be pleased to know how smooth and efficient your software applications are running. But gradually, it slows down and this bothers you. What truly causes the decline in performance? You may argue that your disk is just a couple of months old. This has much to do with the way you operate on your system. Try to imagine a big tool bucket filled with gadgets. Initially, the bucket only contains a few spanners, a hammer and some screws. So every time you search for a particular item, it is relatively easy to find. But soon as you keep filling the bucket with all sorts of items and especially when the amount of items grows, you will discover that you may need more time just to search for a particular screw head. In such cases, uninstall any unnecessary software and defragment your disk. Typically, your system performance will decline when the amount of data in your hard disk starts to grow.