SlideShare a Scribd company logo
LO.1 Transfer Data to Other
Devices
1.Files such as documents, pictures, music and
email.
2. Peripherals or hardware this is where you can
transfer from one device to another just like
computer to flash disk or vice versa, cellphone to
cellphone, computer to computer and so on.
Ways to transfer Files and Data:
1. Computer to computer
2. Computer to External storage device
3. Mobile Phone to Mobile Phone
4. Computer, Cellphone, Laptop to Online
Storage
LESSON 2. Using WWW browser
to locate information
1. Google Chrome
2.
3.
4.
5.
Activity 6 – Identification of browsers
Identify five browsers that is now available in the World Wide
Web. Write your answers in the empty spaces.
World Wide Web
Sir Tim Berners-Lee is a British computer scientist. He
invented the World Wide Web in October 1990.
 He wrote the first web page editor/browser which is
World Wide Web. app and the first server which http. The
first web page was served on the open internet by the end
of 1990.
 It was in the year 1993 that CERN, a European Organization for
Nuclear Research, where Sir Tim was working, to announced the
global wave of creativity, collaboration and innovation.
In 1994, Sir Tim moved to Massachusetts Institute of Technology
to found the World Wide Web Consortium (W3C), an
international community devoted to developing open web
standards. He remains the Director of W3C to this day.
Parts of Web browser:
• HyperText Markup Language (HTML) o This is the markup
or format language for the web.
• Uniform Resource Identifier (URI) o A kind of “address”
that is unique and used to identify to each resource on the
web. It is also commonly called a URL.
https://r.search.yahoo.com/_ylt=AwrKC.ijO3Jj7m8bNV.zRwx.;_ylu=Y29sbwNzZzMEcG9zAzEEdnRpZ
AMEc2VjA3Ny/RV=2/RE=1668459556/RO=10/RU=https%3a%2f%2fen.wikipedia.org%2fwiki%2fUni
form_Resource_Identifier/RK=2/RS=T3nOiLRikZ8RyGs5NgK0vHcjB1I-
• Hypertext Transfer Protocol (HTTP) o Allows for the
retrieval of linked resources from across the web.
Multiple Choice.
Direction: Select the best answer for each question. Write your answer on a separate sheet of paper.
1. 1. What is the complete name of WWW?
a. World Wire Web b. World Wire Wed c. World Wide Web
1. 2. Who discovered the World Wide Web?
a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee
1. 3. What year that the first World Wide Web was published?
a. 1990 b. 1991 c. 1992
1. 4. Which is the following does not belong to the group?
a. Google chrome b. Mozilla corporation c. Microsoft Edge
1. 5. What is the complete of HTML?
2. a. Hypertext Transfer Protocol b. Hypertext Trans Protocol
1. c. Hyperlink Transfer Protocol
1. 6. What is the example of online storage?
a. one drive b.google.com c. twitter
1. 7. It is a wireless technology that allows the exchange of data between different devices.
a. Wi-Fi b. share it c. Bluetooth
1. 8. The transferring of files is has many ways.
a. True b. False
1. 9. Which is the following does not belong to the group?
a. Flash drive b. icloud c. dropbox
1. 10. It is an application use to share files between cellphones when only the Bluetooth is on.
a. Shareit b. OneDrive c. shareme
Lesson 3.
BASIC COMPUTER MAINTENANCE
The basic routine maintenance
comprises of the 3 basic processes:
1.Data Backup
2. Malware Maintenance
3. Disk or File Maintenance
Data Backup- Backing up basically means
creating a redundant copy of a data so
that in case anything happens to the
original data, you have a spare copy. This is
typically a simple thing to do.
What data should I back up?
In general, you should back up any work or
data that cannot be replaced easily. Some
examples are word processing documents,
spreadsheets, databases (for financial data),
customer data, and personal files such as
pictures, music files, emails, etc.
 Malware refers to any kind of malicious codes, objects or
content that infiltrates your computer, resulting in damage
and causing your system to act in an undesirable manner.
Commonly, these include viruses, spyware, worms, trojan
horses, spams and many more.
 One thing you can do to scan the file for any virus infection
before you attempt to open it. If the scan shows nothing, it
is probably a safe file.
Malware Maintenance
88
Uninstall any unnecessary software and
defragment your disk.
Disk Maintenance
TYPES OF MALWARE:
• Spyware is a form of malware that hides on your device, monitors activity, and steals
sensitive information like financial data, account information, logins, and more.
• Adware, a contraction of ‘advertising-supported software’, displays unwanted and
sometimes malicious advertising on a computer screen or mobile device, redirects
search results to advertising websites, and captures user data that can be sold to
advertisers without the user's consent.
• Ransomware is malware designed to lock users out of their system or deny access to
data until a ransom is paid. Crypto-malware is a type of ransomware that encrypts user
files and requires payment by a specific deadline and often through a digital currency
such as Bitcoin.
• A Trojan (or Trojan Horse) disguises itself as legitimate software to trick you into
executing malicious software on your computer. Because it looks trustworthy, users
download it, inadvertently allowing malware onto their device.
Activity 13. Essay Writing Activity
Write an essay about the importance
of Data Backup. Relate your statements to
the most treasured skills you acquired in the
lesson. Give also your own title for the essay
(minimum of 400 words).

More Related Content

Similar to Css- 2nd quarter.pptx

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet work
Anand Bhushan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
Padme Amidala
 
Internet Terms and Definitions
Internet Terms and DefinitionsInternet Terms and Definitions
Internet Terms and Definitions
Roi Fernandez
 
Internt.pptx
Internt.pptxInternt.pptx
Internt.pptx
musketeer2
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
Dr. Jayarama Reddy
 
unit oe 1.pdf
unit oe 1.pdfunit oe 1.pdf
unit oe 1.pdf
wondimagegndesta
 

Similar to Css- 2nd quarter.pptx (20)

History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
Mis pdf
Mis pdfMis pdf
Mis pdf
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet work
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
 
Internet terms and definitions
Internet terms and definitionsInternet terms and definitions
Internet terms and definitions
 
Internet Terms and Definitions
Internet Terms and DefinitionsInternet Terms and Definitions
Internet Terms and Definitions
 
Internt.pptx
Internt.pptxInternt.pptx
Internt.pptx
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
unit oe 1.pdf
unit oe 1.pdfunit oe 1.pdf
unit oe 1.pdf
 
Going Online
Going OnlineGoing Online
Going Online
 

More from MaryGraceHeredero3

Performing Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptxPerforming Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptx
MaryGraceHeredero3
 
CERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptxCERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptx
MaryGraceHeredero3
 
essentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptxessentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptx
MaryGraceHeredero3
 
TRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptxTRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptx
MaryGraceHeredero3
 
Media and government.pptx
Media and government.pptxMedia and government.pptx
Media and government.pptx
MaryGraceHeredero3
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptx
MaryGraceHeredero3
 
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptxINTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
MaryGraceHeredero3
 

More from MaryGraceHeredero3 (9)

Performing Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptxPerforming Computer Operations [Autosaved].pptx
Performing Computer Operations [Autosaved].pptx
 
MEYA PR2.docx
MEYA PR2.docxMEYA PR2.docx
MEYA PR2.docx
 
LP3.docx
LP3.docxLP3.docx
LP3.docx
 
CERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptxCERTIFICATE OF RECOGNITION.pptx
CERTIFICATE OF RECOGNITION.pptx
 
essentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptxessentialism-161109105322 (1) [Autosaved].pptx
essentialism-161109105322 (1) [Autosaved].pptx
 
TRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptxTRADITIONAL MEDIA AND NEW MEDIA.pptx
TRADITIONAL MEDIA AND NEW MEDIA.pptx
 
Media and government.pptx
Media and government.pptxMedia and government.pptx
Media and government.pptx
 
Performing Computer Operations.pptx
Performing Computer Operations.pptxPerforming Computer Operations.pptx
Performing Computer Operations.pptx
 
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptxINTRO TO MEDIA AND INFORMATION LITERACY.pptx
INTRO TO MEDIA AND INFORMATION LITERACY.pptx
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Css- 2nd quarter.pptx

  • 1. LO.1 Transfer Data to Other Devices
  • 2. 1.Files such as documents, pictures, music and email. 2. Peripherals or hardware this is where you can transfer from one device to another just like computer to flash disk or vice versa, cellphone to cellphone, computer to computer and so on.
  • 3. Ways to transfer Files and Data: 1. Computer to computer
  • 4. 2. Computer to External storage device
  • 5. 3. Mobile Phone to Mobile Phone
  • 6. 4. Computer, Cellphone, Laptop to Online Storage
  • 7. LESSON 2. Using WWW browser to locate information
  • 8. 1. Google Chrome 2. 3. 4. 5. Activity 6 – Identification of browsers Identify five browsers that is now available in the World Wide Web. Write your answers in the empty spaces.
  • 9. World Wide Web Sir Tim Berners-Lee is a British computer scientist. He invented the World Wide Web in October 1990.  He wrote the first web page editor/browser which is World Wide Web. app and the first server which http. The first web page was served on the open internet by the end of 1990.
  • 10.  It was in the year 1993 that CERN, a European Organization for Nuclear Research, where Sir Tim was working, to announced the global wave of creativity, collaboration and innovation. In 1994, Sir Tim moved to Massachusetts Institute of Technology to found the World Wide Web Consortium (W3C), an international community devoted to developing open web standards. He remains the Director of W3C to this day.
  • 11. Parts of Web browser: • HyperText Markup Language (HTML) o This is the markup or format language for the web. • Uniform Resource Identifier (URI) o A kind of “address” that is unique and used to identify to each resource on the web. It is also commonly called a URL. https://r.search.yahoo.com/_ylt=AwrKC.ijO3Jj7m8bNV.zRwx.;_ylu=Y29sbwNzZzMEcG9zAzEEdnRpZ AMEc2VjA3Ny/RV=2/RE=1668459556/RO=10/RU=https%3a%2f%2fen.wikipedia.org%2fwiki%2fUni form_Resource_Identifier/RK=2/RS=T3nOiLRikZ8RyGs5NgK0vHcjB1I- • Hypertext Transfer Protocol (HTTP) o Allows for the retrieval of linked resources from across the web.
  • 12.
  • 13. Multiple Choice. Direction: Select the best answer for each question. Write your answer on a separate sheet of paper. 1. 1. What is the complete name of WWW? a. World Wire Web b. World Wire Wed c. World Wide Web 1. 2. Who discovered the World Wide Web? a. Tim Berner-Lee b. Tim Berners-Lee c. Tom Berners-Lee 1. 3. What year that the first World Wide Web was published? a. 1990 b. 1991 c. 1992 1. 4. Which is the following does not belong to the group? a. Google chrome b. Mozilla corporation c. Microsoft Edge 1. 5. What is the complete of HTML? 2. a. Hypertext Transfer Protocol b. Hypertext Trans Protocol 1. c. Hyperlink Transfer Protocol
  • 14. 1. 6. What is the example of online storage? a. one drive b.google.com c. twitter 1. 7. It is a wireless technology that allows the exchange of data between different devices. a. Wi-Fi b. share it c. Bluetooth 1. 8. The transferring of files is has many ways. a. True b. False 1. 9. Which is the following does not belong to the group? a. Flash drive b. icloud c. dropbox 1. 10. It is an application use to share files between cellphones when only the Bluetooth is on. a. Shareit b. OneDrive c. shareme
  • 16. The basic routine maintenance comprises of the 3 basic processes: 1.Data Backup 2. Malware Maintenance 3. Disk or File Maintenance
  • 17. Data Backup- Backing up basically means creating a redundant copy of a data so that in case anything happens to the original data, you have a spare copy. This is typically a simple thing to do.
  • 18. What data should I back up? In general, you should back up any work or data that cannot be replaced easily. Some examples are word processing documents, spreadsheets, databases (for financial data), customer data, and personal files such as pictures, music files, emails, etc.
  • 19.  Malware refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more.  One thing you can do to scan the file for any virus infection before you attempt to open it. If the scan shows nothing, it is probably a safe file. Malware Maintenance
  • 20. 88
  • 21.
  • 22. Uninstall any unnecessary software and defragment your disk. Disk Maintenance
  • 23. TYPES OF MALWARE: • Spyware is a form of malware that hides on your device, monitors activity, and steals sensitive information like financial data, account information, logins, and more. • Adware, a contraction of ‘advertising-supported software’, displays unwanted and sometimes malicious advertising on a computer screen or mobile device, redirects search results to advertising websites, and captures user data that can be sold to advertisers without the user's consent. • Ransomware is malware designed to lock users out of their system or deny access to data until a ransom is paid. Crypto-malware is a type of ransomware that encrypts user files and requires payment by a specific deadline and often through a digital currency such as Bitcoin. • A Trojan (or Trojan Horse) disguises itself as legitimate software to trick you into executing malicious software on your computer. Because it looks trustworthy, users download it, inadvertently allowing malware onto their device.
  • 24. Activity 13. Essay Writing Activity Write an essay about the importance of Data Backup. Relate your statements to the most treasured skills you acquired in the lesson. Give also your own title for the essay (minimum of 400 words).

Editor's Notes

  1. After making or creating a new document and all the encoded information, designed a cover page or edit some photo, you need to know how to transfer files from device to another. There are ways on how to transfer files from a certain device to another. Files need to be kept and stored securely to prevent others from acquiring it illegally. In this topic, you will learn what are ways on how to transfer files and data between compatible systems using computer software, hardware/peripheral devices.
  2. There are several ways on how to transfer files and data between compatible systems using computer software, hardware and peripherals devices. You need to know the following:
  3. In this way, you will use a local connection or router either wired or wireless connections where the computers are connected to the same network to meet and can transfer files to each other. Some are using third party to install and use in transferring files from each other like Zinstall Winwin.
  4. Here, you need of course an external storage just like flash disk or memory card where you can transfer files from computer to external storage or vice versa. How to tranfer? 1. Make sure you have wire connectors if you want to transfer files from mobile phone and external hard drive to computer and vice versa.
  5. In these two same devices, Bluetooth connection should be turned on in order to transfer files from each other. Others prefer to use the ShareIt applications because it is very fast and easy to install. Others are preferred to use a third party software called ShareIt
  6. How to transfer files? When transferring files from different devices to online storage, make sure you are connected to the internet. Internet access is needed when saving and transferring files. Applications are available to download and install for easy access of the online storage.
  7. In the early age, researching of information is quite hard and challenging. You need to locate the book and the author name in order to research in the library. Today locating information is being made easy. In just one click, you can see many options to choose from the same topic. This new era of technology, makes everything easy and simply but sometimes it makes us lazier enough to understand and comprehend because we are bombarded with so much information from the web. In this topic, you will learn the basic function of World Wide Web browsers to locate information
  8. 1. Google chrome 2. Opera Mini 3. Microsoft Edge
  9. Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW) in 1989, while working at CERN. The web was originally conceived and developed to meet the demand for automated information-sharing between scientists in universities and institutes around the world. WWW APP renamed into NEXUS browser to avoid confusion between WWW SOFTWARE AND WWW APP. At first it was called a Passive browsers which do not have the ability to edit eventually adapted many version and development of the WWW. (html and other communication protocols).
  10.  is the main international standards organization for the World Wide Web. Founded in 1994 and led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working together in the development of standards for the World Wide Web. As of 21 March 2022, W3C had 459 members. W3C also engages in education and outreach, develops software and serves as an open forum for discussion about the Web.
  11. HTML stands for HyperText Markup Language.  is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books.  Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate. You see HTTP when you visit a website because the protocol appears in the URL (for example, http://www.lifewire.com).
  12. C B A B A A C A A a
  13. As a rule of thumb, do not backup programs or system folders. Programs will need to be reinstalled before you can run them and system folders can be restored from your operating system install disc. Be sure to save program installation discs, operating system discs, and registration information in a safe place. If you have downloaded any of your applications, you should save the install files whenever possible.
  14. When you are infected, you can lose your privacy, confidential data, and access to your system when software and hardware are damaged. Fortunately, there are a couple of preventive measures you can take to protect yourself from malware. When you are infected, you can lose your privacy, confidential data, and access to your system when software and hardware are damaged. Fortunately, there are a couple of preventive measures you can take to protect yourself from malware.
  15. Did anyone tell you that your hard disk is a tricky machine? When you first installed your operating system, you may be pleased to know how smooth and efficient your software applications are running. But gradually, it slows down and this bothers you. What truly causes the decline in performance? You may argue that your disk is just a couple of months old. This has much to do with the way you operate on your system. Try to imagine a big tool bucket filled with gadgets. Initially, the bucket only contains a few spanners, a hammer and some screws. So every time you search for a particular item, it is relatively easy to find. But soon as you keep filling the bucket with all sorts of items and especially when the amount of items grows, you will discover that you may need more time just to search for a particular screw head. In such cases, uninstall any unnecessary software and defragment your disk. Typically, your system performance will decline when the amount of data in your hard disk starts to grow.