TLE/TVL - ICTÂ
Computer Programming (.Net Technology) NC IIIQuarter 1 - MODULE 6Â
Perform Computer Operations: Maintain Computer Equipment
Learning Competency and Code: TVL_ICT.NET_11-12PCO-Ile-28
expected outcomes
After going through this module, you are expected to:
Implement procedures for ensuring security of data, including regular back-ups and virus checks in accordance with standard operating procedure; and
Implement basic file maintenance procedures in line with standard operating procedures.
QUARTER 1 - MODULE 6 LIST OF topics
Lesson 8: Performing Computer Operations (PCO)
Topics:
Security measures
Cyber Security
Why Cyber Security is Important
Cyber Attacks
How to avoid Online security Threats
Types of Hackers
Cybersecurity Best Practices
Anti-virus software/programs
What is a Virus
A Brief History of Computer Viruses
File management
- File Management, Part 1
- File Management, Part 2
cyber security
What is Cyber Security?
cyber security
Why Cyber Security is Important
ascyber attacks
Types of Cyber Attacks to Look Out For
how to avoid online security threats
How to Protect Yourself Against Cyber Attacks
types of hackers
What are the 7 Types of Hackers
cyber security best practices
Quick Tips: Cyber Security Best Practices
anti-virus software / programs
Anti Virus
anti-virus software / programs
A Brief History of Computer Viruses
file management
File Management, Part 1
file management
File Management, Part 2