TLE/TVL - ICTÂ
Computer Programming (.Net Technology) NC IIIQuarter 1 - MODULE 6Â
Perform Computer Operations: Maintain Computer Equipment
Learning Competency and Code: TVL_ICT.NET_11-12PCO-Ile-28
Perform Computer Operations: Maintain Computer Equipment
Learning Competency and Code: TVL_ICT.NET_11-12PCO-Ile-28
After going through this module, you are expected to:
Implement procedures for ensuring security of data, including regular back-ups and virus checks in accordance with standard operating procedure; and
Implement basic file maintenance procedures in line with standard operating procedures.
Lesson 8: Performing Computer Operations (PCO)
Topics:
Security measures
Cyber Security
Why Cyber Security is Important
Cyber Attacks
How to avoid Online security Threats
Types of Hackers
Cybersecurity Best Practices
Anti-virus software/programs
What is a Virus
A Brief History of Computer Viruses
File management
- File Management, Part 1
- File Management, Part 2
What is Cyber Security?
Why Cyber Security is Important
Types of Cyber Attacks to Look Out For
How to Protect Yourself Against Cyber Attacks
What are the 7 Types of Hackers
Quick Tips: Cyber Security Best Practices
Anti Virus
A Brief History of Computer Viruses
File Management, Part 1
File Management, Part 2