Quarter 3 g10 Css

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 59

10

Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3
Configuring Computer System and
Network

Department of Education ● Republic of the Philippines


Technology and Home Economics Grade 10
Information and Communications Technology - Computer Systems Servicing
Alternative Delivery Mode
Quarter 3 - Module 2: Configuring Computer System and Network
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for the exploitation of such work for a
profit. Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., pictures, photos, brand names, trademarks, and etc.)
included in this module are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over
them.

Published by the Department of Education - Division of Bukidnon


Development Team of the Module

Writer: Geraldine B. Acob


Editor: Ligaya S. Gonzales, EdD
Reviewer: Mary Jane R. Cardente, PhD
Illustrator and Layout Artist: Dave L. Generalao

Management Team:
Chairperson: Arturo B. Bayocot, PhD, CESO III
Regional Director

Co-Chairpersons: Victor G. De Gracia, Jr., PhD, CESO V


Assistant Regional Director

Randolph B. Tortola, PhD, CESO IV


Schools Division Superintendent

Shambaeh A. Usman, PhD


Assistant Schools Division Superintendent

Mala Epra B. Magnaong, Chief ES, CLMD


Neil A. Improgo, PhD, EPS-LRMS
Bienvenido U. Tagolimot, Jr., EPS-ADM

Members: Elbert R. Francisco, PhD, Chief ES, CID


Mary Jane R. Cardente, PhD, EPS in TLE
Rejynne Mary L. Ruiz, PhD, LRMDS Manager
Jeny B. Timbal, PDO II
Shella O. Bolasco, Division Librarian II

Printed in the Philippines by


Department of Education - Division of Bukidnon
Office Address: Fortich Street, Sumpong, Malaybalay City
Telefax: (088) 813-3634
E-mail Address: [email protected]
Website: depedbukidnon.net.ph
10
Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3
Configuring Computer System and
Network

This module was collaboratively developed and reviewed by educators


from public schools. We encourage teachers and other education stakeholders
to email their feedback, comments and recommendations to the Department of
Education at [email protected]
We value your feedback and recommendations.

Department of Education • Republic of the Philippines


Table of Contents
Pa
ge
COVER PAGE
COPYRIGHT PAGE
TITLE PAGE
TABLE OF CONTENTS
WHAT IS THIS MODULE ALL ABOUT i

WHAT I NEED TO KNOW 2

WHAT I KNOW ( PRE-TEST) 3

Lesson 5 - (Network and Security)

What I Need to Know 5


What I Know 6
What’s In 7
What’s New 7
What is It 7
What’s More 13
What I Have Learned 15
What I Can Do 15
Assessment 16
Additional Activities 17

Lesson 6- (File and Printer Sharing) 19

What I Need to Know 19


What I Know 19
What’s In 19
What’s New 20
What is It 20
What’s More 23
What I Have Learned 23
What I Can Do 24
Assessment 24
Additional Activities 25

Lesson 7- (Occupational Health and Safety) 27

What I Need to Know 27


What I Know 28
What’s In
What’s New
What is It 29
What’s more 31
What I Have Learned 32
What I Can Do 33
Assessment 33
Additional Activities 34

Lesson 8- (Guidelines for Testing Computer Systems and Network) 35

What I Need to Know 35


What I Know 36
What’s In 38
What’s New 38
What is It 39
What’s More 40
What I Have Learned 42
What I Can Do 43
Assessment 45
Additional Activities 45

POST TEST 46

ANSWER KEYS 47

REFERENCES 48
What This Module Is All About

Introductory Message

For the Facilitator:

Welcome to the Technology and Livelihood Education Grade 10 Information


and Communications Technology - Computer Systems Servicing Alternative Delivery
Mode (ADM) Module on Configuring Computer System and Network (2)!

This module was collaboratively designed, developed, and reviewed by


educators, from public institutions to assist you, the teacher, or facilitator in helping
the learners meet the standards set by the K to 12 Curriculum while overcoming their
personal, social and economic constraints in schooling.

This learning resource hopes to engage the learners in guided and


independent learning activities at their own pace and time. Furthermore, this also
aims to help learners acquire the needed 21st-century skills while taking into
consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

In response to the need for today’s challenging new normal way of living due
to pandemic, the Grade 10 TLE (ICT) Module 1 Quarter 3 is the first book uniquely
designed to achieve the goals set by the Department of Education. It is expected that
with the use of the modern technologies that we have, millennial teachers are
expected to be more innovative, creative, resilient and with good communication
skills.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.

For the Learner and Parents:


Welcome to the Technology and Livelihood Education Grade 10 Information
and Communications Technology - Computer Systems Servicing Alternative Delivery
Mode (ADM) Module on Configuring Computer System and Network (2)!
The hand is one of the most symbolized parts of the human body. It is often
used to depict skill, action, and purpose. Through our hands, we may learn, create,
and accomplish. Hence, the hand in this learning resource signifies that you as a
learner is capable and empowered to successfully achieve the relevant
competencies and skills at your own pace and time. Your academic success lies in
your own hands.

This module is designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled
to process the contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies that you are expected to learn
from the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This will be a brief drill or review to help you


link the current lessons from the previous
topic.

What’s New In this portion, new lessons will be introduced


to you in various ways, such as a story, song,
poem, problem opener, an activity, or
situation.

What Is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.
Quarter 3
CONFIGURING COMPUTER SYSTEMS AND
NETWORKS

Content Standard Performance Standard


The learner demonstrates The learner independently
understanding of the underlying demonstrates skills in configuring
concepts and principles on configuring computer systems and networks as
computer systems and networks. prescribed by TESDA Training
Regulations.
Learning Competencies and Objectives

 Enable network security to the computer systems


 Configure file and printer sharing
 Follow OHS procedures in configuring computer systems and networks;
 Test computer systems and networks in accordance with the job requirements
 Accomplish technical reports on the test conducted

What I Need to Know

This module will allow the students to learn the Network security to the
computer system. Enabling the network security of the computer system by
understanding of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer network and
network-accessible resources.

It secures the network, as well as protecting and overseeing operations being


done.

This will define the Network Security and its different types what is suitable for
installations to enable it to the computer system.
The students will learn on how to configure of file and printer sharing as one
of the most effective ways to manage computer settings as a network administrator.
The File and Printer Sharing setting needs to be enabled in your work-sharing
network domain before you can use network printers or transfer files between
computers operating system feature that enables the computer to communicate to
each other and send print jobs to your printer. All computers should be part of the
main network and the same Workgroup or Homegroup for File and Printer Sharing to
work properly. The students will understand 1 the terms “File Sharing” and “Printer
Sharing.”
The students will learn the steps in configuring a file sharing and printer sharing.
This module is designed to teach the students to learn the safety and
precautions by setting activities or guidelines for inspection and testing the computer
systems and networks.
It outlines the potential health risks and provides an implementing policy
statement that is maintaining the required level of health and safety in the workplace
which the students will understand very well the importance of its procedure:

1. Follow Occupational Health and Safety (OHS) Procedures in Testing Systems


and networks.
2. Test computer systems and networks in accordance with the job
requirements.
3. Accomplish technical reports on the tests conducted.

The students will have an overview of regulating requirements and


workstation risk assessment to identify the hazards enhance the procedure to avoid
untoward incidents. Its procedure includes the task, responsibilities, and rules in the
workplace

What I Know (Pre-Test)

Multiple Choice

Direction: Encircle the letter of the correct answer.

1. Which of the following is correct regarding Class B Address of IP address?


a. Network bit-14,Host bit-16 c. Network bit-18,Host bit-16
b. Network bit-16,Host bit-14 d. Network bit-12,Host bit-14
2. What is the use of Bridge in Network?
a. To connect LANS c. to control Network Speed
b. to separate LANS d. All of the above
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Network congestion occurs
a. In case of traffic overloading
b. When systems Terminates
c. When connection between two nodes 2 terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and maintenance
category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision, hearing and
mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. What is the benefit of the Networking?.
a. File Sharing c. Easier Backups
b. Easier access to resources d. All of the above
8. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. ADSL is the abbreviation of
a. Asymmetric Dual Subscriber Line
b. Asymmetric Digital System Line
c. Asymmetric Dual System Line
d. Asymmetric Digital Subscriber Line
10. What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. Bridge works in which layer of the OSI model?
a. Application layer c. Network layer
b. Transport layer d. Datalink layer

15. Which data communication method is used to transmit the data over a serial
communication link?
3
a. Simplex c. Full duplex
b. Half-duplex d. all of the above
Lesson

1 Network Security

What I Need to Know

Welcome to the next lesson on this module Network and Security.


At the end of this lesson you will be able to apply the knowledge and skills on
network security. This skill is essential for you to identify the viruses and threats on
the computer.

At the end of this lesson you are expected to:

 Inspect networking devices and connectors;


 Enable network security

What I Know

Direction: Match the meanings in column A with the terms in column B to identify
the term/word being described.
5
A B
1) attached to small pieces of
computer code, software and a. accidental threats
documents.
b. antivirus software
2) when an employee intends to c. data encryption
cause damage
d. firewall
3) it is technical a worm
e. malicious threats
4) Software designed to detect, f. traffic
disable and remove viruses
g. trojan horse
5) when user damages data or h. virus
equipment unintentionally
i. VPN
6) data being transported on a
network j. WPA
7) an encryption system that
k. WEP
protects data
8) a self-replicating program that is l. Worm
harmful to network
9) it involves using codes and
ciphers
10) a way of protecting a
computer from intrusion through
the ports

6
What’s In

You need to understand computer and network security. Failure to implement


proper security procedures can affect users, computers, and the general public.
Private information, company secrets, financial data, computer equipment, and items
about national security are placed at risk if proper security procedures are not
followed

What’s New

Computer and network security help keep data and equipment safe by giving
only the appropriate people access. Everyone in an organization should give high
priority to security, because everyone can be affected by a breach in security.
An attack that intentionally degrades the performance of a computer or
network can also harm an organization’s productivity. Poorly implemented security
measures that allow unauthorized access to wireless network devices demonstrate
that physical connectivity is not necessary for security breaches by intruders.

What Is It

Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
security.html

7
Security Attacks

To successfully protect computers and the network, a technician must understand


both of the following types of threats to computer security

 Physical:
Events or attacks that steal, damage, or destroy such ---
equipment as servers, switches, and wiring.
 Data:
Events or attacks that remove, corrupt, deny access to, allow access
to, or steal information.
Threats to security can come from inside or outside an organization, and the level
of potential damage can vary greatly. Potential threats include the following:
 Internal: Employees who have access to data, equipment, and the
network. Internal attacks can be characterized as follows:
o Malicious threats are when an employee intends to cause damage.
o Accidental threats are when the user damages data or equipment
unintentionally.
 External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be characterized as
follows:
o Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed
to vandalize.
o Structured attacks, which use code to access operating systems
and software.
Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly
changing as attackers find new ways to gain entry and commit their crimes.

8
Types of Computer Threats

Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
securoty.html
Viruses, Worms, and Trojan Horses
A virus is attached to small pieces of computer code, software, or document. The
virus executes when the software is run on a computer. If the virus spreads to other
computers, those computers could continue to spread the virus. A virus is transferred
to another computer through e-mail, file transfers, and instant messaging. The virus
hides by attaching itself to a file on the computer. When the file is accessed, the
virus executes and infects the computer. A virus has the potential to corrupt or even
delete files on your
A worm is a self-replicating program that is harmful to networks. A worm uses the
network to duplicate its code to the hosts on a network, often without any user
intervention.
A Trojan horse technically is a worm. It does not need to be attached to other
software. Instead, a Trojan threat is hidden in software that appears to do one thing,
and yet behind the scenes it does another.

Security Procedures
9
Regular testing provides details of any possible weaknesses in the current
security plan that should be addressed. A network has multiple layers of security,
including physical, wireless, and data.

Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software

Virus protection software, also known as antivirus software, is software designed to


detect, disable, and remove viruses, worms, and Trojans before they infect a
computer. Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the
company.
Enabling Windows 7 Firewall
1. Open Windows Firewall by clicking the Start button , and then clicking Control
Panel. In the search box, type firewall, and then click Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an
administrator password or confirmation, type the password or provide confirmation.
Turn Windows Firewall on or off link in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that you want to help
protect, and then click OK.
If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box

Data Encryption
Encrypting data involves using codes10and ciphers. Data encryption can help
prevent attackers from monitoring or recording traffic between resources and
computers. A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network.

Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of protecting a
computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured. Data
being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
1. Click Start Button then choose Control Panel
2. Click the Network and Internet Connections option.
3. Then click the Network Connections option.
4. Double click the icon labeled “Local Area Connection”. The icon may have
a number after it, for example “Local Area Connection 5” Click on
Properties button.
5. On the “Advance “ tab select “Protect my computer and network by limiting
or preventing access to this computer from the Internet.
6. Click Settings, then on the ICMP tab select “Allow incoming echo request”.
Enabling Windows 7 Firewall
1. Open Windows Firewall by clicking the Start button, and then click Control
Panel. In the search box, type firewall, and then click Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you want
to help protect, and then click OK.

If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box.

Wireless Security Techniques


11
Traffic flows through radio waves in wireless networks, so it is easy for
attackers to monitor and attack data without having to connect to a network
physically.
When installing wireless services, you should apply the following wireless
security techniques immediately to prevent unwanted access to the network:
o Wired Equivalent Privacy (WEP) was the first-generation security standard for
wireless network. Attackers quickly discovered that 64-bit WEP encryption
was easy to break
o Change the default administration password.
o Disable the broadcasting of the Service Set Identifier (SSID) to hide it from
other users
o Use MAC filtering to protect the network from other users.
o Change the default values of the SSID by entering the setup program for the
access point and renaming the SSID.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all traffic
except the desired network settings.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all traffic
except the desired network settings.
An attacker can access data as it travels over the radio signal. However, you can
use a wireless encryption system to encode data and thereby prevent unwanted
capture and use of the data. The following list describes the different levels of
wireless security, from most secure to least secure.

 Lightweight Extensible Authentication Protocol (LEAP): Also called EAP-


Cisco, LEAP is a wireless security protocol created by Cisco to address the
weaknesses in WEP and WPA
 Wi-Fi Protected Access (WPA): An improved version of WEP. It was created
as a temporary solution until 802.11i (a security layer for wireless systems)
was fully implemented
 WEP 128: An enhanced encryption protocol combining a 104-bit key and a
24-bit initialization vector.
 WEP 64: The first-generation security standard for wireless network.
 No security: Although you can elect to implement no security whatsoever,
you leave your wireless network completely vulnerable to attack.

12
What’s More

A. Configure Windows XP Firewall


Directions: In this hands-on activity you will explore the Windows XP Firewall and
configure some advanced settings. There are essential questions that you need to
answer while performing the activity.
Step 1

 Navigate to the Windows XP Firewall:


 Start > Control Panel > Security Center
 The Firewall indicator shows the status of the firewall. The normal setting is
“ON”.

Figure 1. Windows Security Center


 Access the controller for the firewall by clicking Windows Firewall at the
bottom of the window.

13
Step 2

Figure 2. Windows Firewall General Tab Window


Essential Questions:
In the space below, state why turning off the Windows Firewall is not advised.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

B. Create a network using WEP


Directions: Create a network profile using WEP shared key authentication:
1. Open Network and Sharing Center by clicking the ________button , and then
clicking Control Panel. In the search box, type network, and then click Network
and Sharing Center.
2. Click Set up a new connection or_________. Enable Firewall for Windows X
3. Click Manually connect to a wireless network, and then click______.
4. On the Enter information for the wireless network you want to add page, under
Security type, select_______.
5. Complete the rest of the page, and then click _________________
6. .Click ______________ settings.
7. Click the___________ tab, and then, under Security type, click Shared.
8. Click ________, and then click Close.

14
What I Have Learned
Direction: Fill in the blank with the word that make the statement correct .
1. Computer and _____________ help keep data and equipment safe by
giving only the appropriate people access.
2. A___________ primary responsibilities include data and network security.
3. Computer _________ are created with malicious intent and sent by
attackers
4. A_______ is transferred to another computer through e-mail, file transfers,
and instant messaging.
5. Security plan policies should be constantly updated to reflect the latest
_________ to a network

What I Can Do

Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local store to
gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls. Based on your
research, complete the table below
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features

2. Which hardware firewall would you purchase? List reasons for your choice.
3. Using the Internet, research two different software firewalls. Based on your
research, complete the table below.
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features

4. Which software firewall would you purchase? List reasons for your choice.

15
Assessment

Direction: Match column A with column B in order to identify the term/word


being described.

A B
1. attached to small pieces of
computer code, software and a. accidental threats
documents.
b. antivirus software
2. when an employee intends to c. data encryption
cause damage
d. firewall
3. it is technical a worm
e. malicious threats
f. traffic
4. Software designed to detect,
disable and remove viruses g. trojan horse
h. virus
5. when user damages data or
equipment unintentionally i. VPN
6. data being transported on a j. WPA
network
7. an encryption system that k. WEP
protects data l. Worm
8. a self-replicating program
that is harmful to network
9. it involves using codes and
ciphers
10. a way of protecting a
computer from intrusion
through the ports

16
Additional Activities

A. Network Security Study


Directions: Using different references available such as articles, books, internet and
publications, investigate and search for the advantages and disadvantages of
network security.

Advantages Disadvantages
1.

2.

3.

4.

5.

B. Modified True or False


Directions: Write security if the underlined word on the subsequent statement
makes it true and virus it makes the statement a false one, then write the correct
term/word to correct it.
_________1.Computer and network security help keep the data and equipment safe.
_________2.A technician’s secondary responsibilities include data and network security.
_________3.Threats to security can come from inside and outside the organization.
_________4.Computer viruses are created and sent by attackers who have malicious
intent.
_________5.A virus is transferred to another computer through e-mail, file transfer and
instant messaging

17
C. Acrostic
Direction: Give the meaning of the acronyms given below:
1. VPN- ____________________________________________
2. SSID- ____________________________________________
3. WEP- ____________________________________________
4. WPA- ____________________________________________
5. WTLS- __________________________________________
Lesson 18

2 File and Printer Sharing

What I Need to Know

File sharing is a Microsoft windows 95 and windows 98 networking component that


allows computers running windows 95 and 98 to share folders and printers so that
other client can access this.
At end of the lesson you will be able to:
 use the same file by some combination in file and printer sharing.
Good luck and enjoy.
 Share folders from PC to PC and PC to printer

What I Know

Essay Writing
Directions: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
19
What’s In

File Sharing is sharing of or offering access to digital information or resources,


including documents, multimedia (audio/video), graphics, computer programs,
images and e-books. It is the private or public distribution of data or resources in a
network with different levels of sharing privileges

What’s New

You have already leraned from the past lesson about computer network and
security. Now you are going to learn how to share files using a computer and a
printer.
File sharing can be done using several methods. The most common method
techniques include the following:

 Removable storage devices


 Centralized file hosting server installations on networks
 World Wide Web-oriented hyperlinked documents
 Distributed peer-to-peer networks

20
What Is It

21
Sharing Resources and Accessing Shared Resources

1) Open My Computer, double-click the C: drive, and create a new folder on the
C: drive. Name it Shared. Right-click the Shared folder and select Properties.
2) In the Shared Properties dialog box, select the Sharing tab.
3) Notice that the Select the Share This Folder button.
4) Type the Share Name. Click Apply and the computer you are linked to should
be able to view your Shared folder.
5) Right-click My Network Places, which should be located on your desktop.
Select Properties.
6) Right-click your connection (look for a name like Local Area Connection) and
again select Properties.
7) In your Local Area Connection Properties dialog box, select File and Print
Sharing for Microsoft Networks and click OK. If you don’t see an option for
File and Print Sharing, click Install and select a service and then click Add.
Now select the File and Print Sharing option.
8) Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window. In the main
(right-hand) pane, you should see one or more options. Double-click the
Microsoft Windows Network icon.
9) You’re now at the main network screen, where you should see what’s called a
workgroup. A workgroup is a basic group of computers connected to the same
Ethernet network. Double-click the workgroup to see all the computers
connected to your Ethernet network.

Printer Sharing

One of the primary reasons that networks were developed was to allow
groups of computer users to share peripheral devices such as printer. Sharing a
single printer among a group of users costs much less than buying a printer for each
computer.

Setting up printer sharing is simple with Windows XP. The following steps
enable a computer to share a printer:

Step 1. Choose Start > Printers and Faxes.


Step 2. Right-click the printer, and choose Properties.
Step 3. Click the Sharing tab.
Step 4. Click the Share this printer radio button.
Step 5. Keep or change the share name.
Step 6. Click Apply.

All the computers that use the shared printer must have the correct drivers
installed. Drivers for other operating systems can be installed on the print server. To
connect to the printer from another computer on the network, choose Start > Printers
and Faxes > Add Printer. The Add Printer Wizard appears. Follow the steps using
the wizard

22
What’s More

Directions: Cite the advantages, disadvantages and example situation of


printer sharing.

Advantages Disadvantages

Example Situation Example Situation

What I Have Learned

Directions What is the importance and use of file and printer sharing? Give at least
5 sentences.
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

23
What I Can Do

Directions: Write the steps in Setting up printer sharing is simple with Windows XP.
1. __________________________________________

2. __________________________________________

3. __________________________________________

4. __________________________________________

5. __________________________________________

6. __________________________________________

Assessment

Essay Writing
Direction: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.
.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

24
Additional Activities

Share a Folder, Share a Printer, and Set Share Permissions


Directions: In this activity, you will create and share a folder, share a printer, and set
permissions for the shares. You will be given 30 minutes to complete the task. You
will be rated based on the performance criteria provided below.
Recommended Equipment
 Two computers running Windows XP Professional that are directly connected
to each other or through a switch or hub.
 A printer installed on one of the two computers.

CRITERIA Excellent Good Fair Poor


4 3 2 1
Safety
Procedures
(15%)
-Applied/Observe
d safety
precautions while
working

Adherence to the
Procedures
(30%) -Followed
the procedures
systematically
Workmanship
(15%) -Had
organized
materials and
tools while
accomplishing
the task and has
time
management

25
Functionality
(40%) -Had set
up a functional
file and printer
sharing system
and was able to
come up with a
printed hard copy
through it

26
Lesson

3 Safety Precautions

What I Need to Know

This module will teach the students to learn the safety and precautions by
setting activities or guidelines for inspection and testing the computer systems and
networks.
The module outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in the
workplace which the students will understand very well the importance of its
procedure:
 Follow Occupational Health and Safety (OHS) Procedures in Testing Systems
and networks.
 Test computer systems and networks in accordance with the job
requirements.
 Accomplish technical reports on the tests conducted.

27
What I Know

Direction: Write TRUE if the statement is correct and FALSE if not.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

28
What Is It

Common hazards encounter by computer technicians and users


A hazard is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment. The situation could
involve a task , chemical or equipment used. Hazard management is a continuous
process that can be used to improve the health and safety of all workplaces.
Physical Hazards
One of the most common physical hazards involving computer technicians is
cables running across the floor. If someone trips ,falls, and hurts himself because of
a cable you can across the floor, someone(you, your employer, or your customer)
has a serious legal negligence problem. If you need to temporarily run a cable
across the floor, place a danger sign similar to those “wet floor” signs used by
cleaning services.
Mechanical Hazards
When working on electric equipment, ask yourself “is there anyway this
equipment could hurt me?”. You might stick your hand in a computer and suddenly
the paper feed arm moves, feeding, but a piece of your finger too.

Safety precautions when using a ladder: encountered


29
1. Read the labels on the ladder, and follow any safety instructions
written on it.
2. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
3. Make sure that people in the area know you will be working there.
4. Cordon off the area with caution tape or safety cones.
5. When you are using a ladder that leans up against a wall, follow the
instructions written on the ladder, and have someone hold the ladder
to help keep it steady.
Occupational Health and Safety is planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks.
Occupational Health and Safety is also referring to the policies, procedures and
activities that aim to protect the health safety and welfare of a people at the
workplace.
Occupational Health and Safety standards Each student has a responsibility to
their colleagues and their organization to report and act upon any potential
workplace hazard. Students need to be aware of the type
of hazards that are possibly present in their work environment .
Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all persons in the computer and
technology industries. You must identify the hazards where you are working and
decide how dangerous they are. Eliminate the hazard or modify the risk that it
presents.

Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from
harm.
4. If the hazard can be easily and safely cleared, then do so. If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal
etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards

30
All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.

What’s More

A. How to make Accident Reports


Forms are used to give specific details with regards to accidents that happened in
the laboratory during experiments.
Accident reports contain the following details :
 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents

Accident Report Sample Form

31
B. Directions: Identify the type of hazards. Match column A with B.
Write only the letter of each correct answer on a separate
sheet of paper.

Column A Column B

1. cables running across the floor 1. mechanical hazard

2. hot components or sharp edges of 2. physical hazard


computers
3. inkjet printer cartridge 3. electric shock hazards

4.Exposed power cable 4.chemical hazards

5.open casing of computer 5. CRT monitor high voltage hazard

What I Have Learned

Personal Safety While Working with PCs

Computer equipment can be dangerous, and you or others can be injured or even
killed if you don’t follow proper safety guidelines when working along with PCs. The
following are some precautionary measures to take before working with any
computer equipment:

Directions: Write your answers on the space provided.

1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

32
What I Can Do

A. Direction: Enumerate some precautionary measures to take before working


on . any other computer
1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________
B. Assess the Risk
What are the two main things should the person in charge or responsible for safety
consider when assessing the risk?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Assessment

Direction: Write T if the statement is correct and F if it is incorrect.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.

33
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14. Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

Additional Activities

Direction: Explain the different example of safety precaution. (5points each)


1. Occupational Health and Safety (OHS) Policy
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

2. Occupational safety and health


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

3. Occupational Health and Safety standards


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

34
Lesson Guidelines for Testing
4 Computer Systems and
Networks

What I Need to Know

Is your PC healthy? Don’t be too sure . think back to when you heard kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
internet connection was down.
The best way to find out what is wrong is to take proactive approach. Check
under the PC’s hood with the following mostly free diagnostic tools, and see if
anything is a miss before disaster strikes.

What I Know

Multiple Choice
Direction: Choose the best answer and write it in a separate sheet of paper.( ½
lengthwise)
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3.What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes

35
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9. What is the size of source and destination IP address in IP header?
a. 4 Bits c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analyzing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering

36
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask

What’s In

You have learned from the previous lesson about precautionary measures
before working on any other computer. Now you must be able to know the guidelines
in testing computer systems and network I accordance with the job requirements.
Good luck and enjoy

What’s New

The best way to find out what’s wrong with the computer is to take proactive
approach: Check under your PC’s hood with the following mostly free diagnostic
tools and see if anything is a miss before disaster.
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.

37
What Is It

GUIDELINES FOR TESTING CONFIGURED COMPUTER SYSTEM AND


NETWORK

Testing Your Computer Network


You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished:
You must verify that the network works as expected. Here are a few simple tests you
can conduct to make sure your network is functional:

 Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer. You must
check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection
problem — most likely a bad cable.
 Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.

38
 Check the network configuration. Click the Start button, type cmd and
press Enter. Then, enter the command ipconfig /all and press Enter. This
command will spit out numerous lines of information. The line you're looking
for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125
(Preferred) If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your DHCP
server is working.
 Verify that the computers can ping each other. Another basic test you
should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another. Do several
ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host.
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if your file
server is named FileServer01, use the command ping File Server

What’s More

Activity 1.

Writing a Technical Report on Test Conducted

Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following
format for a technical report for your recently conducted test.

39
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________ Date of
Inspection: __________________ Time: _________________

Device Tested:

Specification:

Diagnosis:

Action Taken:

Remarks:

40
Activity 2.

Testing the Wireless NIC


Directions: In this activity, you will check the status of your wireless connection,
investigate the availability of wireless networks, and test connectivity. After
accomplishing the task you need to write a technical report regarding the test
conducted.
Recommended Equipment
1. A computer with Windows XP Professional installed  A wireless NIC
installed  An Ethernet NIC installed  Linksys WRT300N Wireless
Router  Internet connectivity Step 1
2. Disconnect the Ethernet patch cable from your computer.  A red “X”
appears over the “Local Area Connection” icon.
3. Hover over the “Wireless Network Connection” icon in the tray.
4. Open a command window.
5. Ping 127.0.0.1.
6. Use the ipconfig command.
7. Get IP address of the default gateway
8. Ping the default gateway.
9. A successful ping indicates that there is a connection between the
computer and the default gateway
10. Open a web browser.
11. Type www.google.com in the “Address” field, and then press Return
12. Open the Network Connections window
13. Right-click the wireless connection and choose Properties.
14. Click the Wireless Networks tab
15. Click the View Wireless Networks button

What I Have Learned

In order for computers to network, what are the things you are going to set or
configure? Write your answer on the space provided below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________

41
What I Can Do

Direction: Give the steps in configuring systems and network.

1.________________________________________________
2.________________________________________________
3.________________________________________________
4.________________________________________________
5.________________________________________________

Assessment

Multiple Choice
Direction: Write your answers in a separate sheet of paper (½ lengthwise).
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3. What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits

42
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9.What is the size of source and destination IP address in IP header?
a. 4 Bit s c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analysing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32

43
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask

Additional Activities

ACRONYMS

Direction: Give the complete meaning of the following acronyms.


1. UTP ________________________________________________________
2. STP ________________________________________________________
3. IP __________________________________________________________
4. TCP /IP _____________________________________________________
5. HTTP _______________________________________________________
6. FTP ________________________________________________________
7. SSH ________________________________________________________
8. IMAP _______________________________________________________
9. SMTP ______________________________________________________
10. DHCP ______________________________________________________
11. DNS _______________________________________________________
12. TTL ________________________________________________________
13. LAN________________________________________________________
14. VPN _______________________________________________________
15. NIC________________________________________________________

Post-Test 44
Multiple Choice
Directions: Encircle the letter of the correct answer.
1. Which of the following is correct regarding Class B Address of IP address?
a. Network bit-14,Host bit-16 c. Network bit-18,Host bit-16
b. Network bit-16,Host bit-14 d. Network bit-12,Host bit-14
2. What is the use of Bridge in Network?
a. To connect LANS c. to control Network Speed
b. to separate LANS d. All of the above
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Network congestion occurs
a. In case of traffic overloading
b. When systems Terminates
c. When connection between two nodes terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and maintenance
category?

a. Administrative tool c. Power Options


b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision, hearing and
mobility needs?

a. Accessibility Option c. Sounds, speech and audio


b. Security Center d. User Accounts
7. What is the benefit of the Networking?
a. File Sharing c. Easier Backups
b. Easier access to resources d. All of the above
8. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
45
9. ADSL is the abbreviation of
a. Asymmetric Dual Subscriber Line
b. Asymmetric Digital System Line
c. Asymmetric Dual System Line
d. Asymmetric Digital Subscriber Line
10. What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. Bridge works in which layer of the OSI model?
a. Application layer c. Network layer
b. Transport layer d. Datalink layer
15. Which data communication method is used to transmit the data over a serial
communication link?

a. Simplex c. Full duplex


b. Half-duplex d. all of the above

46
Answer Key

Lesson 5. Network Security

Assessment What I
What's More Know
1. H
2. E 3. start 1. H
3. G 4. Network 2. E
4. B 5. next 3. G
5. A 6. WEP 4. B
6. F 7. Next 5. A
7. I 8. Change 6. F
8. L connecti 7. I
9. C on 8. L
10.D 9. Security 9. C
10.okay
10.D

Lesson 6. File Printer


Sharing

Assessment What's More What I Know

Answers will be Answers will be Answers will be


assessed using a rubric assessed using a rubric assessed using a rubric

47
2. F
1. F 3. T
2. F 4. T
3. T 5. T
4. T 6. F
5. T 7. T
Lesson
6. F 7. Safety Precautions
8. T
7. T Teacher or 9. T
8. T facilitator’s 10. T
9. T discretion to rate 11. T
10. T the output of the 12. F
11. T students 13. T
12. F 14. T
13. T 15. T
14. T
15. T

Assessment

1.A
2.C
3.C
4.C
5.D
Lesson 8. Guidelines in Computer Systems and Network
6.B
7.B
Teacher or 8.C
What I know facilitator’s 9.D
1. A discretion to rate 10.C
2. C the output of the 11.B
3. C students 12.C
4. C 13.A
5. D 14.B
6. B 15.A
7. B
8. C
9. D
10. C
11. B
12. C
13. A
14. B
15. A

48
34. B 17. C
35. C 18. C
36. D 19. C
37. D 20. D
38. A 21. B
39. D 22. B
PRE-TEST
40. C AND POST TEST 23. C
41. B 24. D
42. C 25. C
43. B 26. B
44. D 27. C
45. A 28. A
46. B 29. B
47. A 30. A

49
References
Books and Articles and Printed Materials:

Rosalie P. Lucero et al, Basic Education Curriculum, Technology and


Livelihood Education Grade 10 “Computer Hardware Servicing” Learners
Materials

Electronic Resources:

“Ping Tim Fisher” Retrieved from


http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htm-

“Puzzles for Activities” Retrieved from


http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp

“System Configuration utility” Retrieved from


http://moderncomputerskillsandtraining.com/?page_id=2950-

“Turn On the Windows Firewall” Retrieved from http://windows.microsoft.com/en-


ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7

“Windows Registry” Retrieved from


http://pcsupport.about.com/od/termsr/p/registrywindows.htm--
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf

“Occupational Safety Precautions” Retrieved from

“peer to peer networking” Retrieved from


http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en
&docname=bph05694-

“Ping Tim Fisher” Retrieved from


http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htm-

“Puzzles for Activities” Retrieved from


http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp

“System Configuration utility” Retrieved from


http://moderncomputerskillsandtraining.com/?page_id=2950-

50
“Turn On the Windows Firewall” Retrieved from http://windows.microsoft.com/en-
ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7

“Windows Registry” Retrieved from


http://pcsupport.about.com/od/termsr/p/registrywindows.htm--
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf

51
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

DepEd Division of Bukidnon


Fortich Street, Sumpong, Malaybalay City

Telefax: (088)813-3634

Email Address: [email protected]


Website: depedbukidnon.net.ph

You might also like