Quarter 3 g10 Css
Quarter 3 g10 Css
Quarter 3 g10 Css
Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3
Configuring Computer System and
Network
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for the exploitation of such work for a
profit. Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., pictures, photos, brand names, trademarks, and etc.)
included in this module are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over
them.
Management Team:
Chairperson: Arturo B. Bayocot, PhD, CESO III
Regional Director
POST TEST 46
ANSWER KEYS 47
REFERENCES 48
What This Module Is All About
Introductory Message
In addition to the material in the main text, you will also see this box in the
body of the module:
In response to the need for today’s challenging new normal way of living due
to pandemic, the Grade 10 TLE (ICT) Module 1 Quarter 3 is the first book uniquely
designed to achieve the goals set by the Department of Education. It is expected that
with the use of the modern technologies that we have, millennial teachers are
expected to be more innovative, creative, resilient and with good communication
skills.
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
This module is designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled
to process the contents of the learning resource while being an active learner.
What I Need to Know This will give you an idea of the skills or
competencies that you are expected to learn
from the module.
This module will allow the students to learn the Network security to the
computer system. Enabling the network security of the computer system by
understanding of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer network and
network-accessible resources.
This will define the Network Security and its different types what is suitable for
installations to enable it to the computer system.
The students will learn on how to configure of file and printer sharing as one
of the most effective ways to manage computer settings as a network administrator.
The File and Printer Sharing setting needs to be enabled in your work-sharing
network domain before you can use network printers or transfer files between
computers operating system feature that enables the computer to communicate to
each other and send print jobs to your printer. All computers should be part of the
main network and the same Workgroup or Homegroup for File and Printer Sharing to
work properly. The students will understand 1 the terms “File Sharing” and “Printer
Sharing.”
The students will learn the steps in configuring a file sharing and printer sharing.
This module is designed to teach the students to learn the safety and
precautions by setting activities or guidelines for inspection and testing the computer
systems and networks.
It outlines the potential health risks and provides an implementing policy
statement that is maintaining the required level of health and safety in the workplace
which the students will understand very well the importance of its procedure:
Multiple Choice
15. Which data communication method is used to transmit the data over a serial
communication link?
3
a. Simplex c. Full duplex
b. Half-duplex d. all of the above
Lesson
1 Network Security
What I Know
Direction: Match the meanings in column A with the terms in column B to identify
the term/word being described.
5
A B
1) attached to small pieces of
computer code, software and a. accidental threats
documents.
b. antivirus software
2) when an employee intends to c. data encryption
cause damage
d. firewall
3) it is technical a worm
e. malicious threats
4) Software designed to detect, f. traffic
disable and remove viruses
g. trojan horse
5) when user damages data or h. virus
equipment unintentionally
i. VPN
6) data being transported on a
network j. WPA
7) an encryption system that
k. WEP
protects data
8) a self-replicating program that is l. Worm
harmful to network
9) it involves using codes and
ciphers
10) a way of protecting a
computer from intrusion through
the ports
6
What’s In
What’s New
Computer and network security help keep data and equipment safe by giving
only the appropriate people access. Everyone in an organization should give high
priority to security, because everyone can be affected by a breach in security.
An attack that intentionally degrades the performance of a computer or
network can also harm an organization’s productivity. Poorly implemented security
measures that allow unauthorized access to wireless network devices demonstrate
that physical connectivity is not necessary for security breaches by intruders.
What Is It
Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
security.html
7
Security Attacks
Physical:
Events or attacks that steal, damage, or destroy such ---
equipment as servers, switches, and wiring.
Data:
Events or attacks that remove, corrupt, deny access to, allow access
to, or steal information.
Threats to security can come from inside or outside an organization, and the level
of potential damage can vary greatly. Potential threats include the following:
Internal: Employees who have access to data, equipment, and the
network. Internal attacks can be characterized as follows:
o Malicious threats are when an employee intends to cause damage.
o Accidental threats are when the user damages data or equipment
unintentionally.
External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be characterized as
follows:
o Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed
to vandalize.
o Structured attacks, which use code to access operating systems
and software.
Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are constantly
changing as attackers find new ways to gain entry and commit their crimes.
8
Types of Computer Threats
Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
securoty.html
Viruses, Worms, and Trojan Horses
A virus is attached to small pieces of computer code, software, or document. The
virus executes when the software is run on a computer. If the virus spreads to other
computers, those computers could continue to spread the virus. A virus is transferred
to another computer through e-mail, file transfers, and instant messaging. The virus
hides by attaching itself to a file on the computer. When the file is accessed, the
virus executes and infects the computer. A virus has the potential to corrupt or even
delete files on your
A worm is a self-replicating program that is harmful to networks. A worm uses the
network to duplicate its code to the hosts on a network, often without any user
intervention.
A Trojan horse technically is a worm. It does not need to be attached to other
software. Instead, a Trojan threat is hidden in software that appears to do one thing,
and yet behind the scenes it does another.
Security Procedures
9
Regular testing provides details of any possible weaknesses in the current
security plan that should be addressed. A network has multiple layers of security,
including physical, wireless, and data.
Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software
Data Encryption
Encrypting data involves using codes10and ciphers. Data encryption can help
prevent attackers from monitoring or recording traffic between resources and
computers. A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of protecting a
computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured. Data
being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
1. Click Start Button then choose Control Panel
2. Click the Network and Internet Connections option.
3. Then click the Network Connections option.
4. Double click the icon labeled “Local Area Connection”. The icon may have
a number after it, for example “Local Area Connection 5” Click on
Properties button.
5. On the “Advance “ tab select “Protect my computer and network by limiting
or preventing access to this computer from the Internet.
6. Click Settings, then on the ICMP tab select “Allow incoming echo request”.
Enabling Windows 7 Firewall
1. Open Windows Firewall by clicking the Start button, and then click Control
Panel. In the search box, type firewall, and then click Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you want
to help protect, and then click OK.
If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box.
12
What’s More
13
Step 2
14
What I Have Learned
Direction: Fill in the blank with the word that make the statement correct .
1. Computer and _____________ help keep data and equipment safe by
giving only the appropriate people access.
2. A___________ primary responsibilities include data and network security.
3. Computer _________ are created with malicious intent and sent by
attackers
4. A_______ is transferred to another computer through e-mail, file transfers,
and instant messaging.
5. Security plan policies should be constantly updated to reflect the latest
_________ to a network
What I Can Do
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local store to
gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls. Based on your
research, complete the table below
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features
2. Which hardware firewall would you purchase? List reasons for your choice.
3. Using the Internet, research two different software firewalls. Based on your
research, complete the table below.
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features
4. Which software firewall would you purchase? List reasons for your choice.
15
Assessment
A B
1. attached to small pieces of
computer code, software and a. accidental threats
documents.
b. antivirus software
2. when an employee intends to c. data encryption
cause damage
d. firewall
3. it is technical a worm
e. malicious threats
f. traffic
4. Software designed to detect,
disable and remove viruses g. trojan horse
h. virus
5. when user damages data or
equipment unintentionally i. VPN
6. data being transported on a j. WPA
network
7. an encryption system that k. WEP
protects data l. Worm
8. a self-replicating program
that is harmful to network
9. it involves using codes and
ciphers
10. a way of protecting a
computer from intrusion
through the ports
16
Additional Activities
Advantages Disadvantages
1.
2.
3.
4.
5.
17
C. Acrostic
Direction: Give the meaning of the acronyms given below:
1. VPN- ____________________________________________
2. SSID- ____________________________________________
3. WEP- ____________________________________________
4. WPA- ____________________________________________
5. WTLS- __________________________________________
Lesson 18
What I Know
Essay Writing
Directions: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
19
What’s In
What’s New
You have already leraned from the past lesson about computer network and
security. Now you are going to learn how to share files using a computer and a
printer.
File sharing can be done using several methods. The most common method
techniques include the following:
20
What Is It
21
Sharing Resources and Accessing Shared Resources
1) Open My Computer, double-click the C: drive, and create a new folder on the
C: drive. Name it Shared. Right-click the Shared folder and select Properties.
2) In the Shared Properties dialog box, select the Sharing tab.
3) Notice that the Select the Share This Folder button.
4) Type the Share Name. Click Apply and the computer you are linked to should
be able to view your Shared folder.
5) Right-click My Network Places, which should be located on your desktop.
Select Properties.
6) Right-click your connection (look for a name like Local Area Connection) and
again select Properties.
7) In your Local Area Connection Properties dialog box, select File and Print
Sharing for Microsoft Networks and click OK. If you don’t see an option for
File and Print Sharing, click Install and select a service and then click Add.
Now select the File and Print Sharing option.
8) Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window. In the main
(right-hand) pane, you should see one or more options. Double-click the
Microsoft Windows Network icon.
9) You’re now at the main network screen, where you should see what’s called a
workgroup. A workgroup is a basic group of computers connected to the same
Ethernet network. Double-click the workgroup to see all the computers
connected to your Ethernet network.
Printer Sharing
One of the primary reasons that networks were developed was to allow
groups of computer users to share peripheral devices such as printer. Sharing a
single printer among a group of users costs much less than buying a printer for each
computer.
Setting up printer sharing is simple with Windows XP. The following steps
enable a computer to share a printer:
All the computers that use the shared printer must have the correct drivers
installed. Drivers for other operating systems can be installed on the print server. To
connect to the printer from another computer on the network, choose Start > Printers
and Faxes > Add Printer. The Add Printer Wizard appears. Follow the steps using
the wizard
22
What’s More
Advantages Disadvantages
Directions What is the importance and use of file and printer sharing? Give at least
5 sentences.
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
23
What I Can Do
Directions: Write the steps in Setting up printer sharing is simple with Windows XP.
1. __________________________________________
2. __________________________________________
3. __________________________________________
4. __________________________________________
5. __________________________________________
6. __________________________________________
Assessment
Essay Writing
Direction: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.
.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
24
Additional Activities
Adherence to the
Procedures
(30%) -Followed
the procedures
systematically
Workmanship
(15%) -Had
organized
materials and
tools while
accomplishing
the task and has
time
management
25
Functionality
(40%) -Had set
up a functional
file and printer
sharing system
and was able to
come up with a
printed hard copy
through it
26
Lesson
3 Safety Precautions
This module will teach the students to learn the safety and precautions by
setting activities or guidelines for inspection and testing the computer systems and
networks.
The module outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in the
workplace which the students will understand very well the importance of its
procedure:
Follow Occupational Health and Safety (OHS) Procedures in Testing Systems
and networks.
Test computer systems and networks in accordance with the job
requirements.
Accomplish technical reports on the tests conducted.
27
What I Know
28
What Is It
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from
harm.
4. If the hazard can be easily and safely cleared, then do so. If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal
etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards
30
All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.
What’s More
31
B. Directions: Identify the type of hazards. Match column A with B.
Write only the letter of each correct answer on a separate
sheet of paper.
Column A Column B
Computer equipment can be dangerous, and you or others can be injured or even
killed if you don’t follow proper safety guidelines when working along with PCs. The
following are some precautionary measures to take before working with any
computer equipment:
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________
32
What I Can Do
Assessment
33
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14. Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.
Additional Activities
34
Lesson Guidelines for Testing
4 Computer Systems and
Networks
Is your PC healthy? Don’t be too sure . think back to when you heard kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
internet connection was down.
The best way to find out what is wrong is to take proactive approach. Check
under the PC’s hood with the following mostly free diagnostic tools, and see if
anything is a miss before disaster strikes.
What I Know
Multiple Choice
Direction: Choose the best answer and write it in a separate sheet of paper.( ½
lengthwise)
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3.What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
35
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9. What is the size of source and destination IP address in IP header?
a. 4 Bits c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analyzing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
36
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
What’s In
You have learned from the previous lesson about precautionary measures
before working on any other computer. Now you must be able to know the guidelines
in testing computer systems and network I accordance with the job requirements.
Good luck and enjoy
What’s New
The best way to find out what’s wrong with the computer is to take proactive
approach: Check under your PC’s hood with the following mostly free diagnostic
tools and see if anything is a miss before disaster.
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.
37
What Is It
Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer. You must
check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection
problem — most likely a bad cable.
Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.
38
Check the network configuration. Click the Start button, type cmd and
press Enter. Then, enter the command ipconfig /all and press Enter. This
command will spit out numerous lines of information. The line you're looking
for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125
(Preferred) If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your DHCP
server is working.
Verify that the computers can ping each other. Another basic test you
should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another. Do several
ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host.
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if your file
server is named FileServer01, use the command ping File Server
What’s More
Activity 1.
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following
format for a technical report for your recently conducted test.
39
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________ Date of
Inspection: __________________ Time: _________________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
40
Activity 2.
In order for computers to network, what are the things you are going to set or
configure? Write your answer on the space provided below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
41
What I Can Do
1.________________________________________________
2.________________________________________________
3.________________________________________________
4.________________________________________________
5.________________________________________________
Assessment
Multiple Choice
Direction: Write your answers in a separate sheet of paper (½ lengthwise).
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3. What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
42
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9.What is the size of source and destination IP address in IP header?
a. 4 Bit s c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analysing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
43
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
Additional Activities
ACRONYMS
Post-Test 44
Multiple Choice
Directions: Encircle the letter of the correct answer.
1. Which of the following is correct regarding Class B Address of IP address?
a. Network bit-14,Host bit-16 c. Network bit-18,Host bit-16
b. Network bit-16,Host bit-14 d. Network bit-12,Host bit-14
2. What is the use of Bridge in Network?
a. To connect LANS c. to control Network Speed
b. to separate LANS d. All of the above
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Network congestion occurs
a. In case of traffic overloading
b. When systems Terminates
c. When connection between two nodes terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and maintenance
category?
46
Answer Key
Assessment What I
What's More Know
1. H
2. E 3. start 1. H
3. G 4. Network 2. E
4. B 5. next 3. G
5. A 6. WEP 4. B
6. F 7. Next 5. A
7. I 8. Change 6. F
8. L connecti 7. I
9. C on 8. L
10.D 9. Security 9. C
10.okay
10.D
47
2. F
1. F 3. T
2. F 4. T
3. T 5. T
4. T 6. F
5. T 7. T
Lesson
6. F 7. Safety Precautions
8. T
7. T Teacher or 9. T
8. T facilitator’s 10. T
9. T discretion to rate 11. T
10. T the output of the 12. F
11. T students 13. T
12. F 14. T
13. T 15. T
14. T
15. T
Assessment
1.A
2.C
3.C
4.C
5.D
Lesson 8. Guidelines in Computer Systems and Network
6.B
7.B
Teacher or 8.C
What I know facilitator’s 9.D
1. A discretion to rate 10.C
2. C the output of the 11.B
3. C students 12.C
4. C 13.A
5. D 14.B
6. B 15.A
7. B
8. C
9. D
10. C
11. B
12. C
13. A
14. B
15. A
48
34. B 17. C
35. C 18. C
36. D 19. C
37. D 20. D
38. A 21. B
39. D 22. B
PRE-TEST
40. C AND POST TEST 23. C
41. B 24. D
42. C 25. C
43. B 26. B
44. D 27. C
45. A 28. A
46. B 29. B
47. A 30. A
49
References
Books and Articles and Printed Materials:
Electronic Resources:
50
“Turn On the Windows Firewall” Retrieved from http://windows.microsoft.com/en-
ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7
51
For inquiries or feedback, please write or call:
Telefax: (088)813-3634