Professional Documents
Culture Documents
Republic Act 8293, section 176states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Authors:
Rosalie P. Lujero
Teacher III / School ICT Coordinator
Dasmariñas East National High School
Ronaldo V. Ramilo
Education Program Specialist
Division of Tanauan
ii
TABLE OF CONTENTS
iii
Unique Selling Proposition
Process………………………………………………………………………….
Reflect and Understand …………………………………..…………………. 9
Transfer…………………………………………………..……………………. 9
Know …..………………………………………………………….. 9
Generating Ideas for Business 9
Key Concept of Selecting a business Idea
Branding
Process .…………………………………………………………..……………..
Reflect and Understand ...……………………………….…………………….. 10
Transfer ………………………………………………………………………... 10
Feedback ………………………………………………………………………. 10
References ………………………………………………………………….. 10
10
iv
Windows Registry Backup and Recovery 28
v
Accomplishing a Technical Report 66
Summative Test ……………………………………………. 66
Feedback …………………………………………………… 67
References ………………………………………………… 70
vi
Respond to sudden breakdown of computer systems
What to Process………………………………………………. 87
Essay Activity
Critical review
Ways to Improve your computer’s performance
Duplication
What to Reflect / Understand……………………………………. 88
Research and investigate
Slide show presentation
Evaluating your needs
What to Transfer………………………………………………… 90
Role Playing
Video Tutorials
Defragmentation Issue
Online Review
Concept Mapping
How to Scan your Flash Drive
Deleting Temporary Files
Lesson 3. Maintain Network Systems …………………… 95
What to Know………………………………………………… 95
Follow OHS Procedures
Run the burn- in test on computer system
What to Process………………………………………………. 95
Maintain Inspection Checklist
Performing Immediate Burn- in Testing
What to Reflect / Understand……………………………………. 96
Video Tutorial
What to Transfer …………………………………………………. 96
Weekly Maintenance Checklist
Lesson 4. Inspect and Test configured/repaired computer Systems and 97
networks………………………..…
What to Know …………………………………………………… 97
Follow OHS Procedures
Maintain Computer systems and networks to ensure
safe operations
Computer communications
Run or conduct computer to computer
communications
vii
Computer systems and network checked to ensure
safe operation
Prepare Technical reports
What to Process ……………………………………………….. 98
Experiment and Demonstrate
What to Reflect / Understand……………………………………. 103
Video Tutorial
Practicing TCP/IP Networking Skills
Video Tutorial
Computer Item Enumeration
What to Transfer ………………………………………………. 104
Schedule and Techniques in Maintaining Systems
Network Checking
Network Connection Demo
Creating Hardware- Software Tools Report
Summative Test ……………………………………………. 105
Feedback …………………………………………………… 105
References ………………………………………………… 109
What to Transfer………
viii
K to12 BASIC EDUCATION CURRICULUM
Information and Communications Technology
COMPUTER HARDWARE SERVICING
Grade 10
GRADE 10 – MODULE 1
Personal Entrepreneurial Competencies (PECs)
Teachers Guide
Quarter I 4 hrs.
Content Standard
Performance Standard
Learning Competencies
I. Introduction
This teacher’s guide will lead you to effectively and efficiently teach
Module 1. Moreover, this will guide you in determining relevant and appropriate
teaching techniques and strategies that will fit the learning needs and demands of
the learners to make them best understand and appreciate the importance of
1
entrepreneurship and the entrepreneurial competencies related to Computer
Hardware Servicing.
II. Objectives
With your assistance and the guidance of this module, learners are
expected to understand the underlying principles and concepts of PECs,
particularly in:
- identifying areas for improvement, development, and growth,
- aligning learners’ PECs according to their business or career choice, and
- creating a plan of action that ensures success in their business or career
choice.
III. Presentation of Content
Introduction
Guide learners in appreciating and understanding PECs for them to be
successful in business or in the workforce by sharing inspiring real-life
stories of successful businessman and or well-known employees in the field
of Computer Hardware Servicing in the province.
Explain to learners the importance of assessing their PECs.
Guide learners in understanding the importance of entrepreneurs and
entrepreneurship.
Objectives
Guide learners in identifying and understanding the objectives of Module 1.
Pre-Assessment
Use the sample pre-assessment test available in the learners’ materials or
craft a comprehensive teacher-made test to assess learner’s prior
knowledge and skills in PECs.
Evaluate the result of the pre-assessment and prepare a plan of action to
2
strategically address the learning needs and requirements of the learners.
Guide Questions
Have learners actively perform task 2, and let them share their answers and
relevant experiences with the class.
Process learners’ understanding of the guide questions presented on task 2.
3
task 5 (Interview) on page 9-12.
Facilitate appropriate learning activities to finish the task.
Encourage learners to report their accomplishments to the class.
Process learners’ understanding.
Transfer
Assist learners in individually accomplishing task 6 (Preparation of a Plan of
Action) on page 12. Let them craft their own plan of action intelligently. Have
learners present this in class.
Process their understanding.
Guide learners in answering the essential questions presented in task 7 on
page 13.
Have learners share their answers with the class, and then process their
understanding.
Provide learners more concrete example and enrichment activities to further
deepen their understanding about PECs and its importance in day-to-day
living as future entrepreneurs or employees.
Provide learners applicable activities whereby they can transfer to the
community what they have learned.
Let learners use available resources in the community to accomplish the
task.
V – Feedback
1. E 6. B
2. K 7. C
3. H 8. I
4. A 9. D
5. J 10. F
VI – References
4
business-environment--165.php#ixzz1PVjUuaWu
4. http://www.thetimes100.co.uk/theory/theory--constraints--
421.php#ixzz1PVki8a36
5. http://www.thetimes100.co.uk/theory/theory--constraints-on-production--
303.php#ixzz1PVkyDy8k
6. http://www.thetimes100.co.uk/theory/theory--production-and-resource-
requirements--354.php#ixzz1PVlGG7zv
7. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing--
245.php#ixzz1PVlc88gR
5
K to12 BASIC EDUCATION CURRICULUM
Information and Communications Technology
COMPUTER HARDWARE SERVICING
(SPECIALIZATION)
GRADE 10 – MODULE 2
Environment and Market (EM)
Teachers Guide
Quarter I 4 hrs.
Content Standard
Performance Standard
The learner independently creates a business vicinity map reflective of
potential market in Computer Hardware Servicing in a province.
Learning Competencies
V. Introduction
6
cultural, and social conditions prevailing in an area. Needs and wants of the
people in a certain area that are not met may be considered as business
opportunities. Identifying the needs of the community, its resources, available
raw materials, skills, and appropriate technology can help a new entrepreneur in
seizing a business opportunity.
VI. Objectives
7
environment and market pertaining to Computer Hardware Servicing.
Using your processing and questioning skills, guide learners in coming up
with a generalization about the environment and market and its
relationship to a successful field of Computer Hardware Servicing.
Objectives
Guide learners in identifying and understanding the objectives of this
module.
Pre-assessment
Use the sample pre-assessment test available in the learner’s materials
or craft a comprehensive teacher-made test to assess learner’s prior
knowledge and skills in environment and market.
Evaluate the result of the pre-assessment and prepare a plan of action to
strategically address the learning needs and requirements of the
learners.
Guide Questions
Ask learners to perform task 2 and guide them in presenting their
answers to the class.
Process learners’ responses and guide them in making appropriate
generalizations.
Learning Goals and Target
Help learners in planning their own learning goals and target as reflected
on page 18.
Provide enrichment activities and guide them in analyzing available
resources and technology in the community to be used in accomplishing
their learning goals and targets.
9
for business, selecting a business idea, and branding.
Let learners undergo varied levels of learning activities to better
appreciate the importance of generating ideas for business, selecting
a business idea, and branding.
Process learners’ understanding relative to the objectives of this
module.
Process
Lead learners in reflecting on their SWOT Analysis and its importance
in generating business ideas by engaging them in learning
opportunities for interaction with others outside the classroom and
with the use of technology.
Instruct learners to enrich their knowledge on SWOT Analysis by
conducting researches.
Provide an appropriate type of assessment to evaluate learners’
understanding of the SWOT Analysis. Use the result of the
assessment to craft more appropriate and productive learning
activities.
Assist learners in performing task 6 (SWOT Analysis).
Evaluate / Assess learners’ output and check it against the objectives
of this module.
Reflect and Understand
Let learners work on an independent learning activity or cooperative
learning (ICL) in accomplishing task 7 (Extra Readings and Video
Viewing) on page 33.
Assist learners in presenting their output. Assess the evidence of
learning and provide useful input to improve their output.
Transfer
Have learners prepare task 8 (Designing a Logo). Assist learners in
accomplishing this task by letting them adhere to their real life
experience.
Assess learners’ output using teacher-made rubrics following the
standards and objectives of this module.
Have learners prepare task 9 (Making My Own Vicinity Map). Guide
learners in creating their own vicinity map reflective of potential
market in computer technician in your province. Ask them to present
their output and process their understanding by asking relevant and
essential questions.
10
Assess learners’ output using teacher-made rubrics following the
standards and objectives of this module.
Assess learners’ output using teacher-made rubrics following the
standards and objectives of this module.
V – Feedback
6. D 6. D
7. C 7. B
8. A 8. C
9. B 9. D
10. A 10. D
VI – References
11
K to12 BASIC EDUCATION CURRICULUM
Information and Communications Technology
COMPUTER HARDWARE SERVICING
(SPECIALIZATION)
Module 3
Configuring computer systems and network
Quarter 1-2 60 hrs
Content Standard
Performance Standard
I - Introduction
12
II - Learning Competencies
13
III – Pre / Post Assessment
a. Ipconfig c. msconfig
b. regedit d. dxdiag
14
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most
commonly used?
15
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address classes does 192.168.1.105
belong?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
A B
1. Copper cabling used for a. Crimping tool
telephone communication b. Cross- over
2. Standard Ethernet cable c. Fiber- optic
3. Cable that has a very thin d. Ipconfig
core e. Multi- mode
4. Cable that has a thicker core f. Ping
5. Tool used for crimping RJ45 g. Protocol
6. Connector for Cat 5e cable h. RJ45
7. Set of rules i. Single- mode
8. Indicates the network portion j. Straight through
of an IP address k. Subnet mask
9. Command used find out the l. Twisted pair
IP address
10. Glass or plastic conductor
16
Test IV. ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
Configuration Skills
Directions: Below is a matrix containing the most important skills that one
must have to configure computer systems and networks successfully. Check
(∕) the appropriate column which describes the level of your confidence in
performing the given tasks.
17
5. I can assign and
configure IP address
6. I can execute the
ipconfig command
properly
7. I can manage to create
a peer to peer
networking
8. I can configure Network
Interface Card using
DHCP
9. I can enable firewall
10. I can configure file
and printer sharing
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
What to KNOW
1.1- Safety Procedures
Guide the learners in understanding safety procedures and general
safety guidelines
Let learners understand the fire safety guidelines.
18
1.2- Prepare Tools Used for Configuration
Guide learners in preparing tools used for configuration.
Let learners be acquainted and familiarize the different tools used for
configuration.
What to PROCESS
1.1- Safety Procedures
Guide learners in performing a peer to peer activity on page 45.
Instruct the students to get a partner in order to perform the said
activity.
Explain the general directions and show example evidences and
picture for a certain circumstances of the activity.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
True
19
performing
services, one must
unplug the power
from the source.
3. It is a best practice
that a fire
extinguisher and
first aid kit must be
available in the
workplace.
4. You are allowed to
open the power
supply or a monitor.
1. Event Viewer
2. Safe Boot
3. List of services that start when computer boots
4. Make all boot settings permanent
5. Normal startup
6. No GUI Boot
7. OS Boot information
8. Hide All Microsoft Services
9. Convenient List of Diagnostic Tools
10. Base Video
20
II. Applet Grouping
Directions: Complete the diagram of various Control Panel Applets with the
components included in their category.
21
Video Documentation of Computer Laboratory Safety Precautions
Excellent (86-
Criteria Poor (70-75) Good (76-85)
100)
Content/Informatio The provided The provided The provided
n (50%) information was information information was
not necessary was, for the necessary and
Technically sound or not sufficient
most part, sufficient to the
information to the computer necessary and computer
Coherence of
laboratory sufficient to the laboratory
information
safety computer safety
precautions. laboratory precautions.
safety
precautions.
Quality of Video It lacks clarity Most part is The video was
(30%) and/or does not well organized, well organized,
Clarity and present ideas in clear and clear and
cohesiveness of a coherent way. presents ideas presents ideas
the video in a coherent in a coherent
Organization and way. way.
coherence of
ideas
22
Task: Research and Explore
Directions: Conduct a research that identifies other available tools used for
computer system and network configuration. Use some other resources like
the World Wide Web and interview a practitioner preferably an IT specialist or
a computer technician to find out the different tools they use for configuration.
Your research will be rated according to the following rubrics:
23
discuss these most part, necessary
these issues. necessary and
issues. and sufficient to
sufficient to discuss
discuss these
these issues.
issues.
Quality of The essay The essay The essay The essay
Writing (25%) was not was well was well was well
well written, written for written for written from
Clarity and and some part, the most start to
cohesiveness contains without part, finish,
of sentences
many spelling, without without
and paragraphs
No errors in
spelling grammar or spelling, spelling,
spelling, errors, use of grammar or grammar or
grammar and and/or English use of use of
use of English grammar errors. English English
Organization errors The essay errors. errors.
and coherence and/or use is for some The essay The essay
of ideas
of English part well is for the was well
errors. organized, most part organized,
It lacks clear and well clear and
clarity presents organized, presents
and/or does ideas in a clear and ideas in a
not present coherent presents coherent
ideas in a way. ideas in a way.
coherent coherent
way. way.
References References Some of Most of the All of the
(10%) were not the references references
appropriatel references were were
Soundness of y used and were appropriatel appropriatel
references cited. appropriatel y used and y used and
y used and cited. cited.
cited.
24
1.3- Procedures in Using Computer System Configuration Tools
The teacher shall craft different tasks to enrich learners understanding
on the procedures of using different computer system configuration
tools.
The teacher may assign learners to apply the result of their research
about different computer system configuration tools through a
demonstration.
What to TRANSFER
1.1- Safety Procedures
Let learners showcase their understanding on safety procedures
through a role playing using the collected and collaborated information
gathered from the research and investigation activity.
Rate the learner’s performance using the rubric for role playing
provided on page 47 of Learner’s Material.
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
base on the Rubrics written below:
25
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
AP A
CRITERIA B D P
(80- (90-
(70- 74) (75-79) (85-89)
84) 100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
26
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
27
LESSON2. CONFIGURE COMPUTER SYSTEM AND NETWORK
What to KNOW
Introduce the concept of system configuration to the learners by citing
circumstances related to configuration.
28
2.5- Network Security
Facilitate brain storming activity on the class. The learners must be
engaged in discovering the importance of security in computer system
and network and the different security attacks.
Discuss and demonstrate the different security procedures.
What to PROCESS
2.1- Safety Precautions Related to Networks
The teacher is suggested to craft appropriate activities to process
learners understanding relevant to safety precautions in system and
network configuration.
29
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
Task: Protocols
Direction: In this worksheet, you will write the name of the protocol and the
default port(s) for each protocol definition in the table.
The teacher shall provide several IP address for the task entitled
“Identifying IP address classes”. It must be written in the board or any
visuals available. Give the directions and instruct the learners to
accomplish the worksheet for the said activity.
30
II. Identifying IP Address Classes
Direction: In this worksheet, your teacher will write several IP addresses with
their appropriate subnet masks on the board. You will copy the IP address
and Subnet Mask. You will write which IP Address Class is appropriate in the
IP Address Class column in the chart below. An example has been provided
for you.
Task: Comparison
Direction: Using the table below, cite the features of peer-to-peer and client
/server network that describes their difference.
1.
2.
3.
4.
5.
31
2.5- Network Security
Ask learners to take the short quiz on pages 138-139 of their Learning
Module.
Short Quiz
Test I. Modified true or false
Directions: Write SECURITY if the underlined word on the subsequent
statement makes it true and VIRUS if it is makes the statement a false one
then write the correct term / word to correct it. (2 points each)
1. Computer and network security help keep data and equipment safe.
2. A technician’s secondary responsibilities include data and network
security.
3. Threats to security can come from inside and outside the organization.
4. Computer viruses are created and sent by attackers who have malicious
intent.
5. A virus is transferred to another computer through e-mail, file transfer and
instant messaging.
A B
1. when an employee intends to a. Accidental threats
cause damage b. Antivirus software
2. when user damages data or c. Data encryption
equipment unintentionally d. Firewall
3. attached to small pieces of e. Malicious threats
computer code, software and f. Traffic
documents g. Trojan horse
4. a self-replicating program that is h. Virus
harmful to network i. VPN
5. it is technically a worm j. WPA
6. software designed to detect, k. WEP
disable and remove viruses l. Worm
7. it involves using codes and
ciphers
8. a way of protecting a computer
from intrusion through the ports
9. an encryption system that
protects data
10. data being transported on a
network
32
Test III. Acrostic
Direction: Give the meaning of the acronyms given below:
1. VPN- ________________________________________
2. SSID- ________________________________________
3. WEP- ___________________________________________
4. WPA- ___________________________________________
5. WTLS- __________________________________________
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Advantages Disadvantages
33
What to REFLECT and UNDERSTAND
2.1- Safety Precautions Related to Networks
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
34
Here are the guide questions:
1. What are the different type of fiber connectors and cite their advantages
and disadvantages?
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
35
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
36
Task: Peer-to-peer study
37
discuss these most part, necessary
these issues. necessary and
issues. and sufficient to
sufficient to discuss
discuss these
these issues.
issues.
Quality of The essay The essay The essay The essay
Writing (25%) was not was well was well was well
well written, written for written for written from
Clarity and and some part, the most start to
cohesiveness contains without part, finish,
of sentences
many spelling, without without
and paragraphs
No errors in
spelling grammar or spelling, spelling,
spelling, errors, use of grammar or grammar or
grammar and and/or English use of use of
use of English grammar errors. English English
Organization errors The essay errors. errors.
and coherence and/or use is for some The essay The essay
of ideas
of English part well is for the was well
errors. organized, most part organized,
It lacks clear and well clear and
clarity presents organized, presents
and/or does ideas in a clear and ideas in a
not present coherent presents coherent
ideas in a way. ideas in a way.
coherent coherent
way. way.
References References Some of Most of the All of the
(10%) were not the references references
appropriatel references were were
Soundness of y used and were appropriatel appropriatel
references cited. appropriatel y used and y used and
y used and cited. cited.
cited.
38
Oral Presentation Rubric
AP A
CRITERIA B D P
(80- (90-
(70- 74) (75-79) (85-89)
84) 100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
39
Task: Research Firewalls
Direction: In this activity, you will use the Internet, a newspaper, or a local
store to gather information about hardware and software firewalls.
2. Which hardware firewall would you purchase? List reasons for your
selection.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Software Website Cost Subscription Length Software
Name URL (Month/Year/Lifetime) Features
4. Which software firewall would you purchase? List reasons for your
selection.
40
What to TRANSFER
2.2- Networking Devices, Media and Connector
Guide the learners in creating their own Ethernet cable by stating the
general directions, materials and tools needed and by discussing the
procedures for the said activity.
Inform the learners about the rubrics to be used in order to rate their
performance (rubrics is on page 90).
Materials:
1) 6 meters Ethernet Cable Category 5e or Cat5e- standard wire for
cabling;
2) RJ45 crimpable connectors for Cat5e;
Tools:
3) RJ45 Crimping tool;
4) Wire cutter, stripper or pliers; and
5) Ethernet cable Tester / LAN Tester
You just need to follow the procedures cited in this module and apply
the safety precautions to avoid injury or any unwanted incident. You will be
given 30 minutes to complete the task. You will be rated according to the
performance rubric.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as
shown. The color order is important to get correct.
4. Use scissors to make a straight cut across the wires 1/2 Inch from the
cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
41
6. A view from the top. All the wires are all the way in. There are no short
wires.
7. Crimping The Cable – carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
8. For a standard "Straight Through" cable, repeat all steps and wire color
order on the other end of cable. For a cross-over cable, the other end
will have a different color order as shown by the crossover picture
above.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
42
Quality of Product
(40%)
-produced a fully
functional Ethernet
Cable
Configuration Rubrics
Adherence to the
Procedures (30%)
(The specified job was done
by following the procedures.
Safety measures were
observed during the activity)
Quality of Work (30%)
(The device was configured
properly)
43
Comprehension (10%)
(Interview / Guide questions
were answered correctly
according to the job
requirements)
Recommended Equipment
Linksys 300N router
A Computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into “Port 1” on the back of
the router.
Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click start
Right-click My Network Places, and then choose Properties.
The “Network Connections” window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
44
Activity Questions:
1. What is the name and model number of the NIC in the “Connect
using:” field?(Answers may vary)
2. What are the items listed in the “This connection uses the
following items:” field? (Answers may vary but must include
Internet Protocol (TCP/IP)
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway
listed in the fields of the “Use the following IP address:” area?
Answers may vary. If the computer is configured to obtain an IP
45
address automatically, there will be no information in the fields.
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights on the back of the NIC. These lights will blink when
there is network activity.
Choose Start > Run....
Type cmd and click OK.
46
Type ipconfig/all, and then press the Enter key.
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter
Local Area Network Connection”? Answers may vary.
2. What is the IP address of the DHCP server? Answers may vary.
3. On what date was the Lease Obtained? Answers may vary.
4. On what date does the Lease Expire? Answers may vary.
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the
LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as
an administrator.
Step 2
Choose start > Run…, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
47
Step 3
48
Type “CHS#” in the “Network Name (SSID):” field, where # is the number
assigned by your instructor.
Click Save Settings.
The “Settings are successful” screen appears.
Unplug the Ethernet patch cable from the rear of the computer.
Choose start, and then right-click My Network Places. Choose
Properties.
Double-click the wireless adapter, and then select View Wireless
Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log into the wireless router.
Close Internet Explorer.
49
2.4- Peer-to-Peer and Client/server Network
Let the learners perform the hands- on activity “setting up a peer-to-
peer and client / server network. Rate them according to the
performance indicators provided on page 128.
Hands- on Activity
50
2.5- Network Security
Assist learners in performing the task entitled “Configure Windows XP
Firewall”. Ask them to answer the essential questions along with the
procedures given in the activity.
In order to validate their performance, the teacher must construct a
rubric appropriate to the activity.
Direction: In this laboratory activity you will explore the Windows XP Firewall
and configure some advanced settings. There are essential questions that
you need to answer while performing the activity.
Step 1
Navigate to the Windows XP Firewall:
Start > Control Panel > Security Center
The Firewall indicator shows the status of the firewall. The normal
setting is “ON”.
Step 2
51
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
Step 3
From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
You can add applications to this list. This may be necessary if your
customer has an application that requires outside communications but
for some reason the Windows Firewall cannot perform the
configuration automatically. You must be logged on to this computer as
an administrator to complete this procedure.
52
Essential Question:
Creating too many exceptions in your Programs and Services file
can have negative consequences. Describe a negative consequence of
having too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings. Network Connection
Settings displays the different connections configured for your
computer.
Essential Question:
In the space below, list the services that are available.
___________________________________________________________
___________________________________________________________
___________________________________________________________
Step 5
There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the
network and the Internet.
53
Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
Essential Question:
In the space below, list the requests for information that your computer will
respond to.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
54
Procedures:
Step 1
Choose My Computer > Tools > Folder Options
Click the View tab.
Uncheck the “Use Simple File Sharing (Recommended)” checkbox,
and then click OK.
Step 2
Right-click the desktop, and then choose New > Folder.
Type Example, and then press the Return key.
Open WordPad. Type “This is an example document”.
Save the file in the “Example” folder with the name “Brief.doc”, and then
close WordPad.
Step 3
Right-click the Example folder, and then choose Sharing and
Security
Click the Share this folder radio button, and then click OK.
55
What is the icon of the “Example” folder?
On the computer with the shared folder, right-click My Computer, and
then click the Computer Name tab.
Step 4
On the other computer, choosestart > Run…
Type \\computername\Example, where computer name is the name
of the computer with the “Example” folder, and then press the Enter
key.
Open the “Brief.doc” file.
Delete the text in the “Brief.doc” file, and then choose File > Save.
Click OK. Close WordPad, and then choose NO when prompted to
save changes to the file.
Step 5
Return to the computer with the shared folder.
Right-click Example folder > Sharing and Security, and then click
Permissions.
Step 6
Open the Control Panel on the computer with the attached printer.
Choose Printers and Other Hardware > Printers and Faxes.
Right-click the icon of the installed printer, and then choose Sharing….
Click the Share this printer radio button, and then click OK.
56
Step 7
Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware >
Printers and Faxes.
Choose File > Add Printer on the screen below.
57
The Local or Network Printer of the Add Printer Wizard window
appears. Click the A network printer, or a printer attached to
another computer radio button, and then click Next.
58
Expand “Shared printers”.
Choose the printer from the list, and then click Next.
The “Default Printer” screen of the “Add Printer Wizard” appears.
Click Next.
Step 8
Choose start > Printers and Faxes.
59
Right-click the printer you installed, and then choose Properties.
The “Printer Properties” window appears.
Choose the General Tab, and then click Print Test Page.
Click OK in the confirmation dialog box, and then click OK to close the
printer properties window.
Step 9
To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
60
Performance Rubrics for Sharing Files and Printer
What to KNOW
3.1- Safety Precautions
Let the students be aware of Occupational Health and Safety Policy.
Cite examples and different situations.
61
What to PROCESS
3.1- Safety Precautions
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter.
3.2- Guidelines for Testing Configured Computer System and Network
Teacher shall fabricate variation of activities for this lesson to process
learners understanding on the subject matter.
What to TRANSFER
3.2- Guidelines for Testing Configured Computer System and Network
Guide the students in performing the final task on page 161 entitled
“Test the Wireless NIC”.
Ask learners to accomplish the technical report on page 165 after
performing the final task.
The teacher must construct rubrics to validate the performance of
learners.
Direction: In this activity, you will check the status of your wireless
connection, investigate the availability of wireless networks, and test
connectivity. After accomplishing the task you need to write a technical report
regarding the test conducted.
Recommended Equipment
A computer with Windows XP Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
62
Step 1
63
A successful ping indicates that there is a connection between the
computer and the default gateway.
Step 2
Open a web browser.
Type www.google.com in the “Address” field, and then press Return.
Step 3
64
Click the View Wireless Networks button.
Name of Technician:_______________________________________
Date of Inspection: __________________ Time: _______________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
65
V – Summative Assessment
VI –Feedback
Pre / Post- Assessment
I. True or false
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. True
9. False
10. True
1. C
2. B
3. D
4. A
5. C
6. A
7. C
8. B
9. D
10. A
11. C
12. C
13. C
14. B
15. A
66
III. Matching Type
1. L
2. J
3. I
4. E
5. A
6. H
7. G
8. K
9. D
10. C
IV. Acronyms
67
II. Applet Grouping
Appearance and Themes
1) Display
2) Taskbar & Start Menu
3) Folder Options
Security Center
1) Automatic updates
2) Windows Firewall
3) Internet Options
68
2. VIRUS- PRIMARY
3. SECURITY
4. SECURITY
5. SECURITY
69
Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
70
http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-on-
off#turn-windows-firewall-on-off=windows-7
71
CONTENT STANDARD
The learner demonstrates understanding of the underlying concepts and
principles in maintaining computer and network systems.
PERFORMANCE STANDARD
The learner independently demonstrates skills in computer systems as
prescribed in the TESDA Training Regulations.
LEARNING COMPETENCIES
I. OBJECTIVES
Guided by the teacher and this module the learner is expected to:
72
3. Maintain network systems
Follow OHS procedures in maintaining network systems
Identify procedures in maintaining network systems
Check or run the diagnostic software
Adhere to the recommended schedule and techniques in maintaining
and cleaning network systems
Respond to sudden breakdowns of network systems in accordance
with established procedures
Run the burn-in test on computer systems
II. PRE-ASSESSMENT
I can… YES NO
73
Plan and prepare work to ensure occupational
health and safety (OHS) policies and procedures
are followed
Obtain materials, tools, equipment and testing
devices needed to conform with job requirements
Interpret work instructions according to job
requirements
74
Based on the objectives of the lesson and results of the pre-
assessment, let the learners define their personal goals and targets to be
achieved at the end of this module. Ask the learners to write their
goals/targets on their notebook/ answer sheet.
Discuss the use and relevance of setting goals and targets for the
mini- course.
Assist/Guide learners in accomplishing their goals and targets
using the format provided in the module.
75
Refer to this link http://www.gcflearnfree.org/windowsxp/16/print
Guide the students in designing a systematic monitoring plan for
hardware. Show more samples.
Present other pc cleaning tools in this web
linkhttp://www.tomsguide.com/us/pictures-story/386-pc-cleaning-tools-
utilities.html
What to PROCESS
76
Slide Show Computer and Network Errors
Let the students answer the activity on page 204.
Ask the students to interview computer technicians or hardware
specialists on their immediate community.
Let them have an online research.
Ask the students to present their work using Powerpoint or in manila
paper.
Let the students discuss their work on the class.
Investigate and Interpret: Computer Systems Check
Security
1)Anti-Spyware Programs
2)Anti-Virus
Maintenance
1)System Maintenance
Internet Research
Students will answer pages 215-216.
Guide the students in answering the worksheet. Show examples on
hardware components, their specifications and cost.
Let the students browse online.
Let the students go to the community and ask the computer stores and
shops.
Network Layout
77
Let the students answer the activity on page 221.
Ask the students to bring their drawing materials.
Let them draw a simple schematic layout of one computer connected
to a network system.
Guide them on the requirements needed to setup network connections.
Direction: In a short coupon, students are task to draw a simple schematic
diagram of a computer connected to a network. Label the parts and present
their drawing to the class. Students work will be rated according to the
following criteria:
CRITERIA Excellent Good Fair Poor
4 3 2 1
Adherence to the
proper network
setup (50%)
-drawn the diagram
with right setup
Workmanship
(20%)
-Had organized
materials and tools
while accomplishing
the task and has
time management
Quality of work
(30%)
-the final output is
neat
Pictorial Tour
Investigative Report
Answer activity on page 209.
In this activity, the students may search online about computer
systems status or interview a practitioner lending a service in computer
78
hardware servicing.
Encourage them to make profiling as a source of evidence of their
reports.
Ask the students to make documentations.
79
Critical Review
Answer the activity on page 222.
Let the students create a table of specifications on network hardware.
List brand names and compare.
What to TRANSFER
80
Clarity (Clearly delivered each 30%
diagnosis)
Team work (cooperation of each 10%
member)
Performance Rating
Magazine Article
Answer activity on page 209.
Let the students write an article on the risk about turning off messages
about spyware and virus protection.
Students may base their idea on the interview taken.
Encourage students to ask help from their English teachers in
generating idea.
1. What is the risk of turning off messages about spyware and related
protection?
2. What is the risk of turning off messages about virus protection?
81
Rubrics
Contents Excellent Good Poor(1)
(5) (3)
Computer Specifications
Students will answer activity on page 217.
Make a market scanning and look for business establishments for
computer sales and services. Create a price list of brands and sample
model of computer parts with its price.
Show a sample complete hardware components and their prices.
82
Direction: In this activity, students will draw in a short coupon, layout plan of
a computer café connected to a network. Write the specifications of the
network hardware. Incorporate the following requirements:
1. One computer server
2. 20 client computers
3. One DSL modem
4. UTP cables
5. Hub
PERFORMANCE RATING
83
2.2 Identify faulty computer systems
UNDERSTANDING PARTITIONS
84
Show more videos with regards to the lesson if necessary
Refer to the following links
http://www.bleepingcomputer.com/tutorials/understanding-hard-disk-
partitions/
http://www.pcworld.com/article/185941/how_and_why_to_partition_you
r_hard_drive.html
http://diligent.tripod.com/hd-partn.htm
Scan Disk
http://pcsupport.about.com/od/maintenance/ht/manualtempxp.htm
http://www.computerhope.com/issues/ch000225.htm
http://www.wikihow.com/Delete-Temporary-Internet-Files
http://www.youtube.com/watch?v=_jrCVrMnct8
Disk Cleanup
Discuss lesson on page 271-272.
Define and discuss disk cleanup.
Mention / Infer to the following references
a) http://www.computerhope.com/jargon/d/diskclea.htm
b) http://www.theeldergeek.com/disk_cleanup_utility.htm
c) http://support.microsoft.com/kb/310312
d) http://windows.microsoft.com/en-us/windows/delete-files-using-disk-
cleanup#delete-files-using-disk-cleanup=windows-7
e) http://www.udel.edu/it/help/best-practices/running-disk-cleanup-
windows-computer.html
85
What to PROCESS
2.1 Essay Activity
Let the student answer the activity on page 229.
Let the students write an essay on the importance of data backup
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using the computer.
Then your actions you have taken.
86
Guide the students in doing the scan disk
Let the students demonstrate the process.
Directions: Have five members per group and make a research on the
different cause and effect of data backup, malware maintenance and disk
maintenance. You can also interview / observe a practitioner while lending a
quality service in computer hardware servicing. This event will be presented
orally through a role playing.
87
Afterwards, make a slide presentation and report it to the class.
Before you start, ask yourself the following questions to help you determine
the kind of partitions to create:
Now, that you are done with the disk image, to enlighten your
understanding and knowledge have some more readings about it thru books
and other resources. You should consider the following topics for research:
1. Acronis True Image
2. Norton Ghost Image
3. Other disk Image backup software
2.5.1
1. What are the things that the scan disk could do in a computer? How
often do you scan disk your computer?
2. Computers should be protected from errors to prevent component
malfunction. What anti-static are the things you should do to avoid
such malfunction?
2.5.2
Computer Terminologies
88
Answer the following questions in your notebook. Make an internet
research.
In this activity, you will learn how useful the Internet can be for a PC support
technician.
1. Research the Web site for the importance of Disk Cleanup and
when to apply it.
What to TRANSFER
2.1
The students will have a group activity on pages 230-231.
Guide the students to analyze the given situations and perform the
task required.
Let the students showcase their talents in acting.
Role Playing
89
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full understanding
of the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting
purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with
props and costumes
Cooperation (10%)
-displays teamwork
90
Application on Diagnosis of Faulty Systems
Directions: In this activity, the students will group into three (3) and make an
interview and observation with a practitioner, the group will showcase what
you have learned through a video demo or tutorials. Use your digital cameras
or cell phones. You will be rated base on the Rubrics written below:
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full understanding of
the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with props
and costumes
Cooperation (10%)
-displays teamwork
2.3
Student will answer the activity on page 258.
Let the students perform the activity
Directions: The class will be divided into five (5) groups. Each group has its
own respective leader. The group will perform a task regarding familiarizing
the cleaning components of computer. After the activity they will be graded
using the given Performance Score Card below:
91
PERFORMANCE SCORE CARD
Performance Rating
2.5
Answer activity on page 267.
Guide the students in answering the following activities.
Let the students follow the procedure on scanning flash drives
1. Concept Mapping
In this activity, you will write on the figures the concept which will relate
to the word “scan”. Add more shapes if you want.
92
SCAN
Here's How:
Directions: Pair the students. Let them perform the deleting of temporary
internet files. After the activity they will be graded through the given
Performance Score Card below:
CRITERIA Passed Failed
93
2.5.3
Answer activity on page 274-275.
Let the students perform the activity.
Activity
Directions: You are to delete temporary files in the different Operating
Systems.
1. Delete Temporary Files in Windows 7 and Windows 8
2. Delete Temporary Files in Windows XP
What to KNOW
Maintain Network Systems
Discuss the lesson on pages 276-282.
Educate the students on how to create a simple maintenance schedule
and how to fill-up the checklist.
Teach the students how to perform network maintenance procedure.
Show Teacher’s personal monitoring checklist for the computer
laboratory
Discuss procedures for General Safety
Burn-In Testing
Discuss the lesson on page 283-284.
Demonstrate the burn-in testing procedure.
Follow the step by step process.
What to PROCESS
3.1
Let the students answer the activity on page 282.
Guide the students in filling-up the Maintenance Inspection Checklist
Let the students accomplish the maintenance inspection checklist.
94
Guide them in performing the task. Ask if they have any suggestions.
Accomplish the maintenance inspection checklist below: Put a check mark on
the column which states an action taken.
Video Tutorial
Direction: To deepen your understanding about maintaining networks
system, watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI
and make an outline steps or procedure of the action taken presented or
shown in the video.
What to TRANSFER
Let the students do the activity on page 276.
95
Weekly Maintenance Checklist
Direction: In this activity, you will create a either a daily, weekly or monthly
maintenance checklist for the computer laboratory. Include all the computer
and network hardware. You will be given 30 minutes to complete the task.
Present your output in the class.
What to KNOW
Discuss the lesson on page 290-292.
Share best practices in the maintenance of the computer system and
networks.
4.3 Network Monitoring
96
Present the different Network Monitoring Software Tools.
Demonstrate the Ping Command
4.4 Computer Communications
Discuss the lesson on pages 301-302.
Teach the students on how DSL or cable networks are connected.
Know the connections commonly used in internet connections.
Show the network connections of the computer laboratory
Suggested topics and activities –
http://www.laneye.com/network/how-network-works/computers-in-
network.htm
http://www.laneye.com/network/how-network-works/computers-in-
network.htm
4.5 Run or conduct computer to computer communications
4.7 Prepare technical reports that comply with the job requirements
Discuss the lesson on General Safety Guidelines on page 305.
What to PROCESS
Let the students do the activity on page 293.
Let the student download and explore free network diagnostic tool.
Experiment and Demonstrate
To check the vulnerability or stability of your network connection, go to the
internet and download a free network diagnostic tool.
Go to any search engine and type – network diagnostic tool.
97
After downloading the application, run the setup file of the program and
install it into your computer.
If the program was already installed, run the application. Take note of the
diagnosis. Do some action if there are problems or errors encountered.
98
Set up a DSL or cable connection
99
A modem and router properly plugged in
100
Detailed Technical Reports
101
What to REFLECT and UNDERSTAND
Video Tutorial
Let the students perform the task on page 304.
102
and make an outline steps or procedure of the action taken presented or
shown in the video.
Direction: You are to enumerate the hardware items that can be seen inside
the computer laboratory, applications installed in a computer, network
devices, computer tools and others.
What to TRANSFER
System Restore
After doing so the performed task, students will be assessed using the
following criteria:
Network Checking
Guide the students in doing the activity on pages 300.
Let the students apply the Ping Command in doing the activity.
Direction: In this activity, you will check the network status by using the ping
command. Make a status report on the results.
1. Ping a website
2. Ping the router
103
3. Ping a terminal/computer
CRITERIA 1 2 3 4 5
Total:
104
Guide the students in creating a technical report.
Students are to reveal in their report the hardware, software and tools
available in the computer laboratory.
PERFORMANCE RATING
VI –Feedback
Answer key for Module 4
105
8. L
9. B
10. F
106
Summative Test
Test 1.
1. Tablet PC
2. Server
3. Minicomputer
4. Microcomputer
5. Netbook
6. Desktop computer
7. Digital
8. Mainframe
9. PDA
10. Wearable computer
11. Operating system
12. Input devices
13. Output device
14. Storage devices
15. Firewall
16. WAN
17. Network gateway
18. Network
19. Hub
20. Bridge
Test II
1. True
2. True
3. True
4. True
5. True
6. True
7. True
8. True
9. True
10. True
11. True
12. True
13. False
107
14. True
15. True
Test III.
1. C
2. D
3. A
4. C
5. B
6. B
7. A
8. D
9. C
10. B
Test IV
1. C
2. A
3. P
4. O
5. J
6. E
7. H
8. Q
9. B
10. G
11. D
12. M
13. L
14. I
15. K
Test I
1. Place computer in a well-ventilated area.
2. Schedule the use of computer for its longer life
3. Treat your computer properly
4. Backup your files.
5. Delete temporary files.
108
6. Update antivirus and spyware.
7. Move the computer only when it is turned off and unplugged
8. Install or secure password.
9. Preventive Maintenance
10. Condition Based Maintenance
Test II
1. a
2. b
3. c
4. b
5. c
6. c
7. b
8. b
9. a
10. a
11. a
12. b
13. a
14. c
15. c
16. a
17. a
18. c
19. d
20. d
Test III
1. e
2. c
3. b
4. d
5. a
VII. REFERENCES
Ron Gilster, “PC Repair Bench Book”., Wiley Publishing Inc., 10475
109
Crosspoint Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, “PC Upgrade and Repair Bible, Desktop
Edition”., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis,IN 46256
Electronic Resources:
110
“Computer Hardware Basics”Retrieved from
http://www.youtube.com/watch?v=6N7bqBsFL0w-
http://www.instructables.com/id/Disassemble-a-Computer/-
111