You are on page 1of 193

Sector : ELECTRONICS

Qualification Title: CSS COMPUTER SYSTEMS SERVICING NCII

Unit of Competency: SET UP COMPUTER NETWORKS

Module Title: INSTALLING AND CONFIGURING COMPUTER SYSTEMS


AMICI INITIATI INCORPORATED
3RD FLOOR BDMPC BUILDING
CPG EAST AVENUE TAGBILARAN CITY

Plan
Training
Session

Date Developed: Document No.


Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici Initiati Page ii of vii
Developed by:
SERVICING Flaviano Auxtero Jr Incorporated

Revision #
Date Developed: Document No.
Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici Initiati Page i of vii
Developed by:
SERVICING Flaviano Auxtero Jr Incorporated

Revision #
Data Gathering Instrument for Trainee’s Characteristics
Please answer the following instrument according to the
characteristics described below. Encircle the letter of your choice that best
describes you as a learner. Blank spaces are provided for some data that
need your response.
Name: ROBIN PADILLA
Characteristics of learners

Language, literacy Average grade in: Average grade in:


and numeracy English Math
(LL&N)
a. 95 and above a. 95 and above
b. 90 to 94 b. 90 to 94
c. 85 to 89 c. 85 to 89
d. 80 to 84 d. 80 to 84
a. 75 to 79 e. 75 to 79

Cultural and Ethnicity/culture:


language a. Muslim
background
b. Badjao
c. Others( please specify) Visayan

Education & Highest Educational Attainment:


general a. Junior High School
knowledge
b. Senior High School
Sex a. Male
b. Female
Age Your age: 17
Physical ability 1. Disabilities(if any) NONE
2. Existing Health Conditions (Existing illness
if any)
a. None
b. Asthma
c. Heart disease
d. Anemia
e. Hypertension
Date Developed: Document No.
Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici Initiati Page 2 of vii
Developed by:
SERVICING Flaviano Auxtero Jr Incorporated

Revision #
Characteristics of learners
f. Diabetes
g. Others(please specify)
List down trainings related to Computer
Previous
learning Systems Servicing NC II
experience NONE
___________________________
___________________________
National Certificates acquired and NC level
Training Level
completed NONE
___________________________
Learning styles a. Visual - The visual learner takes mental
pictures of information given, so in order for
this kind of learner to retain information,
oral or written, presentations of new
information must contain diagrams and
drawings, preferably in color. The visual
learner can't concentrate with a lot of
activity around him and will focus better and
learn faster in a quiet study environment.
b. Kinesthetic - described as the students in
the classroom, who have problems sitting
still and who often bounce their legs while
tapping their fingers on the desks. They are
often referred to as hyperactive students
with concentration issues.
c. Auditory- a learner who has the ability to
remember speeches and lectures in detail
but has a hard time with written text.
Having to read long texts is pointless and
will not be retained by the auditory learner
unless it is read aloud.
d. Activist - Learns by having a go
e. Reflector - Learns most from activities where
they can watch, listen and then review what
has happened.
f. Theorist - Learns most when ideas are linked
to existing theories and concepts.
g. Pragmatist - Learns most from learning
activities that are directly relevant to their
Date Developed: Document No.
Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici Initiati Page 3 of vii
Developed by:
SERVICING Flaviano Auxtero Jr Incorporated

Revision #
Characteristics of learners

situation.
a. Financially challenged
Other needs
b. Working student
c. Solo parent
d. Others(please specify) ____________________

Date Developed: Document No.


Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici Initiati Page 4 of vii
Developed by:
SERVICING Flaviano Auxtero Jr Incorporated

Revision #
FORM 1.1 SELF-ASSESSMENT CHECK

INSTRUCTIONS: This Self-Check Instrument will give the trainer necessary


data or information which is essential in planning training
sessions. Please check the appropriate box of your answer
to the questions below.

BASIC COMPETENCIES
CAN I…? YES NO
1. Participate in Workplace Communication
1.1.1 Obtain and convey workplace information 
1.1.2 Complete relevant work related documents 
1.1.3 Participate in workplace meeting and discussion
2. Work in a Team Environment 
2.1.1 Describe and identify team role and 
responsibility in a team
2.1.2 Describe work as a team member 
3. Practice Career Professionalism 
3.1.1 Integrate personal objectives with organizational goals
3.1.2 Set and meet work priorities 
3.1.3 Maintain professional growth and development. 
4. Practice Occupational Health and Safety
4.1.1 Identify hazards and risks 
4.1.2 Evaluate hazard and risks 
4.1.3 Control hazards and risks
4.1.4 Maintain occupational health and safety 
awareness

Note: In making the Self-Check for your Qualification, all required competencies
should be specified. It is therefore required of a Trainer to be well- versed
of the CBC or TR of the program qualification he is teaching.

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 5 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
FORM 1.1 SELF-ASSESSMENT CHECK

INSTRUCTIONS: This Self-Check Instrument will give the trainer necessary


data or information which is essential in planning training
sessions. Please check the appropriate box of your answer
to the questions below.
COMMON COMPETENCIES
CAN I…? YES NO
1. Apply quality standards
1.1 Assess quality of received materials. 
1.2 Assess own work. 
1.3 Engage in quality improvement.
2. Perform computer operations
2.1 Plan and prepare for task to be taken 
undertaken.
2.2 Input data into computer. 
2.3 Access information using computer. 
2.4 Produce output/ data using computer system.
2.5 Use basic functions of a www-browser to locate 
information.
2.1.6 Maintain computer equipment and systems. 
3. Perform mensuration and calculation
3.1 Select measuring instruments. 
3.2 Carry out measurements and calculation. 
3.3 Maintain measuring instruments. 
4. Prepare and interpret technical drawing
4.1 Identify different kinds of technical drawings. 
4.2 Interpret technical drawing. 
4.3 Prepare/make changes to electrical/electronic 
schematics and drawings.
4.4 Store technical drawings and equipment 
/instruments.
5. Use hand tools
5.1 Plan and prepare for tasks to be undertaken. 
5.2 Prepare hand tools. 
5.3 Use appropriate hand tools and test equipment. 
5.4 Maintain hand tools. 
6. Terminate and connect electrical wiring and
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 6 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
COMMON COMPETENCIES
CAN I…? YES NO
electronic circuits
6.1 Plan and prepare for termination/connection of 
electrical wiring/electronics circuits.
6.2 Terminate/connect electrical wiring/electronic 
circuits.
6.3 Test termination/ connections of electrical 
wiring/electronics circuits.
7. Test electronic components
7.1 Determine criteria for testing electronics 
components.
7.2 Plan an approach for component testing. 
7.3 Test components. 
7.4 Evaluate the testing process. 

FORM 1.1 SELF-ASSESSMENT CHECK

INSTRUCTIONS: This Self-Check Instrument will give the trainer necessary


data or information which is essential in planning training
sessions. Please check the appropriate box of your answer
to the questions below.

CORE COMPETENCIES
CAN I…? YES NO
() ()
1. Install and configure computer systems
1.1 Assemble computer hardware. 
1.2 Install operating system and drivers for 
peripherals/ devices.
1.3 Install application software. 
1.4 Conduct testing and documentation. 
2. Set-up Computer Networks
2.1 Install network cables. 
b. Set network configuration. 
c. Set router/Wi-Fi/ wireless access point/repeater 
configuration.
d. Inspect and test the configured computer 
networks.
3. Set-up Computer Servers
3.1 Set-up user access. 
3.2 Configure network services. 
3.3 Perform testing, documentation and pre- 
deployment procedures.
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 7 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
4. Maintain and Repair Computer Systems and
Networks
4.1 Plan and prepare for maintenance and repair. 
4.2 Maintain computer systems and networks. 
4.3 Diagnose faults of computer systems and 
networks.
4.4 Rectify/correct defects in computer systems and 
networks.
4.5 Inspect and test the computer systems and 
networks.

Prepared by:

FLAVIANO AUXTERIO JR.

Form 1.2: Evidence of Current Competencies acquired


related to Job/Occupation

Current Competencies Proof/Evidence Means of validating


Participate in Certificate of Submitted original
Workplace Employment COE, called up
Communication issuing company to
verify authenticity,
conducted
interview AND
ASKED TO
DEMONSTRATE

Certificate of Submitted original


Employment COE, called up
issuing company to
Work in a team verify authenticity,
environment conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
Practice career
issuing company to
professionalism
verify authenticity,
conducted

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 8 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original COE,
Practice occupational Employment called up issuing company to
health and safety verify authenticity,
conducted interview AND
procedures ASKED TO DEMONSTRATE

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 9 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
Certificate of Submitted original
Employment COE, called up
issuing company to
Apply quality verify authenticity,
standards conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
issuing company to
Perform computer verify authenticity,
operations conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
issuing company to
Perform mensuration verify authenticity,
and calculation conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of  Submitted original
Employment COE, called up
issuing company to
Prepare and interpret verify authenticity,
technical drawing conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
issuing company to
verify authenticity,
Use hand tools conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
Terminate and issuing company to
connect electrical verify authenticity,
wiring and electronic conducted
circuits interview AND
ASKED TO
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 10 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
DEMONSTRATE
Certificate of Submitted original
Employment COE, called up
issuing company to
Test electronic verify authenticity,
components conducted
interview AND
ASKED TO
DEMONSTRATE
Certificate of Submitted original
Set-up Computer Employment COE, called up
Networks issuing company to
 Install network verify authenticity,
cables. conducted
 Set network interview AND
configuration. ASKED TO
 Perform testing, DEMONSTRATE
documentation and
pre-deployment
procedures.

Set-up Computer Certificate of Submitted original


Servers Employment COE, called up
 Set-up user access. issuing company to
 Configure network verify authenticity,
services. conducted
 Perform testing, interview AND
documentation and ASKED TO
pre-deployment DEMONSTRATE
procedures.
Maintain and Repair Certificate of Submitted original
Computer Systems Employment COE, called up
and Networks issuing company to
verify authenticity,
 Plan and prepare for
conducted
maintenance and
interview AND
repair.
ASKED TO
 Maintain computer DEMONSTRATE
systems and
networks.
 Diagnose faults of
computer systems
and networks.
 Rectify/correct
defects in computer
systems and
networks.
 Inspect and test the
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 11 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
computer systems
and networks.

Identifying Training Gaps


From the accomplished Self-Assessment Check (Form 1.1) and the
evidences of current competencies (Form 1.2), the Trainer will be able to
identify what the training needs of the prospective trainee are.

Form 1.3 Summary of Current Competencies Versus Required


Competencies
Required Units of Current Training Gaps/
Competency/Learning Competencies Requirements
Outcomes based on CBC () ()
BASIC BASIC
1. Participate in 1. Participate in
workplace workplace
communication communication
2. Work in team 2. Work in team
environment environment

3. Practice career 4. Practice career


professionalism professionalism

COMMON COMMON
1. Apply quality 1. Apply quality
standards standards
2. Perform computer 2. Perform computer
operations operations
3. Perform mensuration 3. Perform mensuration
and calculation and calculation
4. Prepare and 4. Prepare and
interpret technical interpret technical
drawing drawing

5. Use hand tools 5. Use hand tools


Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 12 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
6. Terminate and 6. Terminate and
connect electrical wiring connect electrical
and electronics circuit wiring and electronics
circuit
7. Test electronic 7. Test electronic
components components
CORE 1. Install and
1. Install and configure configure computer
computer systems systems
1.1 Assemble computer 1.1 Assemble computer
hardware Hardware
1.2 Install operating 1.2 Install operating
system and drivers system and drivers
for peripherals/ for peripherals/
devices. devices.
1.3 Install the computer 1.3 Install the computer
application software application software
1.4 Conduct testing and 1.4 Conduct testing and
documentation Documentation

2. Set-up computer 2. Set-up computer


networks networks
2.1 Install network 2.1 Install network
cables Cables
2.2 Set network 2.2 Set network
configuration Configuration
2.3 Set router/Wi-Fi/ 2.3 Set router/Wi-Fi/
wireless access wireless access
point/repeater point/repeater
configuration configuration
2.4 Inspect and test the 2.4 Inspect and test the
configured configured
computer networks computer networks
3. Set-up Computer 3. Set-up Computer
Servers Servers
3.1 Set-up user access 3.1 Set-up user access

3.2 Configure network 3.2 Configure network


service Service
3.3 Perform testing, 3.3 Perform testing,
documentation and documentation and
pre-deployment pre-deployment
practices practices

4. Maintain and repair 4. Maintain and repair


Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 13 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
computer systems computer systems
and networks and networks
4.1 Plan and prepare for 4.1 Plan and prepare for
maintenance and maintenance and
repair repair
4.2 Maintain computer 4.2 Maintain computer
systems and systems and
networks networks
4.3 Diagnose faults of 4.3 Diagnose faults of
computer systems computer systems
4.4 Rectify/correct 4.4 Rectify/correct
defects in computer defects in computer
systems systems
4.5 Inspect and test the 4.5 Inspect and test the
computer systems computer systems
and networks and networks

Using Form No.1.4, convert the Training Gaps into a Training Needs/
Requirements. Refer to the CBC in identifying the Module Title or Unit of
Competency of the training needs identified.

Form No. 1.4: Training Needs

Training Needs Module Title/Module of


Instruction
(Learning Outcomes)

 Assemble computer hardware


 Install operating system and
drivers for peripherals/
devices.
Setting-up Computer Network
 Install the computer
application software
 Conduct testing and
documentation

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 14 of 250
Developed by:
Amici Initiati
SERVICING Incorporated
Flaviano Auxtero
jr Revision #
SESSION PLAN

Sector : Electronics
Qualification Title : Computer Systems Servicing NCII
Unit of Competency : set up computer networks
Module Title : setting up computer networks

Learning Outcomes:
After _30__ hours of learning activities, the trainees will be able to effectively:
1 install network cables
2 set network configuration
3. set router/Wi-Fi/ wireless access point/repeater configuration
4.inspect and test the configured computer networks

A. INTRODUCTION- This module covers the outcomes required in setting up computer networks for LANs and small
office home office(SOHO)systems It consist of competencies to install cable networks set up configuration set router-
Wifi wireless access point/repeater configuration as well us to inspect and test the configured computer networks
B. LEARNING ACTIVITIES
LO 1:install networks cables
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 15 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
Learning Content Methods Presentation Practice Feedback Resources Time
1.determine and
plan the cable route Compare answers
Self-paced Read information CBLM
instruction sheet 2.1-1 Cable Answer Self- with Answer key 1hr
Lecture/ Route check 2.1-1 2.1-1
Discussion

2.Identify and Read information Answer Self- 1hr


obtain network Self-paced sheet 2.1-2 check 2.1-1 Compare Answer CBLM
materials necessary instruction Network Materials key
to complete the Discussion for Installation
work 2.1-1

3.obtain the needed Self-paced Read information Answer Self- Compare Answer CBLM 1hr
tools, equipment instruction/di sheet 2.1-1 check 2.1-1 key
and testing device scussion Tools, Equipment 2.1-1
and Testing Device

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 16 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
Self-paced Read information Answer Self- Compare answer CBLM 1hr
instruction/di sheet 2.1-1 check key 2.1-1
4.Use appropriate
personal protective scussion Personal protective 2.1-1
equipment
equipment

5. Perform cable Self-paced Read information Answer Self- Compare Answer CBLM 2hr
splicing instruction sheet 2.1-1 check key
based on discussion Cable splicing 2.1-1 2.1-1
standards

Demonstratio Familiarize Task Perform Task Check


n Sheet 2.11 Sheet 2.11 Performance
Splice Internet Splice Internet using
Cable Cable Performance
Criteria Checklist
2.11
6. Install Self-paced Read information Answer Self- Compare Answer CBLM 2hr
network cable instruction/di sheet check key
and cable scussion 2.1-1 2.1-1 2.1-1
raceway Network cable and
cable raceway
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 17 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
Demonstratio Familiarize Task Perform Task Check
n Sheet 2.12 Sheet 2.12 Performance
Install Internet Install Internet using
Network Cable Network Cable Performance
Criteria Checklist
2.12
7. Perform and Self-paced Read information Answer Self- Compare Answer CBLM 1hr
check instruction/di sheet 2.1-1 check key
installation scussion Check installation 2.1-1 2.1-1
work work

8. Follow 5S Self-paced Read information Answer Self- Compare Answer CBLM 2hr
and 3Rs instruction/di sheet 2.1-1 check key
scussion 5S and 3Rs 2.1-1 2.1-1
LO 2:set network configurations (peer to peer networks)
1.check network Lecture self- Read information Answer Self- Compare Answer CBLM 1hr
connectivity of paced sheet 2.2-1 check key
terminals instruction/di Network 2.2-1 2.2-1
scussion connectivity of
terminal
Demonstratio Familiarize tasks Perform Task Check
n Sheet2.2 1 Checks Sheet 2.1 Performance
connectivity 2connectivity using
Terminals terminals Performance
Criteria Checklist

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 18 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
2.diagnose and Lecture self- Read information Answer Self- Compare Answer CBLM
remedy fault or paced sheet 2.2-1 check key 2hr
problem in the instruction/di Fault problem in 2.2-2 2.2-1
network system scussion network system
Demonstratio Familiarize tasks Perform Task Check
n Sheet2.2 1 fault or Sheet 2.1 1 Performance
problem in the or using CBLM
fault
network system problem in the Performance
network system Criteria Checklist
3.configure network Lecture Read information Answer Compare Answer CBLM
interface card demonstratio sheet 2.2-1 compare Self- key 2hr
settings n Network interface check 2.2-1
card settings 2.2-1
Demonstratio Familiarize tasks Perform task Check
n Sheet2.2 1configure sheet 2.2 Performance
network interface 1configure using CBLM
card network Performance
interface card Criteria Checklist
4.carry out Lecture Read information Answer Self- Answer key CBLM 2hr
communication demonstratio sheet 2.2-1 check 2.2-1
checking between n Communication 2.2-1
terminals checking between
terminals
5.respond to Lecture self- Read information Answer Self- Compare Answer CBLM 2hr
unplanned events paced sheet 2.2-1 check key
and conditions instruction Unplanned and 2.2-1 2.2-1
conditions

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 19 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
L03 Set router WI-FI wireless access point repeater configure

1.configure client Self-paced Read information


device system instruction/di sheet 2.3-1 Answer Self- Compare Answer CBLM 1hr
settings scussion Configure client check key
device system 2.3-1 2.3-1
settings

Demonstratio Familiarize tasks Perform task Check


n Sheet2.3 1 client sheet 2.3 1 Performance
device system using CBLM
Client device
Performance
system
Criteria Checklist
Self-paced Read Answer Self- Compare Answer CBLM 1hr
2.configure local instruction/di information sheet check key
area network port scussion 2.3-1 2.3-1 2.3-1
Local area network
port

3.configure wide Self-paced Read information Answer Self- Compare Answer CBLM 1hr
area network port instruction/di sheet 2.3-1 check key
scussion Wide area network 2.3-1 2.3-1
port
Date Developed: Document No.
May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 20 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
Compare

Self-pace Answer key CBLM


4.configure wireless instruction/di Read information Answer Self- 2.3-1 1hr
settings scussion sheet 2.3 1 check
Configure wireless
2.3-1
setting
Demonstratio Familiarize tasks Perform task Check
n Sheet2.3 1 sheet 2.3 1 Performance
configure wireless configure using
wireless Performance
Criteria Checklist
5.configure Self-paced Read information Answer Self- Compare Answer CBLM 2hr
security/firewall/ad instruction/di sheet2.3 1 check key
vance settings scussion security/firewall 2.3-1 2.3-1
advance settings

L04 Inspect and test the configured computer networks


1 undertake final Self-paced Read information Answer elf- Compare Answer CBLM 1hr
inspection instruction sheet 2.4-1 check key
Undertake final 2.4-1 2.4-1
inspection

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 21 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
2.check computer Lecture Read information Answer Answer key CBLM 2hr
networks demonstratio sheet 2.4-1 compare Self- 2.4-1
n Computer networks check
2.4-1
Familiarize Job
Sheet 2.41 Inspect
and Test Computer
Network
3.prepare complete Self-paced Read information Answer Self- Compare Answer CBLM 1hr
reports instruction/di sheet 2.4-1 check key
scussion Prepare complete 2.4-1 2.4-1
report

C. ASSESSMENT PLAN-
 Written Test
 Performance Test
*Demonstration

D. TEACHER’S SELF-REFLECTION OF THE SESSION

Date Developed: Document No.


May 2018 Issued by:
COMPUTER Date Revised:
SYSTEMS Page 22 of 250
Amici Initiati
SERVICING NCII Developed by:
Flaviano Auxtero Jr Incorporated
Revision #
COMPETENCY-BASED LEARNING MATERIAL

Sector: ELECTRONICS
Qualification Title: CSS COMPUTER SYSTEMS SERVICING II
Unit of Competency: SET UP COMPUTER NETWORK
Module Title: INSTALING AND CONFIGURING COMPUTER SYSTEMS
Name of your School:AMICI INITIATI INCORPORATED

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 23 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
HOW TO USE THIS COMPETENCY –BASED
LEARNING MATERIALS

Welcome!
=
The core unit of competency, "setting up Computer
Network", is one of the competencies of COMPUTER SYSTEM
SERVICING NC II, a course which comprises the knowledge,
skills and attitudes required for a TVET trainee to possess.

The module, setting up computer network, contains


training materials and activities related to preparing area for bed
making, performing bed making and performing after care
activities of materials and equipment used for you to complete.
This is prepared to help you achieve the required competency in
COMPUTER SYSTEM SERVICING NCII.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 24 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
In this module, you are required to go through a series of
learning activities in order to complete each learning outcome. In
each learning outcome are Information Sheets, Task Sheets, Job
Sheets and Operation Sheets. Follow and perform the activities on
your own. If you have questions, do not hesitate to ask for
assistance from your facilitator.

The goal of this module is the development of practical


skills. You must learn the basic concepts and terminology to gain
these skills. For most part, you will get this information from the
Information Sheets.

This will be the source of information for you to acquire


knowledge and skills in this particular competency independently
and at your own pace with minimum supervision or help from
your trainer.

You will be given plenty of opportunity to ask questions and


practice on the job. Make sure you practice your new skills
during regular work shift. This way you will improve both your
speed and memory as well as your confidence.

Reminder:

Read Information Sheet, perform Task Sheet, Job Sheet or


Operation Sheet until you are confident that your outputs
conform to the Self-Check (Answer Key) and Performance
Criteria Checklist that follows the sheet. Suggested references
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 25 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
are included to supplement the materials provided in this
module.

When you feel confident that you have had sufficient practice
to achieve competency, perform and submit output of the Task
Sheet, Job Sheet or Operation Sheet to your facilitator for
evaluation and recording in the Accomplishment Chart.
Output shall serve as your portfolio during the Institutional
Competency Assessment. When you feel confident that you
have had sufficient practice, ask your trainer to evaluate you.
The results of your institutional assessment will be recorded in
your Progress Chart.

You must pass the Institutional Competency Assessment for


this competency before moving to another competency. A
Certificate of Achievement will be awarded to you after passing
the evaluation.

You need to complete this module before you can perform the
module on Inspect and test the configured computer
networks.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 26 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
PARTS OF A COMPETENCY-BASED LEARNING MATERIAL
PACKAGE

References/Further Reading

Performance Criteria Checklist


Operation/Task/Job Sheet

Self Check Answer Key

Self Check

Information Sheet

Learning Experiences

Learning Outcome Summary

Module
Module Content
Content

Module
List of Competencies
Content

Module Content

Module Content

In our efforts to standardize CBLM, the


above parts are recommended for use
in Competency Based Training (CBT) in
Technical Education and Skills
Date Developed:
Development Document No.
Authority (TESDA)
May 2018
TechnologyIssued
Date Revised:
by:
Institutions. The next
COMPUTER sections will show you the components
Page 27 of 61
SYSTEMS featuresAmici
andby:
Developed
initiati
of each part.
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
TABLE OF CONTENTS
Page

A.LIST OF COMPETENCIES 5
B.MODULE CONTENT 6-8

.LEARNING OUTCOME NO #3…………………………… 9-10

.learning Experience………………………………………11-13
.Information Sheet 1.3-1 Configure Client Device settings
……………………………………………………………. 14-25
.self check1.3-1………………………………………………26
.Answer key 1.3-1……………………………………………27
Information sheet 1.3-2 configure Local Area Network
………………………………………………………………28-34
.Self-Check 1.3-2…………………………………………...35
.answer key 1.3-2……………………………………..……36
.Task sheet 1.3-2……………………………………………37
.Performance Criteria Sheet 1.3-2………………………38
.Information Sheet 1.3-3 Configured Wide Area Network
………………………………………………………………..39-41
.Self-Check 1.3-3……………………………………………..42
.Answer key 1.3-3………………….…………………………43
.Task Sheet …………………………………………………….44
.Performance Criteria Sheet 1.3-3………………………..45
.Information Sheet 1.3-4 Configure Wireless Settings…46-51
.Self-Check 1.3-3……………………………………………..52
.Answer key…………………………………………….……..53
.Information Sheet 1.3-5 setting Up Firewall with advance
Security………………………………………………………54-61
.Self-Check1.3-5…………………………………………………62
.Answer key…………………………………….…………………63

C. REFERENCIES…………………………………………………….64

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 28 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
(Qualification Title)
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Installing and
Install and configure ELC724331
1. configuring computer
computer system
system

Set-up Computer Setting up Computer ELC724332


2.
System Networks

Set up Computer Setting up computer


3. ELC724333
Servers Servers

Maintain and Maintain and


Repair Computer Repairing Computer
4. ELC724334
Systems and Systems and
Network Networks

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 29 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
MODULE CONTENT

UNIT OF COMPETENCY SET UP COMPUTER NETWORK

MODULE TITLE Setting up Computer Network

MODULE DESCRIPTOR: This module covers the outcomes


required setting up computers networks for LAN and
small office home office (SOHO)systems It consists of
competencies to install Ethernet cables set network configuration
set router/Wi-Fi/ wireless access point/repeater configuration as
well as to inspect and test the configured computer networks

NOMINAL DURATION: 40HOURS

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Install Ethernet cable
2. Set Network Configuration
3. Set router /Wi-Fi/ wireless access point/repeater
configuration
4. Inspect and test the configured computer networks

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 30 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance
with networks design and actual installation site.
2. Network materials neccesary to comple the work are
indentified and obtained and accordance with established
procedures and checked againts systems requarments
3. Tools equipments and testing device needed to carry out
the installation work are obtained in accordance with
establish procedured and checked procedures are followed.
4. Appropraite personal protective equipments is used and
OHS policies and procedure are followed
5. Copper cable splicing is perfored based on Electronices
Industries Alliance/Telecommunicatons Industry
Assosscation (EIA/TIA)standars
6. Ethernet cables and cable raceway are installed accordance
with establish procedures and installationrequarments
7. Install work is performed and is checked to secure to
unnessesary damege has occurred and comples with
requarments
8. OHS standards and 5s principle are followed according to
enterprise requarments
9. Excess components and materials are desposed of based on
WEEE derectivies are 3Rs waste management program
10. Network connectivity of each terminal is checked in
accordance with network design
11. Any faul or problem in the network system is diagnosed are
remedied in line with standard operating procedures
12. Network interface card (NIC)settings are configured in
accordance with network design
13. Communication checking between terminals are carred out
in accordance wit OS network configure guides
14. Unnplaned events or conditions are responded in
accordance with establish procedures

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 31 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
15. Client Device Systems setting are configured in accordance
with manufactured instractions and end-user preferences
16. Local area network (LAN)port is configuredin accordance
with manufacturers instruction and network design
17. Wide area network (WAN)por is configuredin accordance
with manufacturers instruction and network design
18. Wireless settings are configured in accordance with
manufacurers instructions network design and end-user
preferences
19. Security/Firewall/Advance setting configure in accordance
with manufacturers instructions and end-user preferences
20. Final inspection are undertaken to ensure that the
configuration done on the computer network confirms with
the manufacturers instruction/manual
21. Computer network are checked to ensure safe operation
22. Reports are prepared /completed according to company
requarments.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 32 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
LEARNING OUTCOME NO. 4
Set router/Wi-fi wireless access point/repeater configuration

Contents:

1. Configure client Device system


2. Configure LAN (Local area network)
3. Configure WAN (Wide area network)
4. Configure wireless settings
5. Setting up Firewall with advanced Security
Assessment Criteria

1. Client device systems setting are configured in accordance with


manufacturers instructions and end-user preferences
2. Local area network (LAN)port is configured in accordance with
manufacturers instructions and network design
3. Wide area network (WAN) port is configured in accordance with
manufacturers instructions and network design
4. Wireless settings are configured are configured in accordance with
manufacturers instructions and end-user preferences
5. Security/Firewall/Advance settings are configured are configured in
accordance with manufacturers instructions and end-user
preferences

Conditions

The participants will have access to:

1. Workplace location
2. Computer networks materials:
1.UTP cable
2.RJ45
3.Router/Hub
4.modem
3.Personal Computer
4.Training Materials:
1.learning package
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 33 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2.Bond Papers
3.Ballpens
4.Whitebord marker
5.Manuals
6.Competency standards
7.Training Regulations

Assessment Method:

1. Written Works
2. Actual Application
3. Performance Creteria

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 34 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Learning Experiences
Learning Outcome No.3
Computer Systems Servicing NCII

Learning Activities Special Instructions

Read information sheet 1.3 1 If you have some problem on the


configure Client Device Systems content of the information sheet
don’t hesitate to approach your
facilitator. If you feel that you are
now knowledgeable on the content
of the information sheet you can
now answer self-check provided in
the module

Answer self-check 1.3-1 configure Compare your answer to the answer


client device systems key 1.3-1 if you got 100%correct
answer in this self-check you can
now move to the next information
sheet if not review the information
sheet and go over the self-check
again

If you have some problem on the


Read information sheet 1.3-2
content of the information sheet
configure local area network
don’t hesitate to approach your
facilitator .If you feel that you are
now knowledgeable on the content
module

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 35 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer self-check 1.3-1 configure Compare your answer key 1.3-1 if
Client Device Systems got 100% correct answer in this self-
check you can now move to the next
information sheet and go over the
self-check again

Read information sheet 1.3-2 If you have some problem on the


configure local Area Network content of the information sheet
don’t hesitate to approach your
facilitator. If you feel that you are
now knowledgeable on the content
of the information sheet you can
now answer self-check provided in
the module

Answer self-check 1.3-2 configure Compare your answer key 1.3-1 if


Local Area Network got 100% correct answer in this self-
check you can now move to the next
information sheet and go over the
self-check again

Perform Task sheet 1.3-2 on to


Trainer evaluates the Performance
configure LAN (Local Area Network)
and makes recommendations

Read information sheet 1.3-3 on


Compare your answer key 1.3-3 if
configure WAN (Wide Area network)
got 100% correct answer in this self-
check you can now move to the next
information sheet and go over the
self-check again

Perform task sheet 1.33 on how to


configure Wan (Wide Area Network Trainer evaluates the performance

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 36 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
and makes recommendations
Read information sheet 1.3 4 on If you have some problem on the
configure Wireless settings content of the information sheet
don’t hesitate to approach your
facilitator. If you feel that you are
now knowledgeable on the content
of the information sheet you can
now answer self-check provided in
the module

Compare your answer key 1.3-4 if


Answer self check 1.3 4 configure got 100% correct answer in this self-
Wireless settings check you can now move to the next
information sheet and go over the
self-check again

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 37 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Information Sheet 2.3-1
Configure Client Device Systems

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify What is Client Device Systems
2. Configure Client Device Systems

Client Device Settings is a way of configured your client device


by which you can specify client setting at a collection level
allowing you to define defferent setting as nescessesary it has
the characteristics of being flexible to create multipule client
device or client user setting and apply it to different collections
as per requirements It is a set of default setting are configured
in accordance with manufacturers instructions and end-user
preferences. In this module we will show the steps of settings
on setting up your client on windows 7,8,&10 which are
configured manually.

Always take note on the following areas to be configured:


1.Set up time and date
2.Set up computer name
3.Install and configure network driver
4.Install necessary software application e.i MS office and anti
virus

Configure Client Device systems


Steps on How Configure Device settings

1.Setting up Tme and Date


a. on windows 10 OS to set up the time and date go the right
buttom of your taskbar see figure below:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 38 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
b.Right Click on the area of time and date then choose “Adjust
date/time” Then the date/time settings will appear

c.If you wish to set your date /time authomatically just click
“ON”at set time authomatically if not you can turn it off and be
the one to set date/time

d. You could also set “Time Zone” it is located below change date
and time. You could choose Beijing, Kuala Lumpur or Taipei,
Philippines is none on the choices just choose a Time Zone that
much on our Time “UTC+8”.
2. Set up Computer Name a. In setting up your Computer Name,
Go to Start Menu and search for “My PC”, and other Windows OS
version you can find it on Desktop a Computer Icon with a name
of “My Computer”. For Win10, please see figure below:
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 39 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
c. Then “Control Panel” will appear. Click on “Change Settings”
button that is shown below:

d. Note: Setting up your Computer Name is important. This


will serve as the Identity of your computer. It will be useful
when it comes on setting up your Computer Network. The
Server/The Network will identify what PC is being connected
or configured.

3. Install and Configure Network Driver a. In every personal


computer, it is necessary to install a network driver so that your
computer will have an access on every network connection it may
need. The first step to do is to select a Compatible driver’s pack
for your PC. Depends on your OS. Below is an example:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 40 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
There are different versions of DriverPack Solution: 15, 14,
13, 12, 11, 10 & 8. You should be careful on choosing a
driver pack; it should be compatible with your PC
specification.

After the installation of your network driver, you are ready


to configure your network. To configure the network of your
PC, Right-click on your network connection. You'll see this
in your System Tray. If you are connecting your computers
through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This
process is handled automatically if you're using a router.
Think of an IP address as a mailing address. Each computer
on the network needs a unique IP address so that
information sent across the network reaches the correct
destination.

Click Open Network and Sharing Center.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 41 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Click the Ethernet link at the top of the window. You'll see
this next to "Connections." Click Properties

Click Internet Protocol Version 4 (TCP/IPv4). Make sure you


don't uncheck it, just highlight it.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 42 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Click Properties.

Click the Use the following IP address radio button.

Type 192.168.1.50 into the IP address field.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 43 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Type 255.255.0.0 into the Subnet mask field.

Type 192.168.0.0 into the Default gateway field.

Click OK. This will save the settings for that computer. This
computer is now configured on your network with a unique
IP address.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 44 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Open the Internet Protocol Version 4 properties on the next
computer. Follow the steps above on the second computer
to open the Internet Protocol Version 4 (TCP/IPv4)
Properties window.

4. Install necessary software application e.i MS Office and Anti


virus a. You may install necessary software applications for
your PC like MS Office and an Antivirus. See figures below
for references:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 45 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 46 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Self- Check 2.3-1

TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not

_____1. Client Device Settings is a way of configuring your client device by


which you cannot specify client settings at a collection
level
. ______2. On Windows 10 OS, to set up the Time and Date go to the upper
left of your taskbar.
______3. Setting up your Computer Name is important. This will serve as
the Identity of your computer.
______4. In every personal computer, it is necessary to install a network
driver.
______5. Assigning an IP Address must be unique.
______6. The default subnet mask is, 255.255.0.0
______7. In setting up Time, you cannot set time automatically.
______8. In setting up the Time Zone, you could use "Philippines" for the
setting.
______9. Client setting on different OS are just the same.
______10. In installing a network drivers, it compatibility on PC must be
consider

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 47 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
ANSWER KEY 2.3 1

TRUE OR FALSE
1. False
2. False
3. True
4. True
5. True
6. True
7. False
8. False
9. False
10. True

INFORMATION SHEET 2.3-2

Configure Local Area Network

Learning Objective:

After reading this INFORMATION SHEET, you should be able to:

1. To identify What is Local Area Network


2. To acquire knowledge in Configuring Local Area Network

A Local Area Network (LAN) is a group of computers and


associated devices that share a common communications line or
wireless link to a server. Typically, a LAN encompasses
computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment.
Computers and other mobile devices use a LAN connection to
share resources such as a printer or network storage
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 48 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Configuring Local Area Network

Equipment and Peripherals Needed for Configuring LAN

Equipment/Peripherals Name Image


and Description

A Personal Computer (PC) is a


multipurpose electronic
computer whose size,
capabilities, and price make it
feasible for individual use. PCs
are intended to be operated
directly by an end user, rather
than by a computer expert or
technician
Ethernet cables are
networking hardware used to
connect one network device to
other network devices or to
connect two or more computers
to share printers, scanners etc.
Different types of network
cables, such as coaxial cable,
optical fiber cable, and twisted
pair cables, are used depending
on the network's physical layer,
topology, and size. The devices
can be separated by a few
meters (e.g. via Ethernet) or
nearly unlimited distances (e.g.
via the interconnections of the
Internet).

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 49 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Router/Hub/Switch is a way
stations that control the traffic
of data within a network,
assigns a unique IP Address to
each computer.
Modem is a device that send,
receives, and translates
information from the internet
and makes it available within
the Local Area Network

When Equipments and Peripherals are all ready, we will now


proceed on Installing and Configuring Local Area Network. Below
are steps in configuring Local Area Network.

1. Prepare your W orkplace

It must be clean and dry. Work on a spacious table. If necessary


work with your PPE. Do not forget to apply the OHS policies and
procedures.

2. Determine the number of computers you want to connect.


The number of computers you're connecting will determine the
type of network hardware you'll need.

 If you are connecting four or less computers, you'll just need a


single router or one switch if you don't need internet.

 If you're connecting more than four computers, you'll want a


router and a switch, or just a switch if you don't need internet

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 50 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
3. Determine your network layout.

If you’re installing a permanent LAN solution, you'll want to keep


cable length in mind. CAT5 Ethernet cables should not run
longer than 250 feet. If you need to cover larger distances, you'll
need switches at regular intervals, or you'll need to use CAT6
cables

a. You'll need one Ethernet cable for each computer you want
to connect to the LAN, as well as an Ethernet cable to
connect the router to the switch (if applicable)

4. P lug one end of an Ethernet cable into your computer.


Make sure you're using an Ethernet cable (RJ45), not a
telephone cable.

5. P lug the other end of the cable into an open LAN port

This can be any open LAN port on either the router or the switch,
depending on your LAN setup.

6. Reset the Router. In resetting your Router just click the small
button on the back of your router using a Pin or Ballpen and wait
until all the icons in front of the Router will Lights on. See figure
below.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 51 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
6. Go to browser either “Google Chrome” or “I explorer”. And
type in the default IP Address. Depends on Manufacturer.
For this module, we will use 192.168.0.1. See figure below

7. Router Login will appear. Type on default username and


password. “admin” is most default username and password,
still depends on manufacturer. See figure below:

8.After encoding the default IP Address and entering the


default username and password, the Router User Interface
will appear. We will now ready for Router Setting Up.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 52 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
9.Click the Network Tab. And change your IP Address. Take note
on the Sequence of your IP Address. Save and it will reboot.

Go to DHCP Tab, just click the Disable Button. And the


browser will reboot.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 53 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
SELF-CHECK. 2.3-2

IDENTIFICATION: Identify what is being ask, write on the space


provided.

__________1. A multi-purpose electronic computer whose size,


capabilities, and price make it feasible for individual use
__________2. Is a device that sends, receives, and translates
information from the internet and makes it available within the
Local Area Network

__________3. Are networking hardware used to connect one


network device to other network devices or to connect two or
more computers to share printers, scanners etc.

__________4. Is a way stations that control the traffic of data


within a network, assigns a unique IP Address to each computer.

__________5. Is a group of computers and associated devices that


share a common communications line or wireless link to a server.

__________6. Default IP address of a Router

__________7. Default Username and Password use for Logging in


on your Router Portal.

__________8. A tab on your Router Portal that can be used to


change your IP Address.

__________9. It is the first step before configuring your Router.

__________10. Indicator that your Router are already reset.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 54 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer Key to 2.3-2

IDENTIFICATION:

1. Personal Computer
2. Modem
3. Ethernet Cable
4. Router
5. LAN
6. 192.168.0.1
7. Admin
8. Network Tab
9. Reset
10. Lights On (Icons in front)

TASK SHEET 2.3-2


Configure Local Area Network
Performance Objective: Given a Network Materials (Router and
Ethernet Cable) together with a Personal Computer you should
Configure Local Area Network with allotted time of 40 minutes.
Supplies/M aterials and Equipments :
 Personal Computer
 Router and Ethernet Cable
 Personal Protective equipment(if necessary)
 Pins/Ballpen (Use for resetting the Router)
Steps/ Procedure:

1. Prepare your W orkplace

a. Make sure that you have the necessary


Materials/Peripherals
b. Make sure that the workplace is clean and dry.
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 55 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2. Start

a. Connect Router and Personal Computer using your


Ethernet Cable
b. Reset your Router using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer d.
Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab g. Set up DHCP Tab

Assessment M ethod:

Performance Criteria checklist

PERFORMANCE CRITERIA CHECKLIST 2.3-2

CRITERIA YES NO
1. Did the trainee configure the

Router correctly?
2. Did the trainee configure the

Local Area Network?

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 56 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
INFORMATION SHEET 2.3-3

Configure W ide Area Network (ACCESS POINT)

Learning Objective:

After reading this INFORMATION SHEET, you should be able to:

1. To identify What is Wide Area Network


2. To acquire knowledge in Configuring Wide Area
Network

A wide area network (WAN) is a telecommunications network or


computer network that extends over a large geographical
distance. Wide area networks are often established with leased
telecommunication circuits.

Business, education and government entities use wide area


networks to relay data to staff, students, clients, buyers, and
suppliers from various locations across the world. In essence,
this mode of telecommunication allows a business to effectively
carry out its daily function regardless of location. The Internet
may be considered a WAN.

Configure W ide Area Network

As we gather all the peripherals and equipment needed we will


proceed on Configuring Wide Area Network. Same process with
Router but this time we will use Modem or the Access Point. See
steps listed below:

1. Gather your Modem, Ethernet Cable and Personal Computer.


Connect each peripheral using the Ethernet Cable. Directly
connect Modem to your Personal Computer using the Ethernet
Cable. This will just be use for the setting up processes
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 57 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2. Reset the M odem. In resetting your Modem just click the
small button at the back and wait until all the icons in front of
the Modem will Lights on. See figure below.

3. Go to browser either “Google Chrome” or “I explorer”. And type


in the default IP Address of your Modem. Depends on
Manufacturer. For this module, we will use 192.168.0.254. And a
Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and
password. See figure below:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 58 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
4. Repeat the step shown on Configuring your Router.

a. Go to Network Tab. Change your IP address. Click Save then it


will reboot.
b. Go to DHCP tab and click Disable Button
.c. Unlike on Router we need to set up Wireless Tab on Modem.
Click Wireless Tab. Click on WPA/WPA2 – Personal
(Recommended) then enter your desired PSK Password. It must
consist of alphanumeric characters. The browser will reboot.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 59 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
SELF-CHECK. 2.3-3

Rearrange the given steps on how to configure W AN. Put the


correct sequence of steps by using numbers 1-10 in the space
provided, 1 is the First Step and 10 is the Last Step.

______1. Gather your Modem, Ethernet Cable and Personal


Computer. Connect each peripheral using the Ethernet Cable.
______2. Go to browser either “Google Chrome” or “I explorer”.
______3. Go to Network Tab. Change your IP address. Click Save
then it will reboot.
______4. Reset the Modem. In resetting your Modem just click
the small button at the back and wait until all the icons in front
of the Modem will Lights on.
______5. Directly connect Modem to your Personal Computer
using the Ethernet Cable. This will just be use for the setting up
processes.
______6. Go to DHCP tab and click Disable Button.
______7. And a Dialog box will pop up and you will need to enter
the default username and password. Use “admin” for both
username and password.
______8. Prepare your Workplace, clean and Dry.
______9. And type in the default IP Address of your Modem.
______10. Click Wireless Tab. Click on WPA/WPA2 – Personal
(Recommended) then enter your desired PSK Password.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 60 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer Key to 2.3-3

REARRANGE

1. 2
2. 5
3. 7
4. 4
5. 3
6. 8
7. 6
8. 1
9. 5
10. 10

TASK SHEET 2.3-2


Title: Configure Local Area Network

Performance Objective: Given a Network Materials (Router


and Ethernet Cable) together with a
Personal Computer you should Configure
Local Area Network with allotted time of
40 minutes
Supplies/Materials Equipment :
.Personal Computer
. Router and Ethernet Cable
. Personal Protective equipment(if necessary)

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 61 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
. Pins/Ball pen (Use for resetting the Router)

Steps/Procedure:
1. Prepare your Workplace
a. Make sure that you have the necessary
Materials/Peripherals
b. Make sure that the workplace is clean and dry
2. Start
a. Connect Router and Personal Computer using your
Ethernet Cable
b. Reset your Router using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab

Assessment Method:
Performance Criteria checklist

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 62 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Performance Criteria Checklist 2.3-2

CRITERIA
YES NO
Did you..?
1. Did the trainee configure the Router √
correctly?

2. Did the trainee configure the Local Area √


Network?

INFORMATION SHEET 2.3-4

Learning Objective:

After reading this INFORMATION SHEET, you should be able to:

1. To identify what is Wireless Network?


2. To enumerate steps in Configuring Wireless Settings

A wireless network is a computer network that uses wireless


data connections between network nodes. Wireless networking is
a method by which homes, telecommunications networks and
business installations avoid the costly process of introducing
cables into a building, or as a connection between various
equipment locations. Wireless telecommunications networks are
generally implemented and administered using radio
communication.

A wireless local area network (WLAN) links two or more devices


over a short distance using a wireless distribution method,
usually providing a connection through an access point for
internet access. The use of spreadspectrum or OFDM
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 63 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
technologies may allow users to move around within a local
coverage area, and still remain connected to the network.

Products using the IEEE 802.11 WLAN standards are marketed


under the Wi-Fi brand name. Fixed wireless technology
implements point-topoint links between computers or networks
at two distant locations, often using dedicated microwave or
modulated laser light beams over line of sight paths. It is often
used in cities to connect networks in two or more buildings
without installing a wired link.

Configure wireless settings

After configuring the Router and Modem we will now proceed on


setting up the wireless network.

1. First, we need to check whether you have a wireless adapter.

a. Select the Start button, type Device Manager in the search box,
and then select Device Manager.
b. Expand Network adapters.
c. Look for a network adapter that might have wireless in the
name.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 64 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2. Setting up the modem and Internet connection

After you have all the equipment, you'll need to set up your
modem and Internet connection. If your modem wasn't set up for
you by your Internet service provider (ISP), follow the instructions
that came with your modem to connect it to your PC and the
Internet. If you're using Digital Subscriber Line (DSL), connect
your modem to a phone jack. If you’re using cable, connect your
modem to a cable jack.

3. Positioning the wireless router

Put your wireless router somewhere where it will receive the


strongest signal with the least amount of interference. For better
results, follow these tips:

a. Place your wireless router in a central location. Place the


router as close to the center of your home as possible to increase
the strength of the wireless signal throughout your home

b. Position the wireless router off the floor and away from
walls and metal objects, such as metal file cabinets. The fewer
physical obstructions between your PC and the router's signal,
the more likely that you'll be using the router's full signal
strength.

Securing your wireless network

Security is always important; with a wireless network, it's even


more important because your network's signal could be
broadcast outside your home. If you don't help secure your
network, people with PCs nearby could access info stored on your
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 65 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
network PCs and use your Internet connection. To help make
your network more secure:

Change the default user name and password. This helps


protect your router. Most router manufacturers have a default
user name and password on the router and a default network
name (also known as the SSID). Someone could use this info to
access your router without you knowing it. To help avoid that,
change the default user name and password for your router. See
the documentation for your device for instructions.

Set up a security key (password) for your network. Wireless


networks have a network security key to help protect them from
unauthorized access. We recommend using Wi-Fi Protected
Access 2 (WPA2) security if your router supports it. See the
documentation for your router for more detailed info, including
what type of security is supported and how to set it up

Some routers support Wi-Fi Protected Setup (WPS). If your router


supports WPS and its connected to the network, follow these
steps to set up a network security key:

1. Select the Start button, look for Control Panel and click
Network and Internet. Then look for Network and Sharing Center.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 66 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2.Select Set up a new connection or network.

3. Select Set up a new network, and then choose Next.

The wizard will walk you through creating a network name and a
security key. If your router supports it, the wizard will default to
Wi-Fi Protected Access (WPA or WPA2) security. We recommend
that you use WPA2, because it offers better security than WPA or
Wired Equivalent Privacy (WEP) security. With WPA2 or WPA you
can also use a passphrase, so you don’t have to remember a
cryptic sequence of letters and numbers.

write down your security key and keep it in a safe place. You
can also save your security key on a USB flash drive by following
the instructions in the wizard. (Saving your security key to a USB
flash drive is available in Windows 8 and Windows 7, but not in
Windows 10.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 67 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2. In the list of networks, choose the network that you want to
connect to, and then select Connect.
3. Type the security key (often called the password).
4. Follow additional instructions if there are any

SELF-CHECK. 2.3-4

Rearrange the given steps on how to configure W AN. Put the


correct sequence of steps by using numbers 1-10 in the space
provided, 1 is the First Step and 10 is the Last Step

_____1. Change the default user name and password


_____2. Set up a security key (password) for your network
_____3. Select Set up a new connection or network.
_____4. Securing your wireless network
_____5. Select the Start button, look for Control Panel and click
Network and Internet.
_____6. Look for Network and Sharing Center.
_____7. Positioning the wireless router
_____8. Select Set up a new network, and then choose Next.
_____9. Setting up the modem and Internet connection.
_____10. We Need To Check Whether You Have A Wireless
Adapter

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 68 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer Key to 2.3-4

REARRANGE

1. 5
2. 6
3. 9
4. 4
5. 7
6. 8
7. 3
8.10
9. 2
10. 1

INFORMATION SHEET 2.3-5


Setting Up Firewall with Advanced Security
Learning Objective:

After reading this INFORMATION SHEET, you should be able to:

1. To identify What is Firewall with Advanced Security


2. To enumerate steps in Configuring Firewall with Advanced
Security

The Windows Firewall with Advanced Security is a tool which


gives you detailed control over the rules that are applied by the
Windows Firewall. You can view all the rules that are used by the
Windows Firewall, change their properties, create new rules or
disable existing ones. In this tutorial we will share how to open
the Windows Firewall with Advanced Security, how to find your
way around it and talk about the types of rules that are available
and what kind of traffic they filter.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 69 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
A firewall is hardware or software that can help protect your PC
from unauthorized users or malicious software (malware).
Running a firewall on each PC on your network can help control
the spread of malicious software on your network, and help
protect your PCs when you're accessing the Internet. Windows
Firewall is included with this version of Windows.

Setting Up Firewall with Advanced Security

You have several alternatives to opening the Windows Firewall


with Advanced Security:

1. One is to open the standard Windows Firewall window, by


going to "Control Panel -> System and Security -> Windows
Firewall". Then, click or tap Advanced settings.

2. In Windows 7, another method is to search for the word


firewall in the Start Menu search box and click the "Windows
Firewall with Advanced Security" result.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 70 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
3. In Windows 8.1, Windows Firewall with Advanced Security is
not returned in search results and you need to use the first
method shared above for opening it.
4. The Windows Firewall with Advanced Security looks and
works the same both in Windows 7 and Windows 8.1. To
continue our tutorial, we will use screenshots that were made in
Windows 8.1.

5. What Are The Inbound & Outbound Rules?


a. In order to provide the security you need, the Windows
Firewall has a standard set of inbound and outbound rules,
which are enabled depending on the location of the network you
are connected to.
b. Inbound rules are applied to the traffic that is coming from
the network and the Internet to your computer or device.
Outbound rules apply to the traffic from your computer to the
network or the Internet.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 71 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
c. These rules can be configured so that they are specific to:
computers, users, programs, services, ports or protocols. You can
also specify to which type of network adapter (e.g. wireless, cable,
virtual private network) or user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can
access all rules and edit their properties. All you have to do is
click or tap the appropriate section in the left-side panel

6. The rules used by the Windows Firewall can be enabled or


disabled. The ones which are enabled or active are marked with a
green check-box in the Name column. The ones that are disabled
are marked with a gray check-box.
7. If you want to know more about a specific rule and learn its
properties, right click on it and select Properties or select it and
press Properties in the column on right, which lists the actions
that are available for your selection.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 72 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
8. In the Properties window, you will find complete information
about the selected rule, what it does and in when it is applied.
You will also be able to edit its properties and change any of
the available parameters.

9. What Are The Connection Security Rules?


a. Connection security rules are used to secure traffic between
two computers while it crosses the network. One example would
be a rule which defines that connections between two specific
computers must be encrypted.

b. Unlike the inbound or outbound rules, which are applied only


to one computer, connection security rules require that both
computers have the same rules defined and enabled.
c. If you want to see if there are any such rules on your
computer, click or tap "Connection Security Rules"on the panel
on the left. By default, there are no such rules defined on
Windows computers and devices. They are generally used in
business environments and such rules are set by the network
administrator.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 73 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
10. What Does the Windows Firewall with Advanced Security
Monitor? The Windows Firewall with Advanced Security includes
some monitoring features as well. In the Monitoring section you
can find the following information: the firewall rules that are
active (both inbound and outbound), the connection security
rules that are active and whether there are any active security
associations.

11. You should note that the Monitoring section shows only the
active rules for the current network location. If there are rules
which get enabled for other network locations, you will not see
them in this section

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 74 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
SELF-CHECK. 2.3-5

TRUE OR FALSE: Write the word TRUE in the space provider if


the statements are correct and FALSE if it is not.
________1. A firewall is hardware or software that can help
protect your PC from unauthorized users or malicious software
(malware).
________2. Running a firewall on each PC on your network won't
help control the spread of malicious software on your network.
________3. In order to provide the security you need, the Windows
Firewall has a standard set of inbound and outbound rules.
________4. These rules can't be configured so that they are
specific to: computers, users, programs, services, ports or
protocols.
________5. In the Windows Firewall with Advanced Security, you
can access all rules and edit their properties.
________6. Connection security rules are used to secure traffic
between two computers while it crosses the network.
________7. Monitoring section shows only the active rules for the
current network location.
________8. Unlike the inbound or outbound rules, which are
applied only to one computer, connection security rules require
that both computers have the same rules defined and enabled.
________9.Windows Firewall with Advanced Security is a tool
which gives you detailed control over the rules that are applied by
the Windows Firewall.
________10. Inbound rules are applied to the traffic that is
coming from the network and the Internet to your computer or
device

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 75 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer Key to 2.3-5
TRUE OR FALSE:

1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
6. TRUE
7. TRUE
8. TRUE
9. TRUE
10. TRUE

REFERENCES:
INTERNET

1) http://www.tesda.gov.ph
a. CSS NCII TR
b. CSS NCII CBC
c. CSS SAG

2) http://wikihow.com a. Configure Local Area Network b.


Configure Wide Area Network

3) http://www.slideshare.net
a. Configure Client Device Settings
b. Configure Wireless Settings
c. Setting up Firewall with Advance Security

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 76 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
JOB SHEET _____

Title: Configure W ide Area Network (ACCESS POINT

Performance Objective: A wide area network (WAN) is a


telecommunications network or computer
network that extends over a large
geographical distance. Wide area
networks are often established with leased
telecommunication circuits. Business,
education and government entities use
wide area networks to relay data to staff,
students, clients, buyers, and suppliers
from various locations across the world.
In essence, this mode of
telecommunication allows a business to
effectively carry out its daily function
regardless of location. The Internet may
be considered a WAN

Supplies/Materials : As we gather all the peripherals


and equipment needed we will proceed on Configuring Wide
Area Network. Same process with Router but this time we will
use Modem or the Access Point. See steps listed below: 1.
Gather your Modem, Ethernet Cable and Personal Computer.
Connect each peripheral using the Ethernet Cable. Directly
connect Modem to your Personal Computer using the Ethernet
Cable. This will just be use for the setting up processes

Equipment 1.To identify What is Wide Area Network


2. To acquire knowledge in Configuring Wide Area
Network
Steps/Procedure:
1. Configure W ide Area Network
2. . Reset the Modem

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 77 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Assessment Method:
Equipment and Peripherals Needed for Configuring LAN

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 78 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Performance Criteria Checklist ______

CRITERIA
YES NO
Did you…?
1. Gather your Modem, Ethernet Cable and √
Personal Computer. Connect each
peripheral using the Ethernet Cable
2. Go to browser either “Google Chrome” or “I √
explorer”.
3. Go to Network Tab. Change your IP √
address. Click Save then it will reboot
4. Reset the Modem. In resetting your Modem √
just click the small button at the back and
wait until all the icons in front of the
Modem will Lights on
5. Directly connect Modem to your Personal √
Computer using the Ethernet Cable. This
will just be use for the setting up processes
6. Go to DHCP tab and click Disable Button. √
7. And a Dialog box will pop up and you will √
need to enter the default username and
password. Use “admin” for both username
and password.
8. Prepare your Workplace, clean and Dry √
9. And type in the default IP Address of your √
Modem
10. Click Wireless Tab. Click on √
WPA/WPA2 – Personal (Recommended)
then enter your desired PSK Password
11. √

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 79 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
OPERATION SHEET

Title: Configure Wide Area Network

Supplies/Materials Given a Network Materials (Router


:
and Ethernet Cable) together with a Personal Computer you
should Configure Wide Area Network with allotted time of 40
minutes
Equipment :
 Personal Computer
 Modem and Ethernet Cable
 Personal Protective equipment(if necessary)
 Pins/Ballpen (Use for resetting the Router)
Steps/Procedure:
1. Make sure that you have the necessary
Materials/Peripherals
2. Make sure that the workplace is clean and dry.
3.
a. Connect Modem and Personal Computer using your
Ethernet Cable
b. Reset your Modem using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer)
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab g. Set up DHCP Tab h. Set up
Wireless Tab

Assessment Method:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 80 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Performance Criteria checklist

Performance Criteria Checklist

CRITERIA
YES NO
Did you….
1. Did the trainee configure the Modem √
correctly?
2. Did the trainee configure the Wide Area √
Network?

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 81 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
INFORMATION SHEET 2.3-4

Configure W ireless Settings

Learning Objective:
After reading this INFORMATION SHEET,

1. To identify what is Wireless Network?


2. To enumerate steps in Configuring Wireless Settings

A wireless network is a computer network that uses wireless data


connections between network nodes.

Wireless networking is a method by which homes,


telecommunications networks and business installations avoid
the costly process of introducing cables into a building, or as a
connection between various equipment locations. Wireless
telecommunications networks are generally implemented and
administered using radio communication. A wireless local area
network (WLAN) links two or more devices over a short distance
using a wireless distribution method, usually providing a
connection through an access point for internet access. The use
of spreadspectrum or OFDM technologies may allow users to
move around within a local coverage area, and still remain
connected to the network.

Products using the IEEE 802.11 WLAN standards are marketed


under the Wi-Fi brand name. Fixed wireless technology
implements point-topoint links between computers or networks
at two distant locations, often using dedicated microwave or
modulated laser light beams over line of sight paths. It is often
used in cities to connect networks in two or more buildings
without installing a wired link.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 82 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Configure wireless settings

After configuring the Router and Modem we will now proceed on


setting up the wireless network.

1. First, we need to check whether you have a wireless adapter. a.


Select the Start button, type Device Manager in the search box,
and then select Device Manager. b. Expand Network adapters. c.
Look for a network adapter that might have wireless in the name

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 83 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Setting up the modem and Internet connection

After you have all the equipment, you'll need to set up your
modem and Internet connection. If your modem wasn't set
up for you by your Internet service provider (ISP), follow the
instructions that came with your modem to connect it to
your PC and the Internet. If you're using Digital Subscriber
Line (DSL), connect your modem to a phone jack. If you’re
using cable, connect your modem to a cable jack

Positioning the wireless router

Put your wireless router somewhere where it will receive the


strongest signal with the least amount of interference. For better
results, follow these tips:

a. P lace your wireless router in a central location. Place the


router as close to the center of your home as possible to increase
the strength of the wireless signal throughout your home.
b. Position the wireless router off the floor and away from walls
and metal objects, such as metal file cabinets. The fewer physical
obstructions between your PC and the router's signal, the more
likely that you'll be using the router's full signal strength

Securing your wireless network

Security is always important; with a wireless network, it's even


more important because your network's signal could be
broadcast outside your home. If you don't help secure your
network, people with PCs nearby could access info stored on your
network PCs and use your Internet connection.
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 84 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
To help make your network more secure:

Change the default user name and password. This helps


protect your router. Most router manufacturers have a default
user name and password on the router and a default network
name (also known as the SSID). Someone could use this info to
access your router without you knowing it. To help avoid that,
change the default user name and password for your router. See
the documentation for your device for instructions.

Set up a security key (password) for your network. Wireless


networks have a network security key to help protect them from
unauthorized access. We recommend using Wi-Fi Protected
Access 2 (WPA2) security if your router supports it. See the
documentation for your router for more detailed info, including
what type of security is supported and how to set it up.

Some routers support Wi-Fi Protected Setup (WPS). If your router


supports WPS and its connected to the network, follow these
steps to set up a network security key:

1. Select the Start button, look for Control Panel and click
Network and Internet. Then look for Network and Sharing Center.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 85 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
2. Select Set up a new connection or network.

3. Select Set up a new network, and then choose Next.

The wizard will walk you through creating a network name and a
security key. If your router supports it, the wizard will default to
Wi-Fi Protected Access (WPA or WPA2) security. We recommend
that you use WPA2, because it offers better security than WPA or
Wired Equivalent Privacy (WEP) security. With WPA2 or WPA you
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 86 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
can also use a passphrase, so you don’t have to remember a
cryptic sequence of letters and numbers.

W rite down your security key and keep it in a safe place


You can also save your security key on a USB flash drive by
following the instructions in the wizard. (Saving your security key
to a USB flash drive is available in Windows 8 and Windows 7,
but not in Windows 10.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area.


2. In the list of networks, choose the network that you want to
connect to, and then select Connect.
3. Type the security key (often called the password).
4. Follow additional instructions if there are any.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 87 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
SELF-CHECK. 2.3-4

Rearrange the given steps on how to configure W AN. Put the


correct sequence of steps by using numbers 1-10 in the space
provided, 1 is the First Step and 10 is the Last Step.

_____1. Change the default user name and password


_____2. Set up a security key (password) for your network
_____3. Select Set up a new connection or network.
_____4. Securing your wireless network
_____5. Select the Start button, look for Control Panel and click
Network and Internet.
_____6. Look for Network and Sharing Center.
_____7. Positioning the wireless router
_____8. Select Set up a new network, and then choose Next.
_____9. Setting up the modem and Internet connection.
_____10. We Need To Check Whether You Have A Wireless
Adapter

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 88 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Answer Key to 2.3-4

REARRANGE

1. 5
2. 6
3. 9
4. 4
5. 7
6. 8
7. 3
8. 10
9. 2
10. 1

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 89 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
INFORMATION SHEET 2.3-5

Setting Up Firewall with Advanced Security

Learning Objective:

After reading this INFORMATION SHEET, you should be able to:

1. To identify What is Firewall with Advanced Security

2. To enumerate steps in Configuring Firewall with Advanced


Security

The Windows Firewall with Advanced Security is a tool which


gives you detailed control over the rules that are applied by the
Windows Firewall. You can view all the rules that are used by the
Windows Firewall, change their properties, create new rules or
disable existing ones. In this tutorial we will share how to open
the Windows Firewall with Advanced Security, how to find your
way around it and talk about the types of rules that are available
and what kind of traffic they filter.

A firewall is hardware or software that can help protect your PC


from unauthorized users or malicious software (malware).
Running a firewall on each PC on your network can help control
the spread of malicious software on your network, and help
protect your PCs when you're accessing the Internet.
WindowsFirewall is included with this version of Windows
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 90 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Setting Up Firewall with Advanced Security

You have several alternatives to opening the Windows Firewall


with Advanced

1. One is to open the standard Windows Firewall window, by


going to "Control Panel -> System and Security -> Windows
Firewall". Then, click or tap Advanced settings.

2. In Windows 7, another method is to search for the word


firewall in the Start Menu search box and click the "Windows
Firewall with Advanced Security" result.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 91 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
3. In Windows 8.1, Windows Firewall with Advanced Security is
not returned in search results and you need to use the first
method shared above for opening it.

4. The Windows Firewall with Advanced Security looks and works


the same both in Windows 7 and Windows 8.1. To continue our
tutorial, we will use screenshots that were made in Windows 8.1.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 92 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
4. What Are The Inbound & Outbound Rules?

a. In order to provide the security you need, the Windows Firewall


has a standard set of inbound and outbound rules, which are
enabled depending on the location of the network you are
connected to.

b. Inbound rules are applied to the traffic that is coming from the
network and the Internet to your computer or device. Outbound
rules apply to the traffic from your computer to the network or
the Internet.
c. These rules can be configured so that they are specific to:
computers, users, programs, services, ports or protocols. You can
also specify to which type of network adapter (e.g. wireless, cable,
virtual private network) or user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can
access all rules and edit their properties. All you have to do is
click or tap the appropriate section in the left-side panel.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 93 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
6. The rules used by the Windows Firewall can be enabled or
disabled. The ones which are enabled or active are marked with a
green check-box in the Name column. The ones that are disabled
are marked with a gray check-box.
7. If you want to know more about a specific rule and learn its
properties, right click on it and select Properties or select it and
press Properties in the column on right, which lists the actions
that are available for your selection.

9. In the Properties window, you will find complete information


about the selected rule, what it does and in when it is
applied. You will also be able to edit its properties and
change any of the available parameters.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 94 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
9. What Are The Connection Security Rules? a. Connection
security rules are used to secure traffic between two computers
while it crosses the network. One example would be a rule which
defines that connections between two specific computers must be
encrypted.

b. Unlike the inbound or outbound rules, which are applied only


to one computer, connection security rules require that both
computers have the same rules defined and enabled.
c. If you want to see if there are any such rules on your
computer, click or tap "Connection Security Rules"on the panel
on the left. By default, there are no such rules defined on
Windows computers and devices. They are generally used in
business environments and such rules are set by the network
administrator.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 95 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Plan Training Session
Evidence Plan

Qualification Computer Systems


servicing NCII
Unit of competency:

Ways in which evidence will be


collected

The evidence must show that the


trainee…

The evidence must Observation Demonstr Third Portfol Writte


show that the & ation & party io n
Questioning Questioni Report
trainee…
ng

Set/Prepared workplace / / /
for repair job in line with
the company
requirements.

Prepared necessary tools, / / /


test instruments and
personal protective
equipment in line with
job requirement

Observed systematic / /
pre-testing
procedures in
accordance with
manufacturer’s
instructions

Identified system / /
defects/fault
symptoms using
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 96 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
appropriate tools and
equipment and in
accordance with
safety procedure

Explained identified / /
defects and faults to
the responsible
person and customer
in accordance with
enterprise or
company policy and
procedures

Replaced defective / / / /
parts/components
with identical or
recommended
appropriate
equivalent ratings

Performed control / /
setting/adjustments
in conformity with
service manual
specifications

Subjected / /
reassembled units to
final testing and
cleaning in
conformity with
manufacturer’s
specifications

Set/Prepared / /
workplace for repair
job in line with the
company
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 97 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
requirements.

Prepared necessary / /
tools, test
instruments and
personal protective
equipment in line
with job
requirements

NOTE: *Critical aspects of competency

SELF-ASSESSMENT GUIDE

Qualification: Computer system servicing NCII

Instruction Read the questions in the left


hand column of the

chart Place a check mark in the


appropriate box opposite each
question to indicate your
answers

Can I? Yes No

Set/Prepared workplace for repair job in


line with the company requirements

Prepared necessary tools, test


instruments and personal protective
equipment in line with job requirements

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 98 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Observed systematic pre-testing
procedures in accordance with
manufacturer’s instructions

Identified system defects/fault symptoms


using appropriate tools and equipment
and in accordance with safety procedures
Explained identified defects and faults to
the responsible person and customer in
accordance with enterprise or company
policy and procedures

Replaced defective parts/components with


identical or recommended appropriate
equivalent ratings Performed control
setting/adjustments in conformity with
service manual specifications Subjected
reassembled units to final testing and
cleaning in conformity with
manufacturer’s specifications

Set/Prepared workplace for repair job in


line with the company requirements.
Prepared necessary tools, test
instruments and personal protective
equipment in line with job requirements

Candidate” Name and Signature Date:

RATING SHEET FOR DEMONSTRATION

Trainee’s Name:

Trainer’s Name:

Qualification Consumer electronics Servicing NCII

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 99 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Unit of Competency Set up computer network

Date of Assessment

Time of Assessment

Instructions for Demonstration:

Given the necessary materials, tools and equipment, the


candidate must be able to:

Demonstrate the delivery of maintain/ repair domestic appliance


Materials and Equipment: power supply, oven toaster, rice
cooker, multi tester. Soldering gun and led. Electronics
Component

OBSERVATION During the demonstration of skills, did the


candidate

To show if evidence is demonstrated

Yes No N/A

Set/Prepared workplace for


repair job in line with the
company requirements.
Prepared necessary tools, test
instruments and personal
protective equipment in line
with job requirements Observed
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 100 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
systematic pre-testing
procedures in accordance with
manufacturer’s instructions
Identified system defects/fault
symptoms using appropriate
tools and equipment and in
accordance with safety
procedures

Explained identified defects and


faults to the responsible person
and

customer in accordance with


enterprise or company policy
and procedures

Replaced defective
parts/components with
identical or recommended
appropriate equivalent ratings
Performed control
setting/adjustments in
conformity with service manual
specifications Subjected
reassembled units to final
testing and cleaning in
conformity with manufacturer’s

Replaced defective
parts/components with
identical or recommended
appropriate equivalent ratings

Performed control
setting/adjustments in
conformity with service manual
specifications Subjected
reassembled units to final
testing and cleaning in
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 101 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
conformity with manufacturer’s

Candidate’s Name: Assessor’s Name:

Signature: Signature

Date: date

TABLE OF SPECIFICATION

Objectives/Conte Knowledge Compreh Applicatio # of


nt area/Topics ension n items/ %
of test

Install and
configure
computer system
4 5 10 30

Set-up Computer 4 5 10 30
System

Set up Computer 4 5 10 30
Servers

Maintain and
Repair Computer
Systems and 4 5 10 30
Network

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 102 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Total 20 30 50 100

Performance Test

Specific Instruction for the Candidate

Qualification Computer Systems Servicing NCIII

Unit of Set up Computer Networks


Competency

General Instruction:

Given the necessary tools, materials and equipment, you are


given repair maintain standard on consumer domestic
appliance ( allotted time : 15 hours)

Specific Instruction:

1. Give example of part of consumer


domestic appliance

2. Applying 5s and OHS on the practical


area.

3. . Proper handling tools on the area.

4. Proper dis assemble and assemble on


domestic appliance

5. Write the trouble on domestic appliance.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 103 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Facilitate Learning Session

QUESTIONING TOOL

Satisfactory response

Questions to probe the candidate’s Yes No


underpinning knowledge

Extension/Reflection Questions Yes No

1. Why do we  
need 5s and
OHS?

2. What is  
safety in
work place?

3. What is the importance of  


preparing all tools on
practical area?

Safety Questions

4. What is the importance of  


explaining the operations
of domestic appliance?

5. Why do you need to identify  


part of domestic appliance?

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 104 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
6. How would you identify the  
importance of marks on the
part on domestic appliance?

7. Contingency Questions  

8. What is part of domestic


appliance in trouble shooting?

9. What are basic tools for  


maintain/repair?

10. What is part of domestic  


appliance in trouble shooting?

11. How will you handle if the  


person has electrocuted?

12. How would you provide  


electrocuted person a first aid?

Job Role/Environment
Questions

13. How did you check the  


malfunction of the equipment

14. Why do you need to clean first  


practical area?

15. Why do you need to observe 


proper hand tools all the time?

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 105 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
16. Why
should you follow certain  
procedure or steps?

Rules and Regulations

17. Whatis the standard procedure


in explaining the use of a
domestic appliance?

18. Explain
the maintain and repair  
domestic understanding

19. Howis the implementation of  


procedures of the executive
troubleshooting done?

20. Why
do we need to follow OHS  
operations?

The candidate’s underpinning knowledge was: Satisfactory

Not Satisfactory

Candidate’s Name: Assessor’s Name:


Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 106 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Signature: Signature:

Date: Date:

Facilitate Learning Session

QUESTIONS ABOUT THE TRAINEE’S DEMONSTRATION OF


TASKS

Name:

Qualification: Computer Systems Servicing

Unit of Competency: Set up computer network

QUESTIONS Satisfactory Responses

Yes No

Set/Prepared workplace for repair job in line with the


company requirements.

Prepared necessary tools, test instruments and personal


protective equipment in line with job requirements

Observed systematic pre-testing procedures in


accordance with manufacturer’s instructions

Identified system defects/fault symptoms using


appropriate tools and equipment and in accordance

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 107 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
with safety procedures

Explained identified defects and faults to the


responsible person and customer in accordance with
enterprise or company policy and procedures

Replaced defective parts/components with identical or


recommended appropriate equivalent ratings

Performed control setting/adjustments in conformity


with service manual specifications

Subjected reassembled units to final testing and


cleaning in conformity with manufacturer’s
specifications

Set/Prepared workplace for repair job in line with the


company requirements

The Trainee’s underpinning knowledge about the


demonstration of tasks was:

Facilitate Learning Session

 Satisfactory  Not Satisfactory

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 108 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Feedback to the Trainee:

Overall Performance:

 Satisfactory  Not Satisfactory

Trainee Signature: Date:

Trainee Signature: Date:

Facilitate Learning Session

All Written Test of Info Sheet

Self- Check no.


TRUE OR FALSE. Read the statements carefully. Write True if the sentence
is correct and False if it is incorrect.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 109 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
1. Power supply is a device that can produce resistance?

2. Its power supply converts A.C to D.C?

3. Example of power supply is cellphone charger?

4. Alternate current is the mean source of power supply?

5. D.C power supply means Direct current?

Facilitate Learning Session

All ANSWER KEY No


1. False

2. True

3. True

4. True

5. True

Inventory of Training Resources

Resources for presenting instruction

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 110 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
 Print Resources As per As per Remarks
TR Inventory

CBLM

Handouts 2 2 0

Text Books 1 1 0

Manual 1 1 0

 Non Print Resources As per As per Remarks


TR Inventory

Power Point Presentation 1 1


0

Film 1 1 0

Resources for Skills practice of Competency #1

_________________________________________

 Supplies and Materials As per TR As per Remarks


Inventory

First aid kit 1 1 0

LCD projector 1 1 0

ESD hand tools 5 5 0

Study lamp 2 2 0

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 111 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Magnifying grass 5 5 0

Activity sheet 5 5 0

Job sheet 10 10 0

Still cabinet 2 2 0

Rubber matt 2sets 2sets 0

Safety shoes 1 1 0

Tools As per TR As per Remarks


Inventory

Too Soldering iron/gun 5 5 0

Screwdriver (assorted) 2 2 0

Nut drivers (assorted) 5 5 0

Wrenches (assorted) 1 1 0

Wrenches (assorted) 1 1 0

Multi-testers (analog/digital) 10units 10units 0

Pliers (assorted) 2units 2units 0

Pliers (assorted) 5 5 0

Pliers (assorted) 5 5 0

PCB 10 10 0

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 112 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Paint brush 5 5 0

Soldering paste 25 25 0

Equipment As per TR As per Remarks


Inventory

Power supply 1 1 0

Oven toaster 1units 1units 0

Rice cooker 2 2 0

Washing machine 1 1 0

LCD Projector 1 1 0

Television 1unit 1unit 0

Note: In the remarks section, remarks may include for repair, for
replenishment, for reproduction, for maintenance etc.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 113 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 114 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Facilitate
Learning
Session

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 115 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Module 2

Training activity Traine Facilities/To Venue Dat Remar


e ols and (Workstation/ e & ks
Equipment Are a) Ti
me
Orientation/ Computer Workstation
Attendance
LCD
Administration of Pretest Workstation
Pre-test
Module Contextual
Learning Area

Module Computer
Laboratory
Performing Job Job Sheet Workstati
Sheet on
Administration of Post test Workstati
Post test on
Training Evaluation Workstati
Evaluation Sheet on

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 116 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Facilitate Learning Session
Focus Group Discussion

Date:
Agenda: Facilitate Learning Session:
Competency-based Training Delivery:
1. Auxtero Jun Jun
2.Auxtero Jofel
3.Bautista Nina
4.Cajes Dodie
5.Depongco Kyle
6.Edang Peter
7.Garcia Ronie
8.Garcia Nhela
9.Garciano essa

CBT Concerns Discussions Resolutions/Agreement

CBT Layout Nine Areas of the Lay-out should be


lay-out were not utilized
utilized

Monitoring of Attendance were Continue to monitor the


Attendance properly attendance
monitored
Utilization of work Work area was not Make use of the work
area properly used area properly
Orientation Orientation was Continue to follow the
a. CBT done in format of orientation
b. Roles accordance the
topic and
c. TR
procedures
d. CBLM
e. Facilities

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 117 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
f. Evaluation system
RPL RPL was checked Conduct the same
before the conduct procedure
of topic discussion
Teaching methods Teaching methods Use the same method
and Technique and techniques and Technique
were delivered
properly

Monitoring of Monitoring of Follow the proper


learning activities learning activities procedure in monitoring
a. Achievement was conducted in of learning activities
chart an improper
manner.
b. Progress chart
Feedback Feedback was Retain to administer
properly proper discussion of
administered and feedback
discussed
Slow learners Slow learners were Continue to give
given attention to the slow
consideration learners
Other concerns Did not focus or Include videos, materials
elaborate the use and other paraphernalia
of variety of
teaching
techniques

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 118 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Name of Trainer Date start: Date end:

Make sure that your charts are readable.


Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 119 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Legend:

Name of Trainer Date start: Date end:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 120 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 121 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Minutes of the Meeting
Focus Group Discussion
(This is a meeting of Trainers)
Date: ________________________
Agenda:
Competency-based Training Delivery
Present:
1. Your name - Facilitator
2. ____________
3. ____________
4. ____________

CBT Concerns Discussions Resolutions/Agreement


1. CBT Layout
2. Monitoring of
Attendance
3. Utilization of work
area
4. Orientation
a. CBT
b. Roles
c. TR
d. CBLM
e. Facilities
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 122 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
f. Evaluation system
5. RPL

6. Teaching methods
and technique
7. Monitoring of
learning activities
a. Achievement chart
b. Progress chart
8. Feedback
9. Slow learners
10. Other
concerns

Training Evaluation Report

1. Title of the Report

2. Executive summary

3. Rationale

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 123 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
4. Objectives

5. Methodology

6. Results and discussion


This is the body of the report. It should contain the following parts:
Data interpretation
Data analysis
Conclusion

7. Recommendation

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 124 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 125 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 126 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Supervise Work-
Based Learning

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 127 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 128 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 129 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 130 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Sample MOA ; your institution and your industry partner
(page 25, SWBL)

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 131 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Technical Education and Skills Development Authority Instructions:
___(your institution)___ This Trainees’ Record Book (TRB) is intended to
serve as record of all accomplishment/task/activities
while undergoing training in the industry. It will
TRAINEE’S RECORD BOOK eventually become evidence that can be submitted for
portfolio assessment and for whatever purpose it will
serve you. It is therefore important that all its contents
are viably entered by both the trainees and instructor.

I.D. The Trainees’ Record Book contains all the


required competencies in your chosen qualification. All
you have to do is to fill in the column “Task Required”
and “Date Accomplished” with all the activities in
Trainee’s No._______________ accordance with the training program and to be taken
up in the school and with the guidance of the
instructor. The instructor will likewise indicate his/her
remarks on the “Instructors Remarks” column
NAME: __________________________________ regarding the outcome of the task accomplished by the
trainees. Be sure that the trainee will personally
accomplish the task and confirmed by the instructor.
QUALIFICATION: _______
It is of great importance that the content should
be written legibly on ink. Avoid any corrections or
TRAINING DURATION :_______________ (OJT hours only) erasures and maintain the cleanliness of this record.
This will be collected by your trainer and submit
the same to the Vocational Instruction Supervisor (VIS)
TRAINER: __________________________________ and shall form part of the permanent trainee’s
document on file.
THANK YOU!
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 132 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
NOTES:
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 133 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
(All Core units of competency)
Unit of Competency: 1__________________ Unit of Competency: 2 _________________________
Your qualification Your qualification

Learning Task/ Date Instructors


Outcome Activity Accomplished Remarks Learning Task/ Date Instructors
Required Outcome Activity Accomplished Remarks
 Required

__________________ ______________
Trainee’s Signature Trainer’s Signature ____________________ ________________
Trainee’s Signature Trainer’s Signature

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 134 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Unit of Competency: 3 __________________________
Unit of Competency: 4 ____________________________

Your qualification
Your qualification
Learning Task/ Date Instructors
Outcome Activity Accomplished Remarks
Required Learning Task/ Date Instructor
Outcome Activity Accomplished s Remarks
Required

_____________________ ________________
Trainee’s Signature Trainer’s Signature
_____________________ ________________
Trainee’s Signature Trainer’s Signature

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 135 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Unit of Competency: 5_____________________

NC Level I
Learning Task/ Activity Date Instructors
Outcome Required Accomplished Remarks

______________________ ________________
Trainee’s Signature Trainer’s Signature

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 136 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
TRAINEE’S PROGRESS SHEET

Name : JUAN DELA CRUZ Trainer :


Nominal
Qualification : :
Duration
Training Training Date Date Trainee’s Supervisor’s
Units of Competency Rating
Activity Duration Started Finished Initial Initial

Total Hours
Note: The trainee and the supervisor must have a copy of this form. The column for rating maybe used either by giving a numerical
rating or simply indicating competent or not yet competent. For purposes of analysis, you may require industry supervisors to give a
numerical rating for the performance of your trainees. Please take note however that in TESDA, we do not use numerical ratings

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 137 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Training Session Evaluation

Instructions:
This post-training evaluation instrument is intended to measure how
satisfactorily your trainer has done his job during the whole duration of
your training. Please give your honest rating by checking on the
corresponding cell of your response. Your answers will be treated with
utmost confidentiality.
TRAINER/INSTRUCTOR
1 2 3 4 5
Name of Trainer: ____________________________
1. Orients trainees about CBT, the use of CBLM

and the evaluation system
2. Discusses clearly the unit of competencies and
outcomes to be attained at the start of every √
module
3. Exhibits mastery of the subject/course he is

teaching
4. Motivates and elicits active participation from

the students or trainees
5. Keeps records of evidence/s of competency

attainment of each student/trainees
6. Instill value of safety and orderliness in the

classrooms and workshops
7. Instills the value of teamwork and positive

work values
8. Instills good grooming √
9. Instills value of time √
10. Quality of voice while teaching √
11. Clarity of language/dialect used in teaching √
12. Provides extra attention to trainees and

students with specific learning needs.
13. Attends classes regularly and promptly √
14. Shows energy and enthusiasm while teaching √
15. Maximizes use of training supplies and

materials
16. Dresses appropriately √
17. Shows empathy √
18. Demonstrates self-control √

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 138 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
This post-training evaluation instrument is intended to measure how
satisfactorily your trainer prepared and facilitated your training. Please
give your honest rating by checking on the corresponding cell of your
response. Your answers will be treated with utmost confidentiality.
Use the following rating scales:
5 - Outstanding
4 - Very Good/Very Satisfactory
3 – Good/Adequate
2 – Fair/Satisfactory
1 – Poor/Unsatisfactory
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
of a CBT workshop
2. Number of CBLM is sufficient
3. Objectives of every training session is well
explained
4. Expected activities/outputs are clarified
DESIGN AND DELIVERY 1 2 3 4 5
1. Course contents are sufficient to attain
objectives
2. CBLM are logically organized and presented
3. Information Sheet are comprehensive in
providing the required knowledge
4. Examples, illustrations and demonstrations help
you learn
5. Practice exercises like Task/Job Sheets are
sufficient to learn required skills
6. Valuable knowledge are learned through the
contents of the course
7. Training Methodologies are effective
8. Assessment Methods and evaluation system are
suitable for the trainees and the competency
9. Recording of achievements and competencies
acquired is prompt and comprehensive
10. Feedback about the performance of learners are
given immediately

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 139 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
TRAINING FACILITIES/RESOURCES 1 2 3 4 5
1. Training Resources are adequate
2. Training Venue is conducive and appropriate
3. Equipment, supplies, and materials are
sufficient
4. Equipment, Supplies and Materials are suitable
and appropriate
5. Promptness in providing Supplies and Materials
SUPPORT STAFF 1 2 3 4 5
1. Support Staff are accommodating

Comments/Suggestions:
Fill -up

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 140 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
SUPERVISED INDUSTRY TRAINING OR ON-THE-JOB
TRAINING EVALUATION FORM

Dear Trainees:
The following questionnaire is designed to evaluate the effectiveness of
the Supervised Industry Training (SIT) or On-the-Job Training (OJT) you
had with the Industry Partner ________________________. Please check (√)
the appropriate box corresponding to your rating for each question
asked. The results of this evaluation shall serve as a basis for improving
the design and management of the SIT in SICAT to maximize the benefits
of the said Program. Thank you for your cooperation.
Use the following rating scales:
5 - Outstanding
4 - Very Good/Very Satisfactory
3 – Good/Adequate
2 – Fair/Satisfactory
1 – Poor/Unsatisfactory

Item RATING
Question
No.
INSTITUTIONAL EVALUATION 1 2 3 4 5 N/A
Has (your institution) conducted
an orientation about the SIT/OJT
1 program, the requirements and
preparations needed and its
expectations?
Has (your institution) provided the
necessary assistance such as
2 referrals or recommendations in
finding the company for your OJT?

Has (your institution) showed


coordination with (industry
3 partner) in the design and
supervision of your SIT/OJT?
Has your in-school training
adequate to undertake (industry
4 partner) assignment and its
challenges?

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 141 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Has (your institution) monitored
5 your progress in the Industry?
Has the supervision been effective
in achieving your OJT objectives
6 and providing feedbacks when
necessary?
Did (your institution) conduct
7 assessment of your SIT/OJT
program upon completion?
Were you provided with the results
of the (industry partner) and (your
8 institution) assessment of your
OJT?
Comments/Suggestions:
FILL UP

Item RATING
Question
No.
INDUSTRY PARTNER 1 2 3 4 5 N/A
Was (industry partner)
1 appropriate for your type of
training required and/or desired?
Has (industry partner) designed
2 the training to meet your
objectives and expectations?
Has (industry partner) showed
coordination with (your institution)
3 in the design and supervision of
the SIT/OJT?
Has (industry partner) and its staff
4 welcomed you and treated you
with respect and understanding?
Has (industry partner) facilitated
the training, including the
provision of the necessary
5 resources such as facilities and
equipment needed to achieve your
OJT objectives?
Has (industry partner) assigned a
6
supervisor to oversee your work or

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 142 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
training?
Was the supervisor effective in
supervising you through regular
7 meetings, consultations and
advise?
Has the training provided you with
the necessary technical and
8 administrative exposure of real
world problems and practices?
Has the training program allowed
you to develop self-confidence,
9 self-motivation and positive
attitude towards work?
Has the experience improved your
10 personal skills and human
relations?
Are you satisfied with your training
11 in the industry?
Comments/Suggestions:
FILL UP

Signature: ________________ Qualification: ________________________


Printed Name: __________________ Supervisor: _______________________
Host Industry Partner: Instructor:
_________________________________ ___________________________________
Period of Training: _______________________________________________

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 143 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Program Evaluation Interpretation and Analysis
How to compute the average or the mean:
1. Add the points per item per rater
2. Divide the sum by the total number of raters

Example:

RATER Rating for Rating for


Item 1 Item 2
Rater A 3
Rater B 4
Rater C 5
Rater D 2
Rater E 4

Total points = 18
Number of Raters = 5

Computing for the Average or Mean


Total Points
Average =
Number of Rater

18
Average = ______________
5

Average = 3.6

Range:
0.00 - 1.49 = Poor/Unsatisfactory
1.50 – 2.49 = Fair/ Adequate
2.50 – 3.49 = Good/Satisfactory
3.50 – 4.49 = Very Good/Very Satisfactory
4.50 – 5.00 = Outstanding

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 144 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Rater A
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
X
of a CBT workshop
2. Number of CBLM is sufficient X
3. Objectives of every training session is well
X
explained
4. Expected activities/outputs are clarified X

Rater B
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
X
of a CBT workshop
2. Number of CBLM is sufficient X
3. Objectives of every training session is well
X
explained
4. Expected activities/outputs are clarified X

Rater C
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
X
of a CBT workshop
2. Number of CBLM is sufficient X
3. Objectives of every training session is well
X
explained
4. Expected activities/outputs are clarified X

Rater D
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
X
of a CBT workshop
2. Number of CBLM is sufficient X
Date Developed: Document No.
May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 145 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
3. Objectives of every training session is well
X
explained
4. Expected activities/outputs are clarified X
Rater E
PREPARATION 1 2 3 4 5
1. Workshop layout conforms with the components
X
of a CBT workshop
2. Number of CBLM is sufficient X
3. Objectives of every training session is well
X
explained
4. Expected activities/outputs are clarified X

Summary of Ratings

RATER Rating for Rating for Rating for Rating for


Item 1 Item 2 Item 3 Item 4
Rater A 4 4 4 4
Rater B 4 4 4 4
Rater C 5 5 4 5
Rater D 5 5 4 5
Rater E 4 4 4 4
TOTAL 22 22 20 22

Average Rating

PREPARATION Average
1. Workshop layout conforms with the
components of a CBT workshop 4.4

2. Number of CBLM is sufficient 4.4


3. Objectives of every training session is
well explained 4

4. Expected activities/outputs are clarified 4.4


General Average 4.3

Range:
0.00 - 1.49 = Poor/Unsatisfactory
1.50 – 2.49 = Fair/ Adequate
2.50 – 3.49 = Good/Satisfactory
3.50 – 4.49 = Very Good/Very Satisfactory
4.50 – 5.00 = Outstanding

General Interpretation:

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 146 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Based on the results, the supervised-industry training was very good/very
satisfactory having attained a 4.3 average on the preparation aspect. It is
evident that the program was well-prepared and that the trainees were
equipped with the necessary information and guidance on how to go about
with the program.

Recommendation/s:
Though it is clear that the preparation was done well, there is still a room
for improvement especially on the aspects that were not outstanding. I is
still recommended that the institution through the trainer conduct further
enhancement on how to prepare the trainees for on-the-job training. It may
also be good to review the methodologies of the preparation and institute
some changes in order to achieve an outstanding rating.

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 147 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
Maintain
Training
Facilities

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 148 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
WORKSHOP LAYOUT

Date Developed: Document No.


May 2018 Issued by:
Date Revised:
COMPUTER
SYSTEMS Amici initiati Page 149 of 61
Developed by:
SERVICING NCII Flaviano Incorporated
Auxtero Jr Revision #
OPERATIONAL PROCEDURE
Equipment Type
Equipment Code
Location
Operation Procedure:

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 150
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
OPERATIONAL PROCEDURE CHECKLIST
YES NO
Did you?
1. ?
2. ?
3. ?
4. ?
5. ?
6. ?

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 151
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
HOUSEKEEPING SCHEDULE

Qualification Station/Bldg

Area/Section

In-Charge
ACTIVITIES Schedule for the 2nd Semester, 2011
Responsible Daily Every Weekly Every Month Remarks
(Based on your Person other 15th ly
Day Day
qualification)
1. Clean and check welding
equipment/ accessories
from dust and oil; dry and
properly laid-out/
secured/stable
2. Clean and free welding
booths and welding
positioners from dust/rust
/gums, used Mig wire
stubs and metal scraps
3. Clean and arrange working
tables according to floor
plan/lay-out; check
stability
4. Clean and check floor,
walls, windows, ceilings
• graffiti/dust/rust
• cobwebs and
outdated/unnecessary
objects/items
• obstructions
• any used
materials/scraps
(slugs, stubs) spilled
liquid
• open cracks (floor)
5. Clean and check work shop
ventilation and
illumination by dusting
lamps/bulbs, replacing
non-functional lamps and
keeping exhaust clean

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 152
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
6. Clean and check computer
set -monitor, CPU,
keyboards, mouse – free,
unnecessary markings,
dust; cables and plugs are
in order; well-arranged; all
items functional
7. Clean, inspect air
conditioning equipment:
• keep screen and filter
free from dust/rust
• Check selector knobs if
in normal positions and
are functional
• Check if drainage is OK
8. Clean, check and maintain
Tool Room
• Free of dust, not damp
• Tools in appropriate
positions/locations
• With visible
labels/signage
• Logbook and forms are
complete, in order and
updated
• Lights, ventilation – OK
10. Clean and check Rest
Room
• Urinals, bowls, wash
basins, walls and
partitions are free from
stains, dirt, oils, graffiti
and unnecessary
objects;
• Ceilings free from
cobwebs and dangling
items
• Floor is kept dry; no
broken tiles or
protruding objects
• Equipped with dipper
and pails; properly
located after use
• Water systems is
functional: no
dripping/damaged
faucets or pipes
• Drainage system is
working, no water-
clogged areas
• No offensive odor
• Lights /Ventilation –
OK

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 153
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
9. Clean and check wash
area:
• Walls/Floors- –free
from oils, molds,
broken tiles, gums,
stains or graffiti
• Drainage system is
functional
• Water system
functional; no dripping
faucets or leaking pipes
• Free from unnecessary
objects (mops, rags)

10. Clean and maintain work


shop surroundings by
sweeping/ removing fallen
leaves, branches, debris
and other refuse,
impounded water, clearing
pathways of obstructions

11. Disposal of waste


materials
(Follow waste segregation
system)

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 154
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
___________ WORKSHOP HOUSEKEEPING INSPECTION
CHECKLIST
Area/Section In-charge
DAILY TASK YES NO

WEEKLY TASK YES NO

MONTHLY TASK YES NO

REMARKS
Inspected by: Date:

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 155
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
EQUIPMENT MAINTENANCE SCHEDULE

EQUIPMENT TYPE
EQUIPMENT CODE
LOCATION
Schedule for the Month of _______
MANPOWER Daily Every Weekly Every Monthly Remarks
ACTIVITIES Other 15th
Day Day
(Based on your
qualification)
1. Check panel board, and
circuit breakers’
electrical connections,
cables and outlets
 Clean and kept dry
 Parts are well-
secured/attached
 Properly labeled

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 156
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
2. Check Mig gun (nozzle,
contact tip, diffuser)
and ground cable:
 Clean and kept dry
 Parts are well-
secured/ attached
 Inspect for damages
and replace parts if
necessary
3. Check adjustment
lever’s if functional
(amperages/speed); if
not, calibrate

4. Check Gas cylinder


outfit for any
abnormality
 Gate valve
 Co2 regulator
 Gas hose Fittings
 Fittings
5. Check/Clean wire
feeder (rollers, wire
speed/spool
adjustment); remove
used oil, dust; keep
dry.

6. Run the equipment for


5 minutes and observe
for unusual noise or
abnormal operation; if
repair is necessary,
send to technician.

EQUIPMENT MAINTENANCE INSPECTION CHECKLIST

Equipment Type :
Property Code/Number :
Location :
YES NO INSPECTION ITEMS

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 157
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Remarks:

Inspected by: Date:

WASTE SEGREGATION LIST


Qualification
Area/Section
In-Charge
WASTE SEGREGATION METHOD
General/Accumulated Wastes
Recycle Compose Dispose

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 158
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
TAG OUT INDEX CARD
Description
Date Type (System components, test
Log Serial
Issued (Danger/Caution) reference, etc.)

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 159
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
WORK REQUEST

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 160
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Unit Description:

Observation/s: Date Reported:

Reported by:

Activity: Date completed:

Spare parts used: Signature:

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 161
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Breakdown / Repair Report

Property ID Number
Property Name
Location
Findings Recommendation

Inspected by: Reported to:

Date: Date:

Assigned to: Received assignment:

Date: Date:

Subsequent Action Taken: Recommendation:

By Technician: Reported to:

Date: Date:

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 162
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
SALVAGE REPORT

AREA / SECTION
IN-CHARGE
FACILITY TYPE PART ID RECOMMENDATION

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 163
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
EQUIPMENT RECORD WITH CODE
AND PICTURE

No. Location Eqpt. Qty Title Descrip- Picture


tion
#
1
2
3

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 164
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
INSPECTION REPORT A

Property ID No.

Property Name

Location

Findings: Recommendation:

Inspected by: Reported to:

Date Date

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 165
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
INSPECTION REPORT B

Area/Section

In-charge

PROGRESS/
FACILITY TYPE INCIDENT ACTION TAKEN
REMARKS

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 166
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Purchase Request

Indicate the amount and purpose

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 167
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 168
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
UTILIZE
ELECTRONIC
MEDIA

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 169
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
CD

MODULE 2: FACILITATE LEARNING SESSION


CODE:TVT232302

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 170
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Sector : ELECTRONICS

Qualification Title: COMPUTER SYSTEMS SERVICING NC II

Unit of Competency: SET UP COMPUTER NETWORK

Module Title: INSTALLING AND CONFIGURING COMPUTER SYSTEMS

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 171
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
POBLACION III TABILARAN CITY

Facilitate
Learning
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 172
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Session

Training Activity Matrix


Training Activity Trainee Facilities/Tools Venue Date & Remar
and Equipment Time ks
(Worksta-
tion/ Area)
Prayer
Recap of Activities All  Multimedia Contextua October
Unfreezing Train- Projetor l Learning 2,2019
Activities ees  PPT Area 8:00
Feedback of  Laptop AM to
Training  Handouts 5:00 PM
Rejoinder/
Motivation

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 173
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Practical
 Determine and Group  PPE Work area Procee
plan the cable 1  Digital Multi d to
route Tester& all Workstati October next
Identify and obtain tools for on 2: 2 2019 Learni
network materials assembly ng
necessary to  Operating Set up 5 outco
complete the work System computer days mes
 Application networks
 obtain the
needed tools, Softwares
equipment and PSU
testing device  Mouse
 Use appropriate  Keyboard
personal  Monitor
protective
equipment
 Perform cable
splicing based on
standards
 Install network
cable and cable
raceway
 Perform and
check
installation work
 Follow 5S and
3Rs

Practical
 Check network Group  Wireless Work area Procee
connectivity of 2 Router October d to
terminals  Switch Station 2: 2,2019 next
 Diagnose and Hub/Patch compe
remedy fault or Panel Set up tency
problem in  Operating computer 5
network system System networks Days
 Configure  Drivers
network interface  Telco
and setting Provider
 Carry out  Crimping
communication Tool
checking  Network
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 174
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
between Tester/ LAN
terminals Tester
 Respond to  RJ45
unplaned events  UTP Wire
and  Wire Stripper
communication  Wire Cutter
 Degital Multi
Tester

 Configure client Group  Client Practical Procee


device system 3 Personal Work area October d to
settings Computer 2,2019 next
 Configure local  Wireless Station 2: learni
area network port Router ng
 Configure wide area  Switch Set up 10 days outco
network port Hub/Patch computer mes
 Configure wireless Panel networks
settings  Client
 Configure Operating
security/firewall/adva System
nce settings  Windows
Server
Operating
System
 PSU
 Mouse
 Keyboard
 Monitor

 Undertake final Group  PPE Practical Procee


inspection 4  Digital Multi Work area October d to
Tester 2, 2019 next
 Check computer  Anti Static learni
networks Mat Station 2: ng
 Anti-static 10 outco
 .Prepare complete Wrist Trap Set up Days mes
reports and all tools computer
in PC networks
Assembly

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 175
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
 Drivers
 Application
Softwares

 Mouse
 Keyboard
 Monitor
 Working
Table
 Printer

Groupings of the students:

Group 1
Auxtero Jun Jun
Auxtero Jofel
Bautista Nina

Group 2
Cajes Dodie
Depongco Kyle
Edang Peter

Group 3
Garcia Ronie
Garcia Nhela
Garciano essa

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 176
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Group 4
GarciaKikay
Tabique Alfie
Tabigue Roger
Samura Kie

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 177
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 178
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 179
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 180
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
PRE-TEST AND POST TEST

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 181
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
I. MULTIPLE CHOICE:
Choose the letter of the best answer. Write the letter of your
choice on your answer sheet.

1. Cabling infrastructure that consists of a number of


standardized smaller elements (hence structured) called
subsystems
a. Structured cabling
b. Spaghetti Cabling
c. Cable pulling
2. Refers to the installation of equipment to secure cables for
electrical services in a building.
a. Structured cabling
b. Spaghetti Cabling
c. Cable Management
3. Cables can easily become tangled, making them difficult to
work with, sometimes resulting in devices accidentally
becoming unplugged as one attempts to move a cable.
a. Structured cabling
b. Spaghetti Cabling
c. Cable Management
4. A large spectacles, with shields around the rims, for protecting
the eyes from dust, excessive light, wind, etc.
a. Googles
b. Gloves
c. Apron
5. It protect and comfort hands against cold or heat, damage by
friction, abrasion or chemicals, and disease; or in turn to
provide a guard for what a bare hand should not touch
a. Googles
b. Gloves
c. Apron
6. A covering for the face to prevent the inhaling or absorbing
dust and other chemicals.
a. Apron
b. Gloves
c. Mask
7. A garment worn over the front of the body as a protection for
one’s cloth.
a. Gloves
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 182
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
b. Apron
c. Googles

8. It refers to the physical equipment or components of an


electronic data processing system.
a. Software
b. Hardware
c. Peopleware
9. It represents the personnel involved in system analysis,
programming, computer operations, and system maintenance.
a. Software
b. Hardware
c. Peopleware
10. Which tool is used for hardware to stand on to prevent static
electricity from building up?
a. Anti-static mat
b. Hex driver
c. Wire cutter
11. Which tool is used to loosen or tighten cross-head screws?
a. Anti-static mat
b. Philips head screwdriver
c. Hex driver
12. Which tool is sometimes called a nut driver?
a. Anti-static mat
b. Philips head screwdriver
c. Hex driver
13. Which tool is used to strip and cut wires?
a. Anti-static mat
b. Philips head screwdriver
c. Wire cutter

14. Which tool is used to retrieve parts from location that are too
small for your hand to fit?
a. Part Retriever
b. Cable ties
c. Lint-free Cloth

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 183
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
15. Which tool is used to clean different computer components
without scratching or leaving debris?
a. Lint-free Cloth
b. Cable ties
c. Part Retriever

16. A glue that holds your home network together


a. router
b. Hub
c. DSL
d. Ethernet cable
17. What boot configuration utility allows setting the programs
that will run at startup?
a. Ipconfig
b. msconfig
c. regedit
d. d. dxdiag
18.What application allows you to edit the registry?
a. Ipconfig
b.msconfig
c. regedit
d.dxdiag
19.Which of the following enables you to test sound and graphics
output?
e. Ipconfig
f. msconfig
g. regedit
h. dxdiag
20.Which of the following is an applet that controls the look of
windows?
i. Appearance and Themes
j. Performance and Maintenance
k.Network and Internet
l. Sounds, Speech and Audio

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 184
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
PRE-TEST/POST TEST ANSWER KEY

1. A
2. C
3. B
4. A
5. C
6. A
7. B
8. C
9. C
10. C
11. C
12. A
13. A
14. B
15. B
16. B
17. C
18. D
19. A
20. B

Sample Analysis
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 185
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Male:
1 Auxtero Jun Jun 12 27
Auxtero Junar 24 39
2
Auxtero Jofel 17 32
3
Cajes Dodie 26 40
4
Depongco Kyle 34 38
5
Edang Peter 29 40
6
GarciaKikay 27 35
7
Tabique Alfie 37 38
8
Tabigue Roger 34 35
9
Samura Kie 28 38
10
11 Sali, Jeremie 18 33
12 Sorias, John victor Renan 34 37
13 Velasquez, Joven 27 36
14 Villanueva, Emerson 23 38
Female:
15 Abapilo, Mildred 29 36
16 Abellos, Jennie Babe 37 39
17 Austria, Jovelyn 32 34
18 Autidas, Geraldine 29 36
19 Auturoza, Jean 30 38
20 Auza, Angelika 36 34
21 Auza, Lyka 32 33
22 Auza, Rhealyn 33 38
23 Avenido, Anbecil 28 37
24 Avergonzado, Anariza 29 33
25 Babatid, Cresil 33 35

Presented below is a hypothetical data of the pretest and posttest


scores which will be the basis of our discussions and example for analyzing
the results of a pretest and post-test.

Graph of the Pretest and Post Test Scores

Pre-Test and Post-Test


Date Developed: Document No.
45
COMPUTER October 2019 Issued by:
40 SYSTEMS Page 186
35 SERVICING Developed by: of 7
30 NCII Flaviano Auxtero Jr
Revision #
25
20
15
The graph shows the result of the pre-test and post test
conducted. The blue line represents the pre-test scores of the
trainees and the red line represents the post test scores.
Generally, post test scores are always higher than the pre-test
scores.

In order to establish the statistical data in the increase of


scores in post test from the pre-test, we test the null hypothesis
which means that “there is no significant differences between the
pre and post test scores” using paired t-test.

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 187
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
The Statistical Table

t-Test: Paired Two Sample for Means

Pre Post
Mean 26.44 30.36
Variance 21.25667 23.82333
Observations 25 25
Pearson Correlation 0.596279
Hypothesized Mean 0
Difference
Df 24
t Stat -4.58885
P(T<=t) one-tail 5.91E-05
t Critical one-tail 1.710882
P(T<=t) two-tail 0.000118
t Critical two-tail 2.063899

The average for post-test is equal to 30.36 and 26.44 for


pre-test. The t-statistical is equal to -4.59 and t-critical value is
equal to 5.91. Since t-statistical is greater than t-critical value,
we reject the null hypothesis.

Therefore I conclude that the post test scores of the trainees


increased.

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 188
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Minutes of the Meeting
Focus Group Discussion

Date: October 14, 2019


Agenda:
Competency-Based Training Delivery
Present:
1.Auxtero Jun Jun
2.Auxtero Junar
3. Auxtero Jofel
4. Cajes Dodie
5.Depongco kyle

CBT Concerns Discussions Resolutions/


Agreement
1.CBT Layout
It is agreed that each
Trainor will choose
his/ her own lay-out
and measurement
based on their training
needs.

2.Monitoring of
Attendance Attendance of the
group is strictly
monitored.

3.Utilization of work
area
4.Orientation

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 189
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
5.CBT It is agreed by the
6.Roles group that based on
7.TR that the CBT we will
8.CBLM discuss the following:
9.Facilities a. Competency-Based
10.Evaluation system Training 10
principles
b. Roles of the
Trainees and
Trainor

c. Training Regulation
of each qualification
d. The Competency
Based Learning
Materials of our
qualification that we
are already
prepared for the
CBT delivery
e. If possible, we
agreed that we
bring/ produce real
tools, facilities or
equipment for the
training.
f. And we have agreed
also, that in the last
part of the CBT
there should be a
proper distribution
of evaluation
instrument.

Date Developed: Document No.


COMPUTER October 2019 Issued by:
SYSTEMS Page 190
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #
Date Developed: Document No.
COMPUTER October 2019 Issued by:
SYSTEMS Page 191
SERVICING Developed by: of 7
NCII Flaviano Auxtero Jr
Revision #

You might also like