You are on page 1of 4

COMPUTER SYSTEMS SERVICING 11

FIRST QUARTER
Quarter: 1 Week: 8 Day: 1 Activity No. 29
Competency: Conduct testing and documentation (TLE_IACSS9-12ICCS-IIIf-j-32)
Objective: Define stress test and identify the different stress testing method
Topic: Computer System Stress Testing
Reference CG, https://www.softwaretestinghelp.com/computer-stress-test-software/
Copyright: For classroom use only

Concept Notes:
STRESS TESTING
Stress testing is the process of determining the ability of a computer, network, program or
device to maintain a certain level of effectiveness under unfavorable conditions. The term also refers to
qualitative evaluation of factors such as availability or resistance to denial-of-service (DoS) attacks.
Stress testing is often done in conjunction with the more general process of performance testing. Stress
testing can be time-consuming and tedious. Stress testing can provide a means to measure graceful
degradation, the ability of a system to maintain limited functionality even when a large part of it has
been compromised.
The main purpose of stress testing is to check the recoverability of system, program, device, or
network.

Five (5) different types of stress testing


1. Distributed Stress Testing
2. Application Stress Testing
3. Transactional Stress Testing
4. Systemic Stress Testing
5. Exploratory Stress Testing

The image given beside will show you the different factors of stress
testing.

Actions involved may include:


➢ Running several resource-intensive applications in a single computer at the same time

➢ Attempting to hack into a computer and use it as a zombie to spread spam


➢ Flooding a server with useless e-mail messages
➢ Making numerous, concurrent attempts to access a single Web site
➢ Attempting to infect a system with viruses, Trojans, spyware or other malware.

TYPES OF COMPUTER STRESS TEST

A. CPU Stress Testing is performed to check the CPU’s performance after running it at a full speed
completely up to maximum temperature. When CPU stress testing is performed, all the cores of the
multi-core system will get used. CPU will get tested with the compatible and justified workload.
B. GPU Stress Testing is performed to check its limits by utilizing its full processing power. Stress
testing a RAM is the first thing that you should perform if you are facing any of the problems like
bluescreen or system reboot. Different tools use different techniques for checking the performance of
the system. For Example, some tools use a 3D scene or some use the prime numbers.
C. Hardware Stress testing should be performed according to its usage. While performing
hardware stress testing make sure that your CPU is well ventilated, is cooled down properly, etc.
Most importantly, check if the power supply is good.

Activity:
1. What is stress testing?
2. What is the main purpose of stress testing?
3. What are computer stress test?
COMPUTER SYSTEMS SERVICING 11
FIRST QUARTER
Quarter: 1 Week: 8 Day: 2 Activity No. 30
Competency: Conduct testing and documentation ( TLE_IACSS9-12ICCS-IIIf-j-32)
Objective: Differentiate 5s and 3R
Topic: 5S and 3Rs Environmental Policies
Reference CG, https://en.wikipedia.org/wiki/Environmental_policy
Copyright: For classroom use only

Concept Notes:
An environmental policy is a statement about an organization’s environmental position and values.
The ISO 14001 standard states that an environmental policy is the
organization’s overall environmental performance intentions and
direction formallyexpressed by top management.
The benefits of 5S are:
1. Cleaner and safer work areas
2. Less wasted time through moreworkplace organization
3. Less space
4. Improved self-discipline
5. Improved culture

• Sorting - separating the needed from the unneeded. Sorting activities


aim to eliminate unneeded items from the work area and to
perform an initial cleaning.
• Simplifying – a place for everything and everything in its place, clean and ready for use. Simplifying
arranges the workplace to
ensure safety and efficiency.
• Systematic Cleaning - cleaning for inspection. Systematic daily cleaning and inspection of work areas and
equipment help you
understand current conditions and determine if corrective action is required.
• Standardizing - developing common methods for consistency. Standardizing aims to make abnormal
conditions noticeable and to
document agreements to ensure consistency and sustainability.
• Sustaining - holding the gains and improving. Sustaining is aimed at maintaining the improvements from
the other 5S activities and
improving further.

Three R’s (3r’s)– Reduce, Reuse and Recycle

Reduce: The first step towards the effective waste management is to consume only a limited number
of resources, which are
essential.
• Helps in saving energy and money
• Helps in utilizing a product to its fullest extent
• Helps in saving natural resources
• Helps in reducing pollution caused by harvesting of new raw materials.
Reuse: Reusing your old things for a little longer can play a major role in reducing lot of waste in your
surroundings.
Major advantages of employing this policy in our daily lives:
• Helps in the reduction of gas emissions, which is majorly contributing to the global climate change
• Helps in sustaining the beautiful surroundings and environment for our future generations
• Helps in reducing waste that needs to be recycled or sent to incinerators and landfills.
Recycle: Recycling is one of those R’s that has caught the maximum attention of all age groups. It
is mainly due to the number of recycling programs, which are run by the government and the
municipalities.
Activity:
1. What is Environmental Policy?
2. Enumerate the 5S’s
3. Enumerate the 3R’s
COMPUTER SYSTEMS SERVICING 12
FIRST QUARTER
Quarter: 1 Week: 8 Day: 3 Activity No. 31
Competency: Install network cables ( TLE_IACSS9-12SUCN-IVa-j-33)
Objective: Define a computer Network and identify computer networks
Topic: Computer Network
Reference CG, https://www.fieldengineer.com/blogs/what-is-a-computer-network
Copyright: For classroom use only

Concept Notes:
Computer networks are the basis of communication in IT. They are used in a huge variety of ways
and can include many different types of network. A computer network is a set of computers that are
connected together so that they can share information. The earliest examples of computer networks are from
the 1960s, but they have come a long way in the half-century since then.

TYPES OF NETWORK
There are many different types of network, which can be used for different purposes and by different
types of people and organization. Here are some of the network types that you might come across:
• Local Area Networks (LAN) - A local area network or LAN is a network that connects computers
within a limited area. This might be in a school, an office or even a home.
• Personal Area Networks (PAN) - A personal area network is a network that is based on an individual's
workspace. The individual's device is the center of the network, with other devices connected to it.
There are also wireless personal area networks.
• Home Area Networks (HAN) - A home area network connects devices within a home environment.
It might include personal computers, tablets, smartphones, printers, TVs and other devices.
• Wide Area Networks (WAN) - A wide area network is a network that covers a larger geographical area,
usually with a radius of more than a kilometer.
• Campus Networks - A campus network is a LAN or set of connected LANs which is used by a
government agency, university, corporation or similar organization and is typically a network across a
set of buildings that are close together.
• Metropolitan Area Networks (MAN) - Metropolitan area networks are networks that stretch across a
region the size of a metropolitan area. A MAN is a series of connected LANs in a city, which might
also connect to a WAN.
• Enterprise Private Networks - An enterprise private network is used by a company to connect
its various sites so that the different locations can share resources.
• Internetworks - Internetworks connect different networks together to build a larger network.
Internetworking is often used to describe building a large, global network.
• Backbone Networks (BBN) - A backbone is a part of a network that connects different pieces and
provides a path for information to be exchanged.
• Global Area Networks (GAN) - A global area network is a worldwide network that connects networks
all over the globe, such as the internet.

Activity:
_______________ 1. network connects devices within a home environment.
_______________ 2. area networks are networks that stretch across a region the size of a metropolitan area.
_______________ 3. network that connects computers within a limited area. This might be in a school, an
office or even a home.
_______________ 4. basis of communication in Information Technology.
_______________ 5. network that covers a larger geographical area, usually with a radius of more than a
kilometer.
COMPUTER SYSTEMS SERVICING 12
FIRST QUARTER
Quarter: 1 Week: 8 Day: 4 Activity No. 32
Competency: Install network cables ( TLE_IACSS9-12SUCN-IVa-j-33)
Objective: Understand the different protocol in computer networking.
Topic: Protocol of The Computer Network
Reference CG, https://searchnetworking.techtarget.com/definition/protocol
Copyright: For classroom use only

Concept Notes:
Network protocols are sets of established rules that dictate how to format, transmit and receive
data so computer network devices -- from servers and routers to endpoints -- can communicate regardless of
the differences in their underlying infrastructures, designs or standards.
To successfully send and receive information, devices on both sides of a communication
exchange must accept and follow protocol conventions. Support for network protocols can be built into
software, hardware or both.
Network protocols are formal standards and policies comprised of rules, procedures and formats
that define communication between two or more devices over a network. Network protocols govern the end-
to-end processes of timely, secure and managed data or network communication. Protocols' are developed
by industry wide organizations.
Types of Protocols

1. Transmission Control Protocol (TCP) is a popular communication protocol which is


used for communicating over a network. It divides any message into series of packets that are sent from
source to destination and there it gets reassembled at the destination.
2. Internet Protocol (IP) is designed explicitly as addressing protocol. It is mostly used with TCP. The IP
addresses in packets help in routing them through different nodes in a network until it reaches the
destination system. TCP/IP is the most popular
protocol connecting the networks.
3. User Datagram Protocol (UDP) is a substitute communication protocol to Transmission Control
Protocol implemented primarily for creating loss-tolerating and low-latency linking between different
applications.
4. Post office Protocol (POP) POP3 is designed for receiving incoming E-mails.
5. Simple mail transport Protocol (SMTP) is designed to send and distribute outgoing E-Mail.
6. File Transfer Protocol (FTP) allows users to transfer files from one machine to another. Types of files
may include program files, multimedia files, text files, and documents, etc.
7. Hyper Text Transfer Protocol (HTTP) is designed for transferring a hypertext among two or more
systems. HTTP is designed on Client-server principles which allow a client system for establishing a
connection with the server machine for making a
request. The server acknowledges the request initiated by the client and responds accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS) is a standard protocol to secure the communication
among two computers one using the browser and other fetching data from web server. HTTPS is used for
transferring data between the client browser (request) and the web server (response) in the hypertext
format, same in case of HTTPS except that the transferring of data is done in an encrypted format.
9. Telnet Protocol Telephone network (Telnet) protocol was designed to provide a general bi-direction
communications stream between computers; Telnet is a set of rules designed for connecting one system
with another. The connecting process here is termed as remote login. The system which requests for
connection is the local computer, and the system which accepts the connection is the remote computer.
10. Gopher was designed to access a Web server or database via the Internet. It requires that files be
stored in a menu-style hierarchy on a Gopher server that is accessible through a Gopher-enabled client
browser and/or directly. It initially supported only text-based file/document access but later came to
support some image formats such as GIF and JPEG.
Activity:
1. Define Network Protocols?
2. How to successfully send and receive information?
3. What are the types of Computer Network Protocol?

You might also like