You are on page 1of 124

Quarter 2

Introduction to Computer System


Servicing

COMPUTER SYSTEM SERVICING


CVE, College INC
Quarter 2
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Module

Chapter 1: Preparing for Hardware and Software Installation

Objectives:

 Learn about Safety Hazard in the computer laboratory


 Learn to read basic pre-cautions and signage to avoid injuries and illness

Watch the video https://www.youtube.com/watch?


v=-pQb99daOiw&t=4s

. Plan and Prepare for Configuration of Computer Systems and Networks.


 
 
Follow Occupational Health and Safety (OHS) procedures in planning and preparing for Hardware and
Software Installation.

Lesson 1. Plan and Prepare for Configuration of Computer Systems and Networks.
This lesson is intended to develop your skills in planning and preparing for configuration of computer
system and networks. At the end of this lesson you are expected to:
 
Follow OHS in planning and preparing for configuration of computer systems and networks;

2. Look at the pictures below and reflect the innermost importance of such word. 2. Look at the
pictures below and reflect the innermost importance of such word.

1
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

As a hopeful computer technician, you should be alert of all probable risks in the workplace. It is a must
to follow appropriate procedures for handling computer equipment.
 
Failure to follow the recommended safety procedures could result damage to equipment, claims for
damage from the owner of the property and data, harm, or even death.

2
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Assessment 1

General Directions: Read the items very carefully. Write your answer in a clean sheet of paper.

Test I. True or False


Directions: State your agreement or dis agreement with the statement below. Write True if you agree
and False if you disagree.

_______1. A fire extinguisher and first aid kit should always be available in the
workplace.

_______2. Opening the power supply of a monitor is never allowed.

_______3. Before opening a case and performing services make it a habit to always unplug the power
from the source

_______4. Food and drinks inside the laboratory is strictly prohibited

_______5. A systematized, clean and well-lit workplace is considered safe environment.

_______6. Whether you’re a professional or a beginner staying safe must be put into priority to prevent
troubles and damage to any person or damage to any object in a work area.

_______7. The most important one is SWITCHING OFF. The first step is to
stop the flow of electricity into your computer

_______8. Know where the fire extinguisher is located and learn how to use it.

_______9. It is a must to follow appropriate procedures for handling computer equipment.

3
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

_______10. Lift heavy objects with sturdy leg support to avoid back injury

_______11. It is vital to stay safe in every working conditions.

_______12. Health and safety are of the outmost importance.

_______13. If you must leave your computer on and unattended for whatever
reason, turn off the monitor during your absence.

_______14. Even when unplugged power supplies can retain dangerous voltage.

_______15. Monitors generate high voltage internally which is potential to start an electrical fire.

OHS Essay:

Let’s check your reflection with these guide questions.


 
1. What is OHS?

2. List some OHS found in the video.

3. Is OHS important? Why & Why Not? (3-5 Sentences) 10pts.

4
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Chapter 2: The Basic Function of a Computer


Objectives:

 Learn about input and output devices


 Learn the difference of storage and memory
 Learn about the relation of RAM and Processor
 Learn about the cycle of 4 basic function of a Computer

Lesson 1: 4 Basic Function of a Computer

Lesson 2: Input & output

What is input and output?


Is the communication between an information processing system, such as a computer, and the outside
world, possibly a human or another information processing system.

 Inputs -are the signals or data received by the system and outputs are the signals or data sent from it. 
Outputs-outputs are the signals or data sent from it. The output from these devices is the computer's

5
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

input. Similarly, printers and monitors take signals that a computer outputs as input, and they convert
these signals into a representation that human users can understand. 

Input Devices

Keyboards-Is a human interface device which is represented as a layout of buttons. Each button, or key,
can be used to either input a linguistic character to a computer, or to call upon a particular function of
the computer. 

KEYER-A keyer is a device for signaling by hand, by way of pressing one or more switches. Modern
keyers typically have a large number of switches but not as many as a full-size keyboard typically
between four and fifty.

6
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Lighted Program Function Keyboard

The Lighted Program Function Keyboard (LPFK) is a computer input device manufactured by IBM that


presents an array of buttons associated with lights. Each button is associated to a function in
supporting software, and according to the availability of that function in current context of the
application; the light is switched on or off, giving the user a graphical feedback on the set of available
functions. Usually the button to function mapping is customizable.

7
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Computer mouse-Is a pointing device (hand control) that detects two-dimensional motion relative to a


surface. This motion is typically translated into the motion of a pointer on a display, which allows a
smooth control of the graphical user interface.

Touchpad-A touchpad, track pad or mouse pad is a pointing device featuring a tactile sensor, a
specialized surface that can translate the motion and position of a user's fingers to a relative position on
the operating system that is outputted to the screen.  Touchpads are a common feature of laptop
computers, and are also used as a substitute for a mouse where desk space is scarce.

8
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Pointing stick-Is an isometric joystick used as a pointing device, as with a touchpad or trackball, typically


mounted in a computer keyboard. Movements of the pointing stick are echoed on the screen by
movements of the pointer (or cursor) and other visual changes.

Touchscreen-Is an important source of input device and output device normally layered on the top of


an electronic visual display of an information processing system. A user can give input or control
the information processing system through simple or multi-touch gestures by touching the screen with a
special stylus and/or one or more fingers.

Trackball-Is a pointing device consisting of a ball held by a socket containing sensors to detect a rotation


of the ball about two axes—like an upside-down mouse with an exposed protruding ball. The user rolls
the ball with the thumb, fingers, or the palm of the hand and their nails to move a pointer.

Composite devices

Input devices, such as buttons and joysticks, can be combined on a single physical device that could be

9
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

thought of as a composite device. 

Joystick-A joystick is an input device consisting of a stick that pivots on a base and reports its angle or
direction to the device it is controlling. A joystick, also known as the control column.

Gamepad-a gamepad (also called joypad), is a type of game controller held in two hands, where the
fingers (especially thumbs) are used to provide input. They are typically the main method of input
for video game consoles.

10
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Paddle-a paddle is a game controller with a round wheel and one or more fire buttons, where the wheel
is typically used to control movement of the player object along one axis of the video screen. A paddle
controller rotates through a fixed arc (usually about 330 degrees); it has a stop at each end.

Jog dial- a jog dial, jog wheel, shuttle dial, or shuttle wheel is a type of knob, ring, wheel, or dial which
allows the user to shuttle or jog through audio or video media. It is commonly found on models of CD
players which are made for disc jockeys, and on professional video equipment such as video tape
recorders. 

11
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Wii Remote-The Wii Remote also known colloquially as the Wiimote, is the primary controller


for Nintendo's Wii console. A main feature of the Wii Remote is its motion sensing capability, which
allows the user to interact with and manipulate items on screen via gesture
recognition and pointing through the use of accelerometer and optical sensor technology. 

VIDEO INPUT DEVICES


Video input devices are used to digitize images or video from the outside world into the computer. The
information can be stored in a multitude of formats depending on the user's requirement.

Digital camera-is a camera that encodes digital images and videos digitally and stores them for later
reproduction. Most cameras sold today are digital, and digital cameras are incorporated into many
devices ranging from PDAs and mobile phones (called camera phones) to vehicles.

12
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Camcorder-is an electronic device combining a video camera and recorder. Although marketing


materials may use the colloquial term "camcorder", the name on the package and manual is often
"video camera recorder".

Portable media player-a portable media player (PMP) or digital audio player (DAP) is a


portable consumer electronics device capable of storing and playing digital media such as audio, images,
and video files.

Webcam-a webcam is a video camera that feeds or streams its image in real time to or through


a computer to computer network. When "captured" by the computer, the video stream may be saved,
viewed or sent on to other networks via systems such as the internet, and email as an attachment.

13
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Kinect-(codenamed Project Natal during development) is a line of motion sensing input


devices by Microsoft for Xbox 360 and Xbox One video game consoles and Windows PCs. Based around
a webcam-style add-on peripheral, it enables users to control and interact with their console/computer
without the need for a game controller, through a natural user interface using gestures and spoken
commands.

Image scanner-often abbreviated to just scanner, although the term is ambiguous out of context
(barcode scanner, CAT scanner etc.)—is a device that optically scans images, printed text, handwriting or
an object and converts it to a digital image. 

14
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Fingerprint recognition-Fingerprint recognition or fingerprint authentication refers to the automated


method of verifying a match between two human fingerprints. Fingerprints are one of many forms
of biometrics used to identify individuals and verify their identity.

Barcode reader -is an electronic device that can read and output printed barcodes to a computer. Like
a flatbed scanner, it consists of a light source, a lens and a light sensor translating optical impulses into
electrical ones.

3D scanner-is a device that analyses a real-world object or environment to collect data on its shape and

possibly its appearance (e.g. colour). The collected data can then be used to construct digital three-
dimensional models.

15
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Laser rangefinder-is a rangefinder which uses a laser beam to determine the distance to an object. The


most common form of laser rangefinder operates on the time of flight principle by sending a laser pulse
in a narrow beam towards the object and measuring the time taken by the pulse to be reflected off the
target and returned to the sender. 

AUDIO INPUT DEVICES

Audio input devices are used to capture sound. In some cases, an audio output device can be used as an
input device, in order to capture produced sound. Audio input devices allow a user to send audio signals
to a computer for processing, recording, or carrying out commands. 

Microphone-are used in many applications such as telephones, hearing aids, public address systems for


concert halls and public events, motion picture production, live and recorded audio engineering, two-
way radios, megaphones, radio and television broadcasting, and in computers for recording

16
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

voice, speech recognition, VoIP, and for non-acoustic purposes such as ultrasonic sensors or knock
sensors.

MIDI(Musical Instrument Digital Interface) keyboard-is typically a piano-style user


interface keyboard device used for sending MIDI signals or commands over a USB or MIDI cable to other
devices connected and operating on the same MIDI protocol interface.

PUNCHED CARD DEVICES

A computer punched card reader or just computer card reader is a computer input device used to
read executable computer programs and data from punched cards under computer control. 

PUNCHED TAPE DEVICES

Punched tape or perforated paper tape is a form of data storage, consisting of a long strip of paper in
which holes are punched to store data. Now effectively obsolete, it was widely used during much of the
twentieth century for teleprinter communication, for input to computers of the 1950s and 1960s, and
later as a storage medium for minicomputers and CNC machine tools.

Digital pen-A digital pen is an input device which captures the handwriting or brush strokes of a user,
converts handwritten analog information created using "pen and paper" into digital data, enabling the

17
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

data to be utilized in various applications.

2. Output-Data is then display in monitor or printed, an electronic or electromechanical piece of


equipment connected to a computer and used to transfer data out of the computer in the form of text,
images, sounds or other media to a display screen , printer, loudspeaker or storage device. Most
modern storage devices such as disk drives and magnetic tape drives act as both input and output
devices, others such as CD-ROMS are input only.

Output Devices
•Any peripheral that receives or displays output from a computer.
•Computer hardware equipment used to communicate the results of data processing carried out by a
computer to the out side world.

Monitor
•The device which displays computer output. The monitor displays the video and graphics information
generated by the computer through the video card.
Monitors are very similar to televisions but usually display information at a much higher resolution.

 
18
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Printer

•Printer is an external hardware device responsible for taking computer data and generating a hard
copy of that data. Printers are one of the most used peripherals on computers and are commonly used
to print text, images, and photos.

Speakers

•A hardware device connected to a computer's sound card that outputs sounds generated by the
computer.
•Speakers can be used for various sounds meant to alert the user, as well as music and spoken text.

Projector

•An output device that can take the display of a computer screen and project a large version of it onto a
flat surface.
•Projectors are often used in meetings and presentations so that everyone in the room can view the
presentation.

19
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Assessment 2

Give At least 5 input devices


1.
2.
3.
4.
5.
Give at least 5 output devices
6.
7.
8
9.
10.

Identify the following:

_________________1. This input device works by utilizing polarized mirrors that pass and reflect only
certain colors of light

_________________2. Is an external hardware device responsible for taking computer data and
generating a hard copy of that data.

_________________3. is an input device which captures the handwriting or brush strokes of a user,


converts handwritten analog information created using "pen and paper" into digital data, enabling the data
to be utilized in various applications.

_________________4. Data is feed in through your Personal Computer /PC some input devices are
operated directly by the use, e.g. keyboard, mouse, touch screen, joystick, microphone, others are sensors
and transducers, which convert external signals into data e.g. scanner

_________________5. is a type of game controller held in two hands, where the fingers (especially
thumbs) are used to provide input.

_________________6. The device which displays computer output

_________________7. Data is then display in monitor or printed, an electronic or electromechanical


piece of equipment connected to a computer and used to transfer data out of the computer in the form of
text, images, sounds or other media to a display screen , printer, loudspeaker or storage device

_________________8. a device that optically scans images, printed text, handwriting or an object and
converts it to a digital image. 

20
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

_________________9.  encodes digital images and videos digitally and stores them for later


reproduction.

_________________10. used in many applications such as telephones, hearing aids, public address


systems for concert halls and public events, motion picture production, live and recorded audio

Essay (5pts.)
Differentiate Input devices and Output devices.
(3 – 5 sentences)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Lesson 3: Type of Storage Device

3. STORAGE- The area of non-volatile memory in a computer such as on hard disk or an external device
e.g. floppy disk, cd-rom where copies of program and files are kept for future.

Types of storage Device

a. Hard disk drive (HDD) - Can store a huge amount of data and program permanently.

21
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

b. CD or DVD ROM Drive - Reading data from the medium disk.

c. Floppy Disk Drive (FDD) - A reusable magnetic storage medium.

d. Flash Drive- A USB flash drive is a data storage device that includes flash memory with an integrated

USB interface. It is typically removable, rewritable and much smaller than an optical disc.USB interface.

22
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

e. Cloud Storage-Cloud storage is a model of computer data storage in which the digital data is stored in
logical pools, said to be on "the cloud". The physical storage spans multiple servers, and the physical
environment is typically owned and managed by a hosting company.

f. A solid-state drive (SSD) is a new generation of storage device used in computers. SSDs replace
traditional mechanical hard disks by using flash-based memory, which is significantly faster. Older hard-
disk storage technologies run slower, which often makes your computer run slower than it should. SSDs
speed up computers significantly due to their low read-access times and fast throughputs. 

f. SSD (Solid-state drive) - A solid-state drive is a solid-state storage device that uses integrated circuit
assemblies to store data persistently, typically using flash memory, and functioning as secondary storage
in the hierarchy of computer storage

23
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

g. External Hard-drive- An external hard drive is a portable storage device that can be attached to a
computer through a USB or FireWire connection, or wirelessly. External hard drives typically have
high storage capacities and are often used to back up computers or serve as a network drive.

What is computer memory?

Computer memory is any physical device capable of storing information temporarily or permanently.


A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data is to be processed and instructions
required for processing are stored.

Two types of memory

Volatile Vs Non-Volatile

VOLATILE
Volatile memory is computer memory that requires power to maintain the stored information. Most
modern semiconductor volatile memory is either static RAM (SRAM) or dynamic RAM (DRAM).
Non-volatile
Non-volatile memory is computer memory that can retain the stored information even when not
powered. Examples of non-volatile memory include read-only memory  flash memory, most types of
magnetic computer storage devices (e.g. hard disk drives, floppy disks and magnetic tape), optical discs,
and early computer storage methods such as paper tape and punched cards.
ROM ( Read Only Memory) - it is an IC programmed with specific data when it is manufactured, also
known as FIRMWARE.

Basic types of ROM


ROM - Read Only Memory
PROM-Programmable Read Only Memory
EPROM-Erasable Programmable Read Only Memory
EEPROM-Electrically Erasable Programmable Read Only Memory

Flash Memory

RAM (Random Access Memory)- is a temporary storage area for data that needs to be available for
programs to run efficiently.

Types of RAM

1. SDRAM-Synchronous Dynamic Random Access Memory


24
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

2.DDRAM-Dual Dynamic Random Access Memory

3.RDRAM-Ram bus Direct Random Access Memory

4.DDR2, DDR4

Memory Slots:

SIMM- Single In line Memory Module

DIMM- Double In Line Memory Module

Lesson 4: Processors and Peripherals

4. Processing- The data input is process by the CPU/ Central Processing Unit.

Processor-responsible for data and execution of instructions.

Today, there are two main manufacturers of CPU chips: Intel and Advanced Micro Devices (AMD).

Two Types of Memory

VOLATILE
Volatile memory is computer memory that requires power to maintain the stored information. Most
modern semiconductor volatile memory is either static RAM (SRAM) or dynamic RAM (DRAM).

Non-volatile
Non-volatile memory is computer memory that can retain the stored information even when not
powered. Examples of non-volatile memory include read-only memory  flash memory, most types of
magnetic computer storage devices (e.g. hard disk drives, floppy disks and magnetic tape), optical discs,
and early computer storage methods such as paper tape and punched cards.

25
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

ROM ( Read Only Memory) - it is an IC programmed with specific data when it is manufactured, also
known as FIRMWARE.

Computer Peripherals
A peripheral device is any auxiliary device that connects to and works with the computer to either put
information into it or get information out of it.
Usually, the word peripheral is used to refer to a device external to the computer, like a scanner, but the
devices physically located inside the computer are also technically peripherals too.
Peripheral devices often aren't directly involved with a computer's main function, but that doesn't mean
they aren't considered necessary components.

Another way to think about peripheral devices is that they don't work as standalone devices. The only
way they work is when they're connected to, and controlled by, the computer.
A peripheral device may also be referred to as an external peripheral, integrated peripheral, auxiliary
component, or I/O (input/output) device.

TYPES OF PERIPHERAL DEVICES

Internal Peripheral Devices


Common internal peripheral devices you'll find in a computer include an optical disc drive, a video card,
and a hard drive.
Network interface cards, USB expansion cards, and other internal devices that might plug in to a PCI
Express or other type of port are all types of internal peripherals.
Sound Card-accessories expansion board for personal computers that permits recording and playing
back sounds channels.

Video Card - controls the display and information of the screen.

4 main parts of the Video Card.

Video BIOS-firmware installed

Video RAM DAC-digital analog converter

Video RAM

Lan Card- A network adapter interface card for a computer to join in the network LAN (Local Area
Network)

TV card-Let you view the TV channels in your PC

26
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Modem(MO-modulator DEM-demodulator) Card-Converts analog to digital signal of the telephone

Fan-for sufficient cooling system

Assessment 3

Identify the Following

_________________1. A network adapter interface card for a computer to join in the network LAN
(Local Area Network)

_________________2. responsible for data and execution of instructions


_________________3. A reusable magnetic storage medium

_________________4. Can store a huge amount of data and program permanently

_________________5. Controls the display and information of the screen

_________________storage device that uses integrated circuit assemblies to store data persistently,
typically using flash memory, and functioning as secondary storage in the hierarchy of computer storage

_________________7. - it is an IC programmed with specific data when it is manufactured, also known


as FIRMWARE

_________________8. Is a computer memory that requires power to maintain the stored information

_________________9. Memory is computer memory that can retain the stored information even when
not powered

_________________10. Is any auxiliary device that connects to and works with the computer to either
put information into it or get information out of it.
27
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Two Types of Memory


11.
12.

Acronyms
 
13.SDRAM-
14.DDRAM-
15.RDRAM-
16.SIMM-
17.DIMM-
18.PROM-
19.EPROM-
20.EEPROM-

Chapter 4: Building a System Unit


Objectives:

 Learn the major parts of a computer


 Learn how to assemble and to disassemble a system unit
 Learn how to install softwares OS like and application

Lesson 1: Major Parts of a System Unit

Power Supply-providing electrical supply to the circuitry. responsible for converting alternative current
to direct current.

Mother Board - everything is connected to the motherboard, the central nervous system, a large circuit
board that contains the minor and major components.

Drive- an area of storage that is formatted with a file system and has a drive letter.

Processor: CPU Central Processing unit. Microprocessor  


It is the portion of a computer system that carries out the instructions of a computer program, to
perform the basic arithmetical, logical, and input/output operations of the system.  

28
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

RAM
Graphics Card
Expansion Slots
Sound Card
Fan

PARTS OF A MOTHERBOARD
PCI slot  
Northbridge chipset
Southbridge chipset
DDR Slot / Memory Slot

29
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

CPU socket
PCI – E slot

RAM
Graphics Card
Expansion Slots

30
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Sound Card
Fan

Lesson 2: Assemble and Disassemble of System Unit

31
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Let us watch a video about it

https://www.youtube.com/watch?v=zxxtXmCZWss&t=202s

What did you learn about the Video?

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Lesson 3: Creating Bootable Flash Drive

8 Types USB Bootable Software

1. Rufus

2. Windows USB/DVD Tool

3. Etcher

4. Universal USB Installer

5. RMPrepUSB

6. UNetBootin

7. YUMI – Multiboot USB Creator

8. WinSetUpFromUSB

Lesson 4: Installing System OS Install Drivers

Watch the video: https://www.youtube.com/watch?v=2d7LoVRri1Q

What did you learn about installing system OS or Windows 7 on a system unit?

_____________________________________________________________________________________
_____________________________________________________________________________________

32
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Lesson 5: Installing Drivers and Application Software

What is computer drivers?

Computer Drivers is a set of files that tells a piece of hardware how to function by
communicating with a computer's operating system. All pieces of hardware require a driver, from your
internal computer components, such as your graphics card, to your external peripherals, like a printer.

Step 1: Open the driver installer and click select all:

33
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Note: I’m using a Snappy Driver Installer to update or install my drivers

Two types of Softwares:


1.  Operating System(OS) : controls such peripherals as monitors, printers, and storage devices.

2. Application Softwares : directs the computer to execute commands given by the user and may
be said to include any program that processes data for a user.

34
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Chapter 3: Networking Hardware

Objectives:

 Learn the tools and equipment in networking


 Learn how to use the equipment properly and right
 Learn how create an internet cable

Lesson 1: Networking hardware

Network Cables
Network cables are the transmission media to transfer data from one device to another. A
commonly used network cable is category 5 cable with RJ – 45 connector, as shown in the
image below:

Routers
A router is a connecting device that transfers data packets between different computer
networks. Typically, they are used to connect a PC or an organization’s LAN to a broadband
internet connection. They contain RJ-45 ports so that computers and other devices can connect
with them using network cables.

35
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Repeaters, Hubs, and Switches


Repeaters, hubs and switches connect network devices together so that they can function as a
single segment.
A repeater receives a signal and regenerates it before re-transmitting so that it can travel
longer distances.0p
A hub is a multiport repeater having several input/output ports, so that input at any port is
available at every other port.
A switch receives data from a port, uses packet switching to resolve the destination device and
then forwards the data to the particular destination, rather than broadcasting it as a hub.

36
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from the
source network to the destined network.

Gateways
A gateway connects entirely different networks that work upon different protocols. It is the
entry and the exit point of a network and controls access to other networks.

Network Interface Cards


NIC is a component of the computer to connect it to a network. Network cards are of two
types: Internal network cards and external network cards.

37
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Modems - is a hardware device that converts data from a digital format, intended for communication
directly between devices with specialized wiring, into one suitable for a transmission medium such as
telephone lines or radio.

Examples of Modems Internet Connection

Lesson 2: Network Hardware

Tools Needed
Network Tools and Their Purpose

Computer networks are used to connect one computer to another so as to facilitate a transfer of data.
The Internet, of course, is the largest network in the world. There are many different types of networks.

38
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

The two basic types are wireless networks and wired networks. Wireless networks use Wi-Fi routers to
connect computers and other devices to the Internet wirelessly.

Crimping Tools `

A crimping tool is one of the most crucial network connecting tools. In order to connect a connector to
the cable, you will need a tool to crimp or connect. Known as the crimping tool, this tool is used to
connect RJ-45, RJ-11 and other connectors to the end of a cable. Some crimping tools have a built-in
wire cutter near the handle. This wire cutter can be used to cut a phone cable or a Cat5 cable.

39
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Network Cable Tester

One of the problems with wired networks is that when they cease to work, troubleshooting may be a
little more difficult as compared to wireless networks. This is where a network cable tester can help you.
A network cable tester is a useful device that allows you to check the continuity of the cable to figure
out if the signal is strong enough to get through to the network. This helps to eliminate cable
connectivity issues while troubleshooting the problems.

40
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Coaxial Compression Tool

The coaxial cable is the cable that includes the outer metal that does the conducting. A central
conducting core ensures that the metal is insulated. High frequency signals are transmitted through this
coaxial cable line. A coaxial compression tool is a useful device that uses connectors to properly
compress the coaxial cable. The side of the cable wire will enable you to know which type of cable it is.

Punch Down Tool

The punch down tool is also known as the Krone tool. It is small tool that is used most frequently by
network troubleshooting technicians. The basic purpose of a punch down tool is to insert wires into
various devices like pinch down blocks, patch panels, surface mount boxes, and more with the help of
insulation-displacement connectors.

Patch Panel?

41
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

A patch panel, also referred to as a patch bay, patch field or jack field, is a mounted hardware assembly
that contains a set number of ports to connect and manage the incoming and outgoing fiber or copper
cables. In a typical data center infrastructure, patch panels are often placed in a wiring closet to connect
racks with each other. Each rack contains at least one patch panel, the back end of which is connected
to the back end of the other one. Then you will need patch cords to connect servers or network switches
to the ports on the front end of the patch panel in each rack.

RJ45

RJ45 is a type of connector commonly used for Ethernet networking. It looks similar to a telephone jack,
but is slightly wider. Since Ethernet cables have an RJ45 connector on each end, Ethernet cables are
sometimes also called RJ45 cables.

The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface. The "45"
simply refers to the number of the interface standard. Each RJ45 connector has eight pins, which means
an RJ45 cable contains eight separate wires. If you look closely at the end of an Ethernet cable, you can
actually see the eight wires, which are each a different color. Four of them are solid colors, while the
other four are striped.

42
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

UNSHIELDED-TWISTED-PAIR (UTP) CABLE

UTP stands for Unshielded Twisted Pair cable. UTP cable is a 100 ohm copper cable that consists of 2 to
1800 unshielded twisted pairs surrounded by an outer jacket. They have no metallic shield. This makes
the cable small in diameter but unprotected against electrical interference. The twist helps to improve
its immunity to electrical noise and EMI.

Lesson 3: Creating Network Cable


T-568A Pinout

43
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

T-568B Pinout

Cross Over Pinout


A crossover cable utilizes two different RJ45 pinouts for the two ends of the cable. If you need to
connect 568A equipment to 568B you can use a crossover cable.

44
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

45
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Learning Task 2

I. Identify the following:

________________________1. cables are the transmission media to transfer data from one device to
another

________________________2. receives data from a port, uses packet switching to resolve the
destination device and then forwards the data to the particular destination

________________________3. receives a signal and regenerates it before re-transmitting so


that it can travel longer distances.
________________________4. a multiport repeater having several input/output ports, so that input at
any port is available at every other port.

________________________5. is a hardware device that converts data from a digital format

________________________6. connects two separate Ethernet network segments

________________________7. connecting device that transfers data packets between different


computer networks.

________________________8. component of the computer to connect it to a network

________________________9. This high-speed Internet connection is provided through either cable or


telephone companies.

________________________10. cable is the cable that includes the outer metal that does the
conducting

________________________11. cable tester is a useful device that allows you to check the continuity of
the cable to figure out if the signal is strong enough to get through to the network.

________________________12. used to connect one computer to another

________________________13. is one of the most crucial network connecting tools

________________________14. a method of connecting to the internet using the telephone line but
provides both data and voice communications

________________________15. also known as the Krone tool

________________________16. a type of connector commonly used for Ethernet networking.

46
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

________________________17. a mounted hardware assembly that contains a set number of ports

________________________18. Also known as RJ-45

II. Skill Test : Create a Ethernet Cable, write the correct arrangement color of the wire. Write
your answer inside the RJ-45

Create Straight Through Cable (T-568B Type) Pin 1


Pin 1

UTP Cable

Pin 1 RJ-45 RJ-45


Create Cross-over Cable (T-568A Type to T-568B) Pin 1
Pin 1

UTP Cable

Pin 1 RJ-45 RJ-45


Create Straight Through Cable (T-568A Type) Pin 1
Pin 1

UTP Cable

Pin 1

Create Cross-over Cable (T-568B Type to T-568A) Pin 1


47 Pin 1
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

UTP Cable

Chapter 4: Connecting Hardware


Objective:
 Learn how to Network Computers
Pin 1  Learn about IP address
 Learn how to connect

Lesson 1: Internet Protocol


What is the Internet Protocol (IP)
The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that
they can travel across networks and arrive at the correct destination. Data traversing the Internet is
divided into smaller pieces, called packets. IP information is attached to each packet, and this
information helps routers to send packets to the right place. Every device or domain that connects to
the Internet is assigned an IP address, and as packets are directed to the IP address attached to them,
data arrives where it is needed.

Example: 192.168.1.1

Two types of IP Address


Dynamic means "constantly changing." The prefix dyna means power; however, dynamic IP addresses
aren't more powerful, but they can change (or be changed).

Example:

I open my computer my computer today: 192.168.1.11

Tomorrow I open again my computer: 192. 168.1.35 (it change)

Reason:

48
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.

I open my computer my computer today: 192.168.1.2

Tomorrow I open again my computer: 192. 168.1.2 (it not change)

Reason:

IP Versions

49
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

IP addresses are made up of binary values and drive the routing of all data over the Internet.
IPv4 addresses are 32 bits long, and IPv6 addresses 128 bits long.

Parts of IP Address

What is Domain Name Server?


The Domain Name System (DNS) is the phonebook of the Internet. ... Web browsers interact through
Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load

50
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Internet resources. Each device connected to the Internet has a unique IP address which other machines
use to find the device.

Remember:

Do not make a same IP addresses because your network connections will affect all the network

Types of area networks – LAN, MAN and WAN


The Network allows computers to connect and communicate with different computers via any medium.
LAN, MAN and WAN are the three major types of the network designed to operate over the area they
cover. There are some similarities and dissimilarities between them. One of the major differences is the
geographical area they cover, i.e. LAN covers the smallest area; MAN covers an area larger than LAN
and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
 PAN (Personal Area Network)
 SAN (Storage Area Network)
 EPN (Enterprise Private Network)
 VPN (Virtual Private Network)
Local Area Network (LAN) –
LAN or Local Area Network connects network devices in such a way that personal computer and
workstations can share data, tools and programs. The group of computers and devices are connected
together by a switch, or stack of switches, using a private addressing scheme as defined by the TCP/IP
protocol. Private addresses are unique in relation to other computers on the local network. Routers are
found at the boundary of a LAN, connecting them to the larger WAN.
Data transmits at a very fast rate as the number of computers linked are limited. By definition, the
connections must be high speed and relatively inexpensive hardware (Such as hubs, network adapters
and Ethernet cables). LANs cover smaller geographical area (Size is limited to a few kilometers) and are
privately owned. One can use it for an office building, home, hospital, schools, etc. LAN is easy to design
and maintain. A Communication medium used for LAN has twisted pair cables and coaxial cables. It
covers a short distance, and so the error and noise are minimized.
Early LAN’s had data rates in the 4 to 16 Mbps range. Today, speeds are normally 100 or 1000 Mbps.
Propagation delay is very short in a LAN. The smallest LAN may only use two computers, while larger
LANs can accommodate thousands of computers. A LAN typically relies mostly on wired connections for
increased speed and security, but wireless connections can also be part of a LAN. The fault tolerance of a
LAN is more and there is less congestion in this network. For example : A bunch of students playing
Counter Strike in the same room (without internet).
Metropolitan Area Network (MAN) –
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as
compared to WAN. It connects two or more computers that are apart but resides in the same or
different cities. It covers a large geographical area and may serve as an ISP (Internet Service Provider).

51
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

MAN is designed for customers who need a high-speed connectivity. Speeds of MAN ranges in terms of
Mbps. It’s hard to design and maintain a Metropolitan Area Network.

The fault tolerance of a MAN is less and also there is more congestion in the network. It is costly and
may or may not be owned by a single organization. The data transfer rate and the propagation delay of
MAN is moderate. Devices used for transmission of data through MAN are: Modem and Wire/Cable.
Examples of a MAN are the part of the telephone company network that can provide a high-speed DSL
line to the customer or the cable TV network in a city.
Wide Area Network (WAN) –
WAN or Wide Area Network is a computer network that extends over a large geographical area,
although it might be confined within the bounds of a state or country. A WAN could be a connection of
LAN connecting to other LAN’s via telephone lines and radio waves and may be limited to an enterprise
(a corporation or an organization) or accessible to the public. The technology is high speed and relatively
expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is difficult to design and
maintain. Similar to a MAN, the fault tolerance of a WAN is less and there is more congestion in the
network. A Communication medium used for WAN is PSTN or Satellite Link. Due to long distance
transmission, the noise and error tend to be more in WAN.
WAN’s data rate is slow about a 10th LAN’s speed, since it involves increased distance and increased
number of servers and terminals etc. Speeds of WAN ranges from few kilobits per second (Kbps) to
megabits per second (Mbps). Propagation delay is one of the biggest problems faced here. Devices used
for transmission of data through WAN are: Optic wires, Microwaves and Satellites. Example of a
Switched WAN is the asynchronous transfer mode (ATM) network and Point-to-Point WAN is dial-up line
that connects a home computer to the Internet.

Step by Step Instructions on How to Change the IP address set in your Windows 7

 Click on "Start" then on "Control Panel".

52
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

NB: if you can't see "Network and Sharing Center" as above, change the "View
by:" setting on the top right corner to "Small icons".

 Click on "Network and Sharing Center" and the following window appears:

 Click on "Change adapter settings" and several adapter card icons will be displayed .

 Double click on the icon representing the adapter for which you want to change IP address:

53
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

NB: For Wireless cards, you might need to right-click its icon and and click on "properties" on the
drop-down menu

 Select Internet Protocol Version 4 for TCP/IPv4 Ip setting and click on "properties" and enter IP
parameters as desired.

54
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

If you are not sure what to write here, contact you network admin

Click "OK" to save your parameters and you are done.

55
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Lesson 2: Network Mapping


Legends:
Router ISP (Internet Service Provider) Note: Our
ISP is
already
connected
to the

Switch Laptop

Computer

Mobile

UTP Cable

56
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Example of Connection:
Switch Connection

Router Connection

Router Port No. 1

Router Port No. 3

Router with Wi-Fi

57
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Router Port No. 2

Router Port No. 1

Router Port No. 2 Router Port No. 3

58
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Another Example

Router Port No. 2 LAN : Router Port


No. 3

Router and Switch


59
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Usin
g the Switch you can connect more computer with your ISP
60
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Assessment 4

I. Identify the following:

________________________1. set of rules, for routing and addressing packets of data so that they can
travel across networks and arrive at the correct destination

________________________2. IP addresses don't change

________________________3. IP addresses aren't more powerful, but they can change


________________________4. addresses 128 bits long

________________________5. addresses are 32 bits long

________________________6. What part of IP Address is 192.168.1

________________________7. is the phonebook of the Internet

________________________8. Network is a computer network that extends over a large geographical


area

________________________9. Network covers a larger area than that of a LAN and smaller area as
compared to WAN

________________________10. Network connects network devices in such a way that personal


computer and workstations can share data, tools and programs

II. Enumerate: enumerate the steps 1 to 6 to change the computer IP Address

_____________ Click on "Start" then on "Control Panel".

_____________ Select Internet Protocol Version 4 for TCP/IPv4 Ip setting and click on "properties" and
enter IP parameters as desired.

_____________ Click on "Network and Sharing Center" and the following window appears:

_____________ Click on "Change adapter settings" and several adapter card icons will be displayed .

_____________ Click "OK" to save your parameters and you are done.

_____________ Double click on the icon representing the adapter for which you want to change IP
address:
61
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

III. Skill Test: Create a Network Map

Instruction: Create a Network Map just like in the page with ISP, Router and Switch, 6 computers, 2
laptop and 1 Mobile

62
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Chapter 5: Network Configuration


Objective:
 Learn how to configure a router/modem
 Learn how to configure Wi-fi settings
 Learn how to Mac Filtering

Lesson 1: Default Gateways


What is Default Gateway?
A default gateway is the node in a computer network using the internet protocol suite that serves as the
forwarding host (router) to other networks when no other route specification matches the
destination IP address of a packet.

Different brands of router and its default gateway

PLDT Modems/Router

Default Gateway: 192.168.1.1

Skyworth Modems/Router

Default Gateway: 192.168.1.1

63
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Cat V Lucena Modems/Router

Default Gateway: 192.168.100.1 or 192.168.1.1

Commonly use TP-link routers

Huawei Modems/Router

Default Gateway: 192.168.8.1

Asus Modems/Router

64
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Default Gateway: 192.168.1.1

Tenda Modems/Router

Default Gateway: 192.168.0.1 or 192.168.1.1

TP-Link Modems/Router

Default Gateway: 192.168.100.1 or 192.168.1.1

65
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Lesson 2: Router Configuration


Changing Wi-fi Name and Password

This method is for changing the Wi-Fi SSID and password of your router/modem

1. Open your browser (Google Chrome/Firefox) and go to 192.168.1.1 (PLDT Fibr default gateway
address).

2. Input the following account information to login in the admin dashboard.


Username: admin
Password: 1234

66
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

3. Once logged in, you will be landed to PLDT Home Fibr admin dashboard. To change your wifi name
and password, just go to "Network". You will manage two networks here, the 2.4 GHz band and the 5
GHz band, under the Wlan Settings.

4. Manage the 2.4Ghz network first, go to "Advanced" tab. Enter your new WiFi name in the "SSID
Name" field, and enter your new password in the "Passphrase" field. The recommended password
format should be minimum 12 alphanumeric characters with symbols and Camel Casing (combination of
upper case and lower case characters). If you're not familiar with other values like SSID Choice, Security
Mode and WPA Algorithms, it is recommended not to change them. After you've entered your new wifi
password and SSID for 2.4G network, just click Apply to save changes.

67
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Now for the 5GHz network, go to "5G Advanced" tab, and do the same procedure as what you did on
the previous tab. After you've entered your new wifi password and SSID for 5G network, just
click Apply to save changes.

68
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

5. Done! You can now logout from the dashboard.

MAC Filtering

In this method, we will block or filter the MAC address of the device and prevent it from connecting to
the internet. Technically, the device can connect to the WiFi but not on the internet. How?

If the person who owned the device knew your WiFi password, he can connect to it and use your
internet. But if you filter his/her device’s MAC address, he/she can still connect to the WiFi but cannot
browse the net.

So, to avoid blocking your own and your family member’s devices, make sure to know all of your
device’s MAC addresses, make a list.

You may also check your PLDT router’s WiFi list and DHCP List, as shown in the image below.

69
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Wi-Fi List

DHCP List

I presumed that you already logged in as an administrator in your Fibr router. If not, please read the 4th
paragraph above, or else you can’t continue below.

Inside PLDT Fibr router, go to Security, and MAC Filtering.

Select the Enable radio button, Black List then Apply.

70
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Block Listed MAC Address

Next click the Add button, input the MAC address that you want to block. Select Enable and click Apply.
And done

71
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Website Blocking

This Method is for blocking a site that you don’t to browse by the users.

1. Open you browser and type 192.168.1.1 in the address bar. You will be redirected to the login page
where you need to provide the router’s username and password.

2. After successfully logged in, Click the “Security” Tab and Enable Firewall.

Note: If you are not seeing the “Security” Tabs, see How to Access PLDT Home Fibr Router Page with Full
Privileges and do the steps provided to be able to see the advance tabs.
3. Click URL Filtering and select the options “Enable” and “Black List” then click the “Add” button to
start adding filters.

Type in the “www.youtube.com” in the URL Address field. The start and end time allows you to set the
duration when users will be blocked from accessing the said URL. In my case, I set it to 10 and 18 which
means 10AM to 6PM.
Finally, select “Enable” in the Enable selection and hit the “Apply” button to save changes.
4. Restart your device so the changes will be applied to the users when they are connected back.

72
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Changing Admin username and password

1. Plug your PLDT Home DSL router in your PC/Laptop via LAN then when status connected open your
favorite browser then type this IP address 192.168.1.1 and a box pop out will request log in type this

Default user with admin rights


User Name: adminpldt
Password: 1234567890

Default user ONLY no admin access


User: admin
Pass: 1234
 
2. Go to Maintenance then password then select by click the dot which user you want to change
password.

73
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

3. Provide required information then click modify button.


4. Click the "save" button at the left side stating "Attention Config is modified to make it effective
forever!"

74
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Learning Task 5

I. Identify the following IP address

________________________1. Skyworth Router

________________________2. PLDT Router

______________________3. Asus Router


________________________4. TP-Link Router

________________________5. Cat V Router

II. Enumeration: Enumerate the following

Website Blocking: 1 to 5

________________ Click URL Filtering and select the options “Enable” and “Black List” then click the
“Add” button to start adding filters.

________________ After successfully logged in, Click the “Security” Tab and Enable Firewall.

________________ Type in the “www.youtube.com” in the URL Address field. The start and end time
allows you to set the duration when users will be blocked from accessing the said URL.

________________ Open you browser and type 192.168.1.1 in the address bar. You will be redirected
to the login page where you need to provide the router’s username and password.

________________ Restart your device so the changes will be applied to the users when they are
connected back.

75
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Changing Wi-fi Name and Password: 1 to 6

________________ Open your browser (Google Chrome/Firefox) and go to 192.168.1.1 (PLDT Fibr


default gateway address).

________________ Input the following account information to login in the admin dashboard.

________________ Manage the 2.4Ghz network first, go to "Advanced" tab. Enter your new WiFi name
in the "SSID Name" field, and enter your new password in the "Passphrase" field. The recommended
password format should be minimum 12 alphanumeric characters with symbols and Camel Casing
(combination of upper case and lower case characters). If you're not familiar with other values like SSID
Choice, Security Mode and WPA Algorithms, it is recommended not to change them. After you've
entered your new wifi password and SSID for 2.4G network, just click Apply to save changes.

________________ Now for the 5GHz network, go to "5G Advanced" tab, and do the same procedure as
what you did on the previous tab. After you've entered your new wifi password and SSID for 5G
network, just click Apply to save changes.

________________ Once logged in, you will be landed to PLDT Home Fibr admin dashboard. To change
your wifi name and password, just go to "Network". You will manage two networks here, the 2.4 GHz
band and the 5 GHz band, under the Wlan Settings.

________________ Done! You can now logout from the dashboard.

MAC Filtering: 1 to 3

________________ Select the Enable radio button, Black List then Apply.

________________ Inside PLDT Fibr router, go to Security, and MAC Filtering.

________________ Next click the Add button, input the MAC address that you want to block. Select
Enable and click Apply. And done

Changing ADMIN username and password: 1 to 5

________________ Provide required information then click modify button.

76
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

________________ Open your browser (Google Chrome/Firefox) and go to 192.168.1.1 (PLDT Fibr


default gateway address).

________________ Input the following account information to login in the admin dashboard.

________________ Click the "save" button at the left side stating "Attention Config is modified to make
it effective forever!" if you want the configuration effective forever.

________________ Go to Maintenance then password then select by click the dot which user you want
to change password.

III. Acronym: Write the Acronym of the following items below

1. LAN –

2. WAN –

3. MAN –

4. MAC –

5. IP –

6. DCHP –

7. DNS –

8. RJ45 –

77
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

9. UTP –

10. DSL –

Chapter 6: Server Installation and Configuration


Lesson 1: Installing Server System Operating System
Objectives:

 Learn to install the windows server on a system unit.

The bare metal Installation

What do we mean by “bare metal”?

Two types of Server 2008 installations:

a. Bare Metal - No existing operating system on the HDD

b. Upgrade - Installing over Server 2008 R2 (or another operating system) is

installer on the HDD

Bare Metal is the simplest installation possible (recommended by Microsoft as the

78
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

preferred method)

STEP IN INSTALLING WINDOWS SERVER 2008 R2 (BARE METAL/CLEAN INSTALL)


1. After booting up from your install disk, you will arrive at a language and preferences screen.
Once you have chosen those options, you get to the Operating System Selection page.
Depending on your license and the purpose of your server, there are a variety of options to
choose from. For our purpose today, we are going to choose the Standard (Full Installation)
version.

Step 1: Wait

79
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 2: Click Next (Always set language to English)

Step 3: Click Install now

80
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 4: Wait

81
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 5: Select Windows Server R2 Standards (Full Installation) then click Next

Step 6: Check the terms license and click Next

82
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 7: Click Custom (advance)

Step 8: Select the clean disk (Disk 0) and click next

Note: if the drive has still an Operating System click the Drive option and FORMAT IT before you install
the server.

Step 9: Wait until the installation is finish

83
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Assessment 5
Enumerate: Enumerate the following to its correct following order in Installing Windows Server 2008

Operating System

____________ Check the terms license and click Next

____________ Boot you’re the USB Bootable Device

____________ Wait until the installation is finish

____________ Select Windows Server R2 Standards (Full Installation) then click Next

____________ Click Custom (advance)

____________ Click Next (Always set language to English)

____________ Click Install now

____________ Select the clean disk (Disk 0) and click next

Lesson 2: Configuring Windows Server


Objectives:

 Learn how to configure server in its first time


 Learn how to setup ADDS (Active Directory Domain Services) and DCHP Server

We know after we completely installed the Windows server 2008r2 Standard we need to configure on
its first time. So, in the first install we need to set up the dcpromo.

84
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

After the installation of Windows Server, after the boot the appearance should be like this.

After that click Next.

After Clicking Next, you need to setup your server password for the privacy and security

For example: The Assessor give an instruction that the password of your server is cvecss@2020

85
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Then Click OK to continue to your desktop;

86
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Configuration

Step 1: Get Ready in Setting up these 3 selection in step 1: Provide Computer Information

Click Set Time Zone:

Click the Change time zone…

87
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Click UTC+8:00 Kuala Lumpur, Singapore or Hongkong/Beijing and click OK and OK Again

Next: Close the Set Time Zone

Click Configure Networking

Right click the Properties

88
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Uncheck the Internet Protocol Version 6 (TCP/IPv6) and Double-Click the Internet Protocol Version 4 (TCP/IPv4)

89
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

And set your server IP as 192.168.1.2 and Press OK and OK

Click Provide Computer Name and Domain

Rename the Computer Description into Server and click Change….

90
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Rename the Computer Name to SERVER and click OK and Apply and select Restart Now

Now: Scroll a little bit and Click Add Roles

91
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Click Server Roles

Check the Active Directory Domain Services and Click Next – Next and Install

And Wait!

92
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

After the installation it should be green check close it and get ready for the next procedures

Setting up the dcpromo or the Active Directory Domain Services and DNS
Server
What is Active Directory Domain Services?

93
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Active Directory Domain Services (ADDS) are the core functions in Active Directory that manage users
and computers and allow sysadmins to organize the data into logical hierarchies. AD DS provides for
security certificates, Single Sign-On (SSO), LDAP, and rights management.

What is Domain Name Server?

The Domain Name System (DNS) is the phonebook of the Internet. ... Web browsers interact through
Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load
Internet resources. Each device connected to the Internet has a unique IP address which other machines
use to find the device.

Step 2: Press  + R to open Run and type dcpromo

Step 3: Wait for a few minutes

94
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 4: Check the Use advance mode of installation Click Next;

Click Next

95
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 5: Select Create new domain in new format and click Next

96
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 6: Type the name of FQND of the rest root domain (Ex. cve.com) then click Next and Next again to
the next page

Step 7: Select Windows Server 2008 R2 in the Forest Functional Level then click Next

Step 8: Check the DNS server and then click Next

97
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 9: Click Yes… for confirmation then click Next and another Next again

Step 10: Type/Create the Restore Mode Administrator Password then click Next

98
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 11: In the Summary Page, click Next

Step 12: Wait for the Domain to be installed and Check the Reboot on completion (it will automatically
reboot)

99
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

After Boot your it needs to be look like this

Assessment 6

Enumerate: Enumerate the following to its correct following order in Configuring and Setting up the
dcpromo

Configuring 1-6

____________ Set first the Server password

____________ Check the Active Directory Domain Services and Click Next – Next and Install

____________ Click Server Roles

____________ Add roles

____________ Configure the Time, IP Address and Computer name (Initial Configuration Task)

____________ After the installation it should be green check close it and get ready for the next
procedures

Setting-up dc promo 1-12

____________ Type the name of FQND of the rest root domain (Ex. cve.com) then click Next
and Next again to the next page

____________ Wait for a few minutes

____________ Select Windows Server 2008 R2 in the Forest Functional Level then click Next

100
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

____________ Check the Use advance mode of installation Click Next;

____________ Click Next

____________ In the Summary Page, click Next

____________ Select Create new domain in new format and click Next

____________ Check the DNS server and then click Next

____________ Type/Create the Restore Mode Administrator Password then click Next

____________ Click Yes… for confirmation then click Next and another Next again

____________ Wait for the Domain to be installed and Check the Reboot on completion (it will
automatically reboot)

____________ Press  + R to open Run and type dcpromo

101
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Setting up DHCP Server Role

What is Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol?

Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol (DHCP) is a network


management protocol used to automate the process of configuring devices on IP networks, thus
allowing them to use network services such as DNS, NTP, and any communication protocol based on
UDP or TCP.

Step 1: To Set-up DCHP Server Role Click the icon Given Below Server Manager:

102
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 2: Select Roles and Click Add Roles and Hit Next

Step 3: Check the DHCP Server and Click Next and Next again

103
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 4: Make sure the IP address is Checked and click Next

Step 5: Type the Server’s IP Address and click the Validate Button make sure the Valid icon will show
up.

104
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Click Next

Step 6: Click the Add… Button and Copy given input above: Hit OK and Click Next to Proceed

105
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 7: Disable the DHCPv6 and Click Next

Click Next

106
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 8: Check the information for assurance and if your information is all correct hit Next to Install the
DHCP

Step 9: Make sure the Installation is Complete and Well Green Checked

107
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Assessment 7

Enumerate: Enumerate the following to its correct following order in Setting up DCHP Server Role

1 - 11

____________ Click Next in DCHP Server Authorization

____________ To Set-up DCHP Server Role Click the icon Given Below Server Manager:

____________ Select Roles and Click Add Roles and Hit Next

____________ Check the DHCP Server and Click Next and Next again

____________ Make sure the IP address is Checked and click Next

____________ Click Next in IPV4WING Setting

____________ Click the Add… Button and Copy given input above: Hit OK and Click Next to
Proceed

____________ Disable the DHCPv6 and Click Next

____________ Make sure the Installation is Complete and Well Green Checked

____________ Check the information for assurance and if your information is all correct hit
Next to Install the DHCP

____________ Type the Server’s IP Address and click the Validate Button make sure the Valid

icon will show up.

Lesson 3: File Sharing


 Learn to share file client to server

108
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

File sharing is the practice of distributing or providing access to digital media, such as computer
programs, multimedia (audio, images and video), documents or electronic books.

Note: Need a local disk D: so, if your system unit don’t have a D: Drive you need to create one.

Click the Start Button and search for create and format hard disk partition

Now right click the C: and select the Shrink Volume… and wait!

109
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Now divide your Hard disk into two. In this case I have a 60gb of HDD so after I this process the drive C:
will be 36gb of storage and we now have 25gb of drive D: storage. And click Shrink

Now right click to the unlocated drive and select New Simple Volume Click next until its finished now
you have a drive D: for back up and for file sharing

110
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

So now we will start set-up the file sharing

Step 1: In your Drive D: Create a folder named (Files/Backup/Directory etc.) right click the folder and
click properties.

Step 2: Click the Sharing tab and click the Share… Button

111
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 3: Type Everyone to the Text Field and click Add

Step 4: click the Read Dropout selection and select Read/Write and now click the Share button, and
click Done

112
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 5: Now click the Start button go to the Administrative Tools and select Active Directory User and
Computers

Step 6: Expand your domain (cve.com) and click New and select the Organizational Unit

113
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 7: Name your Object as CVE COMLAB and click OK

Step 8: On the CVE COMLAB right-click, click New and select User

114
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 9: Fill Up the form like given to the picture. ALWAYS REMEMBER THE USER LOGON NAME:

Step 10: Write again the password cvecss@2020 and check the Password never expires and to the next
page click Finish

115
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 11: Now click Start and Administrative Tools and select Group Policy Management

Now Expand the Forest cve.com next is domain and cve.com

it should be look like this.

116
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 12: Right-click the CVE COMLAB and select Create a GPO in this domain, and Link it here…

Step 13: Name the GPO to cve comlab and click OK

117
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 14: Now right-click the COMLAB and click Edit

Now follow the directory click User Configuration

Next Policies

And last the Folder Redirection

118
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Next Windows Settings

Step 15: Now right-click folder you want to redirect to your client. For example, I want to get the files on
my clients Desktop/Documents/Music/Video/Favorites/Download etc. And now click Properties

This is your
root path

Step 16: Now set your Settings to Basic – Redirect everyone’s folder to the same location

119
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Note: To get the Root Path please read again the Step 1 in File Sharing

The Root Path is given to the picture

Now click Yes and OK after

120
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Step 17: Close all the Windows and now Run the CMD (Command Prompt)

Now run the command gpupdate and press ENTER and it should be completed successfully

Assessment 8

121
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

Enumerate: Enumerate the following to its correct following order in Setting up File Sharing and
Creating partition

Creating Partition 1 - 4

____________ Now divide your Hard disk into two. In this case I have a 60gb of HDD so after I
this process the drive C: will be 36gb of storage and we now have 25gb of drive D: storage. And click
Shrink

____________ Click the Start Button and search for create and format hard disk partition

____________ Now tight click to the unlocated drive and select New Simple Volume Click next
until its finished now you have a drive D: for back up and for file sharing

____________ Now right click the C: and select the Shrink Volume… and wait!

Setting-up file sharing 1 - 19

____________ Click the Sharing tab and click the Share… Button

____________ click the Read Dropout selection and select Read/Write and now click the Share
button, and click Done

____________ Now click the Start button go to the Admirative Tools and select Active
Directory User and Computers

____________ In your Drive D: Create a folder named (Files/Backup/Directory etc.) right click
the folder and click properties.

____________ Name your Object as CVE COMLAB and click OK

____________ On the CVE COMLAB right-click, click New and select User

____________ Now right-click folder you want to redirect to your client. For example, I want to
get the files on my clients Desktop/Documents/Music/Video/Favorites/Download etc. And now click
Properties

____________ Type Everyone to the Text Field and click Add

____________ Fill Up the form like given to the picture. ALWAYS REMEMBER THE USER LOGON
NAME:
122
Prepared By: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd., Brgy. Del Carmen, Pagbilao Quezon
Tel No.: (042)797-1692, email add: cvecolleges.official@gmail.com

____________ Write again the password cvecss@2020 and check the Password never expires
and to the next page click Finish

____________ Now click Start and Administrative Tools and select Group Policy Management

____________ Now set your Settings to Basic – Redirect everyone’s folder to the same location

____________ Expand your domain (cve.com) and click New and select the Organizational Unit

____________ Right-click the CVE COMLAB and select Create a GPO in this domain, and Link it
here…

____________ Close all the Windows and now Run the CMD (Command Prompt)

____________ Name the GPO to cve comlab and click OK

____________ Now right-click the COMLAB and click Edit

____________ Go to User Configuration > Windows Settings >Policies > Folder Redirection

____________ Now run the command gpupdate and press ENTER and it should be completed
successfully

123
Prepared By: JELLIE ANN A. DAYAWON

You might also like