You are on page 1of 24

9444

Technical Vocational Education


Computer Systems Servicing
Quarter 3- Week 1-3 Module 1
Set-up User Access
SPTVE_CSYS9-SUCSIIIa-c-9
Technical Vocational Education Computer Systems Servicing – Grade 8
Alternative Delivery Mode
Quarter 3 Week 1-3 Module 1 - Set-up User Access
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Published by the Department of Education


Secretary : Leonor Magtolis Briones
Undersecretary : Diosdado M. San Antonio
Development Team of the Module

Author: Jocelyn M. Gamo


Language Reviewer: Melgee A. Canare
Content Editor: Elmar S. Legaspi
Illustrator: Jocelyn M. Gamo
Layout Artist: Jocelyn M. Gamo

Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division

Rainelda M. Blanco, PhD


Education Program Supervisor - LRMDS

Agnes R. Bernardo, PhD


EPS-Division ADM Coordinator

Joel I. Vasallo, PhD


EPS – EPP/TLE/TVE/TVL

Glenda S. Constantino
Project Development Officer II

Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph
8
Technical Vocational Education
Computer Systems Servicing
Quarter 3 - Week 1-3 - Module 1
Set-up User Access
SPTVE_CSYS9-SUCSIIIa-c-9
Introductory Message
For the Facilitator:

Welcome to the Technical Vocational Education-Computer Systems Servicing 8 Project CAP-


LRE Alternative Delivery Mode (ADM) Module on Set-up User Access.

This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners

As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.

For the Learner:

Welcome to the Technical Vocational Education-Computer Systems Servicing 8 Project


CAP-LRE Alternative Delivery Mode (ADM) Module on Set-up User Access.

This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.

This module has the following parts and corresponding icons:


This will give you an idea of the skills or
competencies you are expected to learn in the
module.

This part includes an activity that aims to check


what you already know about the lesson to take. If
you get all the answers correctly (100%), you may
decide to skip this module.
This is a brief drill or review to help you link the
current lesson with the previous one.

1
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.

At the end of this module, you will also find:

References- This is a list of all sources used in developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.

If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!

2
This module encourages you to be familiar on how to validate one’s work
for quality improvement work. Different activities are provided for you to be
able to:
1. Create user folder in accordance with Network Operating System
features
2. Configure user access level based on NOS features
3. Establish network access policies/end user requirements
4. Perform security check in accordance with established network

Pre-Test
Directions: Choose the best answer. Write the letter of the correct answer.

1. It provides the several functionalities for managing the data, applications, security,
and other functions.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network

2. A network operating system wherein devices are connected directly to each other
without any additional networking devices between them.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network

3. In this type of network operating system, the server provides the requested
information or service to the client.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network

4. Which of the following is not a communication medium?


a. coaxial cable c. Guided media
b. fiber optic cables d. router

3
5. Which of the following is a connecting terminals?
a. Guided Media, Coaxial Cable, Fiber Optic Cables.
b. Microwaves, Infra-Red Waves
c. Routers, Bridges, and Hubs
d. Unix, Linux, Windows 2000

6. Which of the following is not a software components?


a. Guided Media c. Network Interface Card
b. Guided media d. TCP / IP Model

7. Which of the following should be done first before Setting Up Peer-to-Peer Network
Operating System?
a. Input an IP address which came from the DNS server
b. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.
c. Peer casting for multicasting streams where to use on demand content delivery.
d. Search a communication network.

8. One of the advantages of Network Operating System is __________________.


a. It is more expensive. c. No central location for storage
b. Less security d. No server need or required

9. These are some programs which are installed on the network machines.
a. Application Components c. People Components
b. Hardware Components d. Software Components

10. There are some devices which are physically connected with each other.
a. Application Components c. People Components
b. Hardware Components d. Software Components

11. Which of the following is not a software components?


a. IP Model b. OSI Model c. TCP Model d. Unix

12. If you have a DNS system and your connected to ISP you can input an _______
address which came from the DNS server
a. Default gateway c. Preferred DNS
b. IP d. Subnet

13. If the shared folder does not appear to network windows dialog box, what do you
need to press to refresh the screen?
a. F1 c. F5
b. b. F2 d. F10

4
14. Which part of the IP Address are you going too change if you are setting up a peer-
to-peer network?
a. first c. third
b. b. 2nd d. fourth

15. Which of the following are you going to put a checkmark under the general tab of
TCP/IP Porperties?
a. Client for Microsoft Network, Computer Description, Internet Protocol (TCP/IP)
b. Client for Microsoft Network, File and Printer Sharing, Internet Protocol (TCP/IP)
c. Full Control, Read, Change, Allow
d. Full Control, Read, Change, Write

Direction: Identify the following acronyms about computer network.

1. HTTP - __________________________________________
2. DHCP - __________________________________________
3. NIS - __________________________________________
4. DSL - __________________________________________
5. IP - __________________________________________

Network Operating System is a specialized operating system


for a network device such as router, switch or firewall. It allows to share
file and printer among multiple computers in a network.
Typically over a Local Area Network(LAN) or private, it enables
the sharing of data, user, groups, security, applications and other
networking functions.

Directions: Identify what type of network is being illustrated below. Choose your
answer inside the box.

1. ________________________ 2. _____________________
5 ___
3. _________________________

Network operating system is like as software that is installed on the


server side on the network
infrastructure. Network
operating system provides
the several functionalities
for managing the data,
applications security, and
other functions. In this
system, all computers and
other terminal are
connected each other
through LAN (Local Area Network) line or Inter-network system.

Objectives of Network Operating System:


➢ share data
➢ printer access, and other devices.
➢ users
➢ groups
➢ security

6
Components of Network Operating System
1. Hardware Components
There are some devices which are physically connected with each other.
✓ Server M/C
✓ Client M/C
✓ Peer M/C
✓ Communication medium – Guided media – coaxial cable, fiber optic cables.
✓ Unguided media – microwaves, infra-red waves
✓ Connecting Terminals – Routers, Bridges, Hubs, Repeaters, Gateways, Switches,
hub, Network Interface Card, Shared printers.
2. Software Components
These are some programs which are installed on the network machines.
✓ Networking Operating System – Unix, Linux, Windows 2000, Windows 98,
Windows XP.
✓ Protocol Suite – OSI Model (Open System Interconnections), TCP / IP Model

Feature | Characteristics of Network Operating System


a. Network operating system (NOS) has ability to detect the different H/W and shared
data over several machines. NOS is supportable to several applications and third
party as well.
b. It contains the all possible security features of operating system. Users can manage
all remote terminals.
c. Network operating system can support the internet functionality and their connection
management as well.
d. In NOS, administrator can control the different setting such as N/W security protocol,
data backup for single and interconnected computer system.
e. Printer and other applications can be shared.
f. Users can use their backup database and web services.
g. Directory and name services management
h. It has ability of Inter networking like as routing and WAN ports.
i. It is capable of clustering.
j. NOS has ability to support for all processors, application, and their hardware.
k. All user s can create user account, and they can manage user logging in and logging
out

Types of Network Operating System


1. Client-to-Server
✓ the server provides the requested information or service to the client.
✓ servers on a client/server network commonly perform some of the processing work
for client machines, such as sorting through a database before delivering specific
the records requested by the client
✓ the servers are maintained by network administrators.
✓ Data backups and security measures are implemented by the network
administrator.
✓ The network administrator also controls user access to the network resources

7
2. Peer to Peer
✓designed especially for small to medial
type local area networks.
✓devices are connected directly to each
other without any additional networking
devices between them.
✓all users can share resources and any
type of data (file) on their workstation
computer system, and these shared
resources can be accessed by other computer system.
✓ individual users are responsible for their own resources and can decide which data
and devices to share.
✓ In this network operating system, all computer systems contain equal privileges for
consuming the all resources which are presented on the network.
✓ every peer on this P2P N/W plays role as server as well as client.
✓ no central point of control or administration

Advantages and Disadvantages of Peer-to-Peer:

Advantages include: Disadvantages includes:


➢ ease of set up ➢ no central location for
➢ less hardware needed storage
no server need or required ➢ less security

Applications of Peer to Peer


There are various areas where to use P2P network:
➢ File sharing
➢ Instant messaging
➢ Voice Communication
➢ Collaboration
➢ High Performance Computing
➢ Streaming media
➢ Peer casting for multicasting streams where to use on demand content delivery.
➢ Science
➢ Search and communication network

Setting Up Peer-to-Peer Network Operating System


Before anything:
➢ Make sure both systems have Network Interface Cards (NICs) installed and are
using the proper cables.
➢ For a direct network cable connection between two PCs (not with a hub, switch or
router), you need to have is a cross-over cable.
➢ Make sure that both PC your going to use is in good condition.
8
Setting Up Peer-to-Peer
1. Configure Network Set Up:
a. Click Start
b. Go to Control Panel
c. Choose Network and Internet
Connections
d. Click Network Connections.
e. At Network Connection Windows, you
will see the Local Area Connection Icon,
Right click it and select Properties
.

f. Click on the General tab.

NOTE:
A device name should appear under "connect using." If not, there is a hardware
issue and Windows is not recognizing the network hardware. This issue must be fixed
before continuing.

g. At the General Tab, Put a check mark


at the following:
✓ Client for Microsoft Network
✓ File and Printer Sharing for Microsoft
Network
✓ Internet Protocol (TCP/IP)
*Put a check mark saying Show icon ✓
in notification area when connected.*
h. Select the Internet Protocol (TCP/IP)
and click the Properties button

NOTE:
If any of the above component is
not installed, install them by
selecting Add or Install, and then
selecting the missing
component, and clicking Add.

9
i. At the IP Address tab, select Specify IP
Address.
j. Enter 192.168.0.1 as the unique IP Address
for the first machine. For each other PC add
one to the last number in the IP address.
For example,
✓ KIDSPC1 = 192.168.0.1 , 0 1

✓ MOMSPC2 = 192.168.0.2 ,
✓ and WORKPC3 = 192.168.0.3

NOTE:
192.168.0.x is an IP Address reserved for
private networks and is not routable to the
Internet.

k. In the Subnet mask field enter: 255.255.255.0


All PCs on the same network use the same
subnet mask. Click the Ok button to finish
configuration and to close the Local Area
Connection Properties windows.
NOTE:
The Domain Name System (DNS) is optional. If you have a DNS system and your
connected to ISP you can input an IP address which came from the DNS server

2. Configure Computer Name and Workgroup Name:


a. Click Start.
b. Click My Computer
c. Right Click on an empty area of
the My Computer Dialog Box.
d. Click Properties
e. Click the Computer Name tab and
click the Change button.

f. Enter a name that describes the PC in the


Computer
g. Description field. For example,
KIDSPC1, MOMSPC2, or WORKPC3.
h. Enter the workgroup name for your
network. Use the same workgroup
name for all PCs on the network.
Spelling is important in this step.
i. Repeat these steps for each PC on
the network.
j. Wait two minutes after Windows opens
on all PCs, and then double- click the
10
Network Neighborhood icon on the
desktop. If all went well, you should see
all the PC names on the network when
KIDSPC files and folders are being shared.
1
KIDSPC
1

NOTE:
If you do not see them, press F5 to refresh
the screen. If after refreshing the network
window, the other PCs still do not appear,
check the firewall settings that may be
interfering with the communication.

Regardless of the windows version, same procedure should be


performed in setting up a peer-to-peer network. If it is a higher version,
you can always search the control panel and the network connections
for peer-to-peer network operating system.

Basic File Sharing:

1. Change the advance sharing setting:


a. Right click on LAN/Wifi icon at the
notification bar
b. Select Open Network and Sharing Center.

c. Select Change advance sharing


settings

11
d. Turn network discovery, file, and
printer sharing.
e. Scroll down and Turn off password
protected sharing.
f. Do the same for Home or Work.
g. Click Save Changes.

NOTE:
Just do the same to the other
PCs which is being set up in a
peer-to-peer network.

2. Create and share a folder:


a. Create a folder in your desktop, or
if you already have a folder in
your desktop you can use it to
share the folder to the other PCs.
b. Right click on the folder.
c. Click Properties.
d. Click the Sharing Tab.
e. Click on share
f. Select everyone, then click on
Add
g. Check the permission level to read/
write, then select share
h. Click on Advance Sharing

i. Check share this folder.


j. Click Permission and check Allow-Full Control
k. Click on Apply and Ok.
l. Finally, click on Apply and Ok again

12
4. ___ Choose Network and Internet Connections.
5. ___ Click Network Connections.
6. ___ Click Ok or press the enter key. 10
7. ___ Edit the TCP/IP Properties by entering a unique IP Address, Subnet mask
and DNS server if needed.
8. ___ Go to Control Panel after clicking the start button.
9. ___ Right click it and select Properties.
10. ___ Select the Internet Protocol (TCP/IP) and click the Properties button.

Independent Assessment 1: Characteristics of Network Operating System


Directions: Write T if the statement is true and F if it is false. Write your answer in your
answer sheet.

1. ___ All users can create user account, and they can’t manage user logging in and logging
out.
2. ___ Directory and name services management.
3. ___ In NOS, administrator can control the different setting such as N/W security protocol,
data backup for single and interconnected computer system.
4. ___ It contains the all possible security features of operating system. Users can manage
all remote terminals.
5. ___ It has ability of Inter networking like as routing and WAN ports.
6. ___ It is incapable of clustering.
7. ___ Network operating system cannot support the internet functionality and their
connection management as well.
8. ___ NOS has ability to support for all processors, application, and their hardware.
9. ___ Printer and other applications cannot be shared.
10. ___ Users cannot use their backup database and web services.

Independent Activity 2: Set Up Peer-to-Peer


Directions: Arrange the steps chronologically using the numbers. Write your answer
in your answer sheet.

A. Configure Computer Name and Workgroup Name (1-10):

1. ___ Click My Computer.


2. ___ Click Properties.
3. ___ Click Start.
4. ___ Click the Change button.
5. ___ Click the Computer Name tab.5
6. ___ Enter a name that describes the PC in the Computer Description field.
7. ___ Enter the workgroup name for your network. Use the same workgroup name
for all PCs on the network. Spelling is important in this step.
8. ___ Repeat these steps for each PC on the network.
9. ___ Right Click on an empty area of the My Computer Dialog Box.
10. ___ Wait two minutes after Windows opens on all PCs, and then double- click the
Network Neighborhood icon on the desktop.
14
Independent Assessment 2:
Directions: Write HC if it describes hardware components, and SC it it is a software
components. Write your answer in your answer sheet.

1. ___ Client M/C 6. ___ Routers


2. ___ fiber optic cables 7. ___ Server M/C
3. ___ OSI Model 8. ___ TCP / IP Model
4. ___ Peer M/C 9. ___ Windows 98
5. ___ Repeaters 10. ___ Windows XP

Independent Activity 3: Basic File Sharing


Directions: Arrange the steps chronologically using the numbers. Write your answer
in your answer sheet.

A. Changing the advance sharing setting (1-4):

1. ___ Do the same for Home or Work and click Save Changes.
2. ___ Scroll down and Turn off password protected sharing after turning network
discovery, file, and printer sharing.
3. ___ Select Change advance sharing settings.
4. ___ Select Open Network and Sharing Center after right clicking on LAN/Wifi icon
at the notification bar.

B. Create and share a folder (1-6):

1. ___ Check the permission level to read/write, then select share after selecting
everyone, and clicking on Add.
2. ___ Click on Advance Sharing then check share this folder.
3. ___ Click on Apply and Ok and click on Apply and Ok again.
4. ___ Click Permission and check Allow-Full Control.
5. ___ Click the Sharing Tab after clicking Properties and click on share
6. ___ Right click on the folder you created.

Independent Assessment 3: Applications of Peer to Peer


Directions: Draw a star if the given networking applications is for a peer-to-peer,
and if it under the client-to-server network. Write your answer in your answer
sheet.

1. ___ Collaboration 6. ___ Search and communication network


2. ___ Database Server 7. ___ Server
3. ___ File sharing 8. ___ Streaming media
4. ___ Instant messaging 9. ___ Voice Communication
5. ___ Multiple Workstations 10. ___ Workstation

15
A network operating system (NOS) is a
computer operating system (OS) that is designed
primarily to support workstations, personal computers
and, in some instances, older terminals that are
connected on a local area network (LAN). The software
behind a NOS allows multiple devices within a network
to communicate and share resources with each other.

Directions. Answer the given question below. Please refer to page 22 for the
rubrics.

1. Aside from the given advantages and disadvantages of network operating system,
cite at least three advantages and disadvantages of a network operating system.
a. Advantages:
______________________________________________________________
______________________________________________________________
______________________________________________________________
b. Disadvantages.
______________________________________________________________
______________________________________________________________
______________________________________________________________

Instructions: Please refer to page 22 for the rubrics.

✓ There are two types of network operating system, one is the peer-to-peer, and
the other one is the client-to-server. Create a Ven Diagram showing the
differences and similarities of the two network operating system.

16
Post Test:
Directions: Choose the best answer. Write the letter of the correct answer.

1. It provides the several functionalities for managing the data, applications, security,
and other functions.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network

2. A network operating system wherein devices are connected directly to each other
without any additional networking devices between them.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network

3. In this type of network operating system, the server provides the requested
information or service to the client.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
4. Which of the following is not a communication medium?
a. coaxial cable c. Guided media
b. fiber optic cables d. router

5. Which of the following is a connecting terminals?


a. Guided Media, Coaxial Cable, Fiber Optic Cables.
b. Microwaves, Infra-Red Waves
c. Routers, Bridges, and Hubs
d. Unix, Linux, Windows 2000

6. Which of the following is not a software components?


a. Guided Media c. Network Interface Card
b. Guided media d. TCP / IP Model

7. Which of the following should be done first before Setting Up Peer-to-Peer Network
Operating System?
a. Input an IP address which came from the DNS server
b. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.
c. Peer casting for multicasting streams where to use on demand content delivery.
d. Search a communication network.

8. One of the advantages of Network Operating System is __________________.


a. It is more expensive. c. No central location for storage
b. Less security d. No server need or required

17
9. These are some programs which are installed on the network machines.
a. Application Components c. People Components
b. Hardware Components d. Software Components

10. There are some devices which are physically connected with each other.
a. Application Components c. People Components
b. Hardware Components d. Software Components

11. Which of the following is not a software components?


a. IP Model c. TCP Model
b. b. OSI Model d. Unix

12. If you have a DNS system and your connected to ISP you can input an _______
address which came from the DNS server
a. Default gateway c. Preferred DNS
b. IP d. Subnet

13. If the shared folder does not appear to network windows dialog box, what do you
need to press to refresh the screen?
a. F1 c. F5
b. b. F2 d. F10

14. Which part of the IP Address are you going too change if you are setting up a peer-
to-peer network?
a. first c. third
b. b. 2nd d. fourth

15. Which of the following are you going to put a checkmark under the general tab of
TCP/IP Porperties?
a. Client for Microsoft Network, Computer Description, Internet Protocol (TCP/IP)
b. Client for Microsoft Network, File and Printer Sharing, Internet Protocol
(TCP/IP)
c. Full Control, Read, Change, Allow
d. Full Control, Read, Change, Write

Instructions: Please refer to page 22 for the rubrics.

1. Enumerate the steps that you need to do before setting up a peer-to-peer network?
________________________________________________________________
________________________________________________________________
________________________________________________________________

18
2. Create a short outline in setting up a peer-to-peer network. (You can use an
illustration to show the procedure/steps).

19
References

Google. Er R S. Banger , “ Network Operating System (NOS) Tutorial, Examples and Types”,
February 10, 2020
http://digitalthinkerhelp.com/network-operating-system-nos-tutorial-examples-and-
types/

Google. Er R S. Banger , “ What is Peer to Peer Network”, September 13, 2020


http://digitalthinkerhelp.com/what-is-peer-to-peer-p2p-network-with-architecture-
types-examples/

Google. Er R S. Banger , “ What is Peer to Peer Network”, September 9, 2020


http://digitalthinkerhelp.com/what-is-client-server-architecture-diagram-types-
examples-components/

Google. Margaret Rouse, TechTarget, “Network Operating System (NOS)”, updated in May
2019
https://searchnetworking.techtarget.com/definition/network-operating-system

Google SlideShare. Eric Talamisan, Education, “CSS NC II - Core 3 Set-up Computer Server”,
Published on Jul 18, 2020, pp: 6 – 14
https://www2.slideshare.net/erictalamisan/css-nc-ii-core-3-setup-computer-server

Google. “Peer to Peer Networking”


http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=endocname=bph
05694-www.itrelease.com

Rosalie P. Lucero et al, Basic Education Curriculum, Technology and Livelihood Education
Grade 10 “Computer Hardware Servicing” Learners Materials

21
Appendices

What I Have Learned:

CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar

Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely

What I Can Do/Additional Activity

20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _

22
For inquiries or feedback, please write or call:

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph

23

You might also like