Professional Documents
Culture Documents
Department of Education
REGION VIII – EASTERN VISAYAS
SCHOOLS DIVISION OF NORTHERN SAMAR
CATARMAN NATIONAL HIGH SCHOOL
BRGY. DALAKIT, CATARMAN, NORTHERN SAMAR
I. OBJECTIVES
A. Content standards The learners demonstrate an understanding of concepts and principles in installing configuring computer systems
B. Performance The learners shall be able to install and configure computer systems based on established procedures and system
standards requirements
C. Learning
Competency/ies Carry out variation to application software in accordance to customer/ client requirements
with Code
After completing this lesson, you should be able to:
Page 1 of 14
Address: Brgy. Dalakit, Catarman, Northern, Samar
Telephone No.: (055) 500-0881
Email Address: catarman.nhs@deped.gov.ph
Department of Education Schools Division of Northern Samar, Catarman National High School
Greetings
Checking of attendance
Setting of classroom rules
Preparatory Activities
Classroom Rules: The 5 P’s
1. Be Prepare
2. Be Positive
3. Be Productive
4. Be Respectful
5. Be Participate
Indicator 2: Used a range of teaching strategies that enhance learner achievement in literacy and numeracy
skills.
Annotations
Students will make a table and list some mobile applications and their functions.
Data Communication
The exchange of data between two devices through a transmission medium is called
Data Communication.
2. Server-Client model:
One can imagine a company’s information system consisting of one or more
databases and some employees who need to access it remotely. In this model, the
data is stored on powerful computers called Servers. Often these are centrally
housed and maintained by a system administrator. In contrast, the employees have
simple machines, called Clients, on their desks, using which they access remote data.
3. Communication Medium:
A computer network can provide a powerful communication medium among
employees. Virtually every company that has two or more computers now has e-mail
(electronic mail), which employees generally use for a great deal of daily
communication
4. eCommerce:
A goal that is starting to become more critical in businesses is doing business with
consumers over the Internet. Airlines, bookstores, and music vendors have
discovered that many customers like the convenience of shopping from home. This
sector is expected to grow quickly in the future.
There are two ways to connect the devices:
Point-To-Point Connection
It is a protocol that is used as a communication link
between two devices. It is simple to establish. The
most common example for Point-to-Point connection
(PPP) is a computer connected by telephone line. We
can connect the two devices using a pair of wires or
using a microwave or satellite link.
Example: Point-to-Point connection between the remote control and Television for
changing the channels.
MultiPoint Connection
It is also called a Multidrop configuration. In this
connection, two or more devices share a single link.
TREE Topology has a root node and all other nodes are
connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels
to the hierarchy.
Indicator 1: Applied Knowledge of content within and across curriculum teaching areas.
Annotations
TLE 10 Check network connectivity of each terminal in accordance with network design. (TLE_IAC559-
12SUCN-Ia-e-34)
D. Application
Now, it’s about time for you to use your knowledge in real-life situations.
1. Your mother wants to transfer files from her smartphone to her new laptop.
What possible network connection can be used to do the job since both
devices are capable of connecting via wireless transmission? Explain your
2. Juan wants to buy a new pair of shoes on the shopping mall but the size of his
shoes is no longer available. What possible business application you can offer
to him to buy the shoes? Why?
Indicator 3:
Applied a range of teaching strategies to develop critical and creative thinking, as well as other higher -
order thinking skills.
Indicator 7:
Established a learner-centered culture by using teaching strategies that respond to their linguistic, cultural,
socio -economic and religious backgrounds.
Annotations
Encourage students to think about the practical applications of their knowledge about computer
networking.
V. EVALUATION
Test I. Choose the letter of the correct answer. Use a separate sheet for your answer.
1. Which of the choices defined when the time elapsed between inquiry and response?
a. Increase time b. response time c. link time d. thinking time
2. What type of topology when each computer forms like a circle and connected to another computer, with the
last one connected to the first?
a. bus b. ring c. star d. mesh
3. What type of topology when each computer is connected via point-to-point connection to other nodes and all
network nodes are connected to each other
a. bus b. ring c. star d. mesh
3. Which components of data communication means that the information is to be delivered?
a. message b. sender c. receiver d. medium
4. It is the person who is sending the message. What components of data communication is this?
a. message b. sender c. receiver d. medium
5. What type of connection if a dedicated link connects two and only two devices.
Column A Column B
1. It is a telecommunication channel using which we can share data with other computers or a. Interpersonal
devices, connected to the same network. Communication
2. It decides the frequency at which network failure take place. More the shortcomings are, less b. Security
is the network’s reliability.
c. message
3. Properties of a good network, we can communicate with each other efficiently and easily.
Example: e-mails, chat rooms, video conferencing etc, all of these are possible because of d. Destination
computer networks.
e. Reliability
4. It refers to the protection of data from any unauthorized user or access. While travelling
through network, data passes many layers of network, and data can be traced if attempted. f. protocol
Hence security is also a very important characteristic for Networks.
g. node
5. Properties of good network, an authorized user are allowed to share the files on the network.
h. Sharing files and
6. In communication model, it accepts the signal from the transmission system and converts it data
into a form which is easily managed by the destination device.
i. Receiver
7. In communication model, this is the one who receives the incoming data from the receiver.
8. In Components of Data Communication, Data to be transmitted is generated by this device, j. Computer
example: telephones, personal computers etc. Network
9. In Components of Data Communication, these are some set of rules which govern data k. source
communication.
10. It can be a device which is capable of sending or receiving data generated by other nodes
on the network like a computer, printer etc.
VI. AGREEMENT
VII.REFLECTION
Noted:
JOHN L. DELORINO
School Principal
Date: _______________