Tle10 - Ict - Css - q2 - Mod2 - Configuringcomputersystemandnetwork (2) - v3 (59 Pages)
Tle10 - Ict - Css - q2 - Mod2 - Configuringcomputersystemandnetwork (2) - v3 (59 Pages)
Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 2 - Module 2
Configuring Computer System and
Network (2)
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for the exploitation of such work for a
profit. Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., pictures, photos, brand names, trademarks, and etc.)
included in this module are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over
them.
Management Team:
Chairperson: Arturo B. Bayocot, PhD, CESO III
Regional Director
POST TEST 46
ANSWER KEYS 47
REFERENCES 48
What This Module Is All About
Introductory Message
This learning resource hopes to engage the learners in guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st-century skills while taking into consideration their
needs and circumstances.
In addition to the material in the main text, you will also see this box in the body
of the module:
In response to the need for today’s challenging new normal way of living due to
pandemic, the Grade 10 TLE (ICT) Module 1 Quarter 2 is the first book uniquely
designed to achieve the goals set by the Department of Education. It is expected that
with the use of the modern technologies that we have, millennial teachers are expected
to be more innovative, creative, resilient and with good communication skills.
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist the
learners as they do the tasks included in the module.
This module is designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What I Need to Know This will give you an idea of the skills or
competencies that you are expected to learn
from the module.
This module will allow the students to learn the Network security to the computer
system. Enabling the network security of the computer system by understanding of the
policies and practices adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
This will define the Network Security and its different types what is suitable for
installations to enable it to the computer system.
The students will learn on how to configure of file and printer sharing as one of
the most effective ways to manage computer settings as a network administrator. The
File and Printer Sharing setting needs to be enabled in your work-sharing network
domain before you can use network printers or transfer files between computers
operating system feature that enables the computer to communicate to each other and
1
send print jobs to your printer. All computers should be part of the main network and
the same Workgroup or Homegroup for File and Printer Sharing to work properly. The
students will understand the terms “File Sharing” and “Printer Sharing.”
The students will learn the steps in configuring a file sharing and printer sharing.
This module is designed to teach the students to learn the safety and precautions
by setting activities or guidelines for inspection and testing the computer systems and
networks.
It outlines the potential health risks and provides an implementing policy
statement that is maintaining the required level of health and safety in the workplace
which the students will understand very well the importance of its procedure:
Multiple Choice
2
b. When sysytems Terminates
c. When connection between two nodes terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and maintenance
category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision, hearing and
mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. What is the benefit of the Networking?.
a. File Sharing c. Easier Backups
b. Easier access to resources d. All of the above
8. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. ADSL is the abbreviation of
a. Asymmetric Dual Subscriber Line
b. Asymmetric Digital System Line
c. Asymmetric Dual System Line
d. Asymmetric Digital Subscriber Line
10. What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. Bridge works in which layer of the OSI model?
a. Application layer c. Network layer
b. Transport layer d. Datalink layer
3
15. Which data communication method is used to transmit the data over a serial
communication link?
4
Lesson
1 Network Security
What I Know
Direction: Match the meanings in column A with the terms in column B to identify
the term/word being described.
5
A B
1) attached to small pieces of
computer code, software and
a. accidental threats
documents.
b. antivirus software
2) when an employee intends to
c. data encryption
cause damage
d. firewall
3) it is technical a worm e. malicious threats
4) Software designed to detect, f. traffic
disable and remove viruses g. trojan horse
5) when user damages data or h. virus
equipment unintentionally i. VPN
6) data being transported on a
network j. WPA
7) an encryption system that k. WEP
protects data
8) a self-replicating program that is l. Worm
harmful to network
9) it involves using codes and
ciphers
10) a way of protecting a
computer from intrusion through
the ports
6
What’s In
What’s New
Computer and network security help keep data and equipment safe by giving
only the appropriate people access. Everyone in an organization should give high
priority to security, because everyone can be affected by a breach in security.
An attack that intentionally degrades the performance of a computer or
network can also harm an organization’s productivity. Poorly implemented security
measures that allow unauthorized access to wireless network devices demonstrate
that physical connectivity is not necessary for security breaches by intruders.
What Is It
Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
security.html
7
Security Attacks
Physical:
Events or attacks that steal, damage, or destroy such ---
equipment as servers, switches, and wiring.
Data:
Events or attacks that remove, corrupt, deny access to, allow access
to, or steal information.
Threats to security can come from inside or outside an organization, and the level
of potential damage can vary greatly. Potential threats include the following:
8
Types of Computer Threats
Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
securoty.html
Viruses, Worms, and Trojan Horses
9
Security Procedures
Regular testing provides details of any possible weaknesses in the current
security plan that should be addressed. A network has multiple layers of security,
including physical, wireless, and data.
Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software
1. Open Windows Firewall by clicking the Start button , and then clicking Control
Panel. In the search box, type firewall, and then click Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an
administrator password or confirmation, type the password or provide confirmation.
Turn Windows Firewall on or off link in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that you want to help
protect, and then click OK.
If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box
Data Encryption
10
Encrypting data involves using codes and ciphers. Data encryption can help
prevent attackers from monitoring or recording traffic between resources and
computers. A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of protecting a
computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured. Data
being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
1. Open Windows Firewall by clicking the Start button, and then click Control
Panel. In the search box, type firewall, and then click Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're prompted
for an administrator password or confirmation, type the password or
provide confirmation. Turn Windows Firewall on or off link in Windows
Firewall.
3. Click Turn on Windows Firewall under each network location that you want
to help protect, and then click OK.
If you want the firewall to prevent all programs from communicating, including
programs that you have previously allowed to communicate through the firewall,
select the Block all incoming connections, including those in the list of allowed
programs check box.
11
Wireless Security Techniques
Traffic flows through radio waves in wireless networks, so it is easy for
attackers to monitor and attack data without having to connect to a network
physically.
When installing wireless services, you should apply the following wireless
security techniques immediately to prevent unwanted access to the network:
o Wired Equivalent Privacy (WEP) was the first-generation security standard for
wireless network. Attackers quickly discovered that 64-bit WEP encryption
was easy to break
o Change the default administration password.
o Disable the broadcasting of the Service Set Identifier (SSID) to hide it from
other users
o Use MAC filtering to protect the network from other users.
o Change the default values of the SSID by entering the setup program for the
access point and renaming the SSID.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all traffic
except the desired network settings.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all traffic
except the desired network settings.
An attacker can access data as it travels over the radio signal. However, you can
use a wireless encryption system to encode data and thereby prevent unwanted
capture and use of the data. The following list describes the different levels of
wireless security, from most secure to least secure.
12
What’s More
13
Step 2
14
What I Have Learned
Direction: Fill in the blank with the word that make the statement correct.
1. Computer and _____________ help keep data and equipment safe by
giving only the appropriate people access.
2. A___________ primary responsibilities include data and network security.
3. Computer _________ are created with malicious intent and sent by
attackers
4. A_______ is transferred to another computer through e-mail, file transfers,
and instant messaging.
5. Security plan policies should be constantly updated to reflect the latest
_________ to a network
What I Can Do
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local store to
gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls. Based on your
research, complete the table below
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features
2. Which hardware firewall would you purchase? List reasons for your choice.
3. Using the Internet, research two different software firewalls. Based on your
research, complete the table below.
Company/Hardware Website Cost Subscription Length Hardware
Name URL (Month/Year/Lifetime) Features
4. Which software firewall would you purchase? List reasons for your choice.
15
Assessment
A B
1. attached to small pieces of
computer code, software and
a. accidental threats
documents.
b. antivirus software
2. when an employee intends to
c. data encryption
cause damage
d. firewall
3. it is technical a worm e. malicious threats
f. traffic
4. Software designed to detect, g. trojan horse
disable and remove viruses
h. virus
5. when user damages data or i. VPN
equipment unintentionally
6. data being transported on a j. WPA
network k. WEP
7. an encryption system that
protects data l. Worm
8. a self-replicating program
that is harmful to network
9. it involves using codes and
ciphers
10. a way of protecting a
computer from intrusion
through the ports
16
Additional Activities
Advantages Disadvantages
1.
2.
3.
4.
5.
17
C. Acrostic
Direction: Give the meaning of the acronyms given below:
1. VPN- ____________________________________________
2. SSID- ____________________________________________
3. WEP- ____________________________________________
4. WPA- ____________________________________________
5. WTLS- __________________________________________
18
Lesson
What I Know
Essay Writing
Directions: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
19
What’s In
What’s New
You have already leraned from the past lesson about computer network and
security. Now you are going to learn how to share files using a computer and a
printer.
File sharing can be done using several methods. The most common method
techniques include the following:
20
What Is It
21
Sharing Resources and Accessing Shared Resources
1) Open My Computer, double-click the C: drive, and create a new folder on the
C: drive. Name it Shared. Right-click the Shared folder and select Properties.
2) In the Shared Properties dialog box, select the Sharing tab.
3) Notice that the Select the Share This Folder button.
4) Type the Share Name. Click Apply and the computer you are linked to should
be able to view your Shared folder.
5) Right-click My Network Places, which should be located on your desktop.
Select Properties.
6) Right-click your connection (look for a name like Local Area Connection) and
again select Properties.
7) In your Local Area Connection Properties dialog box, select File and Print
Sharing for Microsoft Networks and click OK. If you don’t see an option for
File and Print Sharing, click Install and select a service and then click Add.
Now select the File and Print Sharing option.
8) Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window. In the main
(right-hand) pane, you should see one or more options. Double-click the
Microsoft Windows Network icon.
9) You’re now at the main network screen, where you should see what’s called a
workgroup. A workgroup is a basic group of computers connected to the same
Ethernet network. Double-click the workgroup to see all the computers
connected to your Ethernet network.
Printer Sharing
One of the primary reasons that networks were developed was to allow
groups of computer users to share peripheral devices such as printer. Sharing a
single printer among a group of users costs much less than buying a printer for each
computer.
Setting up printer sharing is simple with Windows XP. The following steps
enable a computer to share a printer:
All the computers that use the shared printer must have the correct drivers
installed. Drivers for other operating systems can be installed on the print server. To
connect to the printer from another computer on the network, choose Start > Printers
and Faxes > Add Printer. The Add Printer Wizard appears. Follow the steps using
the wizard
22
What’s More
Advantages Disadvantages
Directions What is the importance and use of file and printer sharing? Give at least
5 sentences.
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
23
What I Can Do
Directions: Write the steps in Setting up printer sharing is simple with Windows XP.
1. __________________________________________
2. __________________________________________
3. __________________________________________
4. __________________________________________
5. __________________________________________
6. __________________________________________
Assessment
Essay Writing
Direction: Cite the importance of file sharing and give an example scenario where
it’s worth was proven.
.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
24
Additional Activities
Adherence to the
Procedures
(30%) -Followed
the procedures
systematically
Workmanship
(15%) -Had
organized
materials and
tools while
accomplishing
the task and has
time
management
25
Functionality
(40%) -Had set
up a functional
file and printer
sharing system
and was able to
come up with a
printed hard copy
through it
26
Lesson
3 Safety Precautions
This module will teach the students to learn the safety and precautions by
setting activities or guidelines for inspection and testing the computer systems and
networks.
The module outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in the
workplace which the students will understand very well the importance of its
procedure:
Follow Occupational Health and Safety (OHS) Procedures in Testing Systems
and networks.
Test computer systems and networks in accordance with the job
requirements.
Accomplish technical reports on the tests conducted.
27
What I Know
28
What Is It
A hazard is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment. The situation could
involve a task , chemical or equipment used. Hazard management is a continuous
process that can be used to improve the health and safety of all workplaces.
Physical Hazards
29
Safety precautions when using a ladder:
1. Read the labels on the ladder, and follow any safety instructions
written on it.
2. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
3. Make sure that people in the area know you will be working there.
4. Cordon off the area with caution tape or safety cones.
5. When you are using a ladder that leans up against a wall, follow the
instructions written on the ladder, and have someone hold the ladder
to help keep it steady.
Occupational Health and Safety is planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks.
Occupational Health and Safety is also referring to the policies, procedures and
activities that aim to protect the health safety and welfare of a people at the
workplace.
Occupational Health and Safety standards Each student has a responsibility to
their colleagues and their organization to report and act upon any potential
workplace hazard. Students need to be aware of the type
of hazards that are possibly present in their work environment .
Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all
persons in the computer and technology industries. You must identify the hazards
where you are working and decide how dangerous they are. Eliminate the hazard or
modify the risk that it presents.
Procedure
4. If the hazard can be easily and safely cleared, then do so. If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal
etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards
30
All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.
What’s More
31
B. Directions: Identify the type of hazards. Match column A with B.
Write only the letter of each correct answer on a separate
sheet of paper.
Column A Column B
Computer equipment can be dangerous, and you or others can be injured or even
killed if you don’t follow proper safety guidelines when working along with PCs. The
following are some precautionary measures to take before working with any
computer equipment:
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________
32
What I Can Do
Assessment
33
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14. Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.
Additional Activities
34
Lesson Guidelines for Testing
4 Computer Systems and
Networks
Is your PC healthy? Don’t be too sure . think back to when you heard kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
internet connection was down.
The best way to find out what is wrong is to take proactive approach. Check
under the PC’s hood with the following mostly free diagnostic tools, and see if
anything is a miss before disaster strikes.
What I Know
Multiple Choice
Direction: Choose the best answer and write it in a separate sheet of paper.( ½
lengthwise)
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3.What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
35
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9. What is the size of source and destination IP address in IP header?
a. 4 Bits c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analyzing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
36
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
What’s In
You have learned from the previous lesson about precautionary measures
before working on any other computer. Now you must be able to know the guidelines
in testing computer systems and network I accordance with the job requirements.
Good luck and enjoy
What’s New
The best way to find out what’s wrong with the computer is to take proactive
approach: Check under your PC’s hood with the following mostly free diagnostic
tools and see if anything is a miss before disaster.
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.
37
What Is It
You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished:
You must verify that the network works as expected. Here are a few simple tests you
can conduct to make sure your network is functional:
Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer. You must
check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection
problem — most likely a bad cable.
Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.
38
Check the network configuration. Click the Start button, type cmd and
press Enter. Then, enter the command ipconfig /all and press Enter. This
command will spit out numerous lines of information. The line you're looking
for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125
(Preferred) If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your DHCP
server is working.
Verify that the computers can ping each other. Another basic test you
should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another. Do several
ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host.
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if your file
server is named FileServer01, use the command ping File Server
What’s More
Activity 1.
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following
format for a technical report for your recently conducted test.
39
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________ Date of
Inspection: __________________ Time: _________________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
40
Activity 2.
In order for computers to network, what are the things you are going to set or
configure? Write your answer on the space provided below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
41
What I Can Do
1.________________________________________________
2.________________________________________________
3.________________________________________________
4.________________________________________________
5.________________________________________________
Assessment
Multiple Choice
Direction: Write your answers in a separate sheet of paper (½ lengthwise).
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3. What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
42
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9.What is the size of source and destination IP address in IP header?
a. 4 Bit s c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analysing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
43
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
Additional Activities
ACRONYMS
44
Post-Test
Multiple Choice
Directions: Encircle the letter of the correct answer.
1. Which of the following is correct regarding Class B Address of IP address?
a. Network bit-14,Host bit-16 c. Network bit-18,Host bit-16
b. Network bit-16,Host bit-14 d. Network bit-12,Host bit-14
2. What is the use of Bridge in Network?
a. To connect LANS c. to control Network Speed
b. to separate LANS d. All of the above
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Network congestion occurs
a. In case of traffic overloading
b. When sysytems Terminates
c. When connection between two nodes terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and maintenance
category?
46
Answer Key
10.okay 10.D
10.D 9. Security 9. C
9. C on 8. L
8. L connecti 7. I
7. I 8. Change 6. F
6. F 7. Next 5. A
5. A 6. WEP 4. B
4. B 5. next 3. G
3. G 4. Network 2. E
2. E 3. start 1. H
1. H More Know
Assessment What's What I
47
48
What I know
Assessment
1. A
1.A 2. C
2.C 3. C
3.C 4. C
4.C 5. D
5.D 6. B
6.B 7. B
7.B 8. C
8.C Teacher or 9. D
9.D facilitator’s 10. C
10.C discretion to rate 11. B
11.B the output of the 12. C
12.C students 13. A
13.A 14. B
14.B 15. A
15.A
Lesson 8. Guidelines in Computer Systems and Network
What I Know Assessment
1. F 1. F
2. F 2. F
3. T 3. T
4. T 4. T
5. T 5. T
6. F 6. F
7. T 7. T
8. T 8. T
9. T Teacher or
facilitator’s 9. T
10. T 10. T
11. T discretion to rate
the output of the 11. T
12. F 12. F
13. T students
13. T
14. T 14. T
15. T 15. T
Lesson 7. Safety Precautions
49
Pre-test
Post-test 31. A
32. A
16. A 33. A
17. C 34. B
18. C 35. C
19. C 36. D
20. D 37. D
21. B 38. A
22. B 39. D
23. C 40. C
24. D 41. B
25. C 42. C
26. B 43. B
27. C 44. D
28. A 45. A
29. B 46. B
30. A 47. A
PRE-TEST AND POST TEST
References
Books and Articles and Printed Materials:
Electronic Resources:
50
“Turn On the Windows Firewall” Retrieved from http://windows.microsoft.com/en-
ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7
51
For inquiries or feedback, please write or call:
Telefax: (088)813-3634