100% found this document useful (3 votes)
2K views

CSS G12 Module 3 Q1

Uploaded by

Pril Gueta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views

CSS G12 Module 3 Q1

Uploaded by

Pril Gueta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

12

Computer Systems
Servicing NCII
Quarter 1
Module 3: Network Operating Systems
(NOS) features.

Source: Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages and
Disadvantages,

February 3, 2020, https://lucentgkquiz.blogspot.com


Computer Systems Servicing NCII - Grade 12
Quarter 1 – Module 3: Network Operating Systems (NOS) features.

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted
to locate and seek permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.

Regional Director: Gilbert T. Sadsad


Assistant Regional Director: Jessie L. Amin

Development Team of the Module

Writers: Jovy E. Ilan

Editors: Armando Lamadrid, T III / Jaspy Silanga, T I

Reviewers: Dr. Nixon SA. Olfindo, EPS / Darcy Guy Y. Mañebo, EPS

Illustrator: Jovy E. Ilan

Layout Artist: Jovy E. Ilan


Computer Systems Servicing NCII - Grade 12
Quarter 1 – Module 3: Network Operating Systems (NOS) features.

I. Introduction:

In able for you to create an efficient client-server network, it is necessary to


understand different terms and policies you will encounter in configuring a server
network and the benefits of using Group Policy Object (GPO). In this lesson you will
also be familiarized in the step by step process of creating accounts like the OU,
Groups and User. Understanding it will also be helpful in troubleshooting future
problems in your network.

Create user folder in accordance with Network Operating System Features -


II. Objectives
TLE_IACSS9-12SUCS-IIIa-e-37:
 Define FQDN, OU, GPO
At the end of the lesson you are expected to:
 Simplify steps in creating OU, GPO and User
 Appreciate the advantage of Group Policy

III. Vocabulary List

Listed below are some important terms that you can find in this lesson.

 Active Directory Domain Services (AD DS)


Active Directory Domain Services (AD DS) is a server role in Active
Directory that allows admins to manage and store information about
resources from a network, as well as application data, in a distributed
database.

 Active Directory Users and Computers


The active Directory Users and Computers is tool and a console snaps in
introduced by Microsoft for the management purposes.

 FQDN (Fully Qualified Domain Name)

1
The FQDN is specified for the host, internet or specific computer. It is the
complete name with two parts host name and domain name and also top-
level domain

2
 Hostname
The term hostname is sometimes used in place of ‘FQDN’

 Host name
The term host name (with space in between) refers to the ‘host’ or the
computer name in a network

 Group Policy Object (GPO)


Group policy object is the tool which provides centralized configuration and
management for the operating system and let you set rules on user and
computer accounts in the Active Directory as the system administrator

 Network Drive
A network drive is a storage device on a local access network (LAN) within a
business or home. Within a business, the network drive is usually located on
a server or a network-attached storage (NAS) device.

 (Organizational Unit):
Organizational Unit let you organize the users in one container that can hold
all user and computer accounts that have common needs so that can be
easily managed and supported by the administrator

 User
User is the person who can use any specific computer in the given
environment with the specified policies.

IV. Pre-Test

True or False. Read each statement carefully and on your answer sheet/notebook,
write FACT if the statement is correct, or BLUFF if the statement is false.

1. A domain name can be considered as a fully qualified domain name if it has a


sub-domain name and a top level domain name.
2. The term “host name” also used to refer ‘FQDN’.
3. The user is the one who manages the network.
4. One of the benefits of GPO is that as the administrator you can block the
devices for specific users
5. User group is a collection of user accounts that share the same security rights
and permissions.

3
V. Learning Activities

Learning Activity 1. I knew it!


Take a look at the words listed in the box. .com, .ph .gov

Do they look familiar to you? Where do you think


you saw them? What does it call?

Correct! Those words are called domains names. You can find it on any website you visit like
Facebook.com, YouTube.com, en.wikipedia.org., deped.gov.ph and many other sites.

INSTRUCTION:

In this activity you will have to answer the crossword puzzle below with the help of the guide
question from. Write your answer on your notebook.

Vertical

1. 1. Domain name used for government


agencies.
2. This domain name was created for
3. U.S. Military branches

4. 2. Horizontal

3. Domain name created for non-profit


5. organizations
4. Domain name created for the use of
commercial organization.
5. This domain brand a website as
business-focused.

See. You easily answered the activity!

Let’s now proceed to our discussion for you to learn


more.

Source: Kchungtw, 3d business man presenting word


easy concept, Free Royalty, www.gograph.com

4
Important Terms, Tools and Concepts in AD DS:

FQDN (Fully Qualified Domain Name):


FQDN is specified for the host, internet or specific computer. It is the complete name with
two parts host name and domain name and also top level domain. Like project.sbk.com is FQDN
where project is host name, “sbk” is second level domain and com is top level domain. FQDN has
specific location in the hierarchy of Domain Name System (DNS).
Study this sample URL below.

SLD – Second Level Domain


TLD – Top Level Domain

Source:
Domain Name System (DNS),
www.iteanz.com/tutorials/aws/dom
ain-namesystem-dns/

Samples of some Top-Level Domain

Source:
MD Juwel, What is a Top-Level Domain
(TLD), July 2018,
https://www.techjan.com/2019/06/what-
is-top-level-domain.html

Need more explanation?


You can also refer to the link below. (Optional, only if internet is available.)
https://www.youtube.com/watch?v=S6uYZ8V1vRc
https://www.youtube.com/watch?v=7fJwSLo65wo

Active Directory Users and Computers:


The active Directory Users and Computers are tools and console snaps are introduced by
Microsoft for the management purposes. You can create user and computer accounts; set their security
policies and you can also apply group policies.

User:
User is the person who can use any specific computer in the given environment with the
specified policies. You can log on the computer by the Active Directory user account. The Active
Directory account identifies the user and establish authentication so that the user can use the resources
within the domain.

5
OU (Organizational Unit):
Organizational Unit let you organize the users in one container that can hold all user and
computer accounts that have common needs so that can be easily managed and supported by the
administrator. The example is an OU Students that is for all the common users. The domain can
contain the collection of different OUs with the same policies as security (password policy) that is
basically same for every user in the OU. The organizational unit administrator is responsible for user
and computer account maintenance in the OU.

Learning Activity 2. Let Us Examine!


As a student and a young adult, you
have encountered lot of policies or rules that
you must abide. Some may seem easy to follow
but most likely difficult. However, at the end of
the day when you think upon these things you
will realize that each policy is made with a good
purpose.

Source: https://changemakerhighschool.org/policies

INSTRUCTION:

In this activity, using a graphic organizer


(like the picture shown on the left) list 5 common
policies in your house, community or school and
think of its purpose. You may do this on your
notebook.

Example: 1. (School) No homework policy. Students


will not be given a home work during Friday for them
to enjoy a quality time with their family during
weekend.

Good Job.

You have listed 5 policies and its purposes.

Same thing with the real life, computer network also has policies.

Group Policy Object (GPO):


Group policy object is the tool which
provides centralized configuration and
management for the operating system and let
you set rules on user and computer accounts
in the Active Directory as the system
administrator. It is used in the small
businesses and organizations very commonly.

6
Group policy object will store the configured setting of Active Directory. The management
and configuration of software, desktop and network environments can be done by GPO. The Group
Policy is the feature in Windows Server 2008’s Server Manager you need to install so that you could
use and manage multiple accounts. Group Policy management console let you easily use different
policies for the group policy objects.

Benefits of using GPO


Source: Margaret Rouse There are some uses of Group Policy Objects
https://searchwindowsserver.techtarget.com/definition/  You can block as the administrator the
Group-Policy-Object devices for specific users

 The improved security implementations


for devices and users using firewall and IPsec

 Categorized management of resources makes it possible to easily deploy and manage the
resources

 You can manage multiple groups, logs and event in the GPO

TWO TYPES OF GROUP POLICIES:


1. Local Group Policy
Each computer running the windows line of operating system has exactly one local
group policy. It is available only to the particular computer in which it resides and to users
who log on to that computer. The local group policy objects reside in the %systemroot
%\System32\Group Policy folder. It has only a subset of settings that are available in the non-
local group policy.

2. Non-local Group policy


Each domain controller has one or more non-local group policies. They are available
to all the machines and users in the Active Directory environment. A non-local group policy
can be applied to all users and computers in a domain or to a particular OU depending on
where the group policy is linked.

Need for Group Policies


As organizations seek to increase productivity and revenues through
technology, they are also trying to minimize the complexity of managing a huge IT
infrastructure. The following are some of the reasons that illustrate why group
policies are necessity:

 Uniform User experience


Users are no longer confined to a single computer in their workplace. They use different
computers for different tasks. So, all their files and folders along with their personalized

7
settings such as taskbar location, wallpaper settings, desktop icons, etc., must be made
available in all the machines the user logs on to.

 Security
Even with all the authentication protocols and authorization techniques involved in AD, a
malicious user, can still gain access to network resources, if the attacker comes to know about a
user’s password. So, it is very important to have a strong password setting for all the users in an
organization. It is also important to record certain events like user login, access to a particular
folder, etc., for auditing purposes.

 Organization wide Policies


Most organizations use wallpapers, screen savers, interactive logon messages, etc., to
establish a standard among all its employees. Organizations also have Internet policies that all
users in the organization should adhere to.

 Cost and Time


Tasks like software installation consume a lot of time. Installing and updating software in all
computers, for all users, will not only take time, but also affects productivity, as employees lack
access to their computers when the installation is taking place.
Group Policies play a crucial role in ensuring that the employees of an organization can have
a hassle-free experience when it comes to using the IT resources to accomplish their tasks.

Create objects (OU,


User and Groups) on
Active Directory
Windows Server 2008
R2
In this topic, the step
by step procedure in creating
an OU, User and Groups on
ADD Windows Server 2008
R2 will be given

Steps in Creating an OU
(Organizational Unit)

8
1. To start the Active Directory Users and Computers snap-in, click Start, point to Administrative
Tools, and then click Active Directory Users and Computers:

2. To create Organization Unit right click on Tekbloq.local and Click New and then


Click Organization Unit:
(Tekbloq.local is the sample domain name)

3. Type name of your New Organizational


Unit and click OK:

As you see New OU (Organization Unit) has


been created, Same way you can create child
OU under IT Users OU:

9
Steps in Creating a User Under an
OU

1. To create user, right click on IT


Users OU and Click New and then
click User:

2. Type all required information below


and click next:

3. Type password for the User and click


Next (In this screen you can also set
up 4 important setting with checking
up checkbox):

10
4. Create User by clicking Finish:

5. So now created an
account for Asim
Alili in the IT Users
OU:

Steps in Creating a Group under an OU

1. To create group, right click on IT Users OU and Click New and then click Group:

11
2. Type group name, Group scope and type for that and click OK:

 The Group type indicates whether the group can be used to assign permissions to other
network resources, such as files and printers. Both security and distribution groups can be used for
e-mail distribution lists.
 The Group scope determines the visibility of the group and what type of objects can be
contained within the group.

3. IT Group created:

VI. Practice Tasks


Practice Task #1 Identify me
Part 1. In this activity, you must identify whether the following are ‘FQDN’ Fully Qualified Domain
Name or a Domain name. Write your answer on your answer sheets.

Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
Ex. www.one.com Fully Qualified Domain Name
1. en.wikipedia.org
2. twitter.com
3. nbi.gov.ph
4. www.jollibee.com.ph
5. css.local

Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host. Write your answer in your answer sheet.

Ex. www.one.com = www (sub domain)


= one (second level domain)
= .com (Top Level Domain)

Practice Task #2. I can relate 12


INSTRUCTION: In a ½ sheet of paper, write a paragraph with 3 to 5 sentences that answers the given
situation. Based on your experience, did you ever encounter or experienced a client-server type of
network?

If yes, where did you encounter a client-server type of network and what do you think its benefits?

If not, where do you think we can apply or use a client-server type of network or what situation can
you apply it?

Your score will be based it the rubrics given below.

Scoring Rubrics
5 4 3 2 Score
All content 80% of the Some content is The content is
Content

reflects the content reflects related to the topic far from the
learner’s the learner’s it also reflects lesson.
understanding on understanding on their
No
the lesson.spelling, Few spellings
the lesson. Several spelling,
understanding. So many
punctuation or and punctuation punctuation or spelling,
Spelling and Grammar

grammatical errors, minor grammatical punctuation


errors grammatical errors. and
errors grammatical
errors that’s
interferes in the
meaning

TOTAL

Practice Task #3 Let’s us organize!

Using a flowchart, map the step by step process of creating an OU, User and Groups. Do this
using your own domain name, OU name, User name, password and Group name. You can also add
more box and use your own flow chart design.

Creating
Creating OU New User Creati
ng
New
Grou
p

13
VII. Post Test
Read the direction in every part carefully and follow the individual instruction and write your answers
on your answer sheets.

Part I. True or False. Write FACT if the statement is correct, or BLUFF if the statement is false.
1. A domain name can be considered as a Fully qualified domain name if it has a sub-domain name
and a top-level domain name.
2. The term “host name” also used to refer ‘FQDN’.
3. The user is the one who manage the network.
4. One of the benefits of GPO is that as the administrator you can block the devices for specific
users
5. User group is a collection of user accounts that share the same security rights and permissions.

Part 2. Multiple choice. Choose the letter of the correct answer. Then write it in on your answer
sheet.
6. What does FQDN stands for?
a. Fully Qualified Domain Name c. Fairly Qualified Domain Name
b. Fully Qualified Device Name d. Full Quality Device Name
7. In which tool can we create user and computer accounts; set their security policies and you can
also apply group policies?
a. Active Directory c. NAS
b. FQDN d. roaming profile
8. Which of the following is not a benefit of using GPO?
a. You can manage multiple groups, logs and event in the GPO.
b. You can block as the administrator the devices for specific users
c. You can easily manage the resource and deploy it to other computers.
d. You can as a user block the network administrator.

9. Which group policy enables a user to access its files and profile in any computer connected to a 1
domain?
a. Local Group Policy c. OU
b. Non-local Group Policy d. NAS
10. What does the abbreviation NAS mean?
a. Network-attached storage c. New account system
b. Network accessed storage d. New access system

VIII. Assignment/Additional Activities

14
In your notebook, write at least a paragraph containing a minimum of 3 sentences that’s
answering the questions below. (You make use any reference available. But don’t forget to cite your
reference or acknowledge your sources.)

1. What is the importance of user account password?


2. How many characters are recommended to have a strong password?

15
References

Illustrations

Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages
and Disadvantages, February 3, 2020, https://lucentgkquiz.blogspot.com

ICONS - https://iconarchive.com/

Kchungtw, 3d business man presenting word easy concept, Free Royalty, www.gograph.com

https://changemakerhighschool.org/policies/

MD Juwel, What is a Top-Level Domain (TLD), July 2018,


https://www.techjan.com/2019/06/what-is-top-level-domain.html
Margaret Rouse https://searchwindowsserver.techtarget.com/definition/Group-Policy-Object
Domain Name System (DNS), www.iteanz.com/tutorials/aws/domain-namesystem-dns/
Thumbs up Icon, https://iconarchive.com/show/noto-emoji-people-bodyparts-icons-by-google /12008-
thumbs-up-icon.html

Content

Kristin Crabb, “Types of Domain Names: A Helpful Guide”, October 30, 2018,
https://www.domain.com/blog/2018/10/30/domain-name-types/

Malou Elevera, “System Administration Windows Server 2008”,


https://www.scribd.com/document/409078171/System-Administration-Windows-Server-2008-docx

Zoho Corp., “Group Policy”, Active Directory 360, http://www.windows-active-


directory.com/group-policy.html

Create objects(OU,user and goups) on Active Directory Windows Server 2008 R2, May 12, 2017,
https://tekbloq.com/2017/05/12/create-objectsouuser-and-goups-on-active-directory-windows-server-
2008-r2/

Video Links

https://www.youtube.com/watch?v=S6uYZ8V1vRc
https://www.youtube.com/watch?v=7fJwSLo65wo

16
IX. Answer Key

Pre-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact

Learning Activity 1.
Vertical Horizontal
1. .gov 3. .org
2. .mil 4. .com
5. .biz
Learning Activity 2. (Possible Answers)
1. (for School) Anti-Bullying. This policy is imposed to maintain a healthy learning
environment for every student and promote unity beyond the students diversity.
2. (for School) No Smoking. The purpose of this policy is to keep the school a healthy
environment for everyone and keep them away from developing bad habits/vices.
3. (for School) Dress code. Proper dress code for student also develops discipline and
lessen unnecessary distractions to every learner.
4. (for School) No littering. This policy is to keep the school premises neat and clean
and to instill discipline to students when it comes to waste management.
5. (for Home) Be at home before dusk. This is to assure our safety.

Practice Task #1 Try Your Best


Part 1. In this activity, you must identify whether the following are ‘FQDN’ Fully Qualified Domain
Name or a Domain name.

Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
1. en.wikipedia.org FQDN
2. twitter.com Domain Name
3. nbi.gov.ph FQDN
4. www.jollibee.com.ph FQDN
6. css.local Domain Name

Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host.

ANSWERS MAY VARY


17
jovy.ilan.com = jovy.ilan (sub domain)
= .com (TDL)
Practice Task #2 Try Your Best
Answers may differ.

Yes, I already have seen a client-server type network in a computer shop. Every computer is
connected to what we call a server and the server controls the other computer. The benefit of that kind
of set up was having a central control, the management of the other computer will be easy and
efficient. It can also lessen the resources needed to accomplish a task because it’s easier to share files
and other resources from computer to another computer.

Practice Task #2 Try Your Best

Creating OU

Creating Group

18
Creating User

Post-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact
6. A
7. B
8. C
9. C
10. A

Assignment/Additional Acticity Key


1. “Passwords provide the first line of defense against unauthorized access to your computer and
personal information. The stronger your password, the more protected your computer will be
from hackers and malicious software. You should maintain strong passwords for all accounts
on your computer.”

Source: uOttawa, “The Importance of Passwords”,


https://it.uottawa.ca/security/identity-authentication-theft

2. Password should at least 8 characters long and must contain combination of text, number and
special character.

19

You might also like