CSS G12 Module 3 Q1
CSS G12 Module 3 Q1
Computer Systems
Servicing NCII
Quarter 1
Module 3: Network Operating Systems
(NOS) features.
Source: Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages and
Disadvantages,
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted
to locate and seek permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.
Reviewers: Dr. Nixon SA. Olfindo, EPS / Darcy Guy Y. Mañebo, EPS
I. Introduction:
Listed below are some important terms that you can find in this lesson.
1
The FQDN is specified for the host, internet or specific computer. It is the
complete name with two parts host name and domain name and also top-
level domain
2
Hostname
The term hostname is sometimes used in place of ‘FQDN’
Host name
The term host name (with space in between) refers to the ‘host’ or the
computer name in a network
Network Drive
A network drive is a storage device on a local access network (LAN) within a
business or home. Within a business, the network drive is usually located on
a server or a network-attached storage (NAS) device.
(Organizational Unit):
Organizational Unit let you organize the users in one container that can hold
all user and computer accounts that have common needs so that can be
easily managed and supported by the administrator
User
User is the person who can use any specific computer in the given
environment with the specified policies.
IV. Pre-Test
True or False. Read each statement carefully and on your answer sheet/notebook,
write FACT if the statement is correct, or BLUFF if the statement is false.
3
V. Learning Activities
Correct! Those words are called domains names. You can find it on any website you visit like
Facebook.com, YouTube.com, en.wikipedia.org., deped.gov.ph and many other sites.
INSTRUCTION:
In this activity you will have to answer the crossword puzzle below with the help of the guide
question from. Write your answer on your notebook.
Vertical
4. 2. Horizontal
4
Important Terms, Tools and Concepts in AD DS:
Source:
Domain Name System (DNS),
www.iteanz.com/tutorials/aws/dom
ain-namesystem-dns/
Source:
MD Juwel, What is a Top-Level Domain
(TLD), July 2018,
https://www.techjan.com/2019/06/what-
is-top-level-domain.html
User:
User is the person who can use any specific computer in the given environment with the
specified policies. You can log on the computer by the Active Directory user account. The Active
Directory account identifies the user and establish authentication so that the user can use the resources
within the domain.
5
OU (Organizational Unit):
Organizational Unit let you organize the users in one container that can hold all user and
computer accounts that have common needs so that can be easily managed and supported by the
administrator. The example is an OU Students that is for all the common users. The domain can
contain the collection of different OUs with the same policies as security (password policy) that is
basically same for every user in the OU. The organizational unit administrator is responsible for user
and computer account maintenance in the OU.
Source: https://changemakerhighschool.org/policies
INSTRUCTION:
Good Job.
Same thing with the real life, computer network also has policies.
6
Group policy object will store the configured setting of Active Directory. The management
and configuration of software, desktop and network environments can be done by GPO. The Group
Policy is the feature in Windows Server 2008’s Server Manager you need to install so that you could
use and manage multiple accounts. Group Policy management console let you easily use different
policies for the group policy objects.
Categorized management of resources makes it possible to easily deploy and manage the
resources
You can manage multiple groups, logs and event in the GPO
7
settings such as taskbar location, wallpaper settings, desktop icons, etc., must be made
available in all the machines the user logs on to.
Security
Even with all the authentication protocols and authorization techniques involved in AD, a
malicious user, can still gain access to network resources, if the attacker comes to know about a
user’s password. So, it is very important to have a strong password setting for all the users in an
organization. It is also important to record certain events like user login, access to a particular
folder, etc., for auditing purposes.
Steps in Creating an OU
(Organizational Unit)
8
1. To start the Active Directory Users and Computers snap-in, click Start, point to Administrative
Tools, and then click Active Directory Users and Computers:
9
Steps in Creating a User Under an
OU
10
4. Create User by clicking Finish:
5. So now created an
account for Asim
Alili in the IT Users
OU:
1. To create group, right click on IT Users OU and Click New and then click Group:
11
2. Type group name, Group scope and type for that and click OK:
The Group type indicates whether the group can be used to assign permissions to other
network resources, such as files and printers. Both security and distribution groups can be used for
e-mail distribution lists.
The Group scope determines the visibility of the group and what type of objects can be
contained within the group.
3. IT Group created:
Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
Ex. www.one.com Fully Qualified Domain Name
1. en.wikipedia.org
2. twitter.com
3. nbi.gov.ph
4. www.jollibee.com.ph
5. css.local
Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host. Write your answer in your answer sheet.
If yes, where did you encounter a client-server type of network and what do you think its benefits?
If not, where do you think we can apply or use a client-server type of network or what situation can
you apply it?
Scoring Rubrics
5 4 3 2 Score
All content 80% of the Some content is The content is
Content
reflects the content reflects related to the topic far from the
learner’s the learner’s it also reflects lesson.
understanding on understanding on their
No
the lesson.spelling, Few spellings
the lesson. Several spelling,
understanding. So many
punctuation or and punctuation punctuation or spelling,
Spelling and Grammar
TOTAL
Using a flowchart, map the step by step process of creating an OU, User and Groups. Do this
using your own domain name, OU name, User name, password and Group name. You can also add
more box and use your own flow chart design.
Creating
Creating OU New User Creati
ng
New
Grou
p
13
VII. Post Test
Read the direction in every part carefully and follow the individual instruction and write your answers
on your answer sheets.
Part I. True or False. Write FACT if the statement is correct, or BLUFF if the statement is false.
1. A domain name can be considered as a Fully qualified domain name if it has a sub-domain name
and a top-level domain name.
2. The term “host name” also used to refer ‘FQDN’.
3. The user is the one who manage the network.
4. One of the benefits of GPO is that as the administrator you can block the devices for specific
users
5. User group is a collection of user accounts that share the same security rights and permissions.
Part 2. Multiple choice. Choose the letter of the correct answer. Then write it in on your answer
sheet.
6. What does FQDN stands for?
a. Fully Qualified Domain Name c. Fairly Qualified Domain Name
b. Fully Qualified Device Name d. Full Quality Device Name
7. In which tool can we create user and computer accounts; set their security policies and you can
also apply group policies?
a. Active Directory c. NAS
b. FQDN d. roaming profile
8. Which of the following is not a benefit of using GPO?
a. You can manage multiple groups, logs and event in the GPO.
b. You can block as the administrator the devices for specific users
c. You can easily manage the resource and deploy it to other computers.
d. You can as a user block the network administrator.
9. Which group policy enables a user to access its files and profile in any computer connected to a 1
domain?
a. Local Group Policy c. OU
b. Non-local Group Policy d. NAS
10. What does the abbreviation NAS mean?
a. Network-attached storage c. New account system
b. Network accessed storage d. New access system
14
In your notebook, write at least a paragraph containing a minimum of 3 sentences that’s
answering the questions below. (You make use any reference available. But don’t forget to cite your
reference or acknowledge your sources.)
15
References
Illustrations
Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages
and Disadvantages, February 3, 2020, https://lucentgkquiz.blogspot.com
ICONS - https://iconarchive.com/
Kchungtw, 3d business man presenting word easy concept, Free Royalty, www.gograph.com
https://changemakerhighschool.org/policies/
Content
Kristin Crabb, “Types of Domain Names: A Helpful Guide”, October 30, 2018,
https://www.domain.com/blog/2018/10/30/domain-name-types/
Create objects(OU,user and goups) on Active Directory Windows Server 2008 R2, May 12, 2017,
https://tekbloq.com/2017/05/12/create-objectsouuser-and-goups-on-active-directory-windows-server-
2008-r2/
Video Links
https://www.youtube.com/watch?v=S6uYZ8V1vRc
https://www.youtube.com/watch?v=7fJwSLo65wo
16
IX. Answer Key
Pre-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact
Learning Activity 1.
Vertical Horizontal
1. .gov 3. .org
2. .mil 4. .com
5. .biz
Learning Activity 2. (Possible Answers)
1. (for School) Anti-Bullying. This policy is imposed to maintain a healthy learning
environment for every student and promote unity beyond the students diversity.
2. (for School) No Smoking. The purpose of this policy is to keep the school a healthy
environment for everyone and keep them away from developing bad habits/vices.
3. (for School) Dress code. Proper dress code for student also develops discipline and
lessen unnecessary distractions to every learner.
4. (for School) No littering. This policy is to keep the school premises neat and clean
and to instill discipline to students when it comes to waste management.
5. (for Home) Be at home before dusk. This is to assure our safety.
Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
1. en.wikipedia.org FQDN
2. twitter.com Domain Name
3. nbi.gov.ph FQDN
4. www.jollibee.com.ph FQDN
6. css.local Domain Name
Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host.
Yes, I already have seen a client-server type network in a computer shop. Every computer is
connected to what we call a server and the server controls the other computer. The benefit of that kind
of set up was having a central control, the management of the other computer will be easy and
efficient. It can also lessen the resources needed to accomplish a task because it’s easier to share files
and other resources from computer to another computer.
Creating OU
Creating Group
18
Creating User
Post-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact
6. A
7. B
8. C
9. C
10. A
2. Password should at least 8 characters long and must contain combination of text, number and
special character.
19