Technology and Livelihood Education: Ict-Computer Hardware Servicing
Technology and Livelihood Education: Ict-Computer Hardware Servicing
Technology
and
Livelihood Education
ICT-COMPUTER HARDWARE
SERVICING
1
Technology and Livelihood Education (ICT) – Grade 10
Alternative Delivery Mode
Republic Act 8293, Section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of
such work for profit. Such agency or office may, among other things, impose as a
condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
2
10
Technology
and Livelihood
Education
ICT-COMPUTER
HARDWARE SERVICING
Quarter 1 – Module 6 and 7
CONFIGURE COMPUTER
SYSTEMS AND NETWORK
This instructional material is collaboratively developed and reviewed by educators
from public schools. We encourage teachers and other education stakeholders to
email their feedback, comments, and recommendations to the Department of
Education-Region III at
3
For the learner:
This module is provided as your alternative instruction for learning in which content
and activities are based on your needs. It is a self-paced approach wherein you will
work on different activities that are interesting and challenging.
To accomplish what is expected from you, you are encouraged to stay focused and
develop a sense of responsibility and independence in doing the different tasks
provided in the module. Be an empowered learner. Always believe that nothing is
impossible and nobody can stop you from reaching your dreams.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.
4
module.
5
At the end of this module you will also find:
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can do it!
6
Table of Contents
Lesson 1
What’s In ------------------------- 3
What is It ------------------------- 4
Assessment ------------------------- 12
References ------------------------- 14
7
What I Need to Know
This module was designed and written with you in mind. It is here to help you understand
Computer Hardware Servicing.
This module is focused on developing skills in configuring computer and networks. You will
study techniques on how to plan and configure pc essential to be successful in computer
hardware servicing as one of the career option in ICT.
The lessons are arranged to follow the standard sequence of the course.
8
What I Know
(PRE-TEST)
9
Lesson
IP Addressing
6
What’s In
Aside from the main lesson, this module consists of pre and post assessment tests together
with various activities which you are required to perform in order to measure your level of
understanding. Each of the activities has corresponding rubrics as your guide.
10
What’s New
A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the delivery address needs
to be written. If the delivery address is written in the wrong place, the letter cannot be
delivered. Internet protocol works in a similar way. Internet protocols are sets of rules
governing communication within and between computers on a network. Protocol
specifications define the format of the messages to be exchanged. Timing is crucial to
network operation. Protocols require messages to arrive within a certain amount of time so
that computers do not wait indefinitely for messages that may have been lost. Therefore,
systems maintain one or more times during transmission of data. Protocols also initiate
alternative actions if the network does not meet the timing rules. Many protocols consist of
a suite of other protocols that are stacked in layers. These layers depend on the operation
of the other layers in the suite to function properly.
What is It
To understand how networks and the Internet work, you must be familiar with the commonly
used protocols. These protocols are used to browse the web, send and receive e-mail, and
transfer data files. You will encounter other protocols as your experience in IT grows, but
they are not used as often as the common protocols described here:
TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols
has become the dominant standard for internetworking. TCP/IP represents a set of public
standards that specify how packets of information are exchanged between computers over
one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol
suite originally employed by Novell Corporation’s network operating system, NetWare. It
delivers functions similar to those included in TCP/IP. Novell in its current releases supports
the TCP/IP suite. A large installed base of NetWare networks continues to use IPX/SPX.
NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small
Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other
on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few
computers directly connected to each other. It can be used in conjunction with another
routable protocol such as TCP/IP. This gives the network administrator the advantages of
11
the high performance of NetBEUI within the local network and the ability to communicate
beyond the LAN over TCP/IP.
AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. It is
composed of a comprehensive set of protocols that span the seven layers of the Open
Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to
run over LocalTalk, which is the Apple LAN physical topology. This protocol is also
designed to run over major LAN types, notably Ethernet and Token Ring.
HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW). The Internet Engineering Task
Force (IETF) developed the standards for HTTP.
FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
SSH: Secure Shell is used to securely connect to a remote computer.
Telnet: It is an application used to connect to a remote computer that lacks security
features.
POP3: Post Office Protocol is used to download e-mail from a remote mail server
IMAP: Internet Message Access Protocol is also used to download e-mail from a remote
mail server.
SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
The more you understand about each of these protocols, the more you will understand how
networks and the Internet work.
IP Addressing
An IP address is a number that is used to identify a device on the network. Each device on
a network must have a unique IP address to communicate with other network devices.
Network devices are those that move data across the network, including hubs, switches,
and routers. On a LAN, each host (device that sends or receives information on the
network) and network device must have an IP address within the same network to be able
to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or address
for the person’s physical aspect—the body. A person’s mailing address, on the other hand,
relates to where the person lives or picks up mail. This address can change. On a host, the
Media Access Control (MAC) address is assigned to the host Network Interface Card (NIC)
and is known as the physical address. The physical address remains the same regardless
of where the host is placed on the network in the same way that fingerprints remain with
12
someone regardless of where he or she goes. An IP address consists of a series of 32
binary bits (1s and 0s). It is very difficult for humans to read a binary IP address. For this
reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address, even in
this grouped format, is hard for humans to read, write, and remember. Therefore, each
octet is presented as its decimal value, separated by a decimal point or period. This format
is called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.
13
What I Have Learned
14
What I Can Do
INFOGRAPHICS
Directions: On a short bond paper, create infographics showing the main functions of
Internet Protocol. You will be graded based on the following rubrics.
Performance Criteria:
Creativity (50%)
Content/Information (20%)
Neatness (20%)
Visual clarity and appeal (20%)
15
Assessment
MATCHING TYPE
Direction: Match Column A with the correct answers on column B. Write the letter of your
answer on the space provided.
Column A Column B
Answer Key
1. B
2. C
3. A
4. B
5. A
16
ASSESSMENT
What I have learned 1. D
2. F
1. CLASS D
3. H
2. 32
4. A
3. IP ADDRESS
5. C
4. PROTOCOL
6. J
5. MAIN FUNCTION
7. I
8. B
9. G
10. E
References
D-CHS_Grade10_-Q1-Q2
17
18