Let Us Discover: Tvl-Computer Systems Servicing-Grade 12
Let Us Discover: Tvl-Computer Systems Servicing-Grade 12
Let Us Discover
Response time: It is defined as the time elapsed between inquiry and response.
GSC-CID-LRMS-
1 ESSLM, v.r. 03.00, Effective June 14, 2021
Computer Networks: Reliability
It decides the frequency at which network failure takes place. The more the
shortcomings are, the less is the network’s reliability.
Computer Networks: Security
It refers to the protection of data from any unauthorized user or access. While
traveling through a network, data passes many layers of a network, and data can be traced if
attempted. Hence security is also an essential characteristic for Networks. Properties of a
Good Network
1. Interpersonal Communication: We can communicate with each other efficiently and
smoothly. Example: e-mails, chat rooms, video conferencing, etc, all of these are
possible because of computer networks.
2. Resources can be shared: We can share physical resources by making them
available on a network such as printers, scanners, etc.
3. Sharing files, data: Authorized users are allowed to share the files on the network.
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication.
Data Communication: Local
Local communication takes place when the communicating devices are in the same
geographical area, the same building, or face-to-face, etc.
Data Communication: Remote
Remote communication takes place over a distance i.e. the devices are farther. The
effectiveness of data communication can be measured through the following features:
1. Delivery: Delivery should be done to the correct destination.
2. Timeliness: Delivery should be on time.
3. Accuracy: Data delivered should be accurate.
Let Us Try
Activity I. TRUE or FALSE
Directions: Write TRUE if the statement is correct and FALSE if otherwise on the space
provided.
_______3. Reliability decides the frequency at which network failure takes place.
_______4. Security refers to the protection of data from any unauthorized user or access.
_______5. In Data Communication: Remote Delivery should not be done to the correct
destination.
Let Us Do
1. The exchange of data between two devices through a transmission medium is called
_____________________.
2. It is the _____________________ through which the message is sent. For example:
A Modem.
3. Security refers to the _____________________ of data from any unauthorized user
or access.
4. A _____________________is a telecommunication channel using which we can
share data with other computers or devices, connected to the same network.
5. A _____________________can be a device which is capable of sending or receiving
data generated by other nodes on the network like a computer, printer etc...
Let Us Apply
Activity III
Now, it’s about time for us to use our knowledge in real-life situations. Let’s answer
the question below.
- Using an OTG connection with a USB connector is much more convenient in my opinion.
But if she wants to transfer files wirelessly, using Wi-fi Direct is the best choice, since it uses
peer-to-peer wireless technology that lets computers or smartphones connect without a
shared public network. However, it needs a third-party application to work (Shareit, Feem,
GoogleFiles, etc.) since Wi-fi direct is available, you only need to turn on Wi-fi hotspot for it
to connect your phone to the PC. And if Wi-fi Direct and OTG connection aren’t available,
the next choice is to use Bluetooth connection, which is much slower compared to Wi-fi
Direct, also you need to pair the two devices first in order for transferring files to work,
turning on Bluetooth is found in the settings in both devices.
Rubrics
Rubrics
The performance of the learners will be rated based on the following criteria.
Criteria 3 2 1
Excellent Very Satisfactory Satisfactory
Content Substantial, specific, and/or Sufficiently developed Limited content with
Knowledge illustrative content content with adequate inadequate
demonstrating strong elaboration or elaboration or
development and sophisticated explanation explanation.
ideas.
Spelling No misspelled word 1-3 misspelled words 4 or more misspelled
words
Capitalization Follows correct capitalization 1-3 capitalization errors. 4 or more
(pronouns, sentences) capitalizations errors.
Punctuation Applies punctuation correctly. 1-3 incorrect use of 4 or more incorrect
punctuations. use of punctuations.
Handwriting Legible 1-3 words can’t be 4 or more words can’t
clearly read. be clearly read.
References