0% found this document useful (0 votes)
218 views

Tle10 Ict Css q2 Mod2 Configuringcomputersystemandnetwork-Week-4

This document discusses safety precautions when working with computer systems and networks. It outlines several common hazards including physical hazards like cables on the floor and mechanical hazards from moving parts. It provides guidelines for making accident reports and assessing risk. Some key safety practices covered are wearing proper protective equipment, clearing work areas, using ladders safely, disposing of waste properly, and reporting any hazards. Maintaining occupational health and safety is important for protecting all individuals working with computers and technology.

Uploaded by

my music
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
218 views

Tle10 Ict Css q2 Mod2 Configuringcomputersystemandnetwork-Week-4

This document discusses safety precautions when working with computer systems and networks. It outlines several common hazards including physical hazards like cables on the floor and mechanical hazards from moving parts. It provides guidelines for making accident reports and assessing risk. Some key safety practices covered are wearing proper protective equipment, clearing work areas, using ladders safely, disposing of waste properly, and reporting any hazards. Maintaining occupational health and safety is important for protecting all individuals working with computers and technology.

Uploaded by

my music
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

10

Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 2 - Module 2
Configuring Computer System and
Network (2)

This module was collaboratively developed and reviewed by educators


from public schools. We encourage teachers and other education
stakeholders to email their feedback, comments and recommendations to the
Department of Education at bukidnon@deped.gov.ph
We value your feedback and recommendations.

Department of Education • Republic of the Philippines


Lesson

3 Safety Precautions

What I Need to Know

This module will teach the students to learn the safety and precautions by
setting activities or guidelines for inspection and testing the computer systems and
networks.
The module outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in the
workplace which the students will understand very well the importance of its
procedure:
 Follow Occupational Health and Safety (OHS) Procedures in Testing Systems
and networks.
 Test computer systems and networks in accordance with the job
requirements.
 Accomplish technical reports on the tests conducted.

27
What I Know

Direction: Write TRUE if the statement is correct and FALSE if not.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

28
What Is It

Common hazards encounter by computer technicians and users

A hazard is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment. The situation could
involve a task , chemical or equipment used. Hazard management is a continuous
process that can be used to improve the health and safety of all workplaces.
Physical Hazards

One of the most common physical hazards involving computer technicians is


cables running across the floor. If someone trips ,falls, and hurts himself because
because of a cable you can across the floor, someone(you, your employer, or your
customer) has a serious leagal negligence problem. If you need to temporarily run a
cable across the floor, place a danger sign similar to those “wet floor” signs used by
cleaning services.
Mechanical Hazards

When working on electric equipment, ask yourself “ is there anyway this


equipment could hurt me?”. You might stick your hand in a computer and suddenly
the paper feed arm moves, feeding, but a piece of your finger too.

29
Safety precautions when using a ladder:

1. Read the labels on the ladder, and follow any safety instructions
written on it.
2. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
3. Make sure that people in the area know you will be working there.
4. Cordon off the area with caution tape or safety cones.
5. When you are using a ladder that leans up against a wall, follow the
instructions written on the ladder, and have someone hold the ladder
to help keep it steady.
Occupational Health and Safety is planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks.
Occupational Health and Safety is also referring to the policies, procedures and
activities that aim to protect the health safety and welfare of a people at the
workplace.
Occupational Health and Safety standards Each student has a responsibility to
their colleagues and their organization to report and act upon any potential
workplace hazard. Students need to be aware of the type
of hazards that are possibly present in their work environment .
Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all

persons in the computer and technology industries. You must identify the hazards
where you are working and decide how dangerous they are. Eliminate the hazard or
modify the risk that it presents.

Procedure

1. Identify the hazard.

2. Clear the area close to the hazard.


3. Partition the hazard off or clearly identify the area to protect other people from
harm.

4. If the hazard can be easily and safely cleared, then do so. If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal
etc.) to obtain assistance.

6. After clearing the hazard, fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards

30
All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.

Learning Task No.1


What’s More

A. How to make Accident Reports


Forms are used to give specific details with regards to accidents that happened in
the laboratory during experiments.
Accident reports contain the following details:
 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents

Accident Report Sample Form

31
B. Directions: Identify the type of hazards. Match column A with B.
Write only the letter of each correct answer on a separate
sheet of paper.

Column A Column B

1. cables running across the floor 1. mechanical hazard

2. hot components or sharp edges of 2. physical hazard


computers
3. inkjet printer cartridge 3. electric shock hazards

4.Exposed power cable 4.chemical hazards

5.open casing of computer 5. CRT monitor high voltage hazard

Learning Task No. 2


What I Have Learned

Personal Safety While Working with PCs

Computer equipment can be dangerous, and you or others can be injured or even
killed if you don’t follow proper safety guidelines when working along with PCs. The
following are some precautionary measures to take before working with any
computer equipment:

Directions: Write your answers on the space provided.

1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

32
Learning Task No.3
What I Can Do

A. Direction: Enumerate some precautionary measures to take before working on


. any other computer
1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________
B. Assess the Risk
What are the two main things should the person in charge or responsible for safety
consider when assessing the risk?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Assessment

Direction: Write T if the statement is correct and F if it is incorrect.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.

33
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14. Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

Performance Task

Direction: Explain the different example of safety precaution. (5points each)


1. Occupational Health and Safety (OHS) Policy
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

2. Occupational safety and health


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

3. Occupational Health and Safety standards


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

34
Lesson Guidelines for Testing
4 Computer Systems and
Networks

What I Need to Know

Is your PC healthy? Don’t be too sure . think back to when you heard kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
internet connection was down.

The best way to find out what is wrong is to take proactive approach. Check
under the PC’s hood with the following mostly free diagnostic tools, and see if
anything is a miss before disaster strikes.

What I Know

Multiple Choice
Direction: Choose the best answer and write it in a separate sheet of paper.( ½
lengthwise)
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3.What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes

35
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9. What is the size of source and destination IP address in IP header?
a. 4 Bits c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analyzing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering

36
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask

What’s In

You have learned from the previous lesson about precautionary measures
before working on any other computer. Now you must be able to know the guidelines
in testing computer systems and network I accordance with the job requirements.
Good luck and enjoy

What’s New

The best way to find out what’s wrong with the computer is to take proactive
approach: Check under your PC’s hood with the following mostly free diagnostic
tools and see if anything is a miss before disaster.

This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.

37
What Is It

GUIDELINES FOR TESTING CONFIGURED COMPUTER SYSTEM AND


NETWORK

Testing Your Computer Network

You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished:
You must verify that the network works as expected. Here are a few simple tests you
can conduct to make sure your network is functional:

 Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer. You must
check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection
problem — most likely a bad cable.
 Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.

38
 Check the network configuration. Click the Start button, type cmd and
press Enter. Then, enter the command ipconfig /all and press Enter. This
command will spit out numerous lines of information. The line you're looking
for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125
(Preferred) If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your DHCP
server is working.
 Verify that the computers can ping each other. Another basic test you
should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another. Do several
ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host.
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if your file
server is named FileServer01, use the command ping File Server

What’s More

Activity 1.

Writing a Technical Report on Test Conducted

Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following
format for a technical report for your recently conducted test.

39
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________ Date of
Inspection: __________________ Time: _________________

Device Tested:

Specification:

Diagnosis:

Action Taken:

Remarks:

40
Activity 2.

Testing the Wireless NIC


Directions: In this activity, you will check the status of your wireless connection,
investigate the availability of wireless networks, and test connectivity. After
accomplishing the task you need to write a technical report regarding the test
conducted.
Recommended Equipment
1. A computer with Windows XP Professional installed A wireless NIC
installed An Ethernet NIC installed Linksys WRT300N Wireless
Router Internet connectivity Step 1
2. Disconnect the Ethernet patch cable from your computer. A red “X”
appears over the “Local Area Connection” icon.
3. Hover over the “Wireless Network Connection” icon in the tray.
4. Open a command window.
5. Ping 127.0.0.1.
6. Use the ipconfig command.
7. Get IP address of the default gateway
8. Ping the default gateway.
9. A successful ping indicates that there is a connection between the
computer and the default gateway
10. Open a web browser.
11. Type www.google.com in the “Address” field, and then press Return
12. Open the Network Connections window
13. Right-click the wireless connection and choose Properties.
14. Click the Wireless Networks tab
15. Click the View Wireless Networks button

What I Have Learned

In order for computers to network, what are the things you are going to set or
configure? Write your answer on the space provided below.
___________________________________________________________________

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________

41
What I Can Do

Direction: Give the steps in configuring systems and network.

1.________________________________________________
2.________________________________________________
3.________________________________________________
4.________________________________________________
5.________________________________________________

Summative Assessment No. 2

Multiple Choice
Direction: Write your answers in a separate sheet of paper (½ lengthwise).
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3. What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits

42
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9.What is the size of source and destination IP address in IP header?
a. 4 Bit s c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analysing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32

43
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask

ACRONYMS

Direction: Give the complete meaning of the following acronyms.


1. UTP ________________________________________________________
2. STP ________________________________________________________
3. IP __________________________________________________________
4. TCP /IP _____________________________________________________
5. HTTP ______________________________________________________

44
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

DepEd Division of Bukidnon


Fortich Street, Sumpong, Malaybalay City

Telefax: (088)813-3634

Email Address: bukidnon@deped.gov.ph


Website: depedbukidnon.net.ph

You might also like