Tle10 Ict Css q2 Mod2 Configuringcomputersystemandnetwork-Week-4
Tle10 Ict Css q2 Mod2 Configuringcomputersystemandnetwork-Week-4
Technology and
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 2 - Module 2
Configuring Computer System and
Network (2)
3 Safety Precautions
This module will teach the students to learn the safety and precautions by
setting activities or guidelines for inspection and testing the computer systems and
networks.
The module outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in the
workplace which the students will understand very well the importance of its
procedure:
Follow Occupational Health and Safety (OHS) Procedures in Testing Systems
and networks.
Test computer systems and networks in accordance with the job
requirements.
Accomplish technical reports on the tests conducted.
27
What I Know
28
What Is It
A hazard is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment. The situation could
involve a task , chemical or equipment used. Hazard management is a continuous
process that can be used to improve the health and safety of all workplaces.
Physical Hazards
29
Safety precautions when using a ladder:
1. Read the labels on the ladder, and follow any safety instructions
written on it.
2. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
3. Make sure that people in the area know you will be working there.
4. Cordon off the area with caution tape or safety cones.
5. When you are using a ladder that leans up against a wall, follow the
instructions written on the ladder, and have someone hold the ladder
to help keep it steady.
Occupational Health and Safety is planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks.
Occupational Health and Safety is also referring to the policies, procedures and
activities that aim to protect the health safety and welfare of a people at the
workplace.
Occupational Health and Safety standards Each student has a responsibility to
their colleagues and their organization to report and act upon any potential
workplace hazard. Students need to be aware of the type
of hazards that are possibly present in their work environment .
Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all
persons in the computer and technology industries. You must identify the hazards
where you are working and decide how dangerous they are. Eliminate the hazard or
modify the risk that it presents.
Procedure
4. If the hazard can be easily and safely cleared, then do so. If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal
etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards
30
All hazards must be reported using an Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action when
necessary to make it safer for all student and clients.
31
B. Directions: Identify the type of hazards. Match column A with B.
Write only the letter of each correct answer on a separate
sheet of paper.
Column A Column B
Computer equipment can be dangerous, and you or others can be injured or even
killed if you don’t follow proper safety guidelines when working along with PCs. The
following are some precautionary measures to take before working with any
computer equipment:
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________
32
Learning Task No.3
What I Can Do
Assessment
33
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14. Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.
Performance Task
34
Lesson Guidelines for Testing
4 Computer Systems and
Networks
Is your PC healthy? Don’t be too sure . think back to when you heard kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
internet connection was down.
The best way to find out what is wrong is to take proactive approach. Check
under the PC’s hood with the following mostly free diagnostic tools, and see if
anything is a miss before disaster strikes.
What I Know
Multiple Choice
Direction: Choose the best answer and write it in a separate sheet of paper.( ½
lengthwise)
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3.What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
35
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9. What is the size of source and destination IP address in IP header?
a. 4 Bits c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analyzing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
36
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
What’s In
You have learned from the previous lesson about precautionary measures
before working on any other computer. Now you must be able to know the guidelines
in testing computer systems and network I accordance with the job requirements.
Good luck and enjoy
What’s New
The best way to find out what’s wrong with the computer is to take proactive
approach: Check under your PC’s hood with the following mostly free diagnostic
tools and see if anything is a miss before disaster.
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.
37
What Is It
You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished:
You must verify that the network works as expected. Here are a few simple tests you
can conduct to make sure your network is functional:
Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer. You must
check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection
problem — most likely a bad cable.
Verify that you can log in. When you're sure the physical connections are
good, you should attempt to log in to each of your network computers using a
valid domain user account.
38
Check the network configuration. Click the Start button, type cmd and
press Enter. Then, enter the command ipconfig /all and press Enter. This
command will spit out numerous lines of information. The line you're looking
for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125
(Preferred) If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your DHCP
server is working.
Verify that the computers can ping each other. Another basic test you
should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another. Do several
ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host.
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if your file
server is named FileServer01, use the command ping File Server
What’s More
Activity 1.
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following
format for a technical report for your recently conducted test.
39
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________ Date of
Inspection: __________________ Time: _________________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
40
Activity 2.
In order for computers to network, what are the things you are going to set or
configure? Write your answer on the space provided below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________
41
What I Can Do
1.________________________________________________
2.________________________________________________
3.________________________________________________
4.________________________________________________
5.________________________________________________
Multiple Choice
Direction: Write your answers in a separate sheet of paper (½ lengthwise).
1. The IETF standards documents are called
a. RFC c.ID
b. RCF d. None of the mentioned
2. Which data communication method is used to transmit the data over a serial
communication link?
a. simplex c.full duplex
b. Half-duplex d. all of the above
3. What is the minimum header size of an IP packet?
a. 16 Bytes c. 20 Bytes
b. 10 Bytes d. 32 Bytes
4. What is the size of MAC address?
a. 16 Bits c. 48 Bits
b. 32 Bits d. 64 Bits
42
5. How many layers does OSI Reference Model has?
a. 4 c. 6
b. 5 d. 7
6. Which of the following is not the networking devices?
a. Gateways c. Routers
b. Linux d. Firewalls
7. DHCP Server provides_______to the client.
a .Protocol c. MAC Address
b. IP Adddress d. Network Address
8. What is the address size of IPv6?
a. 32 Bit c. 128 Bit
b. 64 Bit d.256 Bit
9.What is the size of source and destination IP address in IP header?
a. 4 Bit s c. 16 Bits
b. 8 Bits d.32 Bits
10. A set of rules that govern all aspects of information communication is called
a. Server c. Protocol
b. Internet d. OSI Model
11. DHCP is the abbreviation of
a. Dynamic Host Control Protocol
b. Dynamic Host Configuration Protocol
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Control Configuration Protocol
12. Controlling access to a network by analysing the incoming and outgoing packets
are called
a. IP Filtering c. Packet Filtering
b. Data Filtering d. Firewall Filtering
13. What is the size of host bits in class B IP address?
a. 04 c. 16
b. 08 d. 32
43
14. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
15. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS server d. subnet mask
ACRONYMS
44
For inquiries or feedback, please write or call:
Telefax: (088)813-3634