0% found this document useful (0 votes)
105 views

Learning Activity Sheet: Quarter 1, Week 1 & 2/ Semester 1

This document provides a summary of a learning activity sheet for a computer systems servicing course. It includes 4 sections: 1) An introduction to computer network concepts defining networks, criteria they must meet, and their uses. 2) Formative activities for students including defining key terms and describing the basic communication model. 3) A reference section listing learning materials. 4) Rubrics for assessing student performance on the activities.

Uploaded by

Hary Bert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views

Learning Activity Sheet: Quarter 1, Week 1 & 2/ Semester 1

This document provides a summary of a learning activity sheet for a computer systems servicing course. It includes 4 sections: 1) An introduction to computer network concepts defining networks, criteria they must meet, and their uses. 2) Formative activities for students including defining key terms and describing the basic communication model. 3) A reference section listing learning materials. 4) Rubrics for assessing student performance on the activities.

Uploaded by

Hary Bert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

LEARNING ACTIVITY SHEET

QUARTER 1 , Week 1 & 2/ SEMESTER 1


Name:______________________________________________________________Score:__________
Grade & Section:_________________________________ Subject: Computer Systems Servicing NC II
Name of Teacher:_____________________________________________________Date: __________
I. Title: COMPUTER NETWORK CONCEPTS
II. Type of Activity:
Concept notes with formative activities
LAS for summative assessment ( Written Work Performance Task)

III. MELC:
IV. LO 1. Install Network cables (TLE_IACSS9- 12SUCN-IVa-j-33)
1.1 Plan cable routes in accordance with network design and actual installation
site
V. Learning Objectives:
 Define computer network and data communication;
 Describe the specific criteria that the network must be able to meet.
 Recognize the uses, applications, basic communication model of the network,
and types of network topology.
VI. Reference/s:
 Computer Systems Servicing – 12 Self-Learning Module (SLM): Quarter 1 –
Module 1: Computer Network Concepts ; Piquero, E.J. et al pp. 1-28
Online Resources:
 2020 Studytonight.”Computer Network”: Introduction to Computer Networks.
https://www.studytonight.com/computer-networks/overview-of-computer-
networks

VI. Concept notes with formative activities


Introduction to Computer Networks
A computer network is a telecommunication channel using which we can share data
with other computers or devices, connected to the same network. It is also called
Data Network. The best example of a computer network is the Internet. A node can
be a device that is capable of sending or receiving data generated by other nodes
on the network like a computer, printer, etc. These links connecting the devices are
called Communication channels.
A network must be able to meet specific criteria; these are mentioned below:
• Performance
• Reliability
• Scalability

Computer Networks: Performance


It can be measured in the following ways:

Transit time: It is the time taken to travel a message from one device to another.
Response time: It is defined as the time elapsed between inquiry and response.

Other ways to measure performance are:


1. Efficiency of software
2. Number of users
3. Capability of connected hardware

Computer Networks: Reliability It decides the frequency at which network failure


takes place. The more the shortcomings are, the less is the network’s reliability.

Computer Networks: Security


It refers to the protection of data from any unauthorized user or access. While
traveling through a network, data passes many layers of a network, and data can be
traced if attempted. Hence security is also an essential characteristic for Networks.

Properties of a Good Network


1. Interpersonal Communication: We can communicate with each other efficiently
and smoothly.
Example: e-mails, chat rooms, video conferencing, etc, all of these are possible
because of computer networks.

2
2. Resources can be shared: We can share physical resources by making them
available on a network such as printers, scanners, etc.
3. Sharing files, data: Authorized users are allowed to share the files on the network.

Data Communication
The exchange of data between two devices through a transmission medium is called
Data Communication.

Data Communication: Local


Local communication takes place when the communicating devices are in the same
geographical area, the same building, or face-to-face, etc.

Data Communication: Remote


Remote communication takes place over a distance i.e. the devices are farther. The
effectiveness of data communication can be measured through the following
features:

1. Delivery: Delivery should be done to the correct destination.


2. Timeliness: Delivery should be on time.
3. Accuracy: Data delivered should be accurate.

Components of Data Communication


1. Message: It is the information to be delivered.
2. Sender: Sender is the person who is sending the message.
3. Receiver: Receiver is the person to whom the message is being sent to.
4. Medium: It is the medium through which the message is sent. For example: A
Modem.
5. Protocol: These are some set of rules which govern data communication

Basic Communication Model


A Communication model is used to exchange data between two parties.

3
Example communication between a computer, server, and telephone (through
MoDem).
1. Source - Data to be transmitted is generated by this device, for example:
telephones, personal computers, etc.
2. Transmitter - The data generated by the source system is not directly transmitted
in the form it created. The transmitter transforms and encodes the data in such a
way to produce electromagnetic waves or signals.
3. Transmission system can be a single transmission line or a complex network
connecting source and destination.
4. Receiver accepts the signal from the transmission system and converts it into a
form that is easily managed by the destination device.
5. Destination receives the incoming data from the receiver.

Following are some business applications of computer networks:


1. Resource Sharing:
The goal is to make all programs, equipment (like printers, etc), and especially data,
available to anyone on the network without regard to the physical location of the
resource and the user.
2. Server-Client model:
One can imagine a company’s information system consisting of one or more
databases and some employees who need to access it remotely. In this model, the
data is stored on powerful computers called Servers. Often these are centrally
housed and maintained by a system administrator. In contrast, the employees have
simple machines, called Clients, on their desks, using which they access remote
data.
3. Communication Medium:
A computer network can provide a powerful communication medium among
employees. Virtually every company that has two or more computers now has e-mail
(electronic mail), which employees generally use for a great deal of daily
communication
4. e-commerce:
A goal that is starting to become more critical in businesses is doing business with
consumers over the Internet. Airlines, bookstores, and music vendors have

4
discovered that many customers like the convenience of shopping from home. This
sector is expected to grow quickly in the future.

5
6
7
Activity I. TRUE or FALSE
Directions: Write TRUE if the statement is correct; otherwise, write FALSE on the
space provided before each number.
_______1. Receiver is the person who is sending the message.
_______2. Performance is one of the criteria in computer networks.
_______3. Reliability decides the frequency at which network failure takes place.
_______4. Security refers to the protection of data from any unauthorized user or
access.
_______5. In Data Communication: Remote Delivery should not be done to the
correct destination.

Activity II: Fill in the Blank


Directions: Complete the statements by filling in the blanks.
1. The exchange of data between two devices through a transmission medium is
called _____________________.
2. It is the _____________________ through which the message is sent. For
example: A Modem.
3. Security refers to the _____________________ of data from any unauthorized
user or access.
4. A _____________________is a telecommunication channel using which we can
share data with other computers or devices, connected to the same network.
5. A _____________________can be a device which is capable of sending or
receiving data generated by other nodes on the network like a computer, printer
etc...

Activity III
Now, it’s about time for us to use our knowledge in real life situations. Let’s answer
the question below. Your mother wants to transfer files from her smartphone to her
new laptop. What possible network connection can be used to do the job since both
devices capable to connect via wireless transmission? Explain your answer and give
the steps how smartphone connects to laptop.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
8
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
______________________________________________________________

RUBRICS
Performance of the learners will be rated based on the following criteria
Criteria 5 4 3 2 1
Excellent Very Satisfactory Moderately Good
Satisfactory Satisfactory
Content/Thought
Organization
Grammar/
Spelling

Activity IV. TRUE or FALSE


Directions: Write TRUE if the statement is correct and FALSE if otherwise on the
space provided.
_______1. In Communication Model Source Data to be transmitted is generated by
this device, such as telephones, personal computers, etc.
_______2. STAR topology is a network type in which every computer and network
device is connected to a single cable
_______3. Multipoint connection is also called a Multidrop configuration. In this
connection, two or more devices share a single link.
_______4. TREE topology has a root node and all other nodes are connected to it
forming a hierarchy.
_______5. Communication Model Receiver accepts the signal from the transmission
system and converts it into a form that is easily managed by the
destination device.

Activity V. Fill in the Blank


Directions: Complete the statements by filling in the blanks.
1. __________________ is connection between remote control and television for
changing the channels.
2. Multipoint connection is also called __________________ configuration.

9
3. __________________ topology is two different types of topologies which is a
mixture of two or more topologies.
4. The transmitter transforms and encodes the data in such a way to produce
__________________ waves or signals.
5. In __________________, the data is stored on powerful computers called
Servers.

Activity VI
Now, it’s about time for us to use our knowledge in real life situations. Let’s answer
the question below. • Jerald wants to buy a new pair of shoes on the shopping mall
but the size of his shoes is no longer available. What possible business application
you can offer to him to buy the shoes? Why?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
________________________________________________________________

RUBRICS
Performance of the learners will be rated based on the following criteria
Criteria 5 4 3 2 1
Excellent Very Satisfactory Moderately Good
Satisfactory Satisfactory
Content/Thought
Organization
Grammar/
Spelling

10
11

You might also like