CSS 9 - Q2 W8 Mod5 - Inspect and Test The Configured Computer Networks
CSS 9 - Q2 W8 Mod5 - Inspect and Test The Configured Computer Networks
Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 8 - Module 5
Inspect and Test the Configured
Computer Networks
SPTVE_CSYS9- SUCNIIg-h-8
GOVERNMENT PROPE
NOT FOR SAL
English – Grade 7
Technical Vocational Education Computer Systems Servicing – Grade 9
Alternative Delivery Mode
Quarter 2 Week 8 Module 5 Inspect and Test the Configured
Computer Networks
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Management Team:
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 8 - Module 5
Inspect and Test the Configured
Computer Networks
SPTVE_CSYS9- SUCNIIg-h-8
Introductory Message
For the Facilitator:
This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social,
and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the
module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own
learning. Furthermore, you are expected to encourage and the learners as they do the tasks
included in the module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner
1
This is a brief drill or review to help you link the
current lesson with the previous one.
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity
or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank
sentence/paragraph to be filled in to process what
you learned from the lesson.
This section provides an activity which will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
2
understanding of the relevant competencies. You can do it!
‘’
Pre-Test:
Direction: Choose the letter of the correct answer. Write your answer in your
answer sheet.
3
5. Casual threats are called errors in network designing, errors in the software,
personal errors.
a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats
7. Test that needs to conduct to check that the Link light — the little red or green
light next to the RJ-45 port — is lit on every computer.
a. Check the network configuration
b. Check the physical connections
c. Verify that the computers can ping each other
d. Verify that you can log in
9. It is an integral part of the learning process, student’s outputs are being recorded
not just graded, to determine the process of their work.
a. Documentation c. Reports
b. Findings d. Results
11. It inspects network traffic for a collection of the most commonly used protocols on
both the Internet and the intranet and assesses that traffic for potentially
malicious code.
a. Network Inspection Service c. New Inspection Service
b. Network Inspection System d. New Inspection System
12. Which of the following are you going to do If after waiting a few minutes, you still
have problems, and you have not already disconnected the power to your router
and modem?
a. close the windows command line
b. open the windows command line
c. close the windows
d. open the windows
4
13. When connecting to most wireless networks, you need to enter the proper
___________ password to connect to the network.
a. DNS c. IP
b. Gateway d. SSID
14. Which of the following should be done if your Internet has been working but recently
stopped working, and after waiting a few minutes, you still have problems
a. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again,
and then plug in your router again.
b. Turn off the power to the computer and leave it off
d. Unplug the power cable to your router and cable modem or DSL modem.
d. All of the above.
Directions: Write FACT if the statement is true and BLUFF if it is false. Write your
answer in your answer sheet.
Directions: Arrange the jumbled letters to form the correct word base on the given
descriptions. Write your answer in your answer sheet.
5
1. N G I T E S T O C S E S P R - The most important phase in inspecting and diagnosing
computer networks
2. K O S N R W S I O N A T - A separate PCs or network terminals; where the users’
automated work environment are realized
3. T O H S R S V E R E S - The high-performance computers intended for
implementation of functions of storage of the data, access, and other operations
4. R N U T A L A S T R H A E T - The threats called by the effects on the computer’s
networks of objective physical processes or the spontaneous natural phenomena or
disasters, independent of human.
5. N I T E N U N O L A T I N - casual threats called by errors in network designing,
errors in the software, personal errors.
Testing process
the most important phase in inspecting and diagnosing computer networks
this phase allows the user to check all of the possible situations that may appear as
the network is being used.
In this phase, the security of the network will also be put to a test.
Classification of threats
Natural threats are the threats called by the effects on the computer’s networks of
6
objective physical processes or the spontaneous natural phenomena or disasters,
independent of humans.
Artificial threats are called by the activity of the person.
Unintentional, casual threats called by errors in network designing, errors in the
software, personal errors.
Deliberate, called by mercenary, ideological or other aspirations of people
7
This command will spit out numerous lines of information. The line you're
looking for should resemble this:
NOTE:
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name.
For example, if your file server is named FileServer01, use the
command ping FileServer01.
SOLUTION
If you are on a small or local network and have the capability of
checking a hub, switch, or router, verify that the cables are properly
connected and that it has power
b. Wireless Network
If you're using a laptop with a wireless network, look for the laptop's Wireless
Fidelity (Wi-Fi) button and make sure it is turned on.
If the button is turned on, make sure you're using the correct Wi-Fi hotspot
1. right-click on the Network icon in the Windows Notification Area
2. clicking "Connect to a network"
3. enter the proper SSID password to connect to the network
3. Adapter functionality
a. Verify that the network card is capable of pinging itself by using the ping
command. Windows users can ping the computer from a Windows command
line. Unix and Linux users can ping from the shell.
To ping the card or the localhost, type either of the following commands:
”ping 127.0.0.1 or ping localhost”
NOTE
Executing either of the commands above should get replies from the
network card. If you receive an error, or the transmission fails, the
network card is not physically installed into the computer correctly, has
the incorrect or outdated drivers installed, or is defective.
SOLUTION
Make sure the network card is physically installed in the computer
correctly by removing it and re-inserting it again. Check the network
card manufacturer's website for the latest drivers and install those
drivers. If the network card is defective, it needs to be replaced.
NOTE
If you get replies back from the router, the connection between your
router and computer are good, and you can skip to the next step.
SOLUTION
If you do not receive any replies back from the router, either the
router is not set up properly, or your connection between the router
and the computer is not
NOTE
If you have a wireless network and followed the above steps, but cannot
ping the router, turn the computer off again and connect the computer to
the router using a network cable instead of wirelessly. If a wire also does
not work, contact the manufacturer of the router for additional support or
replacement.
5. Firewall
If your computer network utilizes a firewall, make sure all required ports are
open, especially port 80, which is the HTTP(Hypertext Transfer Protocol) port. If
possible, disable the firewall software or disconnect the computer from the
firewall to make sure it is not causing network problems.
SOLUTION
If your Internet has been working but recently stopped working, give it a
few minutes to make sure it is not a temporary outage. If after waiting a
few minutes, you still have problems, and you have not already
disconnected the power to your router and modem, follow the steps
below.
a. Turn off the power to the computer and leave it off.
b. Unplug the power cable to your router and cable modem or DSL modem.
c. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again, and then plug in your router again.
d. Finally, turn on your computer and see if you can ping your router.
SOLUTION
If after following the above steps, the Internet is still not working,
open the Windows command line and run the command ping
google.com.
Running the command should get a reply from Google.
If you get a reply, this is an indication that the Internet is working, but you may be
encountering a problem with the Internet browser you are using to browse the
Internet. Try an alternative browser, such as Firefox or Chrome.
If you're getting no reply from Google, your router or modem is not reaching the
Internet. If you have a router, make sure your router has DHCP(Dynamic Host
Configuration Protocol) enabled and that the WAN or Gateway address is the
proper ISP address.
Finally, if trying the above steps has not helped, contact your ISP to make sure
there is no problem on their end and to assist you further with any special
configurations.
STANDARD PROCEDURE
set of step-by-step instructions compiled by an organization to help workers carry out
routine operations.
aim to achieve efficiency, quality output, and uniformity of performance while
reducing miscommunication and failure to comply with industry regulations
key factors in having a correct outcome on every activity
1.
Independent Activity 1:
Instructions: Please refer to page 27 for the rubrics
Independent Assessment 1:
Directions: Arrange the steps chronologically using the numbers. Write your
answer in your answer sheet.
12
Independent Activity 2:
Instructions: Please refer to page 23 for the rubrics
Independent Assessment 2:
Directions: Write T if the underlined word(s) is correct and F if it is incorrect. Write
your answer in your answer sheet.
1. ___ Aim to achieve efficiency, quality output, and uniformity of performance while
maximizing miscommunication and failure to comply with industry regulations.
2. ___ If your computer network utilizes a firewall, make sure all required ports are
open, especially port 80, which is the HTTP(Hypertext Transmission Protocol) port.
3. ___ If there are no lights or the lights are orange or green, the card may be bad, not
connected properly, or may not be receiving a signal from the network.
4. ___ A set of step-by-step instructions compiled by an organization to help workers
carry out routine operations.
5. ___ Some ISPs, such as Comcast, require special software to be installed.
Independent Activity 3:
Directions: Write CS if the given guidelines are to test the Computer System, and
NS if it is for Network System. Write your answer in your answer sheet.
Independent Assessment 3:
Directions Supply a missing word(s) in the paragraph below to complete the
network inspection systems’ description. Choose your answer inside the box.
Direction: Answer the following questions correctly. Please refer to page 23 for
the rubrics
14
Instructions: Please refer to page 23 for the rubrics
\
Post Test:
Direction: Choose the letter of the correct answer. Write your answer in your
answer sheet.
15
b. Host Servers d. Workstation
5. Casual threats are called errors in network designing, errors in the software,
personal errors.
a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats
7. Test that needs to conduct to check that the Link light — the little red or green
light next to the RJ-45 port — is lit on every computer.
a. Check the network configuration
b. Check the physical connections
c. Verify that the computers can ping each other
d. Verify that you can log in
9. It is an integral part of the learning process, student’s outputs are being recorded
not just graded, to determine the process of their work.
a. Documentation c. Reports
b. Findings d. Results
11. It inspects network traffic for a collection of the most commonly used protocols on
both the Internet and the intranet and assesses that traffic for potentially
malicious code.
a. Network Inspection Service c. New Inspection Service
b. Network Inspection System d. New Inspection System
12. Which of the following are you going to do If after waiting a few minutes, you still
have problems, and you have not already disconnected the power to your router
and modem?
a. close the windows command line
b. open the windows command line
c. close the windows
d. open the windows
16
13. When connecting to most wireless networks, you need to enter the proper
___________ password to connect to the network.
a. DNS c. IP
b. Gateway d. SSID
14. Which of the following should be done if your Internet has been working but
recently stopped working, and after waiting a few minutes, you still have
problems
a. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again,
and then plug in your router again.
b. Turn off the power to the computer and leave it off
d. Unplug the power cable to your router and cable modem or DSL modem.
d. All of the above.
17
What I Know: What’s In: What’s New:
1. A 1. B 11. B 1. Fact 1. Testing Process
2. C 2. B 12. B 2. Bluff 2. Workstation
3. D 3. C 13. D 3. Bluff 3. Host Servers
4. B 4. A 14. D 4. Fact 4. Natural Threats
5. D 5. D 15. B 5. Bluff 5. Unintentional
18
References
Building up for Ultimate Learner’s Advancement thru Capable and Active Nurturing, “1st
Quarter - Lesson 9 Setting-Up Computer Networks (SUCN)”, pp: 84-104
19
Appendices
RUBRICS
CRITERIA 10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer and and answer and answer the has a
the answer the the questions questions difficulty in
questions questions slightly correct slightly constructing
correctly and correctly correct with a ideas
clearly minimal error in
explained usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely
20
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _
21