Dlp_css Coc 3_samper_q2wk15 Coc 2 Setup Computer Server Lo1 Set Up User Access
Dlp_css Coc 3_samper_q2wk15 Coc 2 Setup Computer Server Lo1 Set Up User Access
Region V – Bicol
Division of Albay
POLANGUI GENERAL COMPREHENSIVE HIGH SCHOOL
Polangui, Albay
S. Y. 2024 – 2025
A Lesson Plan in Computer Systems Servicing
Date and Time Grade Level Learning Area Quarter
I. LEARNING COMPETENCIES
A. CONTENT STANDARD:
The learners demonstrate an understanding of concepts and principles in setting up computer servers.
B. PERFORMANCE STANDARD:
The learners shall be able to set up computer servers based on acceptable standards and hardware.
C. LEARNING OUTCOMES:
At the end of the lesson, the students are expected to:
LO 1: Set up user access
1.1 Create user folder in accordance with Network operating system features
1.2 Configure user access level based on NOS features
1.3 Establish network access policies/end user requirements
1.4 Perform security check in accordance with established network access policies/end user
requirements.
B. Materials:
C. References: CBLM Computer System Servicing NC II Training Manual, Internet sources on computer
networking.
I. PROCEDURES
Teacher’s Activity Student’s Activity
1. Preliminary Activities
• Greetings and Prayer
• Checking of Attendance
• Classroom Management, House Rules
•
A. ACTIVITY 1: "Access Adventure: Unlocking
User Essentials"
Student Response: Students share their initial ideas on
• The teacher starts with a quick discussion user access and discuss what might happen if access is
question: "Why is user access important in a poorly managed.
networked environment, especially in
organizations?"
Follow-up Question:
• How do you find the activity?
• Why is user access important in a networked
environment, especially in organizations?"
B. ANALYSIS
C. ABSTRACTION
• To Deepen understanding through practical • Follow along on their devices, completing the tasks.
application and guided practice. The teacher will • Reflect on challenges encountered during the process
guide students in setting up their own user access and troubleshoot with guidance.
levels:
✓ Task 1: Create a user folder for "Employee1"
using the NOS.
✓ Task 2: Configure the folder’s access level to
“read-only.”
✓ Task 3: Establish a sample policy for "Employee1"
allowing access only during specific hours.
D. APPLICATION
2. Generalization
• The teacher will call a student to summarize the • Student Response: Students articulate the importance
lesson by emphasizing that understanding the: of boot devices in their own words and discuss how the
skills learned can be applied in real-world situations,
1. User Access is Essential for Network Security; such as troubleshooting or setting up new systems.
2. Network Operating System (NOS) Features
Aid in Configuring Access
3. Access Policies and Security Checks Are Vital
for Compliance and Protection
I. EVALUATION
ASSESSMENT AND REFLECTION
(Output-Based Assignment)
Students submit a brief report on their
configuration process, including screenshots and
descriptions of each step.
Rubric for Grading:
Student Response: Students will perform the steps in
• Accuracy in folder creation and access level creating a bootable flash drive and submit it to the teacher
configuration (30%) with a brief report detailing the steps they followed.
• Suitability of network access policies (30%)
• Completeness of security check (20%)
• Clarity and professionalism of report (20%)
II. ASSIGNMENT
Activity 5: "User Access Project – Building a Secure Department Network"
Task: Demonstrate your understanding of setting up user access, configuring folders and access levels,
establishing network policies, and performing security checks by creating a secure network setup for a fictional
department within a company.
Instructions:
1. Choose a Department: Imagine you are responsible for setting up user access for a specific department
(e.g., HR, Finance, or IT) in an organization. Describe the department's role and the types of data they
handle.
2. Create User Folders: For at least three user roles within the department (e.g., Manager, Staff, Intern),
create user folders using NOS features.
3. Configure Access Levels: Assign access levels for each user role based on their needs (e.g., Manager with
full access, Staff with read/write access, Intern with read-only access).
4. Establish Access Policies: Set up access policies for each role. Include rules for specific access times,
shared resources, and restrictions.
5. Perform Security Checks: Outline a brief security check plan that will help maintain access control and
prevent unauthorized access. This may include password policies, regular audits, and access log reviews.
Deliverables:
• Project Report: Include screenshots (if possible), descriptions of each step, the rationale for assigned
access levels, and your security check plan.
• Reflection (1 Paragraph): Summarize your experience. What did you learn about user access and
security policies? What challenges did you encounter?
Rubric:
• User Folder Creation (25%) – Completeness and accuracy in creating folders based on NOS features.
• Access Level Configuration (25%) – Appropriateness of access levels assigned to each user role.
• Policy Establishment (25%) – Relevance and clarity of access policies created for each role.
• Security Check Plan (15%) – Feasibility and thoroughness of the security check plan.
• Reflection (10%) – Insightfulness and clarity in summarizing learning and challenges.
Master Teacher II/ASP Designate Head teacher II/ASP Designate School Principal IV