0% found this document useful (0 votes)
28 views

Dlp_css Coc 3_samper_q2wk15 Coc 2 Setup Computer Server Lo1 Set Up User Access

Uploaded by

Donna Samper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Dlp_css Coc 3_samper_q2wk15 Coc 2 Setup Computer Server Lo1 Set Up User Access

Uploaded by

Donna Samper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Department of Education

Region V – Bicol
Division of Albay
POLANGUI GENERAL COMPREHENSIVE HIGH SCHOOL
Polangui, Albay
S. Y. 2024 – 2025
A Lesson Plan in Computer Systems Servicing
Date and Time Grade Level Learning Area Quarter

November 6-8, 2024 12 Computer Systems Servicing - 1st Semester,


COC 3 2nd Quarter, Week 15
12 CSS-LAPLACE

I. LEARNING COMPETENCIES
A. CONTENT STANDARD:
The learners demonstrate an understanding of concepts and principles in setting up computer servers.

B. PERFORMANCE STANDARD:
The learners shall be able to set up computer servers based on acceptable standards and hardware.

C. LEARNING OUTCOMES:
At the end of the lesson, the students are expected to:
LO 1: Set up user access
1.1 Create user folder in accordance with Network operating system features
1.2 Configure user access level based on NOS features
1.3 Establish network access policies/end user requirements
1.4 Perform security check in accordance with established network access policies/end user
requirements.

II. SUBJECT MATTER


A. Topic: SET-UP COMPUTER SERVER
Set Up User Access
(TLE_IACSS9-12SUCS-IIIa-e-37)

B. Materials:

✓ Computers with a network operating system (e.g., Windows Server, Linux)


✓ Internet access
✓ Projector for presentation
✓ Handouts on NOS features (user management and security)
✓ Instructions for configuring access levels
✓ Worksheet with practice scenarios for configuring user folders, access levels, and policies
✓ Rubric for evaluating security checks and access configuration

C. References: CBLM Computer System Servicing NC II Training Manual, Internet sources on computer
networking.

I. PROCEDURES
Teacher’s Activity Student’s Activity
1. Preliminary Activities
• Greetings and Prayer
• Checking of Attendance
• Classroom Management, House Rules

A. ACTIVITY 1: "Access Adventure: Unlocking
User Essentials"
Student Response: Students share their initial ideas on
• The teacher starts with a quick discussion user access and discuss what might happen if access is
question: "Why is user access important in a poorly managed.
networked environment, especially in
organizations?"

• The teacher will show a short video (2-3


minutes, accessible online or pre-
downloaded) explaining the concept of user
access in network systems, highlighting
folders, access levels, and network policies.

Follow-up Question:
• How do you find the activity?
• Why is user access important in a networked
environment, especially in organizations?"
B. ANALYSIS

ACTIVITY 2: "NOS Know-How: The Secrets of Student Response:


Network Gatekeeping" • Take notes and ask questions about each NOS feature
demonstrated.
• The teacher will provide a brief lecture on the • Discuss in pairs which access level might be most
Network Operating System (NOS) features suitable for different user roles in an organization.
and their relevance to user access.
• Demonstrate how to create a user folder in
NOS and explain different access levels (e.g.,
administrator, read-only, read/write).
• Use a visual guide or diagram to outline
steps for establishing network access
policies.

Praise students’ contributions and don’t criticize any


of the ideas. Then, the teacher will consolidate the Students might have different reactions and answers. What
answers of the students and lead them to the lesson. is more important is how they will react on the activity.

C. ABSTRACTION

ACTIVITY 3: "Folder Forge: Crafting Secure User


Spaces" Student Response:

• To Deepen understanding through practical • Follow along on their devices, completing the tasks.
application and guided practice. The teacher will • Reflect on challenges encountered during the process
guide students in setting up their own user access and troubleshoot with guidance.
levels:
✓ Task 1: Create a user folder for "Employee1"
using the NOS.
✓ Task 2: Configure the folder’s access level to
“read-only.”
✓ Task 3: Establish a sample policy for "Employee1"
allowing access only during specific hours.

D. APPLICATION

ACTIVITY 4: "Policy Patrol: Setting Boundaries Student Response:


in the Cyber City"
• Each group sets up user folders, configures access
• To apply skills in a real-world scenario, levels, establishes network policies, and performs
reinforcing learning outcomes. The teacher security checks according to the scenario.
will present a scenario: "The IT team needs • Prepare a short report summarizing their configuration
to set up user access for a new department decisions and the rationale for chosen access levels
within an organization with specific access and policies.
requirements."
• Assign students to groups and provide them
with different user roles to configure (e.g.,
Administrator, HR, Finance).

2. Generalization

• The teacher will call a student to summarize the • Student Response: Students articulate the importance
lesson by emphasizing that understanding the: of boot devices in their own words and discuss how the
skills learned can be applied in real-world situations,
1. User Access is Essential for Network Security; such as troubleshooting or setting up new systems.
2. Network Operating System (NOS) Features
Aid in Configuring Access
3. Access Policies and Security Checks Are Vital
for Compliance and Protection

I. EVALUATION
ASSESSMENT AND REFLECTION
(Output-Based Assignment)
Students submit a brief report on their
configuration process, including screenshots and
descriptions of each step.
Rubric for Grading:
Student Response: Students will perform the steps in
• Accuracy in folder creation and access level creating a bootable flash drive and submit it to the teacher
configuration (30%) with a brief report detailing the steps they followed.
• Suitability of network access policies (30%)
• Completeness of security check (20%)
• Clarity and professionalism of report (20%)

II. ASSIGNMENT
Activity 5: "User Access Project – Building a Secure Department Network"

Task: Demonstrate your understanding of setting up user access, configuring folders and access levels,
establishing network policies, and performing security checks by creating a secure network setup for a fictional
department within a company.

Instructions:
1. Choose a Department: Imagine you are responsible for setting up user access for a specific department
(e.g., HR, Finance, or IT) in an organization. Describe the department's role and the types of data they
handle.
2. Create User Folders: For at least three user roles within the department (e.g., Manager, Staff, Intern),
create user folders using NOS features.
3. Configure Access Levels: Assign access levels for each user role based on their needs (e.g., Manager with
full access, Staff with read/write access, Intern with read-only access).
4. Establish Access Policies: Set up access policies for each role. Include rules for specific access times,
shared resources, and restrictions.
5. Perform Security Checks: Outline a brief security check plan that will help maintain access control and
prevent unauthorized access. This may include password policies, regular audits, and access log reviews.

Deliverables:
• Project Report: Include screenshots (if possible), descriptions of each step, the rationale for assigned
access levels, and your security check plan.
• Reflection (1 Paragraph): Summarize your experience. What did you learn about user access and
security policies? What challenges did you encounter?

Rubric:
• User Folder Creation (25%) – Completeness and accuracy in creating folders based on NOS features.
• Access Level Configuration (25%) – Appropriateness of access levels assigned to each user role.
• Policy Establishment (25%) – Relevance and clarity of access policies created for each role.
• Security Check Plan (15%) – Feasibility and thoroughness of the security check plan.
• Reflection (10%) – Insightfulness and clarity in summarizing learning and challenges.

Submission: Next class session.

Prepared by: Checked by:

DONNA D. SAMPER JOYCE M. HERNANDEZ

Teacher I Teacher II/Subject Group Head- TVL

HILDA REMENDADO WILMOUR F. RAÑON LOURDES R. BIGCAS, PhD

Master Teacher II/ASP Designate Head teacher II/ASP Designate School Principal IV

You might also like